Question 1 / Week 6(12.5 + 8 = 20.5 marks)Computer networks are constructed using a modular architecture known as layering.a)Identify and describe the five different approaches to configuring IPv6 addresses. In your answer, explain why it may be beneficial to use stateless DHCPv6
Question 2 / Week 7(12 + 6 = 18 marks)a)Transport protocols usually provide multiplexing and demultiplexing services. Explain how this works and why it is necessary.b)(HD Task) Sliding-window flow control provides both flow control and error control. The TCP protocol implements a variant of this, where an acknowledgement can be sent for segments received without granting permission for additional segments to be sent. If the underlying IP protocol were modified to provide a reliable service, guaranteeing that all segments sent by TCP arrived at the destination without error, explain why it would still be useful to separate the acknowledgement and the granting of permission.Question 3 / Week 8((3 + 7 + 5) + (4 + 2) = 21 marks)a)Select three popular Internet domains, examples of which could include amazon.com, facebook.com, google.com, microsoft.com, reddit.com, or any other popular domains of your choosing.i.Obtain the SOA records for each of your chosen domains and present their data in a table.ii.Briefly explain the meaning of each field.iii.Discuss how the observed different values will impact other DNS servers.b)(HD Task) We have examined the HTTP protocol in this week’s materials. For constrained devices such as IoT devices, alternative protocols such as the Constrained Application Protocol (CoAP) are often used instead.i.Describe the CoAP protocol.ii.Explain why CoAP might be preferred for constrained devices.
Question 4 / Week 9(8 + 12 = 20 marks)a)In Week 9 on Slide 6, a figure is shown illustrating SNMP querying how many UDP datagrams have been received by an agent (the agent could be an individual host or a router). Explain how such simple data can be made useful.b)One of the problems encountered for multimedia is jitter. Explain how a playback buffer solves the problem of jitter and discuss whether a playback buffer is useful for live events such as a video call/conference. Question 5 / Week 10(8 + (5 + 7.5) = 20.5 marks)a)Digital signatures work by generating and signing a digest of a message. Explain why only a digest is signed and why it isn’t necessary to sign the entire message. b)Consider an organisation that has two sites (offices, branches, etc.), each with a typical connection to the Internet via an ISP (such as an NBN connection like many Australian homes). To secure communication between the two sites, a site-to-site VPN has been established using IPsec ESP in tunnel mode.i.Draw an illustration showing the two sites and their connection to the Internet, the VPN tunnel, packets travelling between the individual sites and public Internet sites, and packets travelling between the sites.ii.Briefly discuss the advantages of this approach and explain the services provided by the VPN