Advanced Higher Computing. Computer Networks. Homework Sheets



Similar documents
Chapter 5. Data Communication And Internet Technology

COMPUTER NETWORK TECHNOLOGY (300)

CompTIA Network+ (Exam N10-005)

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Technical Glossary from Frontier

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IT Data Communication and Networks (Optional)

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Study Guide CompTIA A+ Certification, Domain 2 Networking

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

SSVP SIP School VoIP Professional Certification

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

SSVVP SIP School VVoIP Professional Certification

Chapter 1 Personal Computer Hardware hours

BASIC ANALYSIS OF TCP/IP NETWORKS

Networking Technology Online Course Outline

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Networking Basics and Network Security

Step-by-Step Configuration

Chapter 4 Connecting to the Internet through an ISP

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Technical Support Information Belkin internal use only

Networking 4 Voice and Video over IP (VVoIP)

Lab Organizing CCENT Objectives by OSI Layer

Protecting the Home Network (Firewall)

This course has been retired. View the schedule of current <a href=

IT4405 Computer Networks (Compulsory)

Written examination in Computer Networks

Chapter 10 Troubleshooting

EDA Training Programs. Catalog of Course Descriptions

WAN Data Link Protocols

Basic Network Configuration

Local Area Networks (LANs) Blueprint (May 2012 Release)

Network System Design Lesson Objectives

COMPUTER NETWORK TECHNOLOGY (40)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Chapter 4: Networking and the Internet

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Multi-Homing Dual WAN Firewall Router

Internet Privacy Options

Key Term Quiz Answers

ABB solar inverters. User s manual ABB Remote monitoring portal

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Cisco Networking Professional-6Months Project Based Training

The OSI and TCP/IP Models. Lesson 2

VPN. Date: 4/15/2004 By: Heena Patel

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

ICTTEN8195B Evaluate and apply network security

Higher Computing Networking 1

DSL-2600U. User Manual V 1.0

Firewalls. Chapter 3

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

GregSowell.com. Mikrotik Basics

Configure ISDN Backup and VPN Connection

Terminology. Internet Addressing System

ASM Educational Center (ASM) Est. 1992

Mathatma Gandhi University

Lecture 28: Internet Protocols

Networked AV Systems Pretest

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Chapter 2 - The TCP/IP and OSI Networking Models

Topic 7 DHCP and NAT. Networking BAsics.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

CCNA Discovery Chapter Four

Security Technology: Firewalls and VPNs

Address Resolution Protocol (ARP)

Computer Networks CCNA Module 1

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

ICANWK406A Install, configure and test network security

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Securing Cisco Network Devices (SND)

Network Simulation Traffic, Paths and Impairment

Network Security - ISA 656 Application Firewalls

Networking: EC Council Network Security Administrator NSA

Pre-lab and In-class Laboratory Exercise 10 (L10)

M3-R3: INTERNET AND WEB DESIGN

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Networking Test 4 Study Guide

Broadband Router User s Manual

IK0-001 Leading the way in IT testing and certification tools,

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

GPRS / 3G Services: VPN solutions supported

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Transcription:

Advanced Higher Computing Computer Networks Homework Sheets

Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards are needed.. What is the Request For Comments (RFC) system and why is it useful? 3. What is the Internet Corporation for Assigned Names and Numbers (ICANN) responsible for? 4. List the seven layers of the ISO network architecture model with a brief description of their function. 3 5. What is the difference between a connection oriented and a connectionless protocol? 6. List the different responsibilities of TCP and IP. 7. Draw a diagram mapping the layers of the ISO model with the Internet Architecture model. Total 0 Marks

Topic : IP Addressing and DNS. Explain how the three classes of IP address split up the four octets in an IP address between network identifiers and host identifiers.. Explain how a router can function without it being aware of the end to end link when forwarding IP packets. 3. What three limitations to the class system of IP addressing were subnets developed to solve? 4. What is Network Address Translation (NAT) and how can it help secure a Local Area Network? 5. Use the example CIDR address 03.35.45.6/6 to describe how CIDR operates 6. What function does the Domain Name Service (DNS) perform? 7. How can the following commands aid network troubleshooting? Ipconfig Ping Traceroute Total 0 Marks

Topic 3: Network Applications. Explain the difference between the three email protocols; POP3, SMTP and IMAP. What headers are added to an email message before it is received by an email client? 3. Why was a password not needed in the original specification of SMTP? 4. What restrictions to the original email specification was MIME designed to get around? 5. What are the disadvantages of MIME? 6. What are the three component parts of an HTML Document? 7. What is the advantage of using stylesheets when designing a web site? 8. Describe what should be considered when designing a web site? Total 0 Marks

Topic 4: Network Applications. List the three ways in which multimedia content can be dealt with by a browser.. Explain the difference between a Java applet and an ActiveX control. 3. What error code would an HTTP server generate if a non-existent page was requested by a client? 4. Both FTP and HTTP are file transfer protocols. What are the main differences between them? 5. Describe the role of HTTP when a user requests a web page by typing a URL into a browser. 6. What is the function of a Proxy Server in a Local Area Network? 7. When would Gateway be used to request a web page? 8. What is Voice Over Internet Protocol (VOIP)? 9. What techniques are used in order to compress video information when using the Internet for Video Conferencing? Total 0 Marks

Topics 5 & 6: Network Security and Denial of Service Attacks. How does Asymmetric encryption differ from Symmetric encryption and how does it overcome the main limitation of Symmetric encryption?. Why does Asymmetric encryption make message authentication possible? 3. Why do digital certificates have to be authenticated? 4. Describe how we classify the strength of an encryption system. 5. The Ping of Death is a buffer overflow attack how can a buffer overflow be exploited by an attacker and what measures can be used to counteract attacks like this? 6. Name two bandwidth consumption attacks and describe how they can be counteracted. 7. What is a Distributed Denial of Service Attack (DDoS)? 8. What is the difference between a virus a worm and a Trojan? Total 0 Marks

Topic 7: Network Protection. What are the limitations of using a Proxy server and Network Address Translation (NAT to protect a Local Area Network?. Why is a firewall needed? 3. Why might a router not be able to do the same job as a firewall? 4. List the services you would leave the ports open for when initially setting up a firewall. 5. What are the differences between a full backup, a differential backup and an incremental backup? 3 6. What are the limitations of a remote backup? Total 0 marks

Topic 8: Data Transmission. What were the benefits of moving from coaxial cable to Unshielded Twisted Pair (UTP) cable for setting up an Ethernet network?. What are the advantages and disadvantages of using of Fibre Optic Cable for an Ethernet network? 3. Explain the difference between a hub and a switch, and how a switch can benefit the data transfer rate in a Local Area Network. 4. Explain the difference between a Bridge and a Router with reference to the OSI layers they operate at. 5. Explain the difference between analogue and digital bandwidth. 6. What are the implications of the inverse square law when manufacturers try to increase the amount of data carried by a wireless signal. 7. What are the advantages of the 80.a wireless standard over the 80.b standard and what are the disadvantages? 8. Describe three ways in which a Wireless Local Area Network (WLAN) could be secured. Total 0 Marks

Topic 9: Remote Access Protocols. Why is an ADSL connection unsuitable for high quality Video Conferencing?. When would an organisation need o use a leased line rather than an ISDN connection? 3. Why is a Virtual Private Network (VPN) a better solution to remote working than direct dialup to a network? 4. Why is the V90 modem standard asymmetric? 5. What are the advantages of the Point to Point Protocol (PPP) over the Serial Line Internet Protocol (SLIP)? 6. Explain what Tunnelling means when transferring packets of data across a Virtual Private Network 7. Why does IP Security (IPSec) need to use asymmetric encryption? Total 0 Marks