ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
Coit11238 2019-t2
1. WRITTEN ASSESSMENT TEMPLATE - PAGE 1
ASSIGNMENT SUBMISSION
Due date: Friday Week 11 (11:45 PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
While it should not be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using the
Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
2. WRITTEN ASSESSMENT TEMPLATE - PAGE 2
Week One
Assignment Question: Counting with different number systems:
You may know what a number system is: a number system is a way to represent
numbers. For example, we are using the base-10 number system, which is called
decimal. Other common number systems include base-2 (binary). base-16, base-8
(octal), and (hexadecimal). In computer science, information is often stored as base-
2 (binary) but presented as base-10 (decimal) or base-16 (hexadecimal). For
example, IPv4 addresses (and/or IPv6 addresses), MAC (hardware) addresses (see
the diagram below) are usually presented in decimal or hex, but internally computers
store them in binary.
View the IPv4 address and MAC address (Physical Address) of your
computer. Then convert both addresses to binary, showing the calculations for
each conversion. In your answer also include one or more screenshots
showing the addresses on your computer.
Your answer
3. WRITTEN ASSESSMENT TEMPLATE - PAGE 3
The ipconfig/all command is used to check the entire network configuration of the device or specifically of the
computer that is connected to a network. The command ipconfig stand for Internet Protocol Configuration and
it explicitly shows the device IP address and the MAC address (Tiwari, 2012). By executing the command in
own computer, the following result is obtained:
The screenshot is showing the part of details obtained by the command execution of ipconfig/all. It is showing
the following about device address:
IPv4: 192.168.42.24
MAC(Physical Address): 8E-4D-A1-9D-4F-F2
The MAC address is defined here by Physical address. The IPv4 address is denoted here by Decimal and the
MAC address is denoted here by Hexadecimal value. Both these two are to be converted to the Binary and
the steps are as follows:
IPv4 to Binary:
Obtained: 192.168.42.24 Decimal
So, each of the sections will be separately converted to Binary as follows:
So, the IPv4 address in binary becomes to: 11000000.10101000.00101010.00011000
4. WRITTEN ASSESSMENT TEMPLATE - PAGE 4
MAC to Binary:
Obtained: 8E-4D-A1-9D-4F-F2 Hexadecimal
As it is known that, each hexadecimal digit represents 4-binary bits. The above MAC address contains 12
hexadecimal digits and so there will be 48-bit binary bits to represent the MAC address (Yiqin Lu, 2017).
Hence the decoding of the hexadecimal MAC address to the Binary address is as follows:
So, the Binary address of the MAC (in form of Hexadecimal) is
10001110-01001101-10100001-10011101-01001111-11110010
The ipconfig/all command also produced the following outcomes along with the first screenshot result and
those are shown below:
5. WRITTEN ASSESSMENT TEMPLATE - PAGE 5
Your question:
Why MAC address is defined in Hex format?
Your sample answer:
Hexadecimal for mat provides the shortest format to keep a value rather than the other
format like decimal, binary and octal. So, for thus reason mainly MAC address is kept in
Hex format.
6. WRITTEN ASSESSMENT TEMPLATE - PAGE 6
Week Two
Assignment Question:
The ping command is used to test the reachability of a specified destination
computer. The ping command operates by sending several (Internet Control
Message Protocol) messages to a destination computer and waiting for a response
(the messages are referred to as Echo Request and Echo Reply). The output of a
ping command contain two major pieces of information: how many of those
responses are returned, and how long it takes for them to return. The ping command
is one of the most often used networking utilities for troubleshooting network
problems. Complete the following questions:
Assume you want to test the reachability to the Google searching service,
create a ping command with 10 ICMP echo requests, with each echo request
packet size set to 512 bits. Include a single screenshot that shows both the
ping command and its output as your answer.
Explain the difference between “ping www.google.com” and “ping the IP
address of Google server at 172.217.167.68”. You may want to try both and
observe any differences. Your answer should include your explanation; it
doesn’t need to include screenshots.
Your answer:
As per the instruction, the ping is done with its two parameters, namely ICMP
and the Packet Size of each echo request (S. T. Ali, 2015). So, the command
will be like the follows:
ping -n 10 -l 512 www.google.com
Using this ping request, the search is done in the command prompt and the
screenshot is shown below:
With this ping request, the echo is done for 10 times as it is shown in the
7. WRITTEN ASSESSMENT TEMPLATE - PAGE 7
footer result in Sent and Received Packet for 10 times. For each time the
request is transacted, 512 bits are transacted actually. As the internet is
connected, so packet loss is Zero (Tiwari, 2012).
The ping is done in two ways, primarily by using the google domain name and
secondly by providing the IP address of the google server. So, for the first
case, the ping will be as follows:
ping www.google.com
And in the second case, the ping will be as follows:
ping 172.217.167.68
Now, the screenshot for these two pings is as follows:
4
For both two cases, the default transaction is made by sending and receiving packet
4. The time taken for the first case is lesser when compared to the second one. The
average time required for the first ping is 96 ms and for the second case, the
average time required is 308 ms. So, the first one is efficient in terms of time
consumption (A.S.Ahmed, 2015).
Your question:
What is ICMP?
Your sample answer:
This is the Internet Control Message Protocol which is basically used for the error reporting
for the IP if the packet delivery is delayed or any error message is receive any the packet
transaction.
8. WRITTEN ASSESSMENT TEMPLATE - PAGE 8
Week Three
Assignment Question:
Describe is the difference between operating in half-duplex mode or full-duplex
mode. Explain why switches can eliminate collisions in LANs, whereas hubs cannot.
Your answer:
Half Duplex and Full Duplex are basically two modes in Communication. The
difference between these two are described below:
1. In half duplex mode, the data transaction can be done in two direction but
it allows the data to be transacted in one direction at a time only whereas
in the full duplex method, the data can be transacted in both direction and
in simultaneous operation (F. A. Barbhuiya, 2011).
2. In half duplex, the responder can send and receive data but only one
operation can be done at a time but in Full duplex method, these two can
be done simultaneously.
3. Half duplex method is less efficient than full duplex as for the one
directional operation (A.S.Ahmed, 2015).
4. Half duplex can be used in Walkie-Talkie where wo sides have to talk by
turns and the full duplex can be applied in the Telephone where the
person at two sides can talk simultaneously (F. Li, 2016).
Switch, in the network traffic, has its own collision domain and is able to
redirect the data to the specific port. So, if there are four devices are
connected with the switch-1 with its ports -1, 2, 3 & 4 with device ID A,B,C &D
and if it is required to transfer the data from A to C, then the data through the
Switch, should pass port-1 & 3 and it will not go to port-2 & 4 (Fuliang Li,
2017). Thus, by using switch, the possibility of collision is lessened. Hub or
repeater has no such capability of redirection to specific port and thus the
packet will reach to every connected port and this the collision will happen
there (Muniyappa, 2012).
Your question:
Between half and full duplex, which one will be preferable for the network communication?
Your sample answer:
As the Full duplex mode allows the bidirectional packet transaction to be happened
simultaneously and for the networking , the bidirectional transaction is essentially required,
so, Full Duplex will be preferred.
9. WRITTEN ASSESSMENT TEMPLATE - PAGE 9
Week Four
Assignment Question:
Draw a network diagram with the following requirements:
A wired Local Area Network (LAN) with 5 workstations, organized as a star
topology
A wireless LAN with an Access Point (AP) and some laptops and mobile
phones.
A router to link these two LANs to an Internet Service Provider (ISP)
Your answer:
First, the Local Area Network is shown which includes 5 workstations. Those
workstations will be connected in a start topology and that means at the center
of the connection, a server will be there which will maintain the data routing
among the workstations (Fuliang Li, 2017). It is assumed that the workstation
will includes all types of devices and the data from the central router will pass
through a Firewall. The design is shown below:
Next, the Wireless LAN is designed which has the access point and there are
different devices connected with the access point such as the computers and
mobiles (S. T. Ali, 2015). Here the access point works as to share the media
to the preferred devices. The diagram is show below:
10. WRITTEN ASSESSMENT TEMPLATE - PAGE 10
According to the instruction, the last objective of the connection is to connect
these to LAN with an Internet Service Provider or ISP (Tiwari, 2012). The
design is shown below:
Your question:
What is ISP?
Your sample answer:
This is basically represents an organization which facilitate the company for using the
internet connection and to connect to the outer world of networking.
11. WRITTEN ASSESSMENT TEMPLATE - PAGE 11
Week Five
Assignment Question:
ABC Corp.’s facilities in Hermit Park, Townsville, are two office buildings 150 metres
apart, each with its own LAN. To connect the two networks, you plan to dig a trench
and lay cable in conduit between the two buildings. You want to use fibre-optic cable,
but your budget-conscious facilities manager wants to use 100 Mbps Ethernet over
twisted-pair cable. Which of the following reasons can you use to justify fibre-optic
cable in this case, and why?
Twisted pair won’t span a 150-metre distance.
Fiber-optic cable is cheaper and easier to work with than twisted pair.
Twisted pair is a conductive cable and can, therefore, carry current based on
the difference in ground potential between the two buildings.
Fibre-optic cable leaves more room for growth and future needs for increased
bandwidth than twisted pair does.
Your answer:
In this scenario, the communication has to be made between two building which are 150
meters distant. It is to be mentioned that, the Fiber Optic Cable and Twisted Pair Cable
both can provide the bandwidth up to 4.7 GHz and thus it sounds similar. But those two is
differed when the coverage distance will be considered (F. A. Barbhuiya, 2011). The
Twisted Pair Cable can provide the coverage up to 100 meters whereas the Fiber Optic
Cable can provide a coverage up to 80000 meters which is far and far higher than the
Twisted Pair Cable. As the distance is the prime concern in this case, so the Fiber Optic
Cable can be chosen by choosing Reason#1 (Yiqin Lu, 2017). On the other hand, the price
is another concern of the communication. The price is less for the Fiber Optic Cable and
higher in case of Twisted Pair Cable. The Twisted Pair Cable costs for $0.7 per meter
whereas the Fiber Optic Cable costs for $0.3 per meter. So, the basic communication
between these two building will cost higher if the Twisted Pair Cable will be used. So, in that
case, again Fiber Optic Cable is chosen by choosing Resaon#2 (Tiwari, 2012).
.
Your question:
How Fiber Optic Cable transfer data in high speed?
Your sample answer:
Fiber Optic Cable transfer data using the light signal with full internal reflection method.
This method helps the system to keep the data intact and lossless and as the light pulse is
used so the transfer rate is same as the speed of light.
12. WRITTEN ASSESSMENT TEMPLATE - PAGE 12
Week Six
Assignment Question:
Complete the following table by nominating the network layer names and the specific
protocols associated with the following tasks:
Ensure that the information sent by the web server reaches your browser
Route messages between your PC and the server over the Internet
Allow the web browser software and the web server software to understand
the messages sent between them
Encapsulate data in frames
Your answer:
Complete this table:
Task Layer Protocol
Ensure that the information sent by the
web server reaches your browser
Application Layer Hyper Text Transfer
Protocol, File
Transfer Protocol
Route messages between your PC and
the server over the Internet
Network Layer Internet Protocol
Allow the web browser software and the
web server software to understand the
messages sent between them
Network Layer User Datagram
Protocol
Encapsulate data in frames Network Layer via
Data Link Layer
Internet Protocol
Your question:
How IP address ca be converted to MAC address in the network?
Your sample answer:
The network layer uses the MAC address which carries the source address in the data
frame. The IP is converted to MAC address using the AR protocol and transferred through
the Network layer and reaches to the destination.
13. WRITTEN ASSESSMENT TEMPLATE - PAGE 13
Week Seven
Assignment Question:
When you try to ping a server on your local network, your operating system needs to
convert the IP address into a MAC address. Answer the following questions:
1) To resolve a local IP address to a physical MAC address, which protocol can
be used? Which layer of the TCP/IP layered architecture does the protocol
belong to?
2) Briefly discuss how this protocol works, including how the protocol avoids
sending a request across a network for each IP packet that needs to be sent
to the same destination.
Your answer:
1. To resolve a local IP to MAC, the Address Resolution Protocol or ARP is
used. The MAC address shows the physical identification of the network and
the IP address shows the logical device address. When the packet of the data
is received from the user, the packet is transformed to Frame and using the
ARP, the IP is converted to MAC in the Network Layer (Fuliang Li, 2017).
2. When ARP is executed in DOS mode, the following outcomes occurs:
So, it can be seen that, the ARP converts the IP address to the MAC or physical
address. Basically, when a packet is to be transferred to the destination, primarily
the ARP frame is created where all the required information like the source address
and the destination address along with the data description (F. Li, 2016). So, this
14. WRITTEN ASSESSMENT TEMPLATE - PAGE 14
particular frame will be transferred and thus, the frame will be received by a
particular destination only.
Your question:
What are the advantages of MAC address in a Network?
Your sample answer:
IP address shows the logical address of a device but it is unable to identify the interface of
the network which is necessary to communicate in the network to reach to the destination.
The MAC address is enriched with the newer version of the address allocation which is able
to identify the destination device as well as the interface using the Frame or ARP Frame.
Thus, MAC address is advantageous (F. A. Barbhuiya, 2011).
15. WRITTEN ASSESSMENT TEMPLATE - PAGE 15
Week Eight
Assignment Question:
A network diagram shows the connection of four computers and the network devices:
a repeater, two switches and a router. The port numbers (P1, P2, and P3) in the
diagram refers to the ports on the respective switches. The MAC addresses of the
computers and the router (where indicated by the arrow) are given in the diagram.
Network Diagram
If the four computers have been actively communicating with each other, what would
the entries of the switching table be for Switch S2? Fill in the switching table below
with the relevant entries. Any order of entries is acceptable.
MAC Address Port #
16. WRITTEN ASSESSMENT TEMPLATE - PAGE 16
Your answer:
Complete the following table:
VLAN MAC Address Port #
1
(C1)
0A-21-DD-2F-00-22 P2
0A-21-DD-2F-00-33 P3-P2-P1
0A-21-DD-2F-00-44 P3-P2-P3
0A-21-DD-2F-00-11 P1
2
(C2)
0A-21-DD-2F-00-11 P1
0A-21-DD-2F-00-33 P3-P2-P1
0A-21-DD-2F-00-44 P3-P2-P3
0A-21-DD-2F-00-22 P2
3
(C3)
0A-21-DD-2F-00-11 P2-P3-P1
0A-21-DD-2F-00-22 P2-P3-P2
0A-21-DD-2F-00-44 P3
0A-21-DD-2F-00-33 P1
4
(C4)
0A-21-DD-2F-00-11 P2-P3-P1
0A-21-DD-2F-00-22 P2-P3-P2
0A-21-DD-2F-00-33 P1
0A-21-DD-2F-00-44 P3
Your question:
What is the function of a Switch?
Your sample answer:
Switch is used to forward the packet or frame to the destination device. When switch
receives a frame, it checks the MAC table and match the destination location of the frame
and forward the frame to the relevant post so that it can reach to the relevant device only
(Tiwari, 2012).
17. WRITTEN ASSESSMENT TEMPLATE - PAGE 17
Week Nine
Assignment Question:
Visit Digital Attack Map and search the internet to complete the following tasks:
1) Explain what DDoS is;
2) Give two specific examples of real of DDoS attacks
3) What are the top three practices for preventing or stopping DDoS attacks.
Your answer:
1. DDoS: DDoS or Distributed Daniel of Service attach is basically a malicious
attack and this aims the target device to be flooding in the network traffic by
disrupting it. So, the user cannot use the normal traffic through their device.
DDoS not only attacks a single computer but it actually attacks the entire
network to take the traffic under the control of the hackers (Mohamed
Idhammad, 2018). Thus, every device of the network including the devices
connected in IoT, will be acted as the bot, controlled by the hackers and thus
the botnet is created and no normal traffic of the desired organization will be
transacted through the network and hence the network breakdown occurs (T.
Vissers, 2014).
2. In 2018, the github, a developer and repository of the leading programmer,
was hacked with the DDoS and got a record-breaking traffic of 1.5TBPS.
Another major incident was occurred for the security provider “CloudFlare”
with a sudden hit of 400GBPS in the year of 2014 (M. Anagnostopoulos,
2015).
3. There are several ways to prevent or at least avoid the DDoS attack. Three of
those methods are:
i. Developing a response plan for the DDoS attack so that when the
18. WRITTEN ASSESSMENT TEMPLATE - PAGE 18
modification is about to be happened, this will be get reported an thus it
make the alert to the administrator (T. Vissers, 2014).
ii. Installing integrated security plan make the system healthy and less
probable to be attacked by the DDoS. This includes the intrusion
detection technique to be install there along with the firewall and other
security patches (M. Anagnostopoulos, 2015).
iii. Utilizing Cloud network is the safer choice to be get immune from the
DDoS as the cloud has the proven security and high bandwidth.
Your question:
What are the symptoms of DDoS attack?
Your sample answer:
The symptoms are:
Slow file access in remote location or in native device
Unable to locate or to reach to a particular web service for long time
Disconnection of Internet Service
Internet flooding and blockages
Storing enormous amount of spam mail.
19. WRITTEN ASSESSMENT TEMPLATE - PAGE 19
Week Ten
Assignment Question:
You have an idea for a cloud-based IoT application that can monitor your
living/working/studying environments by collecting and demonstrating the data of
temperature, humanity, air quality and so on. You need a development server for
your team members (classmates across several campuses). And then, once the
software is developed and deployed with required hardware, you need a hosting
solution for users to access to the software and users can check their
living/working/studying environments on their tablets and smartphones.
What types of cloud computing service are appropriate to these situations?
Justify your answers.
Your answer:
In this scenario, Infrastructure as a Service will be more appropriate. This
Infrastructure as a Service provides the integration of software ad hardware
usages by the user. As the students have to use the infrastructure for studying
purpose in difference campuses with the software and hardware for the
development purpose, so, Infrastructure as a Service will be better to provide
the service respectively (Sidhu, 2017). By using Infrastructure as a Service,
the students will be able to access the software applications, can manage the
data in runtime, access the middleware and also able to access the operating
system from remotely. So, the students even need not to have a native
system and do not even to bother about the same and can work smoothly
(Zhou, 2016).
Your question:
How many types of cloud services are there?
Your sample answer:
There are basically three types of cloud services for providing the integrated solutions to
the clients through which they can use the resources, provided by the vendors and without
the installation of any software and in many cases, the hardware are also not required up to
high level. Those are:
Infrastructure as a Service
20. WRITTEN ASSESSMENT TEMPLATE - PAGE 20
Software as a Service
Platform as a Service.
References
A.S.Ahmed, R. a. N., 2015. Improvingsecurity forIPv6neighbordiscovery.
ProceedingsoftheInternational ConferenceonElectricalEngineeringandInformatics(ICEEI’15), p.
271–274.
F. A. Barbhuiya, S. B. a. S. N., 2011. “Detection of neighbor solicitation and advertisement spoofing
in IPv6 neighbor discovery protocol. in Proceedings of the 4th International Conference on Security
of Information and Networks (SIN ’11), , pp. 111-118.
F. Li, J. Y. X. W. T. P. C. A. a. J. W., 2016. Characteristics analysis at prefix granularity: A case
study in an IPv6 network. Journal of Network and Computer Applications, Volume 70, p. 156–170.
Fuliang Li, X. W. T. P. a. J. Y., 2017. A Case Study of IPv6 Network Performance: Packet Delay,
Loss, and Reordering. Mathematical Problems in Engineering, p. 10.
M. Anagnostopoulos, G. K. a. S. G., 2015. New facets of mobile botnet: architecture and evaluation.
International Journal of Information Security, 15(5), p. 455–473.
Mohamed Idhammad, K. A. M. B., 2018. Detection System of HTTP DDoS Attacks in a Cloud
Environment Based on Information Theoretic Entropy and Random Forest. Security and
Communication Networks, p. 13.
Muniyappa, V. K., 2012. Performance Analysis of IPv4 versus IPv6 in a Simple Campus Network.
Long Beach.
S. T. Ali, V. S. A. R. a. S. J., 2015. A survey of securing networks using software defined
networking. IEEE TransactionsonReliability, 64(3), p. 1086–1097.
Sidhu, S. S. a. J., 2017. Compliance-based Multi-dimensional Trust Evaluation System for
determining trustworthiness of Cloud Service Providers. Future Generation Computer Systems,
Volume 67, p. 109–132.
T. Vissers, T. S. S. L. P. K. G. a. P. H., 2014. DDoS defense system for web services in a cloud
environment. Future Generation Computer Systems, Volume 37, pp. 37-45.
Tiwari, V. K. a. S., 2012. Routing in IPv6 over Low-Power Wireless Personal Area Networks
(6LoWPAN): A Survey. Journal of Computer Networks and Communications, Volume 2012, p. 10.
Yiqin Lu, M. W. a. P. H., 2017. An SDN-Based Authentication Mechanism for Securing Neighbor
Discovery Protocol in IPv6. Security and Communication Networks , Volume
https://doi.org/10.1155/2017/5838657, p. 9.
Zhou, Z. W. a. Y., 2016. Customized Cloud Service Trustworthiness Evaluation and Comparison
Using Fuzzy Neural Networks,. Proceedings of the 2016 IEEE 40th Annual Computer Software and
Applications Conference (COMPSAC), pp. 433-442.
21. MARKING SHEET - DO NOT DELETE
Assignment Question Student Question
Criteria
0 Incorrect/No Response 0 No question provided or minimal
attempt
0.5 Limited /Partially incorrect
response OR response is
not in the student’s own
words
0.5 Simplistic question/sample answer
that does not demonstrate an
understanding of the topic area OR
sample answer is not in the
student’s own words
1 Correct response but
could have more detail
1 Good question that has some
challenge, but could be more
challenging and/or the sample
answer needs more
detail/explanation
1.5 Excellent response with
good detail
1.5 Excellent and challenging question
with a detailed sample answer
Week Marks Awarded Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
WRITTEN ASSESSMENT TEMPLATE - PAGE 14