You are on page 1of 6

*i!

J NORTH·WEST UNIVERSITY
YUNIBESITI YA BOKONE-B• PHIRIMA
NOORDWES-UNIVERSITEIT
®

Benodigdhede vir hierdie vraestel / Requirements for this paper:


Antwoordskrifte / @ Multikeusekaarte (A5) / 0 Sakrekenaars / I Ja/Yes I
Answer scripts: Multi-choice cards (A5): Calcu lators:
Presensiestrokies (lnvulvraestel) / 0 Multikeusekaarte (A4) / 0
Attendance slips (Fill-in paper) : Multi-choice cards (A4 ):
Rofwerkpapier / 0 Grafiekpapier / 0
Scrap paper: Graph paper:

Tipe Assessering / Eksamen lste geleentheid Kwalifikasie / B.lng.


Type of Assesment: Exam 1st opportunity Qualification: B.Eng.

Modulekode / REii 312 Tydsduur / 3 ure


Module code: Duration: 3 hours

Module Beskrywing / Grondbeginsels van Netwerke


Module Description : Network Fundamentals Maks / Max: 160

Eksaminator(e) / Dr. M. Ferreira Datum / 24/06/2017


Examiner(s): Date:

Moderator( s): Dr. R. Heymann Tyd / Time: 9:00


lnhandiging van antwoordskrifte / Submission of answer scripts: Gewoon/Ordinary
Vanne/ Surnames: Ferreira

Vraag 1 / Question 1

Verduidelik wat die verskil is tussen die "layered" OSI model en die TCP / IP model met die hulp van
'n skets. / Explain what the difference is between the layered OSI model and the TCP/ IP model with
the aid of a sketch.

(6)

Vraag 2 / Question 2

Beskou 'n kommunikasie kanaal met 'n bandwydte van 1 MHz. Die SNR van die kanaal is gemeet as
70dB. / Consider a communications channel with a bandwidth of 1 MHz. The SNR of the channel is
measured to be 70 dB.

a) Bereken the kanaalkapasiteit. / Calculate the capacity of the channel. (2)

REii 312 Eerste geleentheid - 24 / 06 / 2017 1/ 7


---------

b) Bepaal die hoeveelheid bisse en kwantiseringsvlakke wat benodig word of elke monster ge-
noegsaam te beskryf indien the kanaal teen 70% van van die kanaal kapasiteit bedryf word .
/ Determine the number of bits and quantisation levels required to adequately describe each
sample, if the channel is operated at 70% of the channel capacity (5)

(7)

Vraag 3 / Question 3

Teken die grafiek vir die data stroom op elk van die volgende lynkodering skemas: / Draw the graph
of the data stream, for each of the following line coding schemes:

Data stroom / Data stream: 1 0 1 1 0 1 1 0

a) NRZ-1
b) Manchester

c) AMI

(12)

Vraag 4 / Question 4

Beskou 'n FHSS sisteem met 'n kanaal bandwydte, B = 5kH z en 'n gespreide bandwydte Bss =
260kH z . / Consider an FHSS system with a channel bandwidth of B = 5kH z and a spreaded
bandwidth Bss = 260kH z.

a) Hoeveel hop sekwensies word in die stelsel gebruik? / How many hopping sequences are used in
the system? (2)

b) Wat is die minimum aantal bisse wat nodig is om die pseudo-ewekansige nom mer sekwensie in
die frekwensie tabel voor te stel? / What is the minimum number of bits needed to represent
the pseudo-random number sequences in the frequency table? (1)

(3)

REii 312 Eerste gelee ~' '


4
., ; . · '>4/ 06/ 2017 2/ 7
Vraag 5 / Question 5

Gedurende the Analoog na Digitaal (A/ D) omset proses word 'n laag-deurlaat sein met 'n bandwydte
van lM H z gemonster. 4096 Kwantiseringsvlakke word gebruik of die sein te beskryf. / During the
Analog to Digital (A/ D) conversion process a low-pass signal with a bandwidth of l M H z has been
sampled. 4096 Quantisation levels are used to describe the signal.

a) Bereken die bistempo van die versyferde sein . / Calculate the bit rate of the digitised signal. (3)

b) Bereken die SNR na A/ D omsetproses in dB. Beskou net kwantiseringsruis in jou berekening
/ Calculate the SNR after (A/ D) conversion in dB. Only consider quantisation noise in your
equation. (3)

(6)

Vraag 6 / Question 6

Enkripteer "DELTA ECHO FOXTROT GOLF" deur 'n bytellende skuif-syfer met 'n sleutel van 12 te
gebruik. U mag die enkodering van die spasies tussen die woorde ignoreer. Wys alle stappe. / Encrypt
"DEL TA ECHO FOXTROT GOLF "using an additive shift cipher with a key of 12. You may ignore
the encoding of the spaces between the words. Show all steps.

(8)

Vraag 7 / Question 7

Gestel Alice wil vir Bob 'n boodskap stuur. Verduidelik met behulp van 'n skets hoe dit geskied vir die
geval van : / Consider Alice wants to send a message to Bob. Using this scenario, explain with the aid
of a sketch, how this can be accomplished for the case of-

a) Simmetriese sleutel kriptografie / Symmetric-key cryptography (4)


b) Asimmetriese sleutel kriptografie. / Asymmetric-key cryptography (6)

(10)

Vraag 8 / Question 8

Beskryf die werking van CSMA/ CA aan die hand van 'n gepaste vloeidiagram en geskrewe beskrywings.
/ Describe the operation of CSMA/ CA using an appropriate flow diagram and written explanations.

(20)

REii 312 Eerste geleent-f-~;q '24/ 06/ 2017 3/ 7


Vraag 9 / Question 9

In terme van die ARP protokol: / In terms ~f the ARP protocol:

a) Waarvoor staan die akroniem ARP? / What is the meaning of the acronym ARP? (1)

b) Wat is die funksie van ARP? / What is the function of ARP? (2)

c) Noem drie belangri ke verskille tussen 'n ARP-request en ARP-reply pakkie? / Give three promi-
nent differences between an ARP-request and ARP-reply packet? (6)

(9)

Vraag 10 / Question 10

Bereken die Walsh tabel W 2 en W 4, gegee dat W1 = [-1] . / Calculate the Walsh table W2 and W4,
given that W1 = [-1] .

(6)

Vraag 11 / Question 11

Verduidel ik wat die verskil tussen "UDP" en "TC P" is deur hulle eienskappe te kontrasteer . / Explain
the difference between UDP and TCP by contrasting their properties.

(10)

Vraag 12 / Question 12

Verduidel ik met behulp van 'n diagram hoe TCP 'n konneksie inisieer tussen node A en node B deur
middel van ' n "three-way handshake" . Aanvaar die ISN = 100 (Initial Sequence Number) vir node A
en die ISN = 300 vir node B. Dui ook aan hoe die volgorde nommers, erkenning nommers en beheer
veld vlaggies verander. / Expla in with the aid of a diagram , TCP connection establishment between
node A and B by means of a three-way handshake. Assume the /SN = 100 (Initial Sequence Number)
for node A, and the /SN= 300 for node 8. Also indicate how the sequence numbers, acknowledgement
numbers and control field flags change.

(12)

REii 312 Eerste gelee- +b-oirl. ?4/ 06/ 2017 4/ 7


Vraag 13 / Question 13

Vergelyk die "per-hop-behaviours" (PHBs) wat Diffserv definieer met die "service classes" wat lntServ
definieer. Beskryf ook kortliks die diensvlak wat elk van die PHBs en "service classes" aan die netwerk
verkeer lewer. / Compare the per-hob behaviours {PHBs) as defined by OiffServ with the service classes
as defined by lntServ. Also, briefly describe the service level that each PHB and service class gives to
the network traffic.

(10)

Vraag 14 / Question 14

Die uitset koppelvlak van 'n roeteerder implementeer die "leaky bucket"algoritme om 8000grepe/s te
kan stuur. As die onderstaande rame in die gegewe volgorde ontvang is, dui die rame wat elke sekonde
versend word aan. / The output interface of a router is designed to use the leaky bucket algorithm
to send 8000 bytes/ s . If the following frames are received in sequence, show the frames that are sent
each second:

Raam 1,2,3,4: 4000 grepe elk / Frame 1,2,3,4: 4000 bytes each
Raam 5,6.7: 3600 grepe elk / Frame 5,6,7: 3600 bytes each
Raam 8,9: 800 grepe elk / Frames 8,9: 800 bytes each
Raam 10,11,12: 2000 grepe elk / Frames 10,11 ,12: 2000 bytes each

(5)

Vraag 15 / Question 15

Gestel dat jy gebruik moet maak van 'n web bediener met "metafile" om gestoorde data te stroom.
Verduidelik hoe jy dit sal implimenteer. Skets ook 'n diagram van u implementering. / Consider the
scenario where you must make use of a web server with metafile to stream stored data. Explain how
you will implement it. Also provide a sketch of your implementation.

(12)

Vraag 16 / Question 16

Noem en beskryf kortliks die verskillende kategoriee van P2P (Peer-to-Peer) netwerke wat bestaan . /
List and briefly describe the different categories of P2P {Peer-to-Peer) networks that exist.

(8)

REii 312 Eerste gele~nthf:>iQ_ - ~ 4/ 06 /2017 5/ 7


Vraag 17 / Question 17

Beskou die "URL": https://www .google.co.za / Consider the URL: https:j/ www.google.co.za/

a) Verklaar die term "URL" en verduidelik watter inligting deur die "URL"weergegee word? / Define
the term URL and explain which information is conveyed by the URL? (4)

b) Verklaar die term "DNS" en verd uidelik wat "D NS" doen . / Define the term DNS and explain
what DNS does. ( 4)

c) Watter bevel kan in die "command prompt" geroep word om addisionele DNS informasie te verky?
/ Which command can be invoked in the command prompt to obtain additional DNS information?
(2)

(10)

Vraag 18 / Question 18

In figuur 1 , aanvaar dat node A 'n webblad van bediener B aanvra en dat bediener B die respons terug
stuur na node A. Bediener B aanvaar HTTP versoeke op die standaard poort en Node A gebruik poort
49 000. In the figure below, assume that node A is requesting a webpage from Server Band Server B
responds back to Node A accordingly Server B accepts HTTP requests on the default port and node
A uses port 49 000.

a) Wys die inhoud vir die "header"velde soos gegee in die tabel hieronder vir die voortwaartse (HTTP
GET) aanvraag . / Show the contents of the header fields given in the table below for the foward
(HTTP GET} request. (6)

I Src Port I Dest Port I Src IP I Dest IP I Src MAC I Dest MAC I

b) Wat is die "default gateway" va .n Node A? / What is the default gateway of Node A? (2)

(8)

TOTAAL / TOTAL: 162

REii 312 Eerste geleenthei('l -24/ 06/ 2017 6/ 7

You might also like