DPIT127 Networks and Communications Supplementary Final Assessment (Autumn Session 2020) Page 1 of 2 DPIT127 Networks and Communications Autumn Session 2020 Supplementary Final Assessment (Weighting:...

1 answer below »
I have attached the file l. Need a quotation for this task.


DPIT127 Networks and Communications Supplementary Final Assessment (Autumn Session 2020) Page 1 of 2 DPIT127 Networks and Communications Autumn Session 2020 Supplementary Final Assessment (Weighting: 30%) Total Marks: 60 Due Date: 26th June 2020 (Friday 03:00 pm). Submit your file to the Turnitin submission link on the subject Moodle site. Please read all the instructions given in each question carefully. Academic Integrity: Your submission must be completely your own work. If it is suspected that you have received assistance, eg, from an electronic source or another person, the matter can be investigated as an alleged breach of the UOW College Academic Integrity and Student Conduct Policy, in accordance with the Procedure for Managing Alleged Student Misconduct. Please note, as part of this investigation, you may be required to undergo an oral examination to verify your understanding of the assessment content. PART A: Short Answer Questions (12 x 5 = 60 Marks) 1. What is the different between a Router and a Switch? Justify your answer with appropriate explanation and diagrams. (05 marks) 2. Medium access control protocols allow devices to ‘take turns’ at transmitting data. Two major types of medium access control protocols are: contention-based and round robin protocols. With use of a diagram/flowchart or otherwise explain how the carrier sense multiple access with collision detection (CSMA/CD) work. (05 marks) 3. Show the equivalent analog sine-wave pattern of the bit string 00110101 using amplitude shift keying, frequency shift keying, and phase-shift keying. (Note: Please clearly identify the voltage levels for each scheme) (05 marks) 4. Code division multiplexing allows multiple users to share a common set of frequencies by assigning a unique digital code to each user. Let us consider an example of 2 mobile users A and B who use code division multiplexing. Mobile user A has been assigned a binary code of 11110000, and Mobile user B has been assigned a binary code 10101010. The mobile users A transmits a 1, while Mobile user B transmits a 0. Show the sum of products that results and your calculations. (05 marks) 5. A company has 240 workstations in their head office and the IT manager would like to assign a subnetwork address for each department. He wants to create 8 subnets using the 172.41.1.0/24 block and assign the first subnetwork to their servers and the rest for their 200 workstations. How will we compute the subnetwork requirement? Clearly, identify the network ID, broadcast ID and host IDs for each subnet. (05 marks) DPIT127 Networks and Communications Supplementary Final Assessment (Autumn Session 2020) Page 2 of 2 6. In an internet networking environment, TCP/IP protocol suite is used to define functions performed by different networking components, based on Open Systems Interconnections (OSI) model. Using a diagram, identify how the OSI model and the TCP/IP Protocol suite are mapped with each other. (05marks) 7. Using the flooding technique on the network graph shown in the figure below, how many packets will be created if a packet originates at node A and the network hop limit is set to 2? The cost of each path in the network is shown in the Figure below. (05 marks) 8. Explain the difference between circuit switch, packet switch, virtual circuit packet switch and broadcast networks structures? (05 marks) 9. How does the size of a key affect the strengths and weaknesses of an encryption technique? Consider both a friendly use of the key and an unfriendly use of the key. Assume a key is 28 bits. If it takes a computer 0.00024 seconds to try each key, how long will it take to try all possible keys? What if 1000 computers are working together to try all keys? What if the key is 64 bits in length? (05 marks) 10. What is the reliability of a modem if the MTBF is 3000 hours and a transaction take 15 minutes, or 1/4 of an hour (0.25)? (05 marks) 11. A company has two offices located approximately 1 mile apart. The company requires data transfer between these two offices at speeds up to 100 Mbps. List as many solutions as possible for interconnecting two offices. Justify the answers by understanding technical, financial, and political feasibilities. (05 marks) 12. You have a computer at home with a wireless NIC and wireless router. List all the security measures that should be employed so that your home network is secure. (05 marks)
Answered Same DayJun 24, 2021

Answer To: DPIT127 Networks and Communications Supplementary Final Assessment (Autumn Session 2020) Page 1 of 2...

Amit answered on Jun 25 2021
139 Votes
Title of the assignment: Supplementary Final Assessment
Student’s name:
Student ID:
Professor’s name:
Course title: DPIT127 Networks and Communications
Date: 6/25/2020
Table of Contents
1.    Answer 1    3
2.    Answer 2    4
3
.    Answer 3    4
4.    Answer 4    5
5.    Answer 5    6
6.    Answer 6    7
7.    Answer 7    8
8.    Answer 8    8
9.    Answer 9    9
10.    Answer 10    10
11.    Answer 11    11
12.    Answer 12    11
13.    References:    12
1. Answer 1
The table showing differences among routers and switch is provided below:
    Router
    Switch
    Data is transmitted as packets.
    Data is transmitted as frames.
    The set IP address is being used by router for performing data transmission.
    MAC address of device is used for data transmission.
    It mainly works on the network layer.
    It mainly works on the data link layer.
    Routing table is used for making data transfer.
    CAM table is used for making data transfer.
    Both WAN and LAN connections can be managed with it.
    Only LAN connections can be managed with it.
    
    
2. Answer 2
The flow chart showing working of CSMA/CD working is provided below:
3. Answer 3
The required sign wave with amplitude shift keying is shown below:
The required sign wave with frequency shift keying is shown below:
The required sign wave with phase shift keying is shown below:
4. Answer 4
Given that;
The binary code send by mobile user A is: 11110000 (++++----)
The binary code send by mobile user B is: 10101010 (+-+-+-+-)
The addition of these signals at receiver end is:
+    +    +    +    -    -    -    -
+    -    +    -    +    -    +    -
Sum: 2    0    2    0    0    -2    0    -2
Now, the actual transmission for receiver end is defined by sum of product, so:
Sum:          2    0    2    0    0    -2    0    -2
Code of A: +1    +1    +1    +1    -1    -1    -1    -1
Product:     2    0    2    0    0    2    0    2
Sum of product: 8
Same method is applied for user B:
Sum:          2    0    2    0    0    -2    0    -2
Code of A: +1    -1    +1    -1    +1    -1    +1    -1
Product:     2    0    2    0    0    2    0    2
Sum of product: 8
5. Answer 5
The table showing for network ID, host IB and broadcast ID for eight subnets is provided below:
    Subnet name
    Network ID
    Host ID
    Broadcast ID
    Server
    172.41.1.0
    172.41.1.1
    172.41.1.255
    Subnet 1
    172.41.2.0
    172.41.2.1
    172.41.2.255
    Subnet 2
    172.41.3.0
    172.41.3.1
    172.41.3.255
    Subnet...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here