TCS 410 & ICS 424 Updated
TCS 410 & ICS 424 Updated
Question 1
a. The ISO network management model partitions the functions of network management into five
conceptual areas, list and explain each of them.
b. List five (5) roles of a Network Administrator.
Answer
a. The ISO network management model partitions the functions of network management into five
conceptual areas:
i- Fault Management: Detects, isolates, notifies, and corrects faults in the network. It involves
identifying and fixing network problems to ensure continuous network availability.
ii- Configuration Management: Manages network and system configurations. It involves tracking and
managing hardware and software configurations, including software updates and device settings.
iii- Accounting Management: Measures and monitors network usage to ensure fair distribution of
network resources. It includes tracking user activities, managing billing, and analyzing usage trends.
iv- Performance Management: Monitors and measures various aspects of network performance, such
as throughput, response time, and error rates. The goal is to maintain optimal network performance.
v- Security Management: Protects network resources from unauthorized access and ensures data
privacy and integrity. It involves implementing security policies, monitoring security breaches, and
managing access controls.
Question 2
a. Managing network infrastructures is essential in administration of a network, explain network
management at service level.
b. Telecommunication Management Network (TMN) architecture and interfaces, defined in the ITU
M.3000 recommendation series, are built on existing open systems interconnection (OSI)
standards. Briefly explain these four (4) standards on which they are built.
c. Describe, with an example, QA (Q-Adapter) as a functional component of TMN.
Answer
a. Network management at the service level involves ensuring that network services meet the required
performance and availability standards. This includes monitoring service quality, managing service
configurations, and ensuring that service-level agreements (SLAs) are met. It also involves proactive
measures to prevent service degradation and quick resolution of service-related issues.
b. The Telecommunication Management Network (TMN) architecture and interfaces, defined in the
ITU M.3000 recommendation series, are built on existing OSI standards:
i- FCAPS Model: Fault, Configuration, Accounting, Performance, and Security management
framework used for network management.
ii- CMIP (Common Management Information Protocol): A protocol used for network management
communications in TMN, defined in the OSI model.
iii- GDMO (Guidelines for the Definition of Managed Objects): Provides guidelines for defining
managed objects in a network.
iv- ASN.1 (Abstract Syntax Notation One): A standard interface used for defining data structures for
representing, encoding, transmitting, and decoding data.
c. A Q-Adapter (QA) is a functional component of TMN that acts as an intermediary between
different network management systems (NMS) or between an NMS and network elements. It
translates information and protocols between incompatible systems to ensure seamless
communication. For example, a QA can convert SNMP protocol data from a network element into a
format understandable by a TMN system using CMIP.
Question 3
a. The various services provided on a Unix system can be categorized in a number of ways: They can
be network services or purely internal services. The service configuration could be of three (3)
different types. Mention the three (3) types and, giving an example, briefly explain each.
b. The first service provided by libwrap is to optionally log every connection it handles, and the more
useful service libwrap provide is a crude form of access control. This is controlled through two
files, /etc/hosts.allow and /etc/hosts.deny. In general, each line in these files contains three colon-
separated fields, as seen below in the Figure. Explain each of the line.
ALL.tcs.unilorin.edu.ng rfc931 allow sshd: ALL rfc931: allow ALL ALL deny
Figure: hosts.allowand hosts.deny
c. Draw a diagram to outline a TMN hierarchy.
Answer
a. Service Configuration Types in Unix Systems
i- Standalone Services: Services that run independently and handle their own processes. For example,
a web server like Apache running independently.
ii- Supervised Services: Services managed by a super-server such as inetd or xinetd. For example, the
FTP service managed by inetd.
iii- On-demand Services: Services that start only when requested. For example, ssh service that starts
when an SSH connection is initiated.
c. The TMN hierarchy is typically outlined in a multi-level structure with the following layers from
top to bottom:
Question 4
a. Describe MD (mediation device) as a functional component of TMN.
b. Interfaces between two TMN components communicate with one another. In tabular form,
describe three (3) interfaces in the TMN model.
c. What are the challenges facing network administrator? Mention just four (4).
Answer
a. A Mediation Device (MD) is a functional component in TMN that collects, processes, and
distributes information between network elements and management systems. It performs data
aggregation, filtering, and protocol conversion to ensure accurate and efficient communication.
Question 5
a. Outline steps to perform simple (Network File System (NFS) experiment on a single system.
b. Explain Management Information Base in relation to Object Identifier that is normally used by
SNMP.
c. In NMS, explain Management Entity.
Answer
a. Steps to Perform a Simple NFS Experiment on a Single System
i- Install NFS Packages: sudo apt-get install nfs-kernel-server.
ii- Create Export Directory: sudo mkdir /export.
iii- Configure Exports: Add /export *(rw,sync,no_root_squash) to /etc/exports.
iv- Start NFS Service: sudo systemctl start nfs-kernel-server.
v- Mount NFS Directory: sudo mount -t nfs localhost:/export /mnt.
b. The Management Information Base (MIB) is a hierarchical database used to manage devices in a
network. It contains a collection of managed objects identified by unique Object Identifiers (OIDs).
Each OID represents a specific variable that can be monitored or controlled using the Simple Network
Management Protocol (SNMP).
Question Three
a. Explain, giving an example each, the three (3) types of the service configuration as categorized
among the various services (network services or purely internal services) provided on a Unix system.
b. Describe Mediation Service (MD) as a functional component of Telecommunication Management
Network (TMN).
Answer
a. Types of Service Configuration in Unix Systems
i- Standalone Services: These services run independently as separate processes.
Example: A web server like Apache, which runs as its own process and listens for HTTP requests.
ii- Supervised Services: These services are managed by a super-server like inetd or xinetd, which
starts the service on demand.
Example: The FTP service managed by inetd, which only starts the FTP daemon when a connection
request is received.
iii- On-demand Services: These services start only when requested and are not running continuously.
Example: The sshd (Secure Shell Daemon) service, which starts when an SSH connection is initiated.
b. A Mediation Device (MD) in TMN acts as an intermediary that collects, processes, and distributes
information between network elements and management systems. It performs data aggregation,
filtering, and protocol conversion to facilitate accurate and efficient communication between different
network components and the management systems.
Question Four
a. In tabular form, explain three (3) interfaces in the TMN model considering how two (2)
components of the TMN communicate with one another.
b. Using a well and clearly labelled diagram, explain the TMN hierarchy.
Answer
a. Interfaces in the TMN Model
Interface Description
Q3 Interface between the network management layer and the element management layer,
facilitating communication and data exchange.
Qx Interface between different management systems within the same layer, ensuring
interoperability and coordinated management activities.
F Interface between network elements and the element management layer, enabling direct
management and monitoring of network devices.
Question Five
a. Briefly explain five (5) among the challenges facing the network administrator.
b. For Network File System (NFS) client and server systems to work reliably, some system daemons
are needed running. Mention those daemons, and group them accordingly.
Answer
a. Five Challenges Facing Network Administrators
i- Security Threats: Managing and mitigating constantly evolving cybersecurity threats.
ii- Network Downtime: Ensuring minimal downtime and quick recovery from network failures.
iii- Scalability: Handling network growth and scalability to accommodate increasing demand.
iv- Performance Monitoring: Continuously monitoring and optimizing network performance.
v- Keeping Up with Technology: Staying updated with rapid advancements in network technologies
and tools.
Question 3
Briefly describe OSI (open systems interconnection) Functionality in TMN (Telecomunications
Management Network).
Answer
The OSI model's functionality in TMN involves using its layered architecture to provide a framework
for managing telecommunication networks. TMN uses the OSI model to define standards and
protocols for communication between different network management systems and devices. The key
functionalities include:
a. Layer 1 (Physical Layer): Ensures the transmission and reception of raw bitstreams over a physical
medium.
b. Layer 2 (Data Link Layer): Provides error detection and correction to ensure reliable data transfer.
c. Layer 3 (Network Layer): Manages routing and forwarding of data packets across the network.
d. Layer 4 (Transport Layer): Ensures end-to-end communication and error recovery.
e. Layer 5 (Session Layer): Manages sessions and controls dialogues between computers.
f. Layer 6 (Presentation Layer): Translates data between the application layer and the network format.
g. Layer 7 (Application Layer): Provides network services directly to end-user applications.
Question 4
Describe Accounting management as defined in ISO network management model.
Answer
Accounting Management in the ISO network management model involves tracking the usage of
network resources by users and applications. The main objectives include:
a. Resource Utilization Tracking: Monitoring and recording the usage of network resources such as
bandwidth, storage, and processing power.
b. Usage Analysis: Analyzing the collected data to understand usage patterns, detect anomalies, and
optimize resource allocation.
c. Billing and Cost Allocation: Providing data for billing purposes and ensuring that costs are
allocated appropriately to different departments or users based on their resource consumption.
d. Budgeting and Planning: Using accounting data to plan and budget for future network expansion
and resource allocation.
Question 5
5. Network Administration involves a wide array of operational tasks that and a network to run
efficiently. With the aid of a diagram, outline network management functional grouping.
Answer
Network Management Functional Grouping involves categorizing network management tasks into
five key areas. Here's a diagram and description:
a. Fault Management: Detecting, isolating, and resolving network faults to ensure network reliability.
b. Configuration Management: Managing network configuration information to ensure the network
operates as intended.
c. Accounting Management: Tracking and billing resource usage by users and applications.
d. Performance Management: Monitoring and analyzing network performance to maintain an optimal
level of service.
e. Security Management: Protecting network resources from unauthorized access and ensuring data
integrity and confidentiality.
Question 6
6. Describe Management Information Base (MIB) in relation to Object Beatifier (OID) that is
normally used by (Sinaple Network Management Protocol) SNMP.
Answer
a. Management Information Base (MIB):
i. Definition: A collection of information organized hierarchically. These are accessed using a network
management protocol such as SNMP.
ii. Structure: The MIB contains managed objects identified by object identifiers (OIDs). Each
managed object represents a network resource or device attribute.
b. Object Identifier (OID):
i. Definition: A globally unique identifier used to name an object (such as a device or an attribute of a
device) in the MIB.
ii. Structure: OIDs are arranged in a hierarchical tree structure, with each node represented by a
number. For example, the OID for system uptime might be 1.3.6.1.2.1.1.3.
iii. Usage: OIDs are used by SNMP to identify and manage objects. When an SNMP manager queries
an agent, it uses the OID to specify which object it wants information about or wants to set.
iv. Example: 1.3.6.1.2.1.1.1.0
This OID represents the "system description" in the MIB.
Question 2
According to the section 106 of the 1976 Copyright Act, the act generally gives the owner of
copyright the exclusive right to do and to authorize others with certain privileges. Highlight five of
those rights others are authorize to perform
Answer
Rights Under the 1976 Copyright Act
According to Section 106 of the 1976 Copyright Act, the owner of a copyright has the exclusive rights
to:
i. Reproduction: To reproduce the copyrighted work in copies or phonorecords.
ii. Distribution: To distribute copies or phonorecords of the work to the public by sale or other transfer
of ownership, or by rental, lease, or lending.
iii. Public Performance: To perform the copyrighted work publicly, in the case of literary, musical,
dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works.
iv. Public Display: To display the copyrighted work publicly, in the case of literary, musical, dramatic,
and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the
individual images of a motion picture or other audiovisual work.
v. Derivative Works: To prepare derivative works based upon the copyrighted work.
Question 3
Some areas of Internet law remain unsettled and have raised a number of legal issues. One of which is
"Contract". Explain (i). Online transactions under English contract law (ii) Virtual Trade
Answer
Legal Issues in Internet Law
i. Online Transactions Under English Contract Law: Online transactions under English contract law
are governed by the same principles as traditional contracts. Essential elements include offer,
acceptance, consideration, and intention to create legal relations. In online contracts, the terms and
conditions must be clear, and the user must have a chance to review them before acceptance. The
Electronic Commerce (EC Directive) Regulations 2002 also play a role, requiring certain information
to be provided to consumers and stipulating how contracts can be concluded electronically.
ii. Virtual Trade: Virtual trade involves the buying and selling of virtual goods and services, often
within online games and virtual worlds. These transactions can include virtual currencies, in-game
items, and digital services. Legal issues in virtual trade include the enforcement of virtual property
rights, the applicability of real-world contract and property laws, and the regulation of virtual
economies. The lack of clear legal frameworks can lead to disputes over ownership, fraud, and the
rights of users versus platform operators.
Question 4
Define Intellectual Property.
Answer
Intellectual property (IP) refers to creations of the mind for which exclusive rights are recognized.
These rights allow the creator or owner to benefit from their invention or creation. IP includes
inventions, literary and artistic works, designs, symbols, names, and images used in commerce. The
main types of IP rights are patents, trademarks, copyrights, and trade secrets.
Question 5
What is Trademark? What kinds of trademarks can be registered?
Answer
A trademark is a sign capable of distinguishing the goods or services of one enterprise from those of
other enterprises. It can be a word, phrase, symbol, design, or a combination of these. Trademarks
help consumers identify and purchase products or services based on their unique characteristics and
quality.
Types of Registrable Trademarks:
i- Word Marks: Words or combinations of words.
ii- Design Marks: Logos, symbols, or images.
iii- Composite Marks: Combination of words and designs.
iv- Color Marks: Specific colors or combinations of colors.
v- Sound Marks: Specific sounds associated with a product or service.
Question 6
Illustrate two Intellectual Property dispute cases.
Answer
Intellectual Property Dispute Cases
Case 1: Apple Inc. vs. Samsung Electronics Co.: This was a major patent infringement case where
Apple accused Samsung of copying the design and functionality of its iPhone. The case led to a series
of lawsuits and counter-suits in several countries, resulting in various rulings and settlements. Apple
was awarded significant damages, and the case highlighted the importance of design patents in the
tech industry.
Case 2: Google LLC vs. Oracle America, Inc.: This case involved the use of Java APIs in Google's
Android operating system. Oracle claimed that Google's use of its Java APIs constituted copyright
infringement. After a lengthy legal battle, the Supreme Court ruled in favor of Google, determining
that its use of the APIs was fair use, emphasizing the balance between protecting IP rights and
fostering innovation.
Question 7
Define Antitrust. What do Antitrust Laws Prohibit?
Answer
Antitrust refers to regulations that promote competition and prevent unfair business practices that
could lead to monopolies or anti-competitive behavior. The goal of antitrust laws is to ensure a fair
and competitive market environment, benefiting consumers with better choices and prices.
Question 2
Explain the principle of 'Fair Use'. Mention two criteria courts use in judging whether a copyright use
is "fair" or an "infringement".
Answer
The principle of fair use allows limited use of copyrighted material without acquiring permission from
the rights holders. It aims to balance the interests of copyright owners with the public's interest in the
dissemination of information.
Two Criteria Courts Use:
(a) Purpose and Character of the Use: Courts examine whether the use is of a commercial nature or
for nonprofit educational purposes. Transformative uses that add new expression or meaning and are
not mere reproductions are more likely to be considered fair use.
(b) Effect of the Use on the Market: Courts consider whether the use negatively impacts the potential
market for the original work. If the use could replace the original work and reduce its market demand,
it is less likely to be considered fair use.
Question 3
3. Some areas of Internet law remain unsettled and have raised a number of legal issues which are yet
to be fully resolved. Explain three of these areas.
Answer
Unsettled Areas in Internet Law
(a) Privacy and Data Protection: With the increasing amount of personal data being collected online,
there are ongoing debates and legal challenges regarding how this data should be protected and what
rights individuals have over their data. Regulations like GDPR in the EU have set standards, but
global consensus and enforcement remain complex.
(b) Cybersecurity: The legal framework for cybersecurity is still evolving. Issues such as the
responsibility of organizations in case of data breaches, cross-border cybercrime, and the balance
between national security and individual privacy are yet to be fully resolved.
(c) Intellectual Property Rights in the Digital Age: The ease of copying and distributing digital content
has made it difficult to enforce intellectual property rights. Issues such as the protection of digital
content, the role of internet service providers, and the liability for user-generated content are still
being debated.
Question 4
Why is Intellectual Property needed? Highlight the difference between a Design and Trademark
Answer
(a) Why Intellectual Property is Needed:
Intellectual property is needed to encourage innovation and creativity by providing creators and
inventors with exclusive rights to their works and inventions. This incentivizes investment in research
and development, promotes economic growth, and ensures that creators are rewarded for their
contributions.
(b) Difference Between Design and Trademark:
i- Design: Refers to the aesthetic aspects of a product, including its shape, pattern, and color. Design
rights protect the visual appearance of a product, not its functionality.
ii- Trademark: A sign capable of distinguishing the goods or services of one enterprise from those of
other enterprises. Trademarks protect brand identity, including words, logos, symbols, and other
identifiers used in commerce.
Question 5
Explain the concept of "offer" and "acceptace" required to form contract under the English Law.
Answer
An offer is a clear, unequivocal proposal made by one party (the offeror) to another (the offeree) with
the intention that, once accepted, it will create a binding contract. The terms of the offer must be
definite and communicated to the offeree.
Acceptance is the unequivocal agreement to the terms of the offer. It must be communicated to the
offeror and must mirror the terms of the offer without any modifications. If any conditions are
attached to the acceptance, it is considered a counter-offer rather than acceptance.
Question 6
Illustrate two Intellectual Property dispute cases.
Answer
Intellectual Property Dispute Cases
Case 1: Apple Inc. vs. Samsung Electronics Co.:
This case involved patent infringement claims where Apple accused Samsung of copying the design
and functionality of its iPhone. After multiple lawsuits across various jurisdictions, the U.S. courts
awarded Apple significant damages, emphasizing the protection of design patents.
Case 2: Google LLC vs. Oracle America, Inc.:
The dispute centered on Google's use of Java APIs in its Android operating system. Oracle claimed
that this constituted copyright infringement. The U.S. Supreme Court ultimately ruled in favor of
Google, stating that its use of the APIs was a fair use, underscoring the balance between innovation
and intellectual property rights.
b. i- Offer: An offer is a clear proposal made by one party (the offeror) to another (the offeree) with
the intention that, upon acceptance, it will create a binding contract. The offer must be communicated,
definite, and show the offeror's intent to be bound by the terms.
ii- Acceptance: Acceptance is the unambiguous agreement to the terms of the offer. It must be
communicated to the offeror and must match the terms of the offer exactly. If any changes are made to
the terms, it becomes a counter-offer rather than acceptance.
Question 2
a. How has the enactment of Federal Competition and Consumer Protection Act (FCCPA) benefited
businesses in Nigeria? (5 marks)
b. Many areas of Internet law remain unsettled which in some instances makes it difficult to develop
clear, unambiguous statements about what constitutes lawful behavior or breaches of lawful behavior
online. Explain three of these areas.
c. Differentiate between copyright and related right.
Answer
a. The FCCPA has significantly benefited businesses in Nigeria by:
i- Promoting Fair Competition: Prevents monopolies and anti-competitive practices, ensuring a level
playing field for all businesses.
ii- Consumer Protection: Enhances consumer confidence, leading to increased patronage and loyalty.
iii- Innovation and Efficiency: Encourages businesses to innovate and improve their services to stay
competitive.
iv- Dispute Resolution: Provides mechanisms for resolving disputes between consumers and
businesses, fostering a more stable business environment.
v- Market Regulation: Establishes clear rules and regulations, reducing uncertainty and fostering a
predictable market environment.
c. i- Copyright: Protects the original works of authorship such as literary, musical, and artistic works.
It grants the creator exclusive rights to reproduce, distribute, perform, and display the work.
ii- Related Right: Protects the legal rights of entities and individuals who contribute to making works
available to the public. These include performers, producers of sound recordings, and broadcasting
organizations. Related rights often provide protection similar to copyright but focus on the execution
and dissemination of works.
Question 3
a. Discuss the goals of telecommunication regulation towards the achievement of a competitive
environment.
b. Explain five challenges to the effective implementation of the Freedom of Information Act (FIA).
c. Are inventions in all fields patentable? Discuss.
Answer
a. Goals of Telecommunication Regulation Towards Competitive Environment
i- Promote Competition: Prevent monopolies and ensure fair competition among telecom providers.
ii- Protect Consumers: Ensure that consumers have access to high-quality, affordable
telecommunication services.
iii- Encourage Investment: Create a favorable environment for investment in telecommunications
infrastructure.
iv- Universal Service: Ensure that telecommunication services are accessible to all citizens, including
those in rural and underserved areas.
v- Innovation and Development: Foster technological innovation and the development of new telecom
services.
c. Not all inventions are patentable. To be patentable, an invention must meet certain criteria:
i- Novelty: The invention must be new and not known to the public before the patent application.
ii- Inventive Step: The invention must involve an inventive step that is not obvious to someone with
knowledge and experience in the subject.
iii- Industrial Applicability: The invention must be capable of being used in some kind of industry.
iv- Non-Exclusion: Certain inventions are excluded from patentability, such as abstract ideas, natural
phenomena, and discoveries.
SECTION B
Question 4
a. Discuss how technology can be used to promote the Rule of Law and Constitutional Supremacy.
b. Explain how the exponential development of Artificial Intelligence (AI) and the associated
disruptive innovation pose substantial challenges for policy makers.
Answer
a. Technology to Promote the Rule of Law and Constitutional Supremacy
i- Digital Governance: Using online platforms to provide access to legal documents, enabling
transparency and accountability.
ii- E-Government Services: Streamlining government services through technology to reduce
corruption and improve efficiency.
iii- Online Legal Education: Providing online resources and platforms for legal education to promote
awareness and understanding of the law.
iv- Digital Evidence: Utilizing technology to collect and present digital evidence in legal proceedings,
ensuring accuracy and integrity.
v- Public Participation: Leveraging social media and other digital tools to engage the public in legal
and political processes.
Question 5
a. Is Privacy a Myth? Discuss.
b. Narrate any case that involved the breach of individuals' privacy.
c. Using Moor's natural/normative privacy distinction, differentiate between a loss of privacy and
violation of privacy.
Answer
a. Privacy is increasingly viewed as a myth due to the pervasive nature of surveillance and data
collection in the digital age. Despite legal protections, the ability of governments, corporations, and
hackers to access personal information has eroded the notion of true privacy.
c. i- Natural Privacy: The state of being free from observation or disturbance in a natural setting,
where individuals expect to be left alone.
ii- Normative Privacy: The societal standards and expectations regarding privacy. Violation of privacy
occurs when societal norms are breached, such as unauthorized data collection, while loss of privacy
happens when natural privacy is intruded upon, such as being watched in one’s home.
Question 6
a. Explain how data mining technology affects personal privacy.
b. Describe how RFID technology threatens individual's privacy.
c. What is your opinion about data privacy protection in Nigeria?
Answer
a. Data mining involves analyzing large datasets to discover patterns and insights. While it offers
significant benefits, it can intrude on personal privacy by revealing sensitive information without
individuals' consent, leading to potential misuse of personal data.
b. RFID (Radio Frequency Identification) technology uses electromagnetic fields to identify and track
tags attached to objects. It poses privacy risks as it can be used to track individuals without their
knowledge, leading to concerns about unauthorized surveillance and data collection.