SIT202讲解、讲解Algorithm、Python语言讲解、辅导Java,c++编程设计

- 首页 >> Java编程
SIT202 Computer Networks
Trimester 2, 2020
Problem Based Learning Task 2
Due Date: 8pm Sunday September 27th, 2020
This assessment is marked out of 100 marks and is worth 35% of your final unit mark.
This assessment task must be completed individually,
group work and/or collaboration with other students is prohibited.
All work completed/submitted as part of this assessment task must be your own, individual work.
Any content drawn from other materials, including unit materials, must be clearly quoted where
appropriate, and/or clearly referenced. All students should review and be familiar with the content
provided by the University regarding how to reference other materials:
https://www.deakin.edu.au/students/studying/study-support/referencing
And in particular the information provided regarding Academy Integrity:
https://www.deakin.edu.au/students/studying/academic-integrity
Use of Illustrations
Note that several questions below may require you to include an illustration in your answer. This
must be your own illustration, not a graphic copied from the Internet or any other source
(textbook, class slides, etc.). Illustrations from the Internet (whether directly copied or
reproduced by you) will not be awarded any marks.
There are many illustration programs that you may use for this purpose, including several free
applications accessible via the Web. If you are unable to use these programs however, you may
include a scanned/photographed hand-drawn illustration in as long as that illustration is clearly
legible.
HD Tasks
Note that there are one or more “HD Tasks” identified in the requirements below. These tasks are
more difficult to answer and total 20% of the marks available for this assessment. A HD result
reflects achievement in the unit of a deep understanding of the unit content and ability to extend
your knowledge beyond that covered in the unit directly. You can expect these tasks will be
assessed harder than other tasks reflecting demonstration of this level of achievement.
Submission
Answers must be submitted via the unit site (CloudDeakin) to the TurnItIn-enabled folder for
Problem Based Learning Task 2. Answers to each question and sub-question must be clearly
identified in your submission. Acceptable file formats include Word documents, PowerPoint
documents, PDF documents, text and rich text files, and HTML. Compressed files such as ZIP files
or RAR files, or any other format that cannot be processed by TurnItIn cannot accepted and will
not be marked.
Extensions
Applications for an extension can be made before the due date/time via the tool in the unit site
(CloudDeakin). The link to the extensions tool can be found by clicking on the Assessments menu
at the top of the screen and selecting the Extension Request link. Extension applications must
clearly explain unusual circumstances that have impacted your studies and must contain enough
information for the duration of any extension to be determined. Students applying on the basis of
a LAP must at a minimum indicate they are supported by a LAP and indicate that the request for
an extension is linked to the disability.
Applications for special consideration can be made at any time including (for a limited time) after
the due date/time. Information on applying special consideration can be found here:
https://www.deakin.edu.au/students/studying/assessment-and-results/special-consideration
Note: Applying for an extension or special consideration does not guarantee a positive outcome.
You should always continue working on the basis that an extension is not granted, such as
submitting any work you have completed by the original due date/time to avoid a late penalty.
If an extension is then granted you can resubmit an updated version of your assessment later.
Question 1 / Week 6 (12.5 + 8 = 20.5 marks)
Computer networks are constructed using a modular architecture known as layering.
a) Identify and describe the five different approaches to configuring IPv6 addresses. In your
answer, explain why it may be beneficial to use stateless DHCPv6.
b) (HD Task) Consider the following weighted graph:
A B
D E
C 2 2
3
4 1 5 1
Demonstrate the step-by-step calculation of the least-cost tree starting from node A using
Dijkstra’s Algorithm and draw a figure illustrating the final least-cost tree.
Question 2 / Week 7 (12 + 6 = 18 marks)
a) Transport protocols usually provide multiplexing and demultiplexing services. Explain how
this works and why it is necessary.
b) (HD Task) Sliding-window flow control provides both flow control and error control. The
TCP protocol implements a variant of this, where an acknowledgement can be sent for
segments received without granting permission for additional segments to be sent. If the
underlying IP protocol were modified to provide a reliable service, guaranteeing that all
segments sent by TCP arrived at the destination without error, explain why it would still be
useful to separate the acknowledgement and the granting of permission.
Question 3 / Week 8 ((3 + 7 + 5) + (4 + 2) = 21 marks)
a) Select three popular Internet domains, examples of which could include amazon.com,
facebook.com, google.com, microsoft.com, reddit.com, or any other popular domains of
your choosing.
i. Obtain the SOA records for each of your chosen domains and present their data in a
table.
ii. Briefly explain the meaning of each field.
iii. Discuss how the observed different values will impact other DNS servers.
b) (HD Task) We have examined the HTTP protocol in this week’s materials. For constrained
devices such as IoT devices, alternative protocols such as the Constrained Application
Protocol (CoAP) are often used instead.
i. Describe the CoAP protocol.
ii. Explain why CoAP might be preferred for constrained devices.
Question 4 / Week 9 (8 + 12 = 20 marks)
a) In Week 9 on Slide 6, a figure is shown illustrating SNMP querying how many UDP
datagrams have been received by an agent (the agent could be an individual host or a
router). Explain how such simple data can be made useful.
b) One of the problems encountered for multimedia is jitter. Explain how a playback buffer
solves the problem of jitter and discuss whether a playback buffer is useful for live events
such as a video call/conference.
Question 5 / Week 10 (8 + (5 + 7.5) = 20.5 marks)
a) Digital signatures work by generating and signing a digest of a message. Explain why only a
digest is signed and why it isn’t necessary to sign the entire message.
b) Consider an organisation that has two sites (offices, branches, etc.), each with a typical
connection to the Internet via an ISP (such as an NBN connection like many Australian
homes). To secure communication between the two sites, a site-to-site VPN has been
established using IPsec ESP in tunnel mode.
i. Draw an illustration showing the two sites and their connection to the Internet, the
VPN tunnel, packets travelling between the individual sites and public Internet
sites, and packets travelling between the sites.
ii. Briefly discuss the advantages of this approach and explain the services provided by
the VPN.

站长地图