2018年1月28日 星期日

ITP4928 Tutorial 3



Tick the box that best represents the category to which each benefits of teleworking belongs.
[3]



Match the following terms to the appropriate definition.                             [5]
DOCSIS, DSLAM, LTE, CMTS, Transceiver
Broadband Solution
Term
Definition
Cable
DOCSIS
Defines the communications and operation support interface that permits the addition of high-speed data transfer to a traditional cable TV system.
CMTS
Located in the headend. This device communicate with CMs located in subscriber homes.
DSL
DSLAM
Located at the CO, this device combines individual DSL connection from subscribers into one high-capacity link to an ISP.
Transceiver
Sometimes referred to as the DSL modem, it connects the subscriber to the DSL network.
Wireless
LTE
Newer and faster technology for high-speed cellular data. Considered part of 4G.

(i)
Briefly describe Digital Subscriber Line (DSL).                                  [1]


DSL provides high-speed connections over installed copper wire system.



(ii)
Compare Asymmetric DSL (ADSL) with Symmetric DSL (SDSL).                    [4]


ADSL provides higher downstream bandwidth to the user than upload bandwidth.
SDSL provides the same capacity in both directions.

What is Virtual Private Network (VPN)?                                          [3]

A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee. By using a VPN, businesses ensure security -- anyone intercepting the encrypted data can't read it

State any TWO benefits of VPNs.                                               [4]

Any TWO of the followings,
Cost savings 
           Enable organizations to use cost-effective, third-party Internet transport to connect remote offices and remote users to the main site.
Scalability 
           Enable organizations to use the Internet infrastructure within ISPs and devices, which makes it easy to add new users.
Compatibility with broadband technology 
           Allow mobile workers and telecommuters to take advantage of high-speed, broadband connectivity, such as DSL and cable, to gain access to the networks of their organization, providing workers flexibility and efficiency.
           Provide a cost-effective solution for connecting remote offices.
Security 
           Can include security mechanisms that provide the highest level of security by using advanced encryption and authentication protocols that protect data from unauthorized access.


Tick the box next to each statement that best matches the VPN statement to its type.      [2]



Refer to the following diagram, write down the command to configure a GRE tunnel on router R2 and advertise the 192.168.2.0 network through OSPF.                                  [5]
 
R2(config)# interface tunnel 0
R2(config-if)# tunnel mode gre ip
R2(config-if)# ip address 192.168.2.2 255.255.255.0
R2(config-if)# tunnel source 209.165.201.2
R2(config-if)# tunnel destination 209.165.201.1
R2(config-if)# router ospf 1
R2(config-if)# network 192.168.2.0 0.0.0.255 area 0
Briefly describe the following FOUR fuctions provided by IPsec.                   [8]
  • Confidentiality (encryption) 
encrypt the data before transmitting across the network
  • Data integrity 
verify that data has not been changed while in transit, if tampering is detected, the packet is dropped
  • Authentication 
verify the identity of the source of the data that is sent, ensures that the connection is made with the desired communication partner, IPsec uses Internet Key Exchange (IKE) to authenticate users and devices that can carry out communication independently.
  • Anti-Replay Protection
detect and reject replayed packets and helps prevent spoofing

The syslog protocol allows networking devices to send their system messages across the network to syslog servers. Write down the command to configure router R1 to perform the following tasks to configure and generate logging messages:                                            [3]
·                                                                                                                                             Set the logging destination to 192.168.1.3
·                                                                                                                                             Set the trapping severity to ‘Warning’ – level 4
·                                                                                                                                             Set the logging source interface to gigabitEthernet 0/0
R1(config)# logging 192.168.1.3
R1(config)# logging trap 4
R1(config)# logging source-interface g0/0
Name the THREE elements in the SNMP protocol.                                  [3]    

The Manager, the agent, and the MIB

Tick the appropriate field to classify each SNMP characteristic as Version 2c, Version 3 or both.
                                                                          [4]



List any TWO security feature improvements in SNMPv3 when compared with the earlier versions 1 and 2.                                                            [2]

Authentication, encryption

Classify each network monitoring tool characterisitc as either SNMP or NetFlow.          [3]



沒有留言:

張貼留言