Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

INC3701 ASSIGNMENT 4 2024

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
31-07-2024
Written in
2023/2024

INC3701 ASSIGNMENT 4 2024

Institution
INC 3701
Course
INC 3701

Content preview

INC3701 ASSIGNMENT 4 2024

Topic: Network Fundamentals
Q1: What is the OSI model? Describe its layers.

A1: The OSI (Open Systems Interconnection) model is a conceptual framework used to
understand and implement standard protocols in network communication. It has seven layers:

1. Physical Layer: Deals with the physical connection between devices and the
transmission of binary data over physical mediums like cables.
2. Data Link Layer: Responsible for node-to-node data transfer and error detection and
correction.
3. Network Layer: Manages data transfer between devices on different networks; handles
logical addressing and routing (e.g., IP addresses).
4. Transport Layer: Ensures error-free data transfer between host systems, provides flow
control, and handles retransmission of lost packets (e.g., TCP/UDP).
5. Session Layer: Manages sessions or connections between applications; handles
establishment, maintenance, and termination of connections.
6. Presentation Layer: Translates data between the application layer and the network
format; handles data encryption, decryption, compression, and decompression.
7. Application Layer: Interfaces directly with the end user; provides network services to
applications (e.g., HTTP, FTP, SMTP).

Topic: TCP/IP Protocol Suite
Q2: What is the difference between TCP and UDP?

A2:

● TCP (Transmission Control Protocol): Connection-oriented protocol that ensures
reliable data transfer through error-checking and retransmission. It establishes a
connection before data is sent and ensures that data arrives in the correct order.
● UDP (User Datagram Protocol): Connectionless protocol that does not guarantee
reliable data transfer. It sends data without establishing a connection and does not
ensure data arrives in order or is error-free. It is faster and used in applications where
speed is critical (e.g., streaming, gaming).

Topic: Network Security
Q3: What are common network security threats and their countermeasures?

A3:

● Malware: Software designed to harm or exploit networks or devices. Countermeasures
include antivirus software, firewalls, and regular software updates.
● Phishing: Fraudulent attempts to obtain sensitive information by disguising as a
trustworthy entity. Countermeasures include educating users, spam filters, and anti-
phishing tools.

, ● DDoS (Distributed Denial of Service): Attacks that overwhelm a network or service
with excessive traffic. Countermeasures include traffic filtering, rate limiting, and using
DDoS protection services.
● Man-in-the-Middle (MitM) Attacks: Intercepting and altering communication between
two parties. Countermeasures include encryption (e.g., SSL/TLS), secure network
configurations, and using VPNs.
● SQL Injection: Attacks that exploit vulnerabilities in SQL-based applications.
Countermeasures include input validation, parameterized queries, and using ORM
frameworks.

Topic: Network Design and Implementation
Q4: What are the key considerations in designing a network?

A4:

● Scalability: Ensuring the network can grow and support an increasing number of
devices and applications.
● Reliability: Ensuring the network is robust and can provide consistent performance and
uptime.
● Security: Implementing measures to protect data and resources from unauthorized
access and attacks.
● Performance: Ensuring the network can handle the required data throughput and
latency needs.
● Redundancy: Adding backup paths and systems to ensure network availability in case
of failure.
● Cost: Balancing the budget with the network’s performance, reliability, and scalability
requirements.

Topic: Wireless Networks
Q5: What are the advantages and disadvantages of wireless networks?

A5:

● Advantages:
○ Mobility: Users can access the network from various locations without being
tethered by cables.
○ Ease of Installation: Reduces the need for extensive cabling and can be
deployed in challenging environments.
○ Flexibility: Easily scalable and can be expanded to accommodate more users
and devices.
● Disadvantages:
○ Security Risks: More susceptible to unauthorized access and eavesdropping.
○ Interference: Susceptible to interference from other wireless devices and
physical obstacles.
○ Speed and Reliability: Typically slower and less reliable than wired networks,
especially in congested areas.

Topic: Network Troubleshooting

, Q6: What are some common network troubleshooting tools and their uses?

A6:

● Ping: Tests connectivity between devices by sending ICMP echo requests and
measuring the response time.
● Traceroute: Traces the path packets take to reach a destination and identifies where
delays or failures occur.
● Netstat: Displays network connections, routing tables, and network interface statistics.
● Wireshark: Captures and analyzes network traffic to diagnose issues and monitor
network performance.
● NSLookup: Queries DNS servers to find domain name or IP address information.



Topic: IP Addressing and Subnetting
Q7: What is the difference between IPv4 and IPv6?

A7:

● IPv4 (Internet Protocol version 4):
○ 32-bit address length, allowing for about 4.3 billion unique addresses.
○ Written in decimal format (e.g., 192.168.0.1).
○ Supports broadcasting.
○ Limited address space leading to the use of NAT (Network Address Translation).
● IPv6 (Internet Protocol version 6):
○ 128-bit address length, allowing for a vastly larger number of unique addresses
(approximately 340 undecillion).
○ Written in hexadecimal format (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
○ Supports new features like multicast and anycast.
○ No need for NAT due to the abundant address space.

Q8: How do you calculate the subnet mask for a given network?

A8:

1. Determine the number of required subnets or hosts.
2. Calculate the number of bits needed to accommodate the required subnets or hosts.
○ For subnets: Use 2^n >= number of subnets.
○ For hosts: Use 2^n - 2 >= number of hosts (subtract 2 for network and broadcast
addresses).
3. Convert the bits to the corresponding subnet mask.
○ For example, if you need 4 subnets, you need 2 bits (2^2 = 4). The subnet mask
will be 255.255.255.192 (or /26).

Topic: Network Protocols
Q9: Explain the DHCP process.

Written for

Institution
INC 3701
Course
INC 3701

Document information

Uploaded on
July 31, 2024
Number of pages
24
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$5.29
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartguide UNISA
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
2 year
Number of followers
2
Documents
388
Last sold
3 months ago

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions