en 2005 to 2007

Upload: sevastari-rose

Post on 06-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 EN 2005 to 2007

    1/43

    Chapter (1) 2005/2006/2007

    1. List the two basic components of a computer network.

    Links

    Nodes

    2. Sate the two primary objectives of a telecommunications operator.

    To meet the end-users needs.

    To make a profit

    3. Name the seven layers of the Open Systems Interconnection (OSI) model and describe the

    function of each layer.

    Physical layer

    Deals with physical attachment to communication lines

    Data link layer

    Provides transfer and control data over communication lines, error correction, etc.

    Network layer

    Adds destination switching, routing, and relaying functions and presents them independency of

    the network in use.

    Transport layer

    Provides user-to-user services, including multiplexing to make he most effective use of network

    facilities. It enhances the quality of service.

    Session layer

    Controls the dialogue between uses and supports synchronization of their activity.

    Presentation layer Allows for the selection of the representation of data, resolving differences between systems.

    Application layer

    Provides the interface to user applications and common services, such as file transfer and

    terminal support.

    4. State which layers of the OSI model a voice network has to comply with.

    Layer 1 to 3

    5. What is a protocol?

    When information is transferred from one computer to another the method of transfer must be

    strictly controlled.

    A protocol is a set of rules that control this transfer of information.

    Page 1 of43

  • 8/3/2019 EN 2005 to 2007

    2/43

    6. Why are protocols necessary for communication in networks?

    Protocols allow computers form different manufacture and/ or running different software to

    communicate with each other.

    7. Briefly describe three of the resources that make up a network.

    The interconnecting circuits that allow communication over the network.

    The equipment that is connected by these circuits.

    The people responsible for planning, building, and running the network.

    The software running on the network.

    Chapter-2 (2005/2006/2007)

    1. Compare and contrast two different bearer media, giving examples of its use.

    Example- Fiber-optic cable

    Transmission occurs at light-wave frequencies that allow a much greater amount of information

    to be carried.

    They are immune to electrical interference.

    Capable of carrying signals over long distances and capable of facilitating high transmission

    speeds.

    Suitable example - large LAN.

    Example- Copper cable

    Easy to connect and disconnect which has disadvantages as well as advantages.

    Takes the form of coaxial cable or twisted pair.

    Big advantage is the relative low cost.

    Suitable example Ethernet.

    2. Use a diagram to explain the difference between star and interconnected star networks.

    3. Describe a situation where an interconnected star network may be used.

    Star network are often used to provide interconnectivity in a particular locality.

    It would often be uneconomical to provide the same level of interconnectivity to a different

    location so trunk or tandem exchanges are used to connect star networks.

    4. Explain the term transmission bearer network.

    The high order network used to provide the links from which communication channels can be

    derived in order to link telephone exchanges, packet switching exchanges, etc.

    Page 2 of43

  • 8/3/2019 EN 2005 to 2007

    3/43

    5. a) Explain the concept of the carriers carrier.

    b) Give an example use for each of the media given in your anser to question a)

    A network operator may have spare capacity on their network and in order to fully utilize this

    capacity they will rent it out to one of their competitors.

    E.g. Fiber-optic cable

    Suitable Example: large LAN

    E.g. Copper cable

    Suitable example: Ethernet.

    Chapter-3 (2005/2006/2007)

    1. Define analogue transmission.

    Analogue transmission involves transmission of a continuously variable signal, either directly, as

    a varying voltage on a cable, or indirectly, by using the analogue signal to modulate a carrier

    signal.

    2. Define digital transmission.

    Digital transmission involves transmitting a signal that is encoded as two or more discrete

    levels.

    3. Briefly describe the following type of distortion that may affect the signal quality in analogue

    transmission system.

    (i) Amplitude distortion

    (ii) Harmonic distortion

    (iii) Intermodulation distortion

    (iv) Attenuation distortion

    Amplitude distortion

    The amplitude of the output signal is not directly proportional to the amplitude of the input signal

    Harmonic distortion

    The output signal contains elements that are not present in the input signal but are harmonics of

    the input frequency.

    Intermodulation distortion

    If the input signal contains several frequencies the output will also contain the sums and

    differences of these frequencies.

    Attenuation distortion

    Attenuation occurs due to energy loss and delay due to the distance traveled.

    Page 3 of43

  • 8/3/2019 EN 2005 to 2007

    4/43

    4. Define the term of crosstalk.

    Sounds hearing in a telephone receiver associated with one channel resulting from the

    transmission of a signal in another channel.

    5. Describe THREE causes of crosstalk.

    The greatest cause of crosstalk in multi-core cables is due to capacitive imbalance between

    wires and from each wire in a circuit and earth.

    Crosstalk may occur if two wires have a different resistance due to a bad connection.

    Crosstalk may occur in frequency division multiplex system due to amplifier non-linearity.

    6. Describe the term Multiplexing.

    The term multiplexing is used to describe the division of a large bandwidth into a series of

    smaller bandwidth channels.

    These smaller channels are termed baseband channels.

    And the transmission channel from which they are derived is termed the broadband or bearer

    channel.

    7. Describe the two mains methods of multiplexing.

    Frequency Division Multiplexing (FDM) used in analogue systems. In FDM the baseband

    channels uses the entire bandwidth of the bearer on a permanent basis.

    Time Division Multiplexing (TDM) used in digital systems. In TDM each baseband channel

    uses the entire bandwidth, but only on a temporary basis.

    8. Describe the different between Dense Wave Division Multiplexing (DWDM) and early WDM

    systems.

    Advances in optical amplifiers and lasers allow wavelengths to be more closely spaced.

    This allows multiple signals to be transmitted at the same time along the same fiber at different

    wavelengths.

    The effect is that one fiber is transformed into multiple virtual fibers. And the capacity of each fiber is greatly increased.

    9. Describe four advantages of DWDM.

    It allows the network to carry a greater amount of traffic.

    It is protocol and bit-rate independent and can carry different types of traffic at different speeds.

    Page 4 of43

  • 8/3/2019 EN 2005 to 2007

    5/43

    Creates a lower cost way of meeting customer bandwidth needs and for protocol changes.

    Increases distances between network elements.

    10. Define the term modulation.

    Modulation is a process of making a signal suitable for sending over a transmission medium.

    11. Describe each of the following modulation methods.

    (i)Amplitude Modulation

    (ii)Frequency Modulation

    (iii)Pulse Amplitude Modulation

    Amplitude Modulation

    Amplitude Modulation where the modulator causes the envelope of the carrier frequency to

    follow the waveform of the modulating signal.

    The demodulator recovers this modulating signal from the envelope.

    Frequency Modulation

    Frequency Modulation where the modulating signal causes changes to the frequency of the

    carrier signal.

    This gives a more complex spectrum than AM and as a result occupies more bandwidth.

    Pulse Amplitude Modulation

    Pulse Amplitude Modulation where carriers are modulated with a train of pulses.

    A train of direct current digital signals is converted into a train of carrier frequency samples. These samples are applied to an Analogue-to-Digital Converter (ADC) resulting in a series of

    on-off pulses.

    12. State three reasons why modulation may be required.

    To modulate a radio frequency carrier with an audio frequency signal.

    To improve the signal-to-noise ratio.

    To divide a bandwidth up into smaller communication channels.

    13. Define the term non- linear distortion.

    The output signal amplitude is not proportional to the input signal amplitude.

    The output signal also contains harmonics that were not present in the input signal.

    Page 5 of43

  • 8/3/2019 EN 2005 to 2007

    6/43

    14. Draw a simple diagram to illustrate how several muldex units can be used to combine 120 64

    Kbits/s channels to form a single 8.448 Mbits/s channel.

    15. Describe in detail UDP- based Data Transport (UDT).

    UDT is a combination of 2 existing protocols, User Datagram Protocol (UDP) and Transmission

    Control Protocol (TCP).

    UDP provides a connectionless datagram service that offers best-effort delivery, i.e. delivery is

    not guaranteed and sequencing is not verified.

    Therefore UDP is fast and efficient but not reliable.

    TCP is a connection oriented reliable protocol in that it ensures error free delivery.

    TCP corresponds to the transport layer in the OSI 7-layer model.

    UDT uses one UDP based channel for data to be sent at high rates.

    And another TCP based channel is used to make the protocol reliable.

    The TCP channel is also used by the protocol for congestion control and rate control.

    16. Define the term bandwidth.

    The range of frequencies that may be transmitted without being strongly attenuated.

    17. Briefly explain how Wavelength Division Multiplexing (WDM) works in optical fibers.

    Wavelength Division Multiplexing allows two or more optical systems to operate over the same

    fiber by using light of different wavelengths or colored laser light, thus effectively increasing the

    capacity of the fiber. The technique can be likened to Frequency Division Multiplexing in that separating optical

    wavelengths (colors) is little different from separating the frequencies of electrical signals. In

    order to work filters are used to pass the required wavelength, while blocking others.

    By using WDM it is possible to increase the capacity of a pair of fibers (one for transmit, one for

    receive) from 140Mbits/s to Gigabits or even Terabits/s.

    18. Describe four advantages of DWDM.

    It allows the network to carry a greater amount of traffic.

    It is protocol and bit-rate independent and can carry different types of traffic at different speeds.

    Create a lower cost way of meeting customer bandwidth needs and for protocol changes.

    Increases distance between network elements.

    Page 6 of43

  • 8/3/2019 EN 2005 to 2007

    7/43

    Chapter-4 (2005/2006/2007)

    1. Explain the difference between forward signal and backward signals.

    Forward signals are from calling to call.

    Backward signals are in the opposite direction.

    2. Explain the difference between common- channel signaling and channel associated signaling

    Channel associated signaling has controlling and routing signals using the same channel as

    speech.

    In common channel signaling they use the spate signaling channel.

    3. Briefly describe seven advantages offered by common channel signaling.

    Information can be exchanged between processors more rapidly.

    Allows a wider repertoire of signals to be used giving a wider range of services to the customer.

    Signals can be added or changed by software modification to provide new services.

    Line signaling equipment is not needed at every junction thus reducing costs.

    Junctions can be used for calls in both directions thus reducing the number of circuits.

    Signals can be sent whilst the call is in progress thus allowing customers to alter connections

    after they have been set up.

    Signals can be exchanged for other functions, other than call processing such as network

    management.

    4. Common Channel Signaling System Number 7 (CCS N0.7) can be modeled as a stack of four

    protocols in a similar way to the OSI model above. Give a detailed description of each of these

    FOUR layers.

    Level 1 is the means of sending bit streams over a physical path.

    It uses time slot 16 of a 2 Mbit/s PCM system or slot 24 of a 1.5 Mbit/s system

    Level 2 performs the function of error control, link initialisation, error-rate monitoring, flow control

    and delineation of messages.

    Level 3 provides the functions required of a signaling network. Each network has a 14-bit signal

    point code address and every message contains the point codes of the originating and

    terminating nodes.

    Levels 1 to 3 form the message transfer part of the system.

    Page 7 of43

  • 8/3/2019 EN 2005 to 2007

    8/43

    Level 4 is the user part that consists of the processes responsible for handling the services

    being supported by the signaling system.

    The message transfer part is capable of supporting many different user parts including

    telephone user part, data-user part, mobile-user part and ISDN-user part.

    5. Describe the difference between continuous signals and pulse signals in a telephone. Give an

    example of each.

    A continuous signal remains in place for a length of time.

    E.g. when a caller lifts the receiver a direct current path is maintained with the exchange until

    the receiver is replaced.

    Pulse signals are intermittent and take the form of a single pulse or coded group of pulses,

    E.g. the dialed digits transmitted by a telephone.

    6. Describe the term continuous signal as applied to a telephone system and give an example of

    the use of a continuous signal in a telephone system.

    Continuous signal remains in place for a length of time.

    E.g. when a caller lifts the receiver direct current path is maintained with the exchange until the

    receiver is replaced.

    7. Define the term acknowledged signal and describe the operation of acknowledged signals in

    a continuous signaling system

    An acknowledged signal receives some kind of response.

    Typically the continuous signal is sent at least until the acknowledgement is received.

    The acknowledgement signal is maintained until the original signal is removed.

    8. Describe the term pulse signal as applied to a telephone system and give an example of the

    use of pulse signals in a telephone system.

    Typically the continuous signal is sent at least until the acknowledgement is received.

    The acknowledgement signal is maintained until the original signal is removed.

    9. Describe the operation of acknowledged signals in a pulse signaling system.

    Typically if an acknowledgement is expected the pulse will be repeated until the

    acknowledgement is received.

    10. Define inband signaling systems (voice frequency signaling system).

    Page 8 of43

  • 8/3/2019 EN 2005 to 2007

    9/43

    Signaling systems that use the 300 Hz to 3.4 kHz speech band.

    11. Describe the advantage of inband signalling systems.

    They will operate over any circuit that provides satisfactory speech transmission.

    12. Describe the disadvantage of inband signalling systems.

    Signal imitation impossible.

    Chapter-5 (2005/2006/2007)

    1. Define the term grade of service in telecommunications traffic theory.

    The probability of finding all circuits on a route simultaneously occupied.

    2. Define the term traffic carried in telecommunications theory.

    The mean number of calls in progress simultaneously.

    3. State the formula used for calculating traffic carried and explain the meaning of each symbol

    in the formula.

    A=C * t/T

    A=traffic in erlangs.

    T= mean call duration or holding time.

    C=number of calls.

    T= the time taken for those calls.

    4. Describe THREE assumptions made in the basic traffic model used as a mathematical model

    for telecommunications traffic.

    Calls arrive in a random fashion at a constant rate (a Poisson process).

    Calls terminate at random regardless of how long they have been in progress (have an

    exponential distribution).

    The system has operated with same call rate for some time ensuring that there is statistical

    equilibrium.

    5. A network has 10 erlangs of traffic and a grade of service of 0.07. Calculate the traffic carried.

    Traffic carried = A (1-B)

    =10(1-0.07)

    =9.3erlangs

    Page 9 of43

  • 8/3/2019 EN 2005 to 2007

    10/43

    6. Calculate traffic carried by 4 circuits in 100 seconds from the following information.

    Circuit 1 carries 1 call of duration 65 seconds.

    Circuit 2 carries 1 call of duration 35 seconds and 1 call of duration 40 seconds.

    Circuit 3 carries 1 call of duration 80 seconds.

    Circuit 4 carries 2 calls each of duration 40 seconds.

    Show all you are working out as part of the answer.

    Traffic =average occupancy = call arrival rate * call holding time

    Total occupancy = 65+35+40+80+(2*40)

    Total occupancy = 300 seconds

    Traffic carried = total occupancy/ time available

    Traffic carried = 300/ 100

    Traffic carried = 3 erlangs

    7. Briefly describe the TWO alternative methods commonly used by telecommunication

    companies

    In a non-hierarchical network the use of automatic alternative routing increases network

    capacity. However, once the traffic increases to a maximum possible level effect of automatic

    alternative routing decreases. Therefore measures must be taken to prevent --- an overload

    reducing network capacity. One method uses trunk reservation where calls overflowing from a

    direct route are blocked when there are fewer than predetermined quantities of circuits free on

    the alternative route.

    An alternative method of dealing with congestion is known as call gapping and this is achieved

    by the Network Management Centre (NMC) only allowing through, say, one call every x

    seconds, where x is varied according to the capacity of the destination to receive calls.

    Chapter 6 (2005/2006/2007)

    1. Describe the THREE basic types of paging service in common use.

    Tone paging. The unit vibrates or emits an audible bleep when the wearer is paged. The user

    then has to call the service operator to collect any message;

    Numeric paging. The unit emits an audible bleep and displays a call-back number;

    Message paging. The unit can display a text message of variable length (up to 400 characters in

    length, but this figure varies between network operators and as terminals are updated).

    Page 10 of43

  • 8/3/2019 EN 2005 to 2007

    11/43

    2. Briefly describe THREE major limitations of paging systems.

    No voice services are offered.

    Data transmitted is only in the form of text or numeric messages.

    One-way communication only, from base to mobile.

    3. Define the term Mobile Communication Network.

    a. A communications network that allows communication to take place whilst some or all of

    the users of the network are moving relative to each other.

    4. Describe FOUR advantages of mobile networks.

    It is easier to stay in contact.

    Access to timely and accurate information is available while away from a home base.

    Productivity and efficiency are improved.

    Different working patterns can be accommodated, e.g. working from home.

    5. Give a detailed description of how mobile data communications are provided via satellite.

    Access to satellite communications is via a terrestrial network provider in the home country.

    They look after the space segment of the communications path.

    Public fixed network providers provide the connection to the base station in the home country.

    Satellites provide a relay link to homeland earth station from mobile terminal.

    Two-way voice communications are available.

    Data is broken into packets for transmission and reassembled at the land earth station or mobile

    terminal.

    Data rates vary the service but can be moderately high for dedicated channels.

    Closed user groups can be formed.

    Satellite services are the only option if truly global mobile data communications are requirement

    6. Describe FOUR reasons why the quality of voice communications on analogue mobile

    networks can be lower than on fixed ones.

    Mobile network tend to use lower bandwidth than fixed networks. As radio spectrum is scarce

    large chunks cannot be allocated for high quality voice communications.

    Higher backgrounds noise as this is more significant on radio channels than fixed channels.

    More interference from other users of the radio spectrum.

    Some networks use the voice channel for network control signaling and this blank out the voice

    when control signals are sent.

    Page 11 of43

  • 8/3/2019 EN 2005 to 2007

    12/43

    7. Describe the key features of a mobile communication networks.

    A communication network that allows communication to take place whilst some of all of

    the users of the network are moving relative to each other.

    8. Compare the quality of voice communications on digital mobile networks to fixed networks.

    The quality levels are similar between digital mobile networks and modern terrestrial voice

    networks.

    9. Describe FOUR characteristic features of Private Mobile Radio (PMR).

    Provide local radio communication on a single channel (e.g. taxi firm).

    Communications are half-duplex and require strict operating procedures (e.g. the use of over

    at the end of a message).

    Requires a license from the relevant government department.

    Bandwidth and channel availability is limited.

    10. Describe THREE disadvantages of Private Mobile Radio.

    Lack of privacy as all communication takes place on a single channel and anyone with a

    suitable receiver can listen to the broadcasts.

    Communications are limited to a small radius resulting in a mobile unit losing the ability to

    communication when it is out of range.

    The channel may become congested at peak times making it difficult to access.

    11. Briefly describe THREE environmental factors that may affect the operating range of a

    wireless LAN within a building.

    General building design - the position of walls, ceilings, windows, etc.

    Construction materials steel, wood, etc. Room layout the position of furniture and the materials it is made out of electrical interference

    from motor, TV, radio, etc.

    Chapter 7 (2005/2006/2007)

    1. Define a switched network.

    Page 12 of43

  • 8/3/2019 EN 2005 to 2007

    13/43

    Data is transferred from source to destination through intermediate nodes.

    The nodes provide the switching capability from progressing the data towards its destination.

    2. Define a packet switched network.

    o Data is sent in a series of small chunks called packets.

    o Each packet is transferred from node to node towards its final destination.

    o At each node the packet is stored briefly and then transmitted to the next node.

    3. Describe SEVEN important differences between a switched network and a packet switched

    network.

    A single user cannot monopolies a transmission line as packets from different users can be

    mixed.

    Circuit switching has static bandwidth allocated whereas packet switching allows fro dynamic

    acquisition and release of bandwidth.

    Packet switching allows different packets to travel via different routes.

    Packet switching allows more economical use of transmission lines as a result of the previous

    two points.

    Circuit switching allows a more deterministic flow from source to destination which is important in

    some applications.

    Circuit switching requires time to set up the circuits, this is not necessary in packet switching.

    Charges for circuit switching are usually based upon time of connection and possibly distance

    whereas packet switching may charge on quantity of data transmitted.

    4. Briefly describe the TWO major functions of a (PAD).

    Assemble characters from the Data Terminal Equipment (DTE) into packets for transmission

    across the network.

    Disassemble the packets into characters that are passed onto the DTE.

    5. Briefly describe SEVEN advantages of X.25 packet switching.

    Support for the X.25 interface is widespread on host, terminal, LAN and switching systems.

    Multiplexing allows connection from a single DTE to many DTEs.

    Virtual calls in connection oriented networks enable soft connections to be made between DTEs.

    The network connections are balanced.

    Emulation of asynchronous protocols by PADS provides opportunities for cheap wide-area

    connections between PCs.

    Page 13 of43

  • 8/3/2019 EN 2005 to 2007

    14/43

    Any number of applications can share the available capacity on a network.

    DTE support for X.25 is available on most manufacturers equipment and packets can be routed

    without the need to configure a physical circuit.

    Can handle relatively large numbers of DTEs sending packets at speeds of 64kbit/s.

    6. Give a brief description of the following:

    a) Circuit switching

    Consists of the establishment of an end-to-end link for the time the connection is being used.

    b) Packet switching

    Consists of the establishing a connection at intervals between two points in order to transmit a

    discrete packet of data.

    7. Explain how circuit switching and packet switching methods operate when all possible links

    in a connection are occupied.

    Circuit switching

    The user receives a busy signal and the call attempt is lost.

    Networks should be dimensioned so that the incidence of this is small.

    Packet switching

    The packets are stored in a queue and transmitted when a link becomes available.

    In this method the call is delayed but not lost.

    8. Describe the key features of a Frame Relay network.

    Provides a greatly simplified packet switching protocol.

    It is a connection oriented network with no error or flow control.

    The customer leases a Permanent Virtual Connection providing connectivity between

    locations.

    The PVs is created in software by the network provider and configured remotely.

    Chapter-8 (2005/2006/2007)

    1. Describe video conferencing using ISDN.Remote meetings can take place using dial-up connections and high quality video and audio

    monitors.

    Allows people to be brought into and taken out the discussion as required.

    This will save time and money as staff can be effectively in more than one place at one time.

    Page 14 of43

  • 8/3/2019 EN 2005 to 2007

    15/43

    2. Describe remote surveillance using ISDN.

    Used by organizations with remote sites that requires guarding against intrusion, fire on

    other threats.

    Does not require neither private connections nor permanent on-site security guards as

    all sites can be monitored at a central office.

    Allows automatic alarms to be reported automatically.

    High data rates allow cameras to have screen refresh times of around second giving improved

    security coverage.

    3. Briefly describe THREE conversational service applications that may be provided by

    broadband ISDN.

    Tele-education sound, video and written material can be used for distance learning

    and be transferred in both directions.

    Video surveillance using cameras to monitor a situation, e.g. CCTV, traffic cameras,

    etc.

    Video/audio transmissions TV signal transfer and audio transfer.

    Multiple sound programme signals several different audio signals can be

    transmitted simultaneously, (e.g. multi-lingual commentary).

    High speed data transmission has many uses including multi-site interactive

    CAD/CAM and real-time metering systems.

    4. Define the term integrated services digital networks (ISDN).

    ISDN is network, in general evolving from telephony IDN.

    It provides end-to-end digital connectivity.

    It supports a wide range of services, including voice and non-voice services.

    Users have access by a limited set of standard multi-purpose, user-network interfaces.

    5.i) Describe how B-channels and D-channels are combined to give the Primary Rate Access

    (PRA) ISDN of 2.048 Mbit/s in Europe.

    European PRA ISDN is made up of 30 B-channels an 2 D-channels.

    Both B-channel and D-channels work at 64 kbit/s.

    Thus 32 * 64 Kbits = 2048 kbit/s.

    =2.084 Mbit/s.

    ii) Explain the function of the B-channels and D-channels within PRA ISDN.

    Page 15 of43

  • 8/3/2019 EN 2005 to 2007

    16/43

    Each B-channel carries voice or data.

    One D-channel is used for signalling.

    The other D-channel is used for synchronization and monitoring functions.

    6. Briefly describe how analogue signals can be transmitted in digital form.

    The analogue signal is sampled at regular intervals.

    The sampled signal levels are transmitted as a digital data stream.

    7. Describe the TWO principal access structures for ISDN which have been defined by the ITU-T.

    Basic Rate Access

    Provides the user with two simultaneous user channels (B channels).

    Each can carry data to different locations at a rate of 64 Kbit/s.

    A third channel (D channel) is primarily used fro signaling.

    The D channel is sometimes used to provide the user with a slower 9.6 Kbit/s data channel.

    A total data rate of 144 Kbit/s is available.

    Primary Rate Access

    Provides the user with 30(23 in North America/Japan) independent data/voice use channels (B

    channels).

    Each can carry data to different locations at a rate of 64 Kbit/s.

    One D channel is primarily used for signalling and another for monitoring and synchronization.

    A total data rate of 2.048 Mbit/s (1.544 Mbit/s in North America/Japan is available.

    Can accommodate higher speed H channels.

    Chapter-9 (2005/2006/2007)

    1. Briefly describe the SIX key features of the Asynchronous Transfer Mode of data

    transmission.

    Packets are of fixed length (53 Octets) and known as cells.

    Operates in a connection-oriented mode and before information is transmitted a virtual

    connection is established and the resources for this reserved. If insufficient resources are

    available at the time the call is refused.

    There is no error protection or flow control on a link-by-link basis. Error control for the

    information in cells (not in their headers) can be omitted because of the very low error rates.

    The headers are short because they are limited to identifying the virtual connection and to

    ensure correct routing of the cell.

    Page 16 of43

  • 8/3/2019 EN 2005 to 2007

    17/43

    The information field is short. This also reduces the length of the cell, which reduces the

    packetizing delay at the sending terminal. It also reduces the size of internal buffers at switching

    nodes and their queuing delays.

    A policing function is included to ensure that a user is not sending and receiving digits at a

    higher rate than they have chosen to pay for.

    2. Explain why copper-based broadband is used when there are advantages to using fiber-

    optics.

    Much of the worlds telecommunications infrastructure is still based upon copper wires.

    Therefore, the cost of replacing all this copper wire with fiber-optic cable is high and would also

    require time. This means that there is a need for broadband systems based upon copper wire.

    3. Describe in detail the operation of the Asymmetric Digital Subscriber Line (ADSL) technology.

    Allows existing wiring into the home to be used for high speed digital communication.

    Uses separate transmission frequencies to provide what are effectively a voice channel and a

    data channel on a single standard telephone line.

    A POTS splitter at the exchange and a signal filter in the ADSL modern keep the voice signals

    and data signals apart.

    At the exchange the ADSL traffic is handled by a DSLAM which handles a number of ADSL

    lines and concentrates them into a single ATM line.

    Because ADSL is asymmetric the data does not flow at the same rate in both directions.

    Maximum download is at 8 Mbit/s and maximum upload at 784 kbit/s.

    4. Describe the difference between cable broadband and ADSL.

    Cable broadband generally utilizes coaxial cable and cable modems to provide broadband

    services to the home.

    Cable not always available to commercial users as often provided by cable TV companies.

    5. Describe FIVE delays that are encountered in a n ATM networks.

    Packetisation typically a few milliseconds for Pulse Code Modulation.

    Transmission for modern networks this is typically around 5 microseconds per kilometer.

    Fixed switching the time taken for a cell to traverse a switch. There are 10s of cells per

    exchange with a typical delay of around 30 microseconds per exchange.

    Queuing delays are necessary to avoid loss of cells and increase with traffic load on a switch.

    Typically around half a millisecond for a 53 octet cell.

    Page 17 of43

  • 8/3/2019 EN 2005 to 2007

    18/43

    Depacketisation cells are buffered at receiving terminals and must accommodate delay

    variations in queuing delay but the maximum is specified in the queuing delay.

    6. Briefly describe the TWO major functions of a Packet Assembler Disassembler (PAD).

    (i) Describe in detail the operation of the Asymmetric Digital Subscriber Line (ADSL)

    technology.

    ii) Describe the main differences between Rate Adaptive Digital Subscriber Line (RADSL)

    technology and ADSL technology.

    The TWO major functions of a Packet Assembler Disassembler (PAD).

    Assemble characters from the Data Terminal Equipment (DTE) into packets for transmission

    across the network.

    Disassemble the packets into characters that are passed onto the DTE.

    The operation of the Asymmetric Digital Subscriber Line (ADSL) technology.

    Allows existing wiring into the home to be used for high speed digital communication.

    Uses separate transmission frequencies to provide what are effectively a voice channel and a

    data channel on a single standard telephone line.

    A POTS splitter at the exchange and a signal filter in the ADSL modem keep the voice signals

    and data signals apart.

    At the exchange the ADSL traffic is handled by a DSLAM which handles a number of ADSL

    lines and concentrates them into a single ATM line.

    Because ADSL is asymmetric the data does not flow at the same rate in both directions.

    Maximum download is at 8 Mbit/s and maximum upload at 784 Kbit/s (modern xDSL can do 40

    Mbit/s).

    The main differences between RADSL technology and ADSL technology

    RADSL is a variation of ADSL in which software is able to determine the rate at which signals

    can be transmitted on a given customer phone line and adjust the delivery rate accordingly.

    It delivers the highest possible performance over standard phone lines.

    7. Describe the main differences between cable broadband and ADSL.

    Cable broadband generally utilizes coaxial cable and cable modems to provide broadbandservices to the home whereas ADSL uses different frequencies to provide data channel on a

    standard telephone line.

    Cable not always available to commercial users as often provided by cable TV companies

    whereas ADSL is supplied by telephony companies and, therefore, usually available to all.

    Page 18 of43

  • 8/3/2019 EN 2005 to 2007

    19/43

    Chapter 10 (2005/2006/2007)

    1) Describe THREE reasons why the initial take-up rate of wireless networking was slow.

    The original data rates were too slow for mainstream users on a shared LAN and

    wireless speeds were much slower than for wired networks.

    Only property, non-standard solutions were available with little interoperability betweendevices and users had little confidence in the market.

    The cost was high compared to wired solutions despite the slower speed.

    2) Describe the TWO key components of a wireless LAN.

    An Access Point acts as a base station transmitting and receiving voice/data via radio

    waves. Access Points provide the link between devices and the network.

    Each device has a Wireless Adapter that is usually situated in the device itself. These

    are capable of transmitting and receiving digital signals and come ion a variety of

    formats depending upon the device.

    3) Define the term wireless hotspot.

    An area defining the range of transmission around an access point.

    4) i) In terms of threats to security, describe the main difference for a wireless LAN when

    compared to a conventional wired LAN.

    The transmission of a wireless network cannot be confined to the building.

    RF signal can be easily intercepted outside the premises.

    Any unauthorized mobile device can act as a receiver.

    Enabling eavesdropping or drive-by hacking from nearby premises.

    The hacker may remain undetected as there is no need to physically enter or connect to

    the premises.

    ii) Name and describe the standard that minimizes the risk of security compromise for

    wireless LAN.

    IEEE 902.1lb includes a security feature called Wired Equivalent Privacy.

    It provides a method for encryption transmissions and authenticating each

    computer using the network.

    Page 19 of43

  • 8/3/2019 EN 2005 to 2007

    20/43

    (5)Detail how Bluetooth wireless networking operates.

    Each piconet can support up to 8 devices simultaneously

    - Piconets can be bridged to make larger networks.

    - The maximum operating range for devices that can extend the range to 100 meters in ideal

    conditions.

    - Offers stable and reliable performance even in noisy environment.

    - Data rates are low with throughput up to 1 M bit/s.

    (6)List TWO imitations of Bluetooth

    - Short operating range

    - Limited data throughput

    - Reliance on a crowded spectrum band (2.4 GHz)

    (7)Define the term Mobile Communications Network

    - A communications network that allows communication to take place whilst some or all of the

    users of the network are moving relative to each other.

    (8)Describe FOUR advantages of mobile network

    - It is easier to stay in contact

    - Access to timely and accurate information is available while away from a home base.

    - Productivity and efficiency are improved

    - Different working patterns can be accommodated. E.g. working form home

    Chapter11

    2005/2006/2007

    (1)Each computer (host) connected to the Internet has a unique IP address. Describe from of this

    address and explain what it is used for.

    - Addresses have the form of a dotted quad a. b. c. d.

    - Where a, b .c, d are 8-bit numbers between 0 and 255.

    - These addresses are attached to packets.

    - Allowing the target address to be determined.

    Page 20 of43

  • 8/3/2019 EN 2005 to 2007

    21/43

    (2)Using an example, explain how the Domain Name System (DNS) is used to provide a name for a

    website host.

    E.g. www.ncceducation.co.uk:

    - A textual name is used instead of a numerical IP address

    - The name is built up from a number of domains separated by dots, read from left to right.

    - The www host belongs to the NCC education domain

    - This in turn belongs to the co domain which is reserved for companies

    - This in turn belongs to the UK domain which is used UK based organizations.

    Ensure that marks are awarded for alternative examples, e.g. biz, .com, .net or domains for other

    countries e.g. nccedu.ae

    (3) Describe the objectives of the standard Interior Gateway Protocol of Open Shorter Path First

    (OSPF).

    Dynamic-has to allow the dynamic updating of routing tables.

    Load balancing- must balance the load of packets sent over different routes so that capacity is

    used effectively.

    Hierarchical- impossible to know the entire internet so a hierarchy of knowledge is required.

    Security-preventing routers from being subverted by hackers.

    (4)Describe the problems faced by exterior routing protocols.

    - Must allow for the fact that certain routes may or should not be used

    - Data transmission must be paid for so the owners of the data must pay for the necessary links.

    - Packets from non-contributing networks should be excluded.

    - Must be capable of handling extremely high volumes of data in a secure and robust fashions.

    (5)i) Define an internet

    An internet is a collection of packet switching networks interconnected by routers, using

    protocols that allow them to perform logically as one single network.

    (ii)Define the Internet

    Page 21 of43

    http://www.ncceducation.co.uk/http://www.ncceducation.co.uk/
  • 8/3/2019 EN 2005 to 2007

    22/43

    The internet is a collection of networks and routers spanning most countries and uses the

    TCP/IP protocol to form a single virtual network.

    (6)Describe how subnet addressing works

    - A part of the HOSTID section of the address is used to indicate which network is intended.

    - These subnets are meaningless to any router outside the business.

    - Internal routers can use this route packet to the relevant subnet work.

    - A subnet mask is used to show which part of the address is used for the host.

    (7)Name and briefly describe the EIGHT component parts of an IPng (Internet Protocol version 6)

    header.

    VERSION- 4-bit Internet Protocol version number=6.

    PRIORITY- 4-bit priority value enables the source to identify the desired delivery priority

    of its packets, relative to other packets from the same source.

    FLOW LABEL- 24-bit label may be used by source to label those packets for special

    handling by IPv6 routers

    PAYLOAD LENGTH- 16-bit unsigned integer giving the length of payload, i.e. the rest of

    the packet following the header, in octets

    NEXT HEADER- 8-bit selector identifying the type of header immediately following the

    IPng header.

    HOP LIMIT- 9-bit unsigned integer decremented by 1 by each node that forwards the

    packet. The packet is discarded if this reaches zero.

    ADDRESS- 128-bit address of the sender

    ADDRESS-128-bit address of the recipient of the packet which may be the ultimate

    recipient

    (8)Describe the responsibilities of the Internet Corporation for Assigned Names and Numbers (ICANN)

    - Responsible for coordinating and managing the Domain Name System (DNS).

    - Ensure that every address is unique and that all users can find all addresses.

    - It does this by distributing unique addresses and domain names and ensuring that they map

    onto each other

    - Also responsible for accrediting domain name registrars.

    - This means to identify and set minimum standards for registration functions.

    Page 22 of43

  • 8/3/2019 EN 2005 to 2007

    23/43

    - And recognize entities meeting those standards and enter into accreditation agreements.

    (9)Briefly explain the purpose of the Internet Protocol (IP)

    IP defines the rules for the transfer of packets from one location to another.

    (10)Describe the functions of the Transmission Control Protocol (TCP)

    - TCP operates on top of IP to produce reliable delivery of data from one host to another.

    - It takes care of breaking down data into packet-sized chunks and reassembling them at their

    destination.

    - It ensures the transmission is reliable by using a checksum for each packet.

    - If a packet is corrupted TCP will detect this and request a retransmission of that packet.

    - It will detect missing packets and request their transmission.

    (11)(i)Describe how Voice-over IP (VoIP) works

    - The voice signal needs to be turned into a digital signal

    - Chopped up into packets

    - Sent by possible varying routes with different timings

    - Assembled back into an audio waveform with no gaps and accurate timing

    (ii)Briefly describe FOUR advantages in using Voice-over IP

    - Voice and data can be transported over the same lines.

    - By using compression technology more calls can be placed on those lines than in the circuit

    switched environment.

    - Up to 8 times as many calls can be placed on the lines without sacrificing sound quality

    network infrastructure.

    - Enables different devices to communicate with one another, e.g. PC to phone.

    (iii)Briefly describe THREE disadvantages to using Voice-over IP

    - In order for an IP network to consistently transmit voice packets it must meet strict performance

    criteria.

    - The underlying system must be transparent to phone users.

    - Basic management procedures such as addressing, security and accounting must be in place.

    Page 23 of43

  • 8/3/2019 EN 2005 to 2007

    24/43

    (12)Describe in detail UDP-based Data Transport (UDT)

    - UDT is a combination of 2 existing protocols. User Datagram Protocol (UDP) and Transmission

    Control Protocol (TCP)

    - UDP provides a connectionless datagram service that offers best-effort delivery. I.e. delivery is

    not guaranteed and sequencing is not verified

    - Therefore UDP is fast and efficient but not reliable

    - TCP is a connection oriented reliable protocol in that it ensures error free delivery

    - TCP corresponds the transport layer in the OSI 7-layer model

    - UDT uses one UDP based channel for data to be sent at high rates

    - And another TCP based channel is used to make the protocol reliable

    - The TCP channel is also used by the protocol for congestion control and rate control.

    (13)(i)Describe the role and operation of the Internet Engineering Task Force (IETF) in the developmen

    of the Internet

    - The IETF is a large, open, international community of network designers, operators,

    vendors and researchers concerned with the evolution of the internet architecture and

    the smooth operation of the internet.

    - Its work is done by working groups which are organized by topic into several areas (e.g.

    transport, security, etc.)with much work being handled by mailing lists.

    (ii)Describe the role and operation of the Internet Assigned Numbers Authority (IANA) in the

    development of the internet.

    - The IANA is the central coordinator for the assignment of unique parameter values for internet

    protocols

    - The IANA is chartered by the Internet Society (ISOC) to act as a clearing house to assign and

    coordinate the use of numerous Internet protocol parameters

    (14)Describe in detail, the purpose and operation of an Extranet.

    - An Extranet is a virtual intranet that is run on a system managed by a third party.

    - Corporate information and events can be accessed and updated by authorized employees from

    any Internet connected PC.

    - It allows all staff to receive up to date corporate information in any Extranet

    - Built using a comprehensive system of firewalls to control and manage access and maintain

    integrity

    Page 24 of43

  • 8/3/2019 EN 2005 to 2007

    25/43

    - It is partially private, partially public network.

    - Typically a server acts as an intermediary between the companys intranet and the Internet.

    - The purpose of this server is to authenticate users and allow access to the companys intranet

    and block out unauthorized access.

    (15)Describe the reasons for the development of Internet Protocol version 6 (IPv6) which is also known

    as Next Generation Internet Protocol (IPng).

    There is a limit on the number of addressees available via the dotted quad format of IP version 4 and

    this is becoming a problem.

    An updated IP was therefore required that was interoperable with the current IP.

    (16)Describe SIX changes made by Internet Protocol version 6 (IPv6) that improve on Internet Protocol

    version 4 (IPv4).

    - The address size is increased from 32-bit to 128-bit allowing for more levels of hierarchy and

    more addressable nodes.

    - The use of any cast addresses allowing a node to specify the path through which a message

    flows

    - The header has been simplified producing a smaller header even though the addresses are

    longer.

    - Changes in the way header options are coded allows for more flexibility to introduce more

    options in the future- Quality of service capabilities have been introduce allowing the sender to specify non-standard

    handling of packets

    - Extensions are defined that allow for the handling of authentication, confidentiality and data

    integrity.

    (17)The following is layout of an IP datagram:

    Describe the usage of the following parts of the datagram:

    (i)HLEN

    - The datagram header length

    - This is necessary because the IP OPTIONS and PADDING many vary in length

    (ii)TOTAL LENGTH

    Page 25 of43

  • 8/3/2019 EN 2005 to 2007

    26/43

    - The total length of the datagram

    - Measured in octets

    (iii)SERVICE TYPE

    - How a datagram should be handled by routers and destination host.

    - It allows for priorities and preferred transport to be defined

    Chapter 12

    2005/2006/2007

    (1)Briefly describe the primary functions of a network management system.

    - To monitor the networks performance to determine whether it is fully operational.

    - To take effective remedial actions should any of the networks operating parameters fall outside

    the predetermined values.

    (2)(i) Describe the FOUR levels of management of a network. Include their levels of responsibility

    1. Business level

    - Management of the network operating business including sales, marketing,

    customer administration, billing, accounting, inventory control and investment

    planning

    2. Service level

    - Management of the user services.

    3. Network level

    - Asset management including management of the database that records all

    assets. The database also includes details of the network, route optimization;

    flow control measures contingency pans, etc.

    4. Network element level

    Page 26 of43

  • 8/3/2019 EN 2005 to 2007

    27/43

    - Records the installation of equipment, the prediction, detection and rectification

    of faults, plus the management of maintenance.

    (ii)Explain which of these levels would be of least interest to a network user.

    At the business level the decisions are largely strategic for the business and of less interest to the user.

    (3)TWO types of financial cost relating to telecommunications network.

    - The capital cost of establishing the network

    - The ongoing cost of operation the network

    (4)(i)Describe the term redundancy when applied to network design

    The inclusion of additional links in a network that can be used in the event of failure thus

    increasing network resilience.

    (ii)Describe FOUR factors that should be taken into account when designing redundancy in a

    network.How important is the traffic, what are the implications to the business, how long to repair the

    link and is the downtime acceptable.

    - What is the most likely reason for failure, interface hardware or the cable?

    - What physical paths do the main and back-up links follow? It is best to have different paths toeliminate one threat breaking both.

    - Can load sharing be used to utilize both main and back-up links thus improving network

    performance?

    (5)Define Network Management

    Assessing the likely benefits likely to ensure from all facets of work associated with the operation of a

    network

    (6)(i) Briefly describe the TWO main characteristics of a network operation that are important to network

    management.

    - The network should preferably be operational at all times

    Page 27 of43

  • 8/3/2019 EN 2005 to 2007

    28/43

    - If a network becomes unoperational when it is required it should be restored to an operable

    state in the shortest possible time.

    (ii) Describe how network management ensures that the characteristics given above are maintained

    The network performance is monitored

    - Remedial action is taken whenever any of the networks parameters move outside of the

    predetermined limits.

    (7) Briefly describe the TWO main priorities of network management from the network point of view.

    Ensuring the cost of network management is kept as low as possible.

    - Ensuring that the systems that manage the network are as reliable as possible

    (8)Briefly describe the THREE resources that make up a network

    - The interconnecting circuits that allow communication over the network.

    - The requirement that is connected by these circuits

    - The people responsible for planning, building, running the network.

    (9)Briefly describe FOUR functions performed by fault management in respect of network faults.

    - Detection- carrying out diagnostic tests and continuity tests- Diagnosis- recognizing fault conditions and planning correction

    - Isolation- tracing faults and isolating then from the rest of the network

    - Correction of abnormal operation- scheduling immediate and deferred repair work.

    - Maintenance work tracking- tracking fault repairs, software code bugs and creating tracking

    summaries.

    (10)What are the THREE main assets of a telecommunications network?

    The interconnecting circuits

    - The equipment to which the interconnecting circuits are connected

    - The people responsible for planning, building and running the network.

    (11)Briefly describe the THREE resources that make up a network.

    Page 28 of43

  • 8/3/2019 EN 2005 to 2007

    29/43

    - The interconnecting circuits that allow communication over the network

    - The equipment that is connected by these circuits

    - The people responsible for planning,, building and running the network.

    (12)Explain the benefit of domain based networking in managing and supporting a network system.

    Most network operate over a large geographical area and network management functions must be

    carried out over this area

    - To facilitate management of the whole network, the network is divided into domains with

    different parts of the management system being responsible for different domains.

    Chapter 13

    05/06/07

    (1)Describe the term Digital Enhanced Cordless Telecommunications (DETC)

    - A radio technology suited for voice, data and networking applications.

    - Up to a range of a few hundred meters

    (2)Briefly describe the following advanced digital radio techniques used in DETC

    (i)Time Division Multiple Access (TDMA)

    Radio access with low interference characteristics

    - Can handle up to 100, 000 users per sq km of office floor space

    (ii)Dynamic Channel Selection/Allocation (DCS/DCA)

    - Guarantees that the best radio channels available are used

    - Ensure the ability to co-exist with other DECT applications and give high quality secure

    communication.

    (3)Briefly explain the main differences between Key Telephone Systems (KTS) and Private Branch

    Exchanges (PBX). Draw a simple diagram of each type of a system to illustrate your answer.

    KTS

    Page 29 of43

  • 8/3/2019 EN 2005 to 2007

    30/43

    In a Key Telephone System the control and switching functions for calls is built into the

    telephone handsets themselves.

    All KTS station users can be allowed to gain access to and answer nay specific

    external lines.

    There is no central control unit (switchboard) and no need for a dedicated switchboard

    operator to control and manage calls.

    PBX

    A PBX system uses a central call processor to handle the routing of incoming,

    outgoing and interextension calls

    PBXs can be either manual, requiring the use of an operator or automatic with no staff

    intervention required for the routing of calls

    Generally PBXs are suited to larger organizations involving hundreds or even

    thousand of telephone extensions.

    (4)Describe how Caller Line Identification (CLI) can used to improve the efficiency of call centre agents.

    This allows the computer to present the information needed by the agent for that particular caller onto

    the agents computer screen, marginally before the agent answers the call. It also allows the agent to

    greet the caller in a personalized manner, which enhances the caring impression

    To have all the required information on hand to deal with the call in the most affective manner possible

    thus increasing productivity.

    (5)Describe the SEVEN basic functions of a telephone

    - Provide a signal when a call is received so that the user is alerted

    - Send a signal to the exchange when a user wants to originate a call

    - Allow the user to advise the exchange of the number to be called

    - Inform the exchanges when a call is finished so that it knows resources are free.

    - Convert voice signals into varying electrical signals to allow their transmission via an electrical

    circuit

    - Convert electrical signals back into voice and allow the user to listen to there audible signals.

    - Give voice signals in preparation for conversion.

    Page 30 of43

  • 8/3/2019 EN 2005 to 2007

    31/43

    Chapter-14 (2005/2006/2007)

    1. Describe the main features of a LAN.

    A LAN is a data communications network that provides a data connection between computers

    and other digital devices.

    Covers a limited geographical are but it is able to connect a larger number of devices Does not use external network services.

    High data rates

    Low probability of undetected errors.

    2. Describe the operation of a Token Ring topology for a LAN includes:

    (a) A Description of the token passing process.

    (b) The specific IEEE standard.

    (c) The problems inherent with a ring topology.

    (a) Description of the token passing process

    A special pattern of bits (called a token) passes around the ring.

    A node can only transmit data when it has the token.

    Data only travels in one direction around the ring. This prevents collision.

    Resources can be placed at any point on the ring as data will reach them.

    (b) The specific IEEE standard.

    IEEE 802.5

    (c) The problems inherent with a ring topology.

    They are dependent on all nodes and cable segments working. If a device is to be added the ring must be broken and remade.

    3. Describe the difference between a Fiber Distributed Data Interface (FDDI) LAN and a simple

    token ring LAN.

    FDDI uses tow counter-rotating rings in the same network.

    Page 31 of43

  • 8/3/2019 EN 2005 to 2007

    32/43

    Have the same characteristics as a standard ring but with extra resilience due to duplicate

    node-to-node connections.

    Data is transmitted simultaneously in both directions.

    Receiving node can compare 2 versions to ensure no corruption.

    Break in one ring can be overcome by using the other as a standard ring.

    4. Explain the meaning of non-contention techniques in terms of network access and give ONE

    example of such a method.

    Designs that prevent conflict of nodes wishing to transmit a message over the network at the

    same time.

    Usually a node is given exclusive rights to transmit preventing a clash of messages.

    Suitable example (e.g. Token Passing)

    5. Describe a logical structure of a Bus Topology used for a LAN.

    A single data highway connects all the nodes.

    Network nodes are tapped onto the highway via T-connection.

    6. Explain the operation of the Carrier Sense Multiple Access Collision Detection (CSMACD)

    connection technique used by Ethernet.

    Each node listens until no other nodes are transmitting

    The node then transmits its data

    If collision is detected the transmission is stopped

    The node then waits for a specified period of time and retransmits.

    7. Describe the characteristics of CSMA/CD in terms of:

    (a) Order of transmission

    (b) Length of wait time before transmission takes place

    (c) Network saturation

    (d) Capture effect

    Page 32 of43

  • 8/3/2019 EN 2005 to 2007

    33/43

    (a) Order of transmission

    There is no order of transmission.

    (b) Length of wait time before transmission takes place

    There is no guarantee of the length of time that must be waited before transmission.

    (c) Network saturation

    As data rates increase the probability of collisions increases.

    This means a network can saturate at levels below the theoretical maximum.

    (d) Capture effect

    If a node transmits frames at a high rate it may have almost exclusive access to the network.

    As other nodes are forced to back off a random time whilst transmission is in progress.

    This means there is a strong probability that it will have uncontested access to its nest time

    frame.

    8. Describe the method used to prevent the reflection of signals at the end of bus.

    A terminator (or head end) is located at the ends of each bus.

    This device may be a resistor or complex electronic device that absorbs dissipates the signa

    energy.

    9. Describe the advantages of 10Base2 (thin Ethernet) cable when compared to 10Base5 (thick

    Ethernet) cable.

    It is very easy to disconnect part of a bus thus making communication along the whole bus and

    all nodes impossible.

    The maximum length of cable (185m) and number of connections (30) that can be made are

    significantly lower than 10Base5 (500m, 100).

    10. Explain the key differences between contention techniques and non-contention techniques

    for allowing network access.

    Page 33 of43

  • 8/3/2019 EN 2005 to 2007

    34/43

    (ii)Name ONE common non-contention technique for network access and state which network

    topology it may be used in.

    Contention techniques do not have a predetermined order of access and any node may transmit

    at any time.

    Contention techniques anticipate conflicts and collisions and use them as part of the design fo

    network access.

    Non-contention techniques are designed so that there is no conflict between nodes that wish to

    transmit over a network.

    (ii)Name ONE common non-contention technique for network access and state which network topology

    it may be used in.

    For Example, token passing is used in ring topology.

    11. Explain the operation of the Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)

    contention technique used by Ethernet.

    Each node listens until no other nodes are transmitting.

    The node then transmits its data.

    If collision is detected the transmission is stopped.

    The node then waits for a specified period of time and retransmits.

    Chapter-15 (2005/2006/5007)

    1. State and briefly describe the three things that a network must offer if it is to be considered

    as secure.

    Privacy: The network should offer a reasonable level of assurance to its users that only those

    users that are authorized to use its services are able to do so.

    Integrity: The network should offer a reasonable level of assurance that the information

    transmitted by a user of its services is to not modified, lost or corrupted in transit across the

    network to its intended recipients(s).

    Availability: The network should offer a reasonable level of assurance that it will be available

    for use as and when its users require to use it.

    2. Describe the difference between a physical attack and a n electronic attack on a network

    Give TWO Examples of each.

    Page 34 of43

  • 8/3/2019 EN 2005 to 2007

    35/43

    A physical attack is the result of a malicious human act, an accidental human act or an accident of

    nature.

    Typical examples are fire and theft.

    An electronic attack is one that exploits the network itself to make an attack.

    Typical examples are eavesdropping or Trojan horses.

    . Describe how passwords are used as security measure in network. Give an example to

    illustrate your answer.

    The system checks that the password and username math.

    If they match access to the system is granted.

    The username will have rights and privileges attached to it.

    The level of access granted will be in accordance with those access rights.

    Suitable example: e.g. administrators will have access to parts of the network that are not

    available to normal users.

    4. Briefly describe what is meant by encryption as a security countermeasure.

    Involves translating information from its original clear form by applying an encryption algorithm

    ot the information.

    It is intended to make it difficult for unauthorized people to read or decode the information.

    5. Briefly describe the purpose of a firewall.

    A security device that separates two or more networks having differing levels of security

    policies.

    Aim to prevent unauthorized external users from having access to an internal network.

    Allow internal users to have access to external resources.

    Can be implemented as software or hardware.

    Can operate at different levels of the TCP/IP stack.

    6. State TWO reasons why a document should be digitally signed before transmission.

    Proves document really does originate from the person claiming to have sent it

    Page 35 of43

  • 8/3/2019 EN 2005 to 2007

    36/43

    Ensures contents of the document have not been modified after sending.

    7. Explain how authentication works as a security measure.

    Allow the network to identify a person

    It does this by challenging the user for some information and checking if this matches the stored

    record.

    It also grants particular rights and privileges to the user.

    8. Briefly describe FIVE methods that may be used to authenticate the identify of a system user.

    . Password: Allocating individual passwords to each user, which are regularly updated.

    Personal identification Number (PIN): Each user has an identification number.

    Fingerprint recognition: The fingerprint of each user is recorded and scanned on login to the

    system.

    Smartcard: Users have a card with a magnetic strip containing ID details the card is unique to

    the user.

    Voice recognition: The voice of each user is stored using special software and the users voice

    is compared for authentication.

    Handwriting recognition: A sample of handwriting (e.g. Signature) is stored and the user has

    to sign again for authentication upon login.

    Retinal Scan: The retina of the human eye has a pattern more unique than a fingerprint. This

    can be stored and the users retina scanned for comparison.

    9. Define the term computer virus and explain how computer viruses are propagated.

    A virus is a malicious program that is in a executable from and may carry a payload that causes

    damage to the host computer system or network.

    Viruses are typically propagated by e-mail attachments but may be carried by any corrupted fileon floppy disk or CD-ROM.

    10. Describe TWO ways in which firewalls specifically help prevent virus infection on a network.

    Perform virus check on incoming e-mail attachments.

    Prevent users from transferring files into the protected network.

    Page 36 of43

  • 8/3/2019 EN 2005 to 2007

    37/43

    11. Define the term Trojan horse and explain how Trojan Horses are propagated.

    Trojan Horses appear as apparently innocuous programs running on the host computer.

    Its purpose is to allow an attacker to have access to the host computer via an attached network.

    They are propagated in the same way as viruses.

    12. State THREE properties required of a secure network.

    Privacy

    Integrity

    Availability

    13. Excluding use of a firewall, describe THREE countermeasures used to prevent virus and

    Trojan Houser attacks.

    Installing virus checking software on all networked machines and keeping the virus definitions

    up to date.

    Ensuring that all software that can connect to a network is updated so that any holes in their

    security are fixed.

    Educating all users of the network in the safe use of the technology.

    14. Briefly describe what is meant by encryption as a security countermeasure.

    Involves translating information from its original clear form by applying an encryption algorithm

    to the information.

    It is intended to make it difficult for unauthorized people to read or decode the information.

    15. Briefly describe the TWO encryption modes supported by Secure IP (IPSEC).

    Transport mode which only encrypts the payload of each packet and not the header.

    Tunnel mode which is more secure and encrypt both header and payload.

    16. Briefly describe the role of Point-to-Point Tunneling Protocol (PPTP) in network security.

    It encapsulated data and overhead in an IP packet and encrypts data prior to transmission.

    Page 37 of43

  • 8/3/2019 EN 2005 to 2007

    38/43

    It provides a secure bridge between networks and computers and can be used to construct a

    Virtual Private Network.

    17. Define the term Denial of Service (DoS) attack

    An attack on a network that significantly slow or completely interrupts normal networks traffic.

    18. Briefly describe how a DoS attack may harm an organization.

    An organization may lose time and money as the result of an attack.

    19. Describe EIGHT methods an organization may use to minimize the risk being affected by a

    DoS attack.

    Install route filters as this will session exposure. It will also aid in preventing users on the

    network from launching DoS attacks.

    Install patches to guard against TCP SYN flooding where TCP request re sent aster than a

    machine can process them. This does not totally eliminate the risk.

    Disable any unused or unneeded network services. This prevents an intruder from using those

    services.

    Enable quota systems on the operating system where available

    Observe system performance and establish baselines for ordinary activity. Use the baseline togauge unusual levels of activity.

    Routinely examine the physical security of the system.

    Invest in redundant and fault-tolerant network configurations.

    Establish and maintain regular backup schedules and policies, particularly for importan

    configuration information.

    Establish and maintain appropriate password policies, especially for highly privileged accounts

    20. Define the term Zombie in relation to network security.

    A system that has been hacked by an intruder in such a way that they can control it without the

    rightful user of the system being aware of anything untoward.

    21. Describe the TWO ways in which Zombies are commonly used

    Page 38 of43

  • 8/3/2019 EN 2005 to 2007

    39/43

    To launch DoS attacks.

    To provide a gateway into other parts of the network.

    22. Define the term computer virus.

    A virus is a malicious program that can be attached to an executable program or can be in other

    executable forms such as macros.

    The program can carry a payload that can caused damage to the infected host system

    23. Briefly describe how data should be protected from physical attacks.

    Have good fire prevention and detection equipment

    Keep wiring and equipment closets locked.

    Prevent unauthorized access to buildings

    Keep back-up copies of data and have recover procedures.

    24. Describe the steps taken to construct a digital signature and to check it at the receiving end.

    The sender uses a hashing function to create a mathematical summary of the document.

    The hashing function is one-way: the document cannot be recreated form it.

    The sender uses a private key to encrypt the summary. This encrypted summary is the

    signature of the document.

    The signature will be different each time a new document is used and if a different key is used.

    The document and signature are transmitted to the recipient. The same hashing function is used

    to calculate the summary.

    The senders public key is used to decrypt the signature.

    The summary calculated by the recipient should match the summary extracted by deciphering

    the signature.

    This confirms the sender of the message and that it was not modified in transit.

    25. Briefly describe the security benefits provided by Virtual Private Network. (VPNs)

    Encryption and encapsulation technology allows a business to securely use the Internet as a

    channel for private data communication.

    Page 39 of43

  • 8/3/2019 EN 2005 to 2007

    40/43

    This greatly reduces cost and simplifies communications as it removes the need to build a

    private network.

    26. Describe the following threats to network security AND give examples of how they may be

    used:

    (i) Eavesdropping

    (ii) Replay

    (iii) Trojan House

    Eavesdropping

    Snooping on information carried by the network.

    This may take the form of borrowing a terminal whilst the user is away.

    Or tapping into the cables that carry the signals.

    Replay

    The attacker snoops on the network and records a series of messages.

    The record messages are later replayed to achieve a particular result.

    A simple method is to record usernames and passwords to allow the attacker to log into the

    network in his/her own right.

    Trojan Hosrse

    Trojan Horses appear as apparently innocuous programs running on the host computer.

    Its purpose is to allow an attacker to have access to the host computer via an attached network

    They are propagated in the same way as viruses.

    Chapter-16 (2005/2006/2007)

    1. You are required to devise a routing plan for a national public telephone network. Assuming

    that the country is already divided into local exchange areas. Briefly describe FOUR different

    factors that should be covered by the plan.

    Page 40 of43

  • 8/3/2019 EN 2005 to 2007

    41/43

    Which local exchanges should have direct connections and which should be conneted via

    tandem exchanges.

    The quantity and location of tandem exchanges

    The maximum number of levels of tandem switching to b used.

    Whether automatic alternative routing should be used and n what circumstances.

    2. Briefly describe the FIVE main areas involved in network planning.

    Traffic analysis: An understanding of the capacity logical information flow and types o

    information between each point.

    Choice of bearers: Choice of cabling is linked to the traffic and requirements to combine data

    and voice cabling as well as the networking technology employed.

    Choice of Technology: This interacts with the previous two points-traffic analysis and choice of

    bearers.

    Network Security: Network security is concerned with ensuring that threats to security are

    countered.

    Implementation: Implementation means how, when and where to carry out the work.

    3. Describe the TWO ways in which networks using automatic alternative routing restrict

    overflow.

    The final route may be split into two with one route reserved for high-level, first-choice final

    traffic. And the other route is a common route for all overflowing traffic.

    The other method is to use SPC exchanges to implement a truck reservation system

    Here overflowing calls from a high usage route are blocked whenever a final route has few free

    circuits.

    4. i) Draw a Diagram showing a process of a typical planning cycle for a network.

    ii) Describe the processes you have shown in your diagram above. (9 Marks)

    5. Briefly describe FOUR main areas involved in network planning.

    Traffic analysis: An understanding of the capacity logical information flow and types o

    information between each point.

    Page 41 of43

  • 8/3/2019 EN 2005 to 2007

    42/43

    Choice of bearers: Choice of cabling is linked to the traffic and requirements to combine data

    and voice cabling as well as the networking technology employed.

    Choice of Technology: This interacts with the previous two points-traffic analysis and choice of

    bearers.

    Network Security: Network security is concerned with ensuring that threats to security are

    countered.

    Implementation: Implementation means how, when and where to carry out the work.

    6. i) Defined the term redundancy when applied to network design.

    ii) Describe FOUR factors that should consider when designing redundancy in a network.

    The term redundancy when applied to network design.

    The inclusion of additional links in a network that can be used in the event of failure, thus

    increasing network resilience.

    FOUR factors that should considered when designing redundancy in a network

    How important is the traffic, what are the implications to the business, how long to repair tha link

    and is the downtime acceptable.

    What is the most likely reason for failure, interface hardware or the cable?

    What physical paths do the main and back-up links follow? It is best to have different paths to

    eliminate one threat breaking both.

    Can load sharing be used to utilize both main and back-up links thus imporving network

    performance?

    7. Briefly describe FIVE main areas involved in network planning.

    Traffic analysis: An understanding of the capacity logical information flow and types o

    information between each point.

    Choice of bearers: Choice of cabling is linked to the traffic and requirements to combine data

    and voice cabling as well as the networking technology employed.

    Choice of Technology: This interacts with the previous two points-traffic analysis and choice of

    bearers.

    Network Security: Network security is concerned with ensuring that threats to security are

    countered.

    Page 42 of43

  • 8/3/2019 EN 2005 to 2007

    43/43

    Implementation: Implementation means how, when and where to carry out the work.

    8. State the THREE main assets of a telecommunications network.

    The interconnection circuits

    The equipment to which the interconnecting circuits are connected.

    The people responsible for planning, building and running the network.

    9. i) State the TWO types of financial costs associated with setting up and running a

    telecommunications network.

    ii) Provide TWO example of EACH type of cost.

    TWO types of financial costs associated with setting up and running a telecommunications network

    The capital cost of establishing the network.

    The ongoing cost of operating the network.

    TWO example of EACH type of cost.

    Example of capital costs include:

    Line Plant

    Switching, transmission and singalling equipment

    Accommodation including real estate

    Exmples of ongoing costs include:

    Network employee costs

    Equipment and line maintenance costs

    Cost of energy

    10. List the TWO main sources of revenue for a telecommunications system.

    Line or service rental

    Call income