Tutorial 7 Detailed Review Questions
Chapter 4
After the 802.3 Working Group creates a new candidate standard, what
steps must the candidate standard go through to become a full OSI standard?
When do vendors begin building products?
Steps to go through include the following:
ii. At the point when the standard is official.
How many wires are there in an 802.3 10Base-T/100Base-TX wiring bundle?
How many are actually used in transmission? How would you answer if someone
asked you what "Cat 5" means?
A bundle of four UTP pairs. ie. eight wires in total. Actual number used is 2 per transmission. Cat 5 means more twists per inch of wire thus reducing cross talk interference at high speeds. The higher the Cat the more twists per inch.
What is the size of address fields in 802.3 MAC layer frames? Why does
every
NIC have a unique 802.3 MAC layer frames? What is the maximum size of these
frame? What is in the data field of a typical MAC layer frame?
produced and hence no two same addresses.
iii. Maximum size of these frames is 1518 octets. Minimum size is 64 octets.
iv. The Logical Link control is usually in the data field of a MAC layer frame.
Chapter 5
Distinguish between permanent virtual circuits (PVC) and switched virtual
circuits (SVC).
In ISDN, distinguish between the Basic Rate Interface (BRI) and the
Primary Rate Interface (PRI).
BRI mulitplexes 3 channels to the desktop:
PRI in based on more channels, possible combinations are:
How do speeds of Frame Relay and ATM compare?
Frame Relay speeds are generally slower than ATM. Quantum is as follows:
However Frame Relay speeds often suffice corporate needs and are priced aggressively.
Tutorial 7 Thought Questions
Chapter 4
1.
To list all the additional hardware and software needed
for a simple PC network. Organisation wishes to use email, word processing,
file sharing and print sharing with one existing printer.
Hardware |
Software |
Ethernet 802.3 10Base-T &/or 100Base-TX UTP wiring (8 wires) |
Server operating system (Unix/Novell/Windows NT) |
Switches/hubs |
Application s/w (Windows 2000/Red Hat Linux) |
NIC for all PCs |
Printer software |
File, email and application servers |
|
|
|
2. Explain the steps a receiving station takes when it receives an Ethernet 802.3 frame NOT intended for it. List each field encountered in order and tell what the receiving MAC layer process does with it. Make each field a separate paragraph.
Preamble field and start of frame delimiter field
Frame begins with these two fields. Purpose is to synchronize the receiver's clock.
Preamble has 7 octets of 10101010 for synchronization, frame delimiter 1 octet of 10101011 to start frame.
Destination and source address field
MAC layer frame uses a 48-bit source address and destination address. 6 octets for address receiving station.
Length field
No specification of fixed length for frames. 802.3 MAC frame has 2-octet length field, which tell the number of octets in the data field.
Data field
This field holds the information being sent and contains the PDU of the next higher layer ie the Logical Link Layer (LLC)
PAD field
Required to "fill up the space" to achieve a minimum of 64 octets.
Frame check sequence field
To keep the error rate very low, the MAC frame specifies a four octet error-handling field, the frame check sequencing field. The transmitting station performs a calculation on the remaining bits and places the results in the frame check sequence field.
The receiving MAC layer process redoes the calculation and determines if the results are consistent with the frame check sequencing field. If results are consistent, the receiving MAC layer process accepts the MAC frame.
If the results are inconsistent, the MAC layer discards the MAC layer frame. No retransmission request occurs. Rightfully, a higher-layer process must detect a problem and retransmit the lost information. 802.3 MAC layer offers only error detection not correction. The LLC layer will offer error correction capabilities.
3. Explain the steps a receiving station takes when it receives an Ethernet 802.3 frame intended for it. List each field encountered in order and tell what the receiving MAC layer process does with it. Make each field a separate paragraph.
Each field encountered does the same for the above question except for the frame check sequence field. MAC layer will accept the MAC frame and the process continues in the LLC layer.
Chapter 5
1. How do virtual circuits reduce costs?
Virtual circuits are connection-oriented transmission services. It forms a single path across multiple switches.
It reduces cost possibly in the following ways:
2. Evaluate each option in terms of performance, cost, and technical
feasibility. Select a good working solution for the college.
Option |
Performance |
Cost |
Tech feasibility |
Ethernet 10Base-T |
Low |
Low |
Limited in distance (200m) and usage capacity |
Ethernet 100Base-TX |
Moderate |
Slightly more option 1 |
Limited in distance (200m) and usage capacity |
Switched 10Base-T Ethernet |
Moderate |
Low |
Switches eases congestion. But Still suffer proximity problem. |
Switched 100Base-T Ethernet |
High |
Slightly more option 1 |
Switches eases congestion. But Still suffer proximity problem. |
ATM |
High speed |
High cost |
More for corporate usage with high speed and deep pockets |
Routers |
|
Low |
|
Choice must take into consideration scaleability and cost.
Optimium choice for a "Switched 10Base-T Ethernet" as it accommodates the usage capacity (thru switches) and proximity problem (use of at least 3 hubs). Speed will be slower as this is impossible with a "Switched 100Base-T Ethernet" solution as its inherent limitation is only 2 hubs (ie distance of 200m)
Tutorial 8
(Communication on Intranets and
other Networks)
Detailed Review Questions
What is the disposition phase in email? Why is it important?
What is electronic document management? Distinguish between full-text
searches and index searches. Why do you need a retention strategy? In group
memory, why is design rationale important?
What is group calendaring? Why is it needed? Why is it difficult to
implement?
· Group calendaring is the coordination of the availability of individuals on certain dates.
· It functions as a organisor that schedules meetings and can even inform involved personal through email.
· It is difficult to implement as it requires everyone to keep his/her availability schedule up-to-date. This is seldom achieved.
Distinguish between workflow and project management.
· Workflow management relates mainly to routine clerical tasks (at all levels) that are usually high in volume.
· Project management relates to ad-hoc tasks that involve high level managerial and professional coordination. Such tasks are more dynamic and complex in nature.
(workflow systems track individual tasks sequentially)
In Lotus/IBM Notes, explain replication and scalability.
· Replication is gives the advantage of resource sharing. Users or groups throughout the organisation can access the information so long as it resides in a Notes server.
· Scalability gives the utility the advantage of adding new components to cope with new demands of the organisation. In Lotus/IBM Notes, this is often present in the broad and constantly emerging modules that one can add.
What are the advantages of combining groupware with telephony.
Thought Questions
At what layer in the TCP/IP-OSI hybrid architecture would you find e-mail
standards?
· The e-mail standards will reside in the Internet layer this is because the mail standards are in the TCP/IP architecture.
Why do you think e-mail has grown so explosively while more sophisticated
groupware products have lagged? Do not limit yourself to what was said in the
text.
Email has grown rapidly because of the following factors:
· Internet Mail Standards like SMTP govern it use.
· It is very user friendly and is as simple as 'posting' a letter.
· It is individualistic in nature, everyone has a private mail account.
Groupware has lagged behind because:
· It requires a group to utilise it before its benefits are realised.
· It is very specific to corporations and are only essential in corporate environments.
· Various objectives are served by plethora of groupware available.
You want to send someone an attachment. What things should you negotiate
beforehand?
· The email account settings of the receiver as it may have size restrictions.
· The internet encoding scheme of sender and user must be common.
· There must also be an agreement pertaining to the application file format so that the recipient can access the file
What groupware services would you like to have for a team designing a new
software product? Explain.
· Email for fast and simple communication.
· Video-conferencing (if the personnel involved are from diverse geographic location)
· Project management to coordinate phases and adhere to timelines.
· Electronic document management to organise phases of software development.
· A bulletin board for placing concerns and issues in relation to project.
· (size of team, location of members, degree of coordination required)
Projects
E-Mail Usage |
A survey of 436 U.S. adults using computers found that:
Associated Press, "Computer Users Use E-Mail to Reach Out and Touch Someone," August 13, 1998. |
Communication Interruptions |
A survey of office workers at many levels by Pitney Bowes found the following averages:
Pitney Bowes, Pitney Bowes Workplace Communications in the 21st Century, 1998 study, May 1998. |
@ |
Who decided to use the @ sign in e-mail? It was Ray Tomlinson, who wrote the first e-mail program to work across multiple hosts. This was in the early 1970s. |
Tutorial 9
(Larger Networks II: Servers,
Management and Security)
Detailed Review Questions
What is 24 x 7 operation? Why is it important for some applications than
for others?
· 24 x 7 operation occurs when computer systems need to be operating all the time and no downtime or shutdown is allowed.
· Certain applications require this feature as they may support mission critical services of the organisation. Eg.
· A bank needs such operations to run its ATMs and update its dbase in real-time.
· Airports need flight monitoring systems to be operational all the time.
In geographical decentralization, distinguish between replication and
caching.
· In geographic decentralization, server replication and data caching promote greater efficiency (time/speed/load adv's) as client PCs utilises server nearest to them.
· In replication, the main server's entire content is made available at each remote server. May pose a question of redundancy.
· In caching, only some webpages are made available at remote servers.
· Replication and caching options require cost (of server and maintenance) benefit (efficiency) analysis. Also to consider directory server use to aid user in locating resources.
Characterize each of the following: fault management, configuration
management, performance management, security management and accounting
management.
Key objective of the following management technology is to move bits efficiently, effectively and securely amongst computers in a network.
Transmission Management Techniques |
Capabilities of Management Program |
Fault Management |
|
Configuration Management |
|
Performance Management |
|
Security Management |
|
Accounting Management |
|
What are the major threats to security?
· Power failure => may lead to legal suits, lost data, exposure to security threats.
· Unauthorised access within the network and from outside the network
=> sensitive information may be compromised
· Viruses upsetting the function and resources in the network
· Message integrity is lost by interception of original message and a change in its content.
How many times does encryption take place when you send a message with a
digital signature? List each, and explain whose private or public key is used
and what this encryption accomplishes.
It takes place twice.
· Once for encryption of the message digest (digital signature) using sender's private key.
· this achieves the authentication of signature when the message digest is check to ensure that its contents tally with the original message
· The other encryption takes place when the digital signature is attached to the entire message and sent as a whole message. This uses the receiver's public key.
· this achieves the encryption of the message which is still require to prevent unauthorised access.
Thought Questions
Why is intrusion detection central to security?
Intrusion detection is central to security because:
· It helps promote damage control of any impending intrusions by alerting the network administrator.
· Such a system can also archive possible intrusion strategies and pre-empt possible attacks. (Prevention is better than cure)
· It promotes evolution of the security features in the network.
· It identifies weak spots to strength them to prevent possible intrusions.
· Self-security analysis tool can aid in attacking the systems to further enhance security.
· Detection must also be within the organisation via audit trails that record where users have gone and what information they have accessed.
If you and I wish to communicate via public key encryption, what do you
have to know? What do I have to know?
In encryption of messages to you:
· I don’t have to know anything but your public key. You should possess your private key to decrypt the message
· I would also need to know how secure I want the encryption to be. The higher the need for secured transmission the higher bit length (2 bit - 128 bit) I would employ.
In authentication of messages to you:
· I need to know place my private key in my message. You would need my public key to authenticate the message.
If I send you a message, I normally encrypt it with your public key.
However, I could also encrypt it with my private key. You could decrypt it with
my public key. This would work, but it would cause a serious problem. What is
that problem?
The problem is that once the receiver is able to decrypt my private key he has knowledge of my encryption method.
Why do you think network management has taken so long to develop?
· The business environment is becoming more complex and dynamic that no network management can be comprehensive enuf.
· Customisation to specific business needs is likely to be an alternative.
· Many vendors con up with their own standards
· There is added advantage of a comprehensive network program that can exploit the characteristics of different network management protocols.
TUTORIAL 10
DATAWAREHOUSING AND DATAMARTS
Describe the three
types of metadata that appear in a three-layer data warehouse architecture.
Briefly describe the purpose of each type of metedata.
The three types of Metadata are:
Operational Metadata
·
describes
the data in the various operational systems or sources that feed the EDW
·
they
exist here in various formats and are usually poor in quality
·
variations
due to different sources data is collected from
·
should
try as much as possible to improve quality at start so that downstream data
related resources are not adversely impacted => TQM
Enterprise Data
Warehouse (EDW) Metadata
·
Describes
the data in the EDW
·
Includes
description of the reconciled data
·
As
well as the rules for transforming ops data to reconciled data
Data Mart Metadata
·
Describes
the derived data layer
·
As
well as rules for transforming reconciled data to derived data
Describe 5 errors and
inconsistencies that are commonly found in operational data.
Inconsistent key
structures
-
primary
keys for tables are different
Synonyms
-
same
data values have disparate key names
Free-form fields
versus structured fields
-
the
same data captured is expressed in different fields
Inconsistent data
values
-
data
values are from varied sources and hence no integration
-
data
values are inconsistent
-
data
collection efforts are not orchestrated
Missing data
-
data
that is supposedly to be present be has been left out or not captured
Explain the use of
facts, dimensions and attributes in the star schema.
Star schema exists in data marts to optimize
the presentation of data through fact and dimension tables.
·
Fact
tables contain hard facts or quantitative
data about an entity.
eg. pdt_code, units_sold,
dollars_cost, dollars_sold.
The granularity of the fact table is an impt
design factor that determines the depth and intended use of the data.
Non-key attributes may exists in fact tables
and are called data columns.
·
Dimension
tables hold descriptive data about
the business
eg. color,size, year, month,mgr,
telephone, address
Attributes exist as descriptive data
in dimension tables.
Different classification of data into fact and
dimensions tables are characteristic of star schemas. One-to-many relationships
are between dimension to fact table.
TUTORIAL 11
DETAILED REVIEW
QUESTIONS
How do active webpages make
web-enabled database applications more attractive?
· Active webpages allow the user to select the type of presentation and query for data to be retrieved.
· Query can be made more attractive by use dynamic query options.
· Presentation can be made more attractive with use of graphics
What do SQL and ODBC both do? How do they compare? What is middleware? Why does it simplify application development?
· SQL merely specifies the how to query the database. The request-response exchanges exists in different proprietary ways. Moreover, it doesn't specify the full format of the request and response messages. Additional request protocols are require to manage such exchanges. SQL is a standard for query.
· ODBC is like a "translator" in a C/S environment where different database application programs exists (eg Oracle, SQL, Access). ODBC is a standard for database interactivity.
· Middleware is an application program that translates formats of one dbase to another.
· It simplifies application by
Ø Handling interactions bet the transport and network layers for the s/w developer.
Ø Limiting the amt of expertise the developer of dbase/network needs.
Ø Linking modern RDBMS servers with older legacy systems
What is networked object oriented programming? Why is it attractive? What is the standards situation in networked OOP?
· Network OOP is a programming that contains both data and logic to process the data in components called objects.
· Its attraction stems from the ability of objects to communicate and perform task more efficiently and effectively.
· There are too many standards governing network OOP.
Explain the concept of best practices? How does ERP help companies implement best practices?
· Best practices are business process that have been tried and testing and found to be superb in expediting tasks.
· ERP embodies the best pracs in each area. eg in HR, inventory, payroll, executive DSS, => in these areas they try to use what research has shown to be the best algorithms, practices and workflow.
Distinguish between SSL and SET. In what way is SET supposed to be better for customers? Is it really better in that way?
· SSL doesn't protect the user from abuses of his information by the vendor/seller.
· SETS provides such a protection thru liasing with a 3rd party for verification of buyers particulars. (loophole that merchant will ask for buyer/user's credit card number)
Name and briefly characterize the main types of software you will need at an electronic commerce website?
Web programming+design software/multimedia/database/server os/transaction processing software/search engine/perf monitors.
THOUGHT
QUESTIONS
Comparing adhocracies, virtual
corporations and international organizational systems, in what order do you
think they will appear? Justify your reasoning.
1. virtual or international
2. adhocracies
· The rational for the sequence is be'cos the virtual and international organizations will first form to promote greater flexibility in business.
· After which, they require X-fxnal teams to handle corporate relations and projects.
· However, given the dynamic business environment. There is no certainty of order they will appear in.
Why are marketing channels
central to e-commerce strategies?
· Marketing channel serve to bring about aware of a website. The web is like an endless road and without marketing there is no way of telling were to go for what.
· Moreover, marketing is also important in building a brandname.
· This is crucial to enhance the element of trust and increase hits at a website.
Give your own assessment of
the validity of customer concerns about credit card fraud in Internet
electronic commerce.
· Valid concerns b'cos Bill Gates card number just got compromised. Smart hackers don't boast abt it. They take gradual expenses or sell your card info. You won’t know when damage is done
· Limited liability clause just pacifies the customer financially but psychological effect of trust on the web is already crippled.
Give your own assessment of
the validity of customer concerns about the privacy in Internet electronic
commerce.
· We are not techies and if our computers get hacked into we wouldn't know.
· eg, Singnet covert activities were claimed to be for customer's good to check if hackers can actually hack a computer are doubtful.