You are on page 1of 9

UMB

Mid Exam Make Up Exam Short Semester Faculty/Department Course Date: Lecturer Class Time : : : : : : : Post Graduate Program IP Based Communication Saturday / 9 February 2008 Rizal Broer & team Magister Telekomunikasi (S2) 120 minute Open Book NIM Name Sign : : :

Final Exam
Other : ..

Odd, 2007 / 2008

I.

Check Your Understanding (Multiple Choice)

[20%]

1. Which of the following is the most appropriate choice for Ethernet connectivity? A. Use 10-Mbps Ethernet as a connection between server and LAN. B. Use Gigabit Ethernet as the link at the user level to provide good performance. C. Use Fast Ethernet as a link between the user level and network devices to support

the aggregate traffic from each Ethernet segment on the access link. D. None of the above.
2. Which standards body created the cables and connector specification used to

support Ethernet implementation? A. ISO B. ANSI C. TIA/EIA D. IETF

3. For which of the following would you not need to provide a crossover cable? A. Connecting uplinks between switches B. Connecting routers to switches C. Connecting hubs to switches D. None of the above

4. Which technology is not a type of wireless communication? A. Cellular B. Wideband C. Infrared D. Spread spectrum

5. Which of the following is not a feature of wired equivalent privacy (WEP)?

A. WEP uses the RC4 stream cipher for encryption. B. WEP is a security mechanism defined within in the 802.3 standards. C. One of the goals of WEP is to deny access to the network by unauthorized

users who do not possess the appropriate WEP key. D. None of the above.
6. Which of the following is not a WAN implementation? A. DSL B. ISDN C. Frame Relay D. Ethernet

7. What type of data-transmission method is used by a WAN? A. Parallel B. Serial C. Single D. None of above 8. What type of connector is used for DSL connection? A. RJ-45 B. RJ-11 C. F D. DB-9

9. What type of connector is used to connect a router and a cable system? A. RJ-45 B. RJ-11 C. F D. AUI

10. What is the importance of the EIA/TIA standards? Select all that apply. A. They provide a framework for the implementation of the OSI reference

model. B. They provide guidelines for manufacturers to follow to ensure compatibility. C. They provide the minimum media requirements for multiproduct and multivendor environment. D. None of the above.
11. A fiber-optic cable transmits multiple streams of LED-generated

light. A. Multimode B. Multichannel C. Multiphase D. None of the above

12. What is one advantage of using fiber-optic cable in networks? A. It is inexpensive. B. It is easy to install. C. It is an industry standard and is available at any electronics store.

D. It is capable of higher data rates than either coaxial or twisted-pair cable. 13. Which fiber-optic cable type is typically used for outside installations? A. Tight-buffered B. Tight-tube C. Loose-buffered D. Loose-tube 14. What is the light source typically used in single mode fiber optics? A. Photo transistor B. Laser C. Photo resistor D. LED 15. Which term describes the angle at which a ray hits a glass surface? A. Angle of reflection B. Angle of refraction C. Angle of incidence D. Angle of attack

16. Modulation is a process of changing amplitude, frequency, or phase. Which

acronym does not represent a type of modulation? A. AM B. FM C. PM D. RM


17. Which range does not correctly identify an unlicensed wireless frequency? A. 2.4 GHz B. 5 GHz C. 9 GHz D. 900 MHz

18. Which statement does not describe a benefit of spread spectrum? A. Spread-spectrum transmissions are transmitted at high speeds. B. Spread spectrum is less susceptible to radio noise. C. Spread spectrum has a higher probability of correct reception. D. Spread spectrum creates little interference. 19. Which statement does not describe the features of direct-sequence spread

spectrum (DSSS)? A. DSSS is reliable because each bit is represented by a string of 1s and 0s. B. If up to 40 percent of the string is lost, the original transmission can be reconstructed. C. DSSS technology has low throughput of data and short-range access. D. The recently released evolution of the IEEE standard, 802.11b, provides for a full Ethernet-like data rate of 11 Mbps over DSSS.
20. Which of the following is not a feature of wired equivalent privacy (WEP)? A. WEP uses the RC4 stream cipher for encryption.

B. WEP is a security mechanism defined within in the 802.3 standards. C. One of the goals of WEP is to deny access to the network by unauthorized

users who do not possess the appropriate WEP key. D. None of the above.

II.
1.

Match Term .. [15%]

Answe r 1 2 3 4 5 6 7 8 9 10 11 fm broadcasr Audio 902-928 MHz (26 MHz) am broadcast Television narrrowband pcs (1.9 GHz) 5GHz (IEEE 802.11) HyperLAN, HyperLAN2 infrared Wireless 2.4-2.4835 GHz (83.5 MHz)/ IEEE 802.11 short wave radio cellular (840 mhz)

2.

answe r 1 2 3 4 5 6 spread spectrum wireless LAN broad band pcs NarrowBand PCS infrared Wireless LAN Satellite NarrowBand Wireless LAN circuit and packet data cellular, 7 CDPD

III.

Case Study [65%]

Case Study

Sebuah perguruan tinggi di JAKARTA , bernama TELKOM-UMB. TELKOM-UMB mempunyai 2 gedung utama yg terpisah. Gedung yg pertama terletak di daerah menteng, dan gedung kedua terletak di daerah meruya. Anda sebagai seorang tenaga ahli Manajemen telekomunikasi, khususnya di bidang Komunikasi berbasis IP diminta membantu pengelola TELKOM-UMB. Teknologi "enabler" yg digunakan antara lain: TCP/IP, Internet, dan Wireless, komunikasi multimedia. Anda konsentasikan untuk: bagian lab. gedung menteng (dimana anda berada sekarang) dan bagian lab. gedung meruya.

Untuk melaksanakan tugas/pekerjaan tsb anda melakukan beberapa langkah-langkah sbb:

Case Study......................................................................................................................................7 1 A. Existing System ("Network") [30%].......................................................................................8 2 B.Target/"Ideal" System [55%]....................................................................................................8 2.1 1. Desain Simulasi (15%)......................................................................................................8 2.2 2.Mobile /Wireless (15%)......................................................................................................8 2.3 3.Network Security (10%).....................................................................................................8 2.4 4. IP ver. 6. Model (15%)......................................................................................................8 3 C. Manfaat "Ideal" System [7.5%]...............................................................................................9 4 Next Move: Research [7.5%]........................................................................................................9

1 A. Existing System ("Network") [30%]


A. Melihat dan membuat dokumentasi terhadap keadaan network (infrastuktur) yg ada. Salah satu hal yg anda dpt kerjakan adalah anda mengambarkan/mengidentifikasi: jumlah hardware, ip, subnet, gate way, dll. Untuk ini anda dapat menggunakan beberapa tools, diantaranya: SolarWind, visio, dll. Anda juga dapat menganalisa servis apa saja yg sedang berjalan. Anda juga dapat menganalisa dari kacamata traffic enginer (trophout , saturation, dll), ataupun dari aspek QOS (Quality of Services).

2 B.Target/"Ideal" System [55%]


B. Mendesain network yg baru/ "ideal" sesuai kebutuhan stake holder.

2.1 1. Desain Simulasi (15%)


1. Untuk tahap ini dapat menggunakan software: Packet Tracer utk mensimulasi desain anda. Anda juga perlu memberikan penjelasan terhadap alasan-alasan anda mendesain network tsb.

2.2 2.Mobile /Wireless (15%)


2. Permintaan utama dari stake holder adalah bahwa sesuai dengan kebutuhan pengunan "mobile". Anda di minta utk memanfaatkan teknologi wireless. a. Anda diminta utk memberikan saran -saran terhadap protocol apa saja yg sebaiknya dipergunakan ?? b. Alat-alat wireless apa saja yg akan anda pergunakan. b. Gambarkanlah desain network ("system") bila anda menambahkan teknologi wireless.

2.3 3.Network Security (10%)


3. Stake holder juga menaruh perhatian besar pada aspek keamanan data/ network. Berdasarkan pertimbangan existing system/network, soal A. a. Anda diminta utk me "list" (mndaftar/merinci) service apa saja yg ada kemungkinan kebobolan dalam hal keamanan. b. Sebutkan jenis-jenis serangan yg mungkin dapat terjadi pada ("keamanan") system. b. Anda juga akan memberikan saran-saran terhadap cara mengatasi serangan-serangan, ataupun bahaya pada keamanan system anda.

2.4 4. IP ver. 6. Model (15%)


4. Stakeholder juga mempunyai visioner terhadap teknologi IP ver. 6. a. Anda di minta untuk mencek apakah ada service dalam system yg berjalan sekarang yg mengunakan IP ver.6. b. Anda juga akan mendesain beberapa atau sebagian system anda menggunakan IP ver.6. Gambarkanlah dan beri penjelasan bagian mana yg akan anda gunakan IP ver. 6.

3 C. Manfaat "Ideal" System [7.5%]


C. Aspek pemanfaatan terhadap Network baru/ideal. Setelah system(network & infrastucture) terbangun, anda akan memberikan arahan/pandangan tentang manfaat dari system baru tsb. a. (Aspek Aplikasi) Anda akan memberikan pandangan terhadap StakeHolder tentang aplikasi-aplikasi apa saja yg mungkin dapat dipergunakan. (Hint: misalkan aplikasi multi-media) Anda perlu memberikan saran yg konkrit, jika perlu hingga aspek jenis/nama aplikasinya , sebaiknya ada di pasaran.

4 Next Move: Research [7.5%]


D. Tindak Lanjut dalam kacamata studi anda. Bila anda diminta utk membuat topik Thesis, yg berhubungan dengan pelajaran ini, maka: a. sebutkan bagian/bab/chapter yg anda rasa tertarik. b. research question (Pertanyaan penelitian) apa yg akan anda tuliskan. c. (Object research), anda akan memilih tempat penilitian dimana . d. Reference apa saja yg akan anda pilih sebagai dasar. (tuliskan: judul, pengarang, thn terbit, dll.)

You might also like