Individual assessment: No discussion or collaboration is allowed.
No component of the assessment may be shared.
Do not start typing/writing until instructed. Candidates must not write/type during reading time.
Turn on the computer and log into Canvas during reading time.
Closed Book Examination (online canvas-based exam) via Canvas (Assignments-> Final Exam 2024 S1).
One submission attempt.
Ensure frequent saving and do not leave the assessment before clicking Save and Submit.
Answer ALL the questions.
No dictionaries are allowed.
The exam is divided into four sections:
Multichoice Questions: 20 marks, 20 minutes.
True/False Questions: 20 marks, 20 minutes.
Fill-in the blanks Questions: 20 marks, 20 minutes.
Short/Long answer Questions: 40 marks, 60 minutes.
Total: 100 marks, 120 minutes.
Optical fiber is primarily used as backbone cabling for high-traffic, point-to-point connections between data distribution facilities and for the interconnection of buildings in multi-building campuses.
Feature | UTP Cabling | Fiber-Optic Cabling |
---|---|---|
Bandwidth supported | 10 Mb/s - 10 Gb/s | 10 Mb/s - 100 Gb/s |
Distance | Relatively short (1 - 100 meters) | Relatively long (1 - 100,000 meters) |
Immunity to EMI and RFI | Low | High (Completely immune) |
Immunity to electrical hazards | Low | High (Completely immune) |
Media and connector costs | Lowest | Highest |
Installation skills required | Lowest | Highest |
Safety precautions | Lowest | Highest |
DNS: Query types (recursive and iterative), hostname, namespace, etc.
DHCP: Lease acquisition process, lease renewal process.
TCP three-way handshake.
Subnet mask: Class A, B, and C in both binary & decimal.
Network Security: Virus, Trojan, spyware, etc. Network attacks – DDOS, Ip-spoofing, etc.
RAID: RAID 0, 1, 5
VPN: Protocol, Transport & tunnel, IPSec
Commands: ipconfig /all
, ipconfig /flushdns
, etc.
Access list: standard, extended
Four types of Clouds:
Public Clouds
Available to the general public through a pay-per-use model or for free.
Private Clouds
Intended for a specific organization or entity such as the government.
Hybrid Clouds
Made up of two or more Cloud types – for example, part custom and part public.
Each part remains a distinctive object but both are connected using the same architecture.
Custom Clouds
Built to meet the needs of a specific industry, such as healthcare or media.
Can be private or public.
An IPv4 address is a 32-bit number divided into four 8-bit numbers (octets).
These octets range in number from zero to 255.
Example: 192.168.1.20
The biggest IP address possible is 255.255.255.255.
In binary, this IP address looks like this: 11111111.11111111.11111111.11111111
Binary to Decimal Conversion Example:
Binary: 10000001
Decimal: 128 + 1 = 129
An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion.
To determine the network vs. host portion, examine the 32-bit stream.
A subnet mask is used to determine the network and host portions.
To identify the network and host portions of an IPv4 address, the subnet mask is compared to the IPv4 address bit for bit, from left to right.
The actual process used to identify the network and host portions is called ANDing.
A prefix length is a less cumbersome method used to identify a subnet mask address.
The prefix length is the number of bits set to 1 in the subnet mask.
It is written in “slash notation” therefore, count the number of bits in the subnet mask and prepend it with a slash.
Subnet Mask | 32-bit Address | Prefix Length |
---|---|---|
255.0.0.0 | 11111111.00000000.00000000.00000000 | /8 |
255.255.0.0 | 11111111.11111111.00000000.00000000 | /16 |
255.255.255.0 | 11111111.11111111.11111111.00000000 | /24 |
255.255.255.128 | 11111111.11111111.11111111.10000000 | /25 |
255.255.255.192 | 11111111.11111111.11111111.11000000 | /26 |
255.255.255.224 | 11111111.11111111.11111111.11100000 | /27 |
255.255.255.240 | 11111111.11111111.11111111.11110000 | /28 |
255.255.255.248 | 11111111.11111111.11111111.11111000 | /29 |
255.255.255.252 | 11111111.11111111.11111111.11111100 | /30 |
Within each network are three types of IP addresses:
Network address
Host addresses
Broadcast address
Network Portion | Host Portion | Host Bits | Subnet mask | ||
---|---|---|---|---|---|
255 | 255 | 255 | 11111111 | 11111111 11111111 | |
Network address | 192 | 168 | 10 | 0 | 00000000 |
First address | 192 | 168 | 10 | 1 | 00000001 |
Last address | 192 | 168 | 10 | 254 | 11111110 |
Broadcast address | 192 | 168 | 10 | 255 | 11111111 |
Subnet mask or /24 | 255.255.255.0 | ||||
Corresponding Binary | 00001010 00000000 | ||||
Corresponding Binary | 00001010 00000001 | ||||
Corresponding Binary | 00001010 11111110 | ||||
Corresponding Binary | 00001010 11111111 | ||||
All 0s | |||||
All 0s and a 1 | |||||
All 1s and a 0 | |||||
All 1s | |||||
192.168.10.0 or /24 | |||||
192.168.10.1 or /24 | |||||
192.168.10.254 or /24 | |||||
192.168.10.255 or /24 |
Class | First Bits | Network Bits | Host Bits | Range | Description |
---|---|---|---|---|---|
A | 0 | 8 | 24 | 1.0.0.0 to 127.255.255.255 | |
B | 10 | 16 | 16 | 128.0.0.0 to 191.255.255.255 | |
C | 110 | 24 | 8 | 192.0.0.0 to 223.255.255.255 | |
D | 1110 | - | - | 224.0.0.0 to 239.255.255.255 | Multicast address |
E | 1111 | - | - | 240.0.0.0 to 255.255.255.255 | Reserved for future use |
Loopback addresses
127.0.0.0 /8 (127.0.0.1 to 127.255.255.254)
Commonly identified as only 127.0.0.1
Used on a host to test if TCP/IP is operational.
Link-Local addresses
169.254.0.0 /16 (169.254.0.1 to 169.254.255.254)
Commonly known as the Automatic Private IP Addressing (APIPA) addresses or self-assigned addresses.
Used by Windows DHCP clients to self-configure when no DHCP servers are available.
Subnetting reduces overall network traffic and improves network performance.
It can be used to implement security policies between subnets.
Subnetting reduces the number of devices affected by abnormal broadcast traffic.
Subnets are used for a variety of reasons including by:
Location
Group or Function
Device Type
Diagram illustrating Network Prefix and Host ID.
Networks are most easily subnetted at the octet boundary of /8, /16, and /24.
Notice that using longer prefix lengths decreases the number of hosts per subnet.
Prefix Length | Subnet Mask | Subnet Mask in Binary (n = network, h = host) | # of hosts |
---|---|---|---|
/8 | 255.0.0.0 | nnnnnnnn.hhhhhhhh.hhhhhhhh.hhhhhhhh | 16,777,214 |
11111111.00000000.00000000.00000000 | |||
/16 | 255.255.0.0 | nnnnnnnn.nnnnnnnn.hhhhhhhh.hhhhhhhh | 65,534 |
11111111.11111111.00000000.00000000 | |||
/24 | 255.255.255.0 | nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh | 254 |
11111111.11111111.11111111.00000000 |
Refer to the table to see six ways to subnet a /24 network.
Prefix Length | Subnet Mask | Subnet Mask in Binary (n = network, h = host) | # of subnets | # of hosts |
---|---|---|---|---|
/25 | 255.255.255.128 | nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh | 2 | 126 |
11111111.11111111.11111111.10000000 | ||||
/26 | 255.255.255.192 | nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh | 4 | 62 |
11111111.11111111.11111111.11000000 | ||||
/27 | 255.255.255.224 | nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh | 8 | 30 |
11111111.11111111.11111111.11100000 | ||||
/28 | 255.255.255.240 | nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh | 16 | 14 |
11111111.11111111.11111111.11110000 | ||||
/29 | 255.255.255.248 | nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh | 32 | 6 |
11111111.11111111.11111111.11111000 | ||||
/30 | 255.255.255.252 | nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh | 64 | 2 |
11111111.11111111.11111111.11111100 |
The left side displays the traditional subnetting scheme (i.e., the same subnet mask) while the right side illustrates how VLSM can be used to subnet a subnet and divided the last subnet into eight /30 subnets.
When using VLSM, always begin by satisfying the host requirements of the largest subnet and continue subnetting until the host requirements of the smallest subnet are satisfied.
The resulting topology with VLSM applied.
With an ID range - 192.168.4.0/24 - Design an IP plan for the network using VLSM
Subnet | 1 | 2 | 4 | 8 | 16 | 32 | 64 | 128 | 256 |
---|---|---|---|---|---|---|---|---|---|
Host | 256 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
Mask | /24 | /25 | /26 | /27 | /28 | /29 | /30 | /31 | /32 |
Example Scenario:
LAN 2: 55 Hosts
LAN 1: 25 Hosts
LAN 3: 12 Hosts
Link A, B, C: 2 Hosts
Subnet | 1 | 2 | 4 | 8 | 16 | 32 | 64 | 128 | 256 |
---|---|---|---|---|---|---|---|---|---|
Host | 256 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
Mask | /24 | /25 | /26 | /27 | /28 | /29 | /30 | /31 | /32 |
Network ID | Subnet Mask | Host | Network | Description |
---|---|---|---|---|
192.168.4.0 | /26 | 64 | LAN 2 | |
192.168.4.64 | /26 | 64 | Unused | |
192.168.4.128 | /26 | 64 | Unused | |
192.168.4.192 | /26 | 64 | Unused | |
Subnet | 1 | 2 | 4 | 8 |
Host | 256 | 128 | 64 | 32 |
Subnet Mask | /24 | /25 | /26 | /27 |
Network ID | Subnet Mask | Host | Network | Description |
---|---|---|---|---|
192.168.4.64 | /27 | 32 | LAN 2 | |
192.168.4.96 | /27 | 32 | Unused | |
Subnet | 1 | 2 | 4 | 8 |
Host | 256 | 128 | 64 | 32 |
Subnet Mask | /24 | /25 | /26 | /27 |
Network ID | Subnet Mask | Host | Network | Description |
---|---|---|---|---|
192.168.4.96 | /28 | 16 | LAN 3 | |
192.168.4.112 | /28 | 16 | Unused | |
Subnet | 1 | 2 | 4 | 8 |
Host | 256 | 128 | 64 | 32 |
Subnet Mask | /24 | /25 | /26 | /27 |
Network ID | Subnet Mask | Host | Network | Description |
---|---|---|---|---|
192.168.4.112 | /30 | 4 | Link A | |
192.168.4.116 | /30 | 4 | Link B | |
192.168.4.120 | /30 | 4 | Link C | |
192.168.4.124 | /30 | 4 | Unused | |
Subnet | 1 | 2 | 4 | 8 |
Host | 256 | 128 | 64 | 32 |
Subnet Mask | /24 | /25 | /26 | /27 |
A business continuity plan (BCP) is a strategic document that provides alternative modes of operation for business activities that, if interrupted, could result in a significant loss to the enterprise.
Business continuity – An organisation’s ability to maintain operations after a disruptive event
Examples of disruptive events:
Hurricane
Tsunami
Flooding
Earthquake
Business continuity planning and testing steps:
Identify exposure to threats
Create preventative and recovery procedures
Test procedures to determine if they are sufficient
Succession planning – Determining in advance who is authorised to take over if a key employee is unavailable, incapacitated or worse
Business Impact Analysis (BIA)
Analyses the most important business functions and quantifies impact of their loss
Identifies threats through risk assessment
Determines impact if threats are realised
Data backup
Information copied to a different medium and stored at an offsite location so that it can be used in the event of a disaster
Five basic questions that should be answered:
What information should be backed up?
How often should it be backed up?
What media should be used?
Where should the backup be stored?
What hardware or software should be used?
Backup software can internally designate which files have already been backed up
By setting an archive bit in the properties of the file
Backing up to magnetic tape has been the mainstay of data backups for over 30 years
Cloud now has many advantages.
Grandfather-father-son backup system
Divides backups into three sets: a daily backup (son), a weekly backup (father), and a monthly backup (grandfather)
Type of backup | How used | Archive bit after backup | Files needed for recovery |
---|---|---|---|
Full backup | Starting point for all backups | Cleared (set to 0) | The full backup is needed. |
Differential backup | Backs up any data that has changed since last full backup | Not cleared (set to 1) | The full backup and only last differential backup are needed. |
Incremental backup | Backs up any data that has changed since last full backup or last incremental backup | Cleared (set to 0) | The full backup and all incremental backups are needed. |
RAID (Redundant Array of Independent Drives)
Uses multiple hard disk drives for increased reliability and performance
The most common levels of RAID are:
RAID Level 0 (striped disk array without fault tolerance)
RAID Level 1 (mirroring)
RAID Level 5 (independent disks with distributed parity)
RAID 0+1 (high data transfer)
Redundancy can also be planned for the entire site itself
Hot site
Generally run by a commercial disaster recovery service
Allows a business to continue computer and network operations to maintain business continuity
A hot site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link. Data backups of information can be quickly moved to the hot site,
Cold site
Provides office space but the customer must provide and install all the equipment needed to continue operations
Warm site
Has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data