NPS Written Exam
NPS Written Exam
You are reminded that you should not access online materials, notes etc. during this
examination or discuss this assessment with others before the end of its time period.
By submitting this assessment, you confirm that you have read the above Statement and
are responsible for understanding and complying with Academic Misconduct regulations
as they relate to this assessment.
1
Instructions to candidates
1) This exam is worth 50% of the assessment.
2) This paper contains 3 Sections of questions on 10 pages.
3) Candidates MUST answer ALL the questions in SECTION A, SECTION B &
SECTION C.
4) Type your answers on this paper itself. Please use Blue color fonts.
5) Answers for the MCQ questions should be highlighted in blue.
6) All illustrations/ diagrams/ graphs should be hand drawn and captured as
images. Then you can paste the image onto your answer sheet. (images
extracted from online sources / other material are not accepted for
marking)
7) Equations should be typed (not hand written).
8) Do not change the order or the numbering of the questions.
9) Each main question in Section C should start on a new page.
10) Clearly mention your London Met ID number on the first page of the
document.
11) Once finished answering, save your document as a PDF and name it as:
London Met ID No_NPS_WrittenExam
12) Upload the PDF to ICMS before the deadline.
2
LMU_Student ID - 20047938
E016323 D.K.S.A.Shevon
3
QUESTIONS – MAIN SIT (Answer ALL the questions)
λ= c / f
4
7. Describe Little’s Law with an example.
This is a principle that determines the average output of a queueing system. Based on the
time of average it takes for an object to arrive in a system and the amount of objects that
arrive in a single unit of time.
Ex: Server satisfies I/O request in average of 60 msec. I/O rate is about 1000 requests/sec.
What is the mean number of requests at the server?
= 60 requests
5
SECTION B [2marks*10=20 Marks]
Select the correct answer/s (Highlight the answer/s in blue color)
6
5. Which of the following is relating to ‘Authentication’?
a) Wiretapping
b) Inconsistency between data sent and data received
c) Unauthorized user gaining access to sensitive information
d) Flooded network
e) A student of XYZ university posting as the examination division has cancelled the
exam
7
8. Packets arrive at a rate of 250 packets per second (pps) at a gateway and the gateway
takes an average of two milliseconds to forward. What is the utilization?
a) 100%
b) 80%
c) 75%
d) 50%
e) 25%
9. Simulation checklist before developing simulation (Choose 3)
a) Are there any surprising results
b) Is the goal properly specified
c) Does the team include right mix
d) Is model reviewed regularly
e) Has sufficient time been planned
8
SECTION C [40 Marks] (Answer All Questions, each main question
should be answered on a new page).
Question 01 [10 marks]
9
2. Graph theory is important when designing a network topology. Define what a graph is with
a suitable illustration. (02 marks)
The mathematical logic of the properties and applications of graphs. Used to design
topology in networking.
Graph theory is referred to the study of relations in the graphs, which can either be
mathematical systems used to represent the inter-relations between objects.
The below equation is a mathematical structure consisting of two sets V and E
G = (V, E)
A D
Vertices: [A, B, C, D]
10
3. Provide the adjacency matrix for the below graph (Figure 1) (02 marks)
Figure 1
This another way of representing a graph. This is a 2D array of size V*V where V is the
count of vertices of the graph.
1 2 3 4 5 6
1 1 1 0 0 1 0
2 1 0 1 0 1 0
3 0 1 0 1 0 0
4 0 0 1 0 1 1
5 1 1 0 1 0 0
6 0 0 0 1 0 0
11
4. Explain the importance of information theory in network planning. (01 mark)
Link capacities of the transmission technologies are defined using information theory.
The key measure of information theory is entropy. Entropy quantifies the value of
uncertainty mixed-up within the quantity of an arbitrary inconstant or the final results of a
random method.
12
5. Explain entropy with related to information theory using an appropriate example.
(04 marks)
If we examine the above figure, we can observe that the likelihood of selecting a blue ball from
the first box is high due to the higher available information. Then, if we look at the second box, if
we are asked to select a blue ball from it, the likelihood of picking a blue ball is relatively low in
comparison to the first box, since the information level is lower in the second box. The likelihood
of selecting the blue ball in the final box is low due to the low level of information available. As a
result, the entropy is greater than that of the other boxes.
By the following scenario, we can come to a conclusion, that when information is high, entropy is
low, and vice versa.
𝑚
13
Question 02 [10 marks]
• Sender / information source – this is the creature of the message, chooses the
transmission channel and pass the message.
• Encoder (transmitter) – this is the information source who uses the machine which turn
the message into binary data.
• Channel – this is the way used to send message.
• Decoder (receiver) – this is the machine which is used to convert the binary data into
message.
• Receiver (destination) – this is the receiver of the message and provides the respond
according.
• Noise – this is the physical disturbance like environment, people which does not allow
the message get to the receiver as what’s sent.
14
3. A certain electromagnetic wave has a wavelength of 625 nm.
a) What is the frequency of the wave? (01 mark)
C = velocity speed of the light (3 x 108 ms-1)
λ=Lambda
f=frequency
λ= 6.25nm x 10-9m
1nm
= 6.25 x 10-7m
V= c/λ
= 4.8 x 1014 hz
E=hf
= 6.626 x 10-34 Js x 4.8 x 1014
= 3.180 x 10-19J
15
4. Differentiate between Bit rate and Baud rate. (01 mark)
Bit rate is known as the transmission of number of bits per second. For this the unit is bits per
second (bps).
• Example: if the bit rate is 20kbps it means that the bit rate is 20000 bits are transferring
in a second.
Baud rate is known as the amount of signal level changes in a second. The unit for this is bauds
per second.
• Example: If the baud rate is 1000 that means 1000 changes of the signals are done in a
second.
16
Question 03 [10 marks]
1. a) State and briefly explain the six (6) phases in network life cycle. (03 marks)
For doing these things in an effective manner cisco have defined several lifecycles. Among those
one of the main is PPDIOO. PPDIOO stands for (Prepare, Plan, Design, Implement, Operate,
Operate).
Optimize
Operate Prepare
Implement Plan
Design
Prepare: In this phase we could collect all the requirements and the goals of the business. And
according to that we have to create a high-level design.
Plan: When working with this phase we have to give the consideration to the existing network of
the organization and gather the information and compare the results with the created high-level
design in the previous phase.
Design: In this phase we have to prepare a detailed network design by taking the business goals
and the requirements into consideration. Also, design must be supported with the availability,
scalability, reliability, security and performance as well.
Implement: This is the phase we have to implement our system in the live environment. Before
implementing in the real environment, we have to create a implementation plan, if possible verify
the system in the lab environment, implement a pilot means that break the project into smaller
parts and while upgrading the system test it whether that part is successful or unsuccessful. After
that we have to do the full deployment by comparing with the baseline of the network created to
observe the effect for the network.
Operate: This is the lengthy phase in this lifecycle and this is the daily operations in the network.
Optimize: In this phase we are identifying the problems that can arise in future and identify the
needs and improvements that have to come more on the newly implemented network. And this is
the phase that the lifecycle begins again and moves circularly to start the new implementations.
17
b) Provide four (4) benefits of the network life cycle. (02 marks)
• It increases the availability of the network – the network availability will be much
higher by following the well-constructed of the phases in network lifecycle.
• It lowers the total cost – by following the above life cycle the cost can be reduced
considerably because of proper requirement gathering and planning.
• By improving the availability, scalability, security, performance and reliability it
gives a speedy access to applications
• Improves the business agility – by defining the business requirements and the
relevant technologies it increases the business efficiency.
18
2. a) Explain the importance of Prim’s Algorithm in topological design. (01 mark)
This is the way to find the shortest path in a topological design.
b) ABC is an organization having data centers in New York, Chicago, Atlanta, Dallas,
Los Angeles, and San Francisco (Figure 3). The New York center is the central
database. All the other data centers must be able to communicate with the central
database. The plan is to connect the centers by leased communication lines. For
simplicity it is assumed the costs of the leased lines are proportional to the distances
between their endpoints which are given in Table 1.
Apply Prim’s Algorithm and illustrate the topological design for this scenario.
(04 marks)
Figure 3
Table 1
Requirement
• All the data centers should have the access to communicate with the central
database
• New York is the central database among all.
• Planning to connect the centers with leased communication lines.
19
Assumption
Distance is proportional to the cost.
= 3626
20
Question 04 [10 marks]
This is a principle that determines the average output of a queueing system. Based on the time of
average it takes for an object to arrive in a system and the amount of objects that arrive in a single
unit of time.
Mean jobs in system = arrival rate x mean response time
Applies if jobs entering equals job serviced
• No newly jobs generated; no new jobs lost
• If lost, can adjust arrival rate
(Esoft lecture slides, 2021)
21
3. Server satisfies I/O request in average of 50 msec. I/O rate is about 1000 requests/sec.
a) What is the mean number of requests at the server? (01 mark)
= 50 requests
4. M/M/5/20/1600/FCFS
a) Explain the above Kendall’s notation for a single queue system. (01 mark)
• Five servers
b) For the same single queue system, Kendall’s notation is given as M/M/5. What can you
say about it? (01 mark)
• Five servers
• Capacity is infinite
• Population is infinite
22
5. Consider I/O system with one disk and one controller. If average time required to service
each request is 8 msec, what is the maximum request rate it can tolerate? (01 mark)
Mean service time = 8 msec
I/O system request processing time = 1 sec
Total requests process in 1 sec = 1000/ 8
= 125 request/ sec
23
6. Briefly describe the two (2) main types of firewalls, Packet level and Application-level.
(02 marks)
24
• Stateful packet filtering firewall
This is a more advanced firewall can configure in a network. They can keep track on the network
and on the active connections. They have the power to understand what are the legitimate and
malicious traffic. And this gives an extra protection to the network by giving more security
procedures for every active connection. And if it is a new connection they have to denote as a
handshake to be allowed for connecting to the network.
• Software firewall
This is type of firewall that is being installed on the devices having locally. There’s a huge benefit
for the network by these type of firewalls because of the defensing ability.
25
• Hardware firewall
These are physical firewalls that are organized in the network to secure the end devices from
malicious threats and risks that can come from the outside of the network.
26