HCS412 Assignment 1 2020

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

HCS412 ADVANCED DATA COMMUNICATIONS AND COMPUTER NETWORKS

ASSIGNMENTS

ASSIGNMENT 1 [30 MARKS] DUE DATE: 3 APRIL


2020

NB: As groups of between 5 – 10, you are supposed to create a write ups and present your
assignment.

Group 1
1) Given that the Zimbabwean FM Radio channel frequencies range between 87.5 to 108
MHz. The SNR for this channel is 120. Calculate the data rate. [3]
2) Suppose we need to send 356 Mbps over a noiseless channel with a bandwidth of 2MHz.
Calculate the number of signal levels needed. [3]
3) Define the following terms using suitable examples:
i. bandwidth
ii. low-pass signal
iii. digital signal [3 X 2
marks]
4) Represent the following bit pattern using the following coding schemes 01011001:
i. Manchester
ii. NRZ-I
iii. MLT-3 [3 X 4 marks]
5) Describe the WLAN infrastructure-based architecture. [6]

Group 2
6) Clearly explain role played by network virtualization in SDN. [4]
7) An analog signal has a bandwidth of 40 MHz. If we sample this signal and send it
through a 3 Mbps channel. Compute SNRdB of the signal. [4]
8) Highlight the features of IEEE802.11g and n standards and state their applications.
[6]
9) Represent the following bit pattern using the following coding schemes 01011001:
i. Differential Manchester

ii. NRZ-L [2 X 4 marks]


10) Differentiate para and full virtualization using suitable illustrations. [8]

Group 3
11) Write the shortest compressed format of the following IPv6 addresses:
2001:0DB8:0000:1470:0000:0000:0000:0200 [4]
12) Distinguish transport mode and tunnel mode applied in network security. [8]
13) Design a network architecture for 18 Bluetooth devices where 10 devices are in active
mode, clearly show the master and slave nodes. [8]
14) Clearly explain the functions of each component in the SSL Architecture. [10]

Group 4
15) Explain the functions of the following Bluetooth protocol stack components.
i. Logical Link Control and Adaptation Protocol (L2CAP)
ii. Radio
iii. Baseband
iv. Service discovery protocol
v. Link Manager [5 X 2 marks]
16) We have sampled a low-pass signal with a bandwidth of 12500 KHz using 8 levels of
quantization.
a) Calculate the bit rate of the digitized signal. [3]
b) Calculate the PCM bandwidth of this signal. [3]
17) Describe the dual stack strategy applied in IPv6. [5]
18) An organization is granted a block of addresses with the beginning address 18.27.75.4/24.
The organization needs to have 3 subblocks of addresses to use in its three subnets: one
subblock of 10 addresses, one subblock of 60 addresses, and one subblock of 120
addresses. Design the subblocks, mentioning the first address, last address and subnet
mask. [9]

Group 5
19) Outline the features of IEEE802.11b and 11a. [5]
20) Distinguish hard handover techniques applied in UMTS and GSM cellular networks
using suitable examples.
[15]
21) Explain each function of the major components of the GSM architecture. [10]

Group 6
22) Describe any two types of handover methods implemented in the GSM cellular network.
[6]
23) Outline the differences between binary phase shift keying and binary amplitude shift
keying techniques, mentioning their most appropriate applications. [8]
24) Differentiate Bluetooth piconet and scatternet using suitable examples. Also indicate the
importance of the state of devices. [8]
25) Explain the authentication and encryption processes of GSM networks. [8]

Group 7
26) Explain the functions of following components found in the 4G cellular Network:
i. eNodeB [3]
ii. Mobile Management Entity [3]
iii. Serving Gateway [3]
27) Compare and contrast the Authentication Header (AH) and Encapsulating Security
Payload (ESP) protocols.
[6]
28) Explain the operations of Virtual Private Network (VPN) with relevance to enforcing
network security. [7]
29) Distinguish classful and classless IP addressing applied in IPv4 using suitable examples.
[8]

Group 8
30) Describe the characteristics of 5G cellular networks. [4]
31) Explain hardware assisted virtualization technique using a suitable illustration. [6]
32) Explain the two modes supported by IPSec. [8]
33) Using a suitable illustration describe how network slicing is achieved using SDN. [12]

Group 9
34) Define the term “Security Association (SA)” and explain its function in ensuring network
security. [3]
35) Y Bank is looking at ways to improve its easy of doing business encompassing improving
daily banking transactions, remote server monitoring and upgrades, interconnecting
branches countrywide, securing data coming and out of the organisation. As a cloud
computing consultant what would you recommend in terms of the following:
i. Cloud deployment model to be adopted and justify your choice. [3]
ii. Services to be implemented and potential service providers to be used. [9]
36) Describe the components of any 3GPP 5G network architecture. [15]

Group 10
37) Describe the functions of the data plane and control plane found in the SDN. [6]
38) Explain the concept of Internet Key Exchange (IKE) and mention its application in
maintaining network security. [6]
39) Given schools in remote areas of Zimbabwe want to make use of cloud resources which
will be used to gather, monitor and safeguard information about student profiles,
sporting, tradition and cultural activities. As a cloud consultant which are the best cloud
services to use and deployment model to adopt.
[8]
40) Mention the best wireless WAN or LAN technologies to use to connect devices in a
smart city environment in the Zimbabwean context and justify your choice.
[10]

Group 11
41) Describe the functions of the following components in GSM network:
i. transcoder/transcoding rate adaptation unit (TRAU) [2]
ii. SMS Center [2]

42) Outline the characteristics of a 4G femtocells and microcells. [4]


43) Define the term “quality of service” and mention two appropriate examples which apply
to computer networks. [4]
44) Explain how mobility management is enabled using VLR in GSM and HSS in 4G
networks respectively.
[8]
45) Using a suitable illustration, explain the sequence of interactions between the various
network components required to setup a circuit-switched voice call from one mobile
station (MS) to another, given that both MSs are connected to different mobile switching
centres of B UMTS network.
[10]

You might also like