Institute of Technology, Carlow
School of Science
Department of Computing & Networking
Autumn 2008 Examinations
BSc in Software Development
Mr A Kinsella
Mr G Clynch
Mr E Townsend
Instructions to Candidate:
Write your Name, Course, Course Year and Class Group on your answer
All questions carry equal marks. Section marks are shown in brackets.
The Frame Relay Forum recommends choosing Frame Relay for WAN connectivity where the
requirement is for:
Connecting Multiple Sites
Interactive or Bursty Traffic
Widely Separated Locations
Explain and comment on these recommendations.
Explain the purpose and
operation of the Committed Information Rate (CIR) in a Frame Relay
Virtual Circuit (VC).
A group of fashion shops has eight branches around the country, and a distribution warehouse at
the Dublin head office. They currently operate a WAN with each br
anch connected to the head
office by 64kb/s leased lines in a star network. They are considering replacing the leased lines
with frame relay circuits, also in a star configuration.
Explain why there would be a saving in changing to Frame Relay.
capacity would you recommend for the access lines between head office and the FR
What CIRs would you recommend for the virtual circuits between one of the branches and head
Firewalls for personal computers are often based on p
acket filtering. Explain how packet
What are the limitations of packet filtering?
A home PC user connecting to the internet over DSL wants to set up packet filtering. Outline a
set of filtering rules that you would consider s
Virtual Private Networks built on the internet are often recommended as an alternative to a
WAN built using Frame Relay. Outline the advantages and disadvantages of each approach for
area networks for small and medium
Virtual Private Networks through the internet often use the IPSec suite of protocols. IPSec has
three principal architectures or configurations. Describe these architectures, and indicate the
situations where they might be used.
IPSec a Security Association (SA) is “the
relationship between two or more entities that
describes how the entities will use security services to communicate securely”.
List the typical
contents of an SA database.
Describe the purpose and operation
Network Address Translation, and indicate how it
contributes to conservation of address space and to network security.
Outline the steps necessary to set up NAT on a Cisco router.
In the ISDN S
(a) describe the encoding scheme used f
or transmitting bits;
(b) what is the purpose of the E bits in the NT to TE frame?
(c) indicate the sequence of events when multiple TEs start to transmit on the D
channel at the
(d) what is the purpose of the threshold, and why w
ill it not be exceeded during the data portion
of a D