윤

COMP609 Final Exam Revision Notes

COMP609 Final Exam Revision

Assessment Instructions

  • Individual assessment: No discussion or collaboration is allowed.

  • No component of the assessment may be shared.

  • Do not start typing/writing until instructed. Candidates must not write/type during reading time.

  • Turn on the computer and log into Canvas during reading time.

  • Closed Book Examination (online canvas-based exam) via Canvas (Assignments-> Final Exam 2024 S1).

  • One submission attempt.

  • Ensure frequent saving and do not leave the assessment before clicking Save and Submit.

  • Answer ALL the questions.

  • No dictionaries are allowed.

Exam Summary

The exam is divided into four sections:

  • Multichoice Questions: 20 marks, 20 minutes.

  • True/False Questions: 20 marks, 20 minutes.

  • Fill-in the blanks Questions: 20 marks, 20 minutes.

  • Short/Long answer Questions: 40 marks, 60 minutes.

  • Total: 100 marks, 120 minutes.

Fiber vs Copper

Optical fiber is primarily used as backbone cabling for high-traffic, point-to-point connections between data distribution facilities and for the interconnection of buildings in multi-building campuses.

Feature

UTP Cabling

Fiber-Optic Cabling

Bandwidth supported

10 Mb/s - 10 Gb/s

10 Mb/s - 100 Gb/s

Distance

Relatively short (1 - 100 meters)

Relatively long (1 - 100,000 meters)

Immunity to EMI and RFI

Low

High (Completely immune)

Immunity to electrical hazards

Low

High (Completely immune)

Media and connector costs

Lowest

Highest

Installation skills required

Lowest

Highest

Safety precautions

Lowest

Highest

Topics Covered

  1. DNS: Query types (recursive and iterative), hostname, namespace, etc.

  2. DHCP: Lease acquisition process, lease renewal process.

  3. TCP three-way handshake.

  4. Subnet mask: Class A, B, and C in both binary & decimal.

  5. Network Security: Virus, Trojan, spyware, etc. Network attacks – DDOS, Ip-spoofing, etc.

  6. RAID: RAID 0, 1, 5

  7. VPN: Protocol, Transport & tunnel, IPSec

  8. Commands: ipconfig /all, ipconfig /flushdns, etc.

  9. Access list: standard, extended

Network Trends - Cloud Computing

Four types of Clouds:

  • Public Clouds

    • Available to the general public through a pay-per-use model or for free.

  • Private Clouds

    • Intended for a specific organization or entity such as the government.

  • Hybrid Clouds

    • Made up of two or more Cloud types – for example, part custom and part public.

    • Each part remains a distinctive object but both are connected using the same architecture.

  • Custom Clouds

    • Built to meet the needs of a specific industry, such as healthcare or media.

    • Can be private or public.

IPv4 Addressing

  • An IPv4 address is a 32-bit number divided into four 8-bit numbers (octets).

  • These octets range in number from zero to 255.

  • Example: 192.168.1.20

  • The biggest IP address possible is 255.255.255.255.

  • In binary, this IP address looks like this: 11111111.11111111.11111111.11111111

  • Binary to Decimal Conversion Example:

    • Binary: 10000001

    • Decimal: 128 + 1 = 129

IPv4 Address Structure - Network and Host Portions

  • An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion.

  • To determine the network vs. host portion, examine the 32-bit stream.

  • A subnet mask is used to determine the network and host portions.

The Subnet Mask

  • To identify the network and host portions of an IPv4 address, the subnet mask is compared to the IPv4 address bit for bit, from left to right.

  • The actual process used to identify the network and host portions is called ANDing.

The Prefix Length

  • A prefix length is a less cumbersome method used to identify a subnet mask address.

  • The prefix length is the number of bits set to 1 in the subnet mask.

  • It is written in “slash notation” therefore, count the number of bits in the subnet mask and prepend it with a slash.

Subnet Mask

32-bit Address

Prefix Length

255.0.0.0

11111111.00000000.00000000.00000000

/8

255.255.0.0

11111111.11111111.00000000.00000000

/16

255.255.255.0

11111111.11111111.11111111.00000000

/24

255.255.255.128

11111111.11111111.11111111.10000000

/25

255.255.255.192

11111111.11111111.11111111.11000000

/26

255.255.255.224

11111111.11111111.11111111.11100000

/27

255.255.255.240

11111111.11111111.11111111.11110000

/28

255.255.255.248

11111111.11111111.11111111.11111000

/29

255.255.255.252

11111111.11111111.11111111.11111100

/30

Network, Host, and Broadcast Addresses

Within each network are three types of IP addresses:

  • Network address

  • Host addresses

  • Broadcast address

Network Portion

Host Portion

Host Bits

Subnet mask

255

255

255

11111111

11111111 11111111

Network address

192

168

10

0

00000000

First address

192

168

10

1

00000001

Last address

192

168

10

254

11111110

Broadcast address

192

168

10

255

11111111

Subnet mask or /24

255.255.255.0

Corresponding Binary

00001010 00000000

Corresponding Binary

00001010 00000001

Corresponding Binary

00001010 11111110

Corresponding Binary

00001010 11111111

All 0s

All 0s and a 1

All 1s and a 0

All 1s

192.168.10.0 or /24

192.168.10.1 or /24

192.168.10.254 or /24

192.168.10.255 or /24

Types of IPv4 Addresses

Class

First Bits

Network Bits

Host Bits

Range

Description

A

0

8

24

1.0.0.0 to 127.255.255.255

B

10

16

16

128.0.0.0 to 191.255.255.255

C

110

24

8

192.0.0.0 to 223.255.255.255

D

1110

-

-

224.0.0.0 to 239.255.255.255

Multicast address

E

1111

-

-

240.0.0.0 to 255.255.255.255

Reserved for future use

Special Use IPv4 Addresses

  • Loopback addresses

    • 127.0.0.0 /8 (127.0.0.1 to 127.255.255.254)

    • Commonly identified as only 127.0.0.1

    • Used on a host to test if TCP/IP is operational.

  • Link-Local addresses

    • 169.254.0.0 /16 (169.254.0.1 to 169.254.255.254)

    • Commonly known as the Automatic Private IP Addressing (APIPA) addresses or self-assigned addresses.

    • Used by Windows DHCP clients to self-configure when no DHCP servers are available.

Reasons for Segmenting Networks

  • Subnetting reduces overall network traffic and improves network performance.

  • It can be used to implement security policies between subnets.

  • Subnetting reduces the number of devices affected by abnormal broadcast traffic.

  • Subnets are used for a variety of reasons including by:

    • Location

    • Group or Function

    • Device Type

Subnet an IPv4 Network

  • Diagram illustrating Network Prefix and Host ID.

Subnet on an Octet Boundary

Networks are most easily subnetted at the octet boundary of /8, /16, and /24.

Notice that using longer prefix lengths decreases the number of hosts per subnet.

Prefix Length

Subnet Mask

Subnet Mask in Binary (n = network, h = host)

# of hosts

/8

255.0.0.0

nnnnnnnn.hhhhhhhh.hhhhhhhh.hhhhhhhh

16,777,214

11111111.00000000.00000000.00000000

/16

255.255.0.0

nnnnnnnn.nnnnnnnn.hhhhhhhh.hhhhhhhh

65,534

11111111.11111111.00000000.00000000

/24

255.255.255.0

nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh

254

11111111.11111111.11111111.00000000

Subnet within an Octet Boundary

Refer to the table to see six ways to subnet a /24 network.

Prefix Length

Subnet Mask

Subnet Mask in Binary (n = network, h = host)

# of subnets

# of hosts

/25

255.255.255.128

nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh

2

126

11111111.11111111.11111111.10000000

/26

255.255.255.192

nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh

4

62

11111111.11111111.11111111.11000000

/27

255.255.255.224

nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh

8

30

11111111.11111111.11111111.11100000

/28

255.255.255.240

nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh

16

14

11111111.11111111.11111111.11110000

/29

255.255.255.248

nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh

32

6

11111111.11111111.11111111.11111000

/30

255.255.255.252

nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh

64

2

11111111.11111111.11111111.11111100

VLSM Variable Length Subnet Mask

The left side displays the traditional subnetting scheme (i.e., the same subnet mask) while the right side illustrates how VLSM can be used to subnet a subnet and divided the last subnet into eight /30 subnets.

When using VLSM, always begin by satisfying the host requirements of the largest subnet and continue subnetting until the host requirements of the smallest subnet are satisfied.

The resulting topology with VLSM applied.

VLSM Variable Length Subnet Mask

With an ID range - 192.168.4.0/24 - Design an IP plan for the network using VLSM

Subnet

1

2

4

8

16

32

64

128

256

Host

256

128

64

32

16

8

4

2

1

Mask

/24

/25

/26

/27

/28

/29

/30

/31

/32

VLSM Variable Length Subnet Mask

Example Scenario:

  • LAN 2: 55 Hosts

  • LAN 1: 25 Hosts

  • LAN 3: 12 Hosts

  • Link A, B, C: 2 Hosts

Subnet

1

2

4

8

16

32

64

128

256

Host

256

128

64

32

16

8

4

2

1

Mask

/24

/25

/26

/27

/28

/29

/30

/31

/32

VLSM Variable Length Subnet Mask

Network ID

Subnet Mask

Host

Network

Description

192.168.4.0

/26

64

LAN 2

192.168.4.64

/26

64

Unused

192.168.4.128

/26

64

Unused

192.168.4.192

/26

64

Unused

Subnet

1

2

4

8

Host

256

128

64

32

Subnet Mask

/24

/25

/26

/27

VLSM Variable Length Subnet Mask

Network ID

Subnet Mask

Host

Network

Description

192.168.4.64

/27

32

LAN 2

192.168.4.96

/27

32

Unused

Subnet

1

2

4

8

Host

256

128

64

32

Subnet Mask

/24

/25

/26

/27

VLSM Variable Length Subnet Mask

Network ID

Subnet Mask

Host

Network

Description

192.168.4.96

/28

16

LAN 3

192.168.4.112

/28

16

Unused

Subnet

1

2

4

8

Host

256

128

64

32

Subnet Mask

/24

/25

/26

/27

VLSM Variable Length Subnet Mask

Network ID

Subnet Mask

Host

Network

Description

192.168.4.112

/30

4

Link A

192.168.4.116

/30

4

Link B

192.168.4.120

/30

4

Link C

192.168.4.124

/30

4

Unused

Subnet

1

2

4

8

Host

256

128

64

32

Subnet Mask

/24

/25

/26

/27

Business Continuity & Disaster Recovery

What is Business Continuity?

  • A business continuity plan (BCP) is a strategic document that provides alternative modes of operation for business activities that, if interrupted, could result in a significant loss to the enterprise.

  • Business continuity – An organisation’s ability to maintain operations after a disruptive event

  • Examples of disruptive events:

    • Hurricane

    • Tsunami

    • Flooding

    • Earthquake

  • Business continuity planning and testing steps:

    • Identify exposure to threats

    • Create preventative and recovery procedures

    • Test procedures to determine if they are sufficient

What is Business Continuity?

  • Succession planning – Determining in advance who is authorised to take over if a key employee is unavailable, incapacitated or worse

  • Business Impact Analysis (BIA)

    • Analyses the most important business functions and quantifies impact of their loss

    • Identifies threats through risk assessment

    • Determines impact if threats are realised

Data Storage redundancy Backups

  • Data backup

    • Information copied to a different medium and stored at an offsite location so that it can be used in the event of a disaster

  • Five basic questions that should be answered:

    • What information should be backed up?

    • How often should it be backed up?

    • What media should be used?

    • Where should the backup be stored?

    • What hardware or software should be used?

Data Backups (cont’d)

  • Backup software can internally designate which files have already been backed up

    • By setting an archive bit in the properties of the file

  • Backing up to magnetic tape has been the mainstay of data backups for over 30 years

  • Cloud now has many advantages.

  • Grandfather-father-son backup system

    • Divides backups into three sets: a daily backup (son), a weekly backup (father), and a monthly backup (grandfather)

Types of Data Backups

Type of backup

How used

Archive bit after backup

Files needed for recovery

Full backup

Starting point for all backups

Cleared (set to 0)

The full backup is needed.

Differential backup

Backs up any data that has changed since last full backup

Not cleared (set to 1)

The full backup and only last differential backup are needed.

Incremental backup

Backs up any data that has changed since last full backup or last incremental backup

Cleared (set to 0)

The full backup and all incremental backups are needed.

Storage Redundancy

  • RAID (Redundant Array of Independent Drives)

    • Uses multiple hard disk drives for increased reliability and performance

  • The most common levels of RAID are:

    • RAID Level 0 (striped disk array without fault tolerance)

    • RAID Level 1 (mirroring)

    • RAID Level 5 (independent disks with distributed parity)

    • RAID 0+1 (high data transfer)

Redundant Sites

  • Redundancy can also be planned for the entire site itself

  • Hot site

    • Generally run by a commercial disaster recovery service

    • Allows a business to continue computer and network operations to maintain business continuity

    • A hot site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link. Data backups of information can be quickly moved to the hot site,

  • Cold site

    • Provides office space but the customer must provide and install all the equipment needed to continue operations

Sites (cont’d)

  • Warm site

    • Has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data