Question 1. a. A MAC Frame format has a Preamble of 7 octet pattern in the form
Question:
Question 1.
a. A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchronization. Use a Manchester Encoding technique to describe the first octet of the signal pattern produced within the Preamble.
b. Consider a compressed video transmission in an ATM network. Suppose standard ATM cells must be transmitted through five switches at a data rate of 43 Mbps. What is the transmission time for one cell through one switch?
c. With the help of the ATM Protocol Architecture diagram, briefly explain the work of the three planes (i.e. User, Control, and Management)
Question 2.
a. Explain the following mechanisms in the multipath propagation:
i. Reflection,
ii. Diffraction
iii. Scattering
b. For a system of 32 cells with a cell radius of 1.6 km, a total frequency bandwidth that supports 336 traffic channels, and a reuse factor of N = 7, What geographical area does the system cover?
c. How many channels will be available per cell from the previous question?
Question 3.
a. List any 4 key requirements for routing function in a Packet Switching Network.
b. Describe the difference between Link State Routing and Distance Vector Routing?
Question 4.
a. Based on your understanding of CSMA/CD, sketch a State Diagram of the Rules that relates to it with a maximum transmission attempt of 16s.
b. Outline the steps followed by the Link State Routing Protocol in the event of failure.
Question 5.
a. Describe the four abstraction layers of TCP/IP
b. Describe a typical scenario involving 2 Computer Devices transferring a video file using an unsecured ftp connection where TCP three-way handshake is susceptible to vulnerability.
Question 6.
a. As a Network Consultant for Ghana Technology University College (GTUC), how would you convince management about the need to segment their network?
b. As a Network Security expert, in the midst of this COVID-19 pandemic which has increased online activities, what measures would you recommend to protect your organization’s network against intrusions and why?