**Introduction to Computer Networking - Exam

2014/2015 ACADEMIC YEAR (SECOND SEMESTER)

THE UNIVERSITY OF DODOMA
COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION
SCHOOL OF INFORMATICS
UNDERGRADUATE UNIVERSITY EXAMINATIONS
SECOND SEMESTER 2014/2015
TN122: INTRODUCTION TO NETWORKING
Date: 24th June 2015
Time Allocated: 3 Hours

Instructions:

  1. This examination consists of FIVE questions.

  2. Answer ALL questions.

  3. All University of Dodoma examination regulations apply.


Question One

A: Write a letter of the correct answer. (1 Mark each)

1. Message ______ means that the data must arrive at the receiver exactly as sent.

  • A) Confidentiality
  • B) Integrity
  • C) Authentication
  • D) None of the above

2. Which of the following is not a guided medium?

  • A) Fiber-optic cable
  • B) Coaxial cable
  • C) Twisted-pair cable
  • D) Atmosphere

3. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable?

  • A) Insulating material
  • B) Inner conductor
  • C) Diameter of cable
  • D) Outer conductor

4. In ______, the chance of collision can be reduced if a station senses the medium before trying to use it.

  • A) CSMA
  • B) MA
  • C) CDMA
  • D) FDMA

5. A ______ is a data communication system spanning states, countries, or the whole world.

  • A) MAN
  • B) LAN
  • C) WAN
  • D) None of the above

6. The network layer concerns with

  • A) Bits
  • B) Frames
  • C) Packets
  • D) None of the above

7. How long is an IPv6 address?

  • A) 32 bits
  • B) 128 bytes
  • C) 64 bytes
  • D) 128 bits

8. Where is a hub specified in the OSI model?

  • A) Session layer
  • B) Physical layer
  • C) Data Link layer
  • D) Application layer

9. What is the main reason the OSI model was created?

  • A) To create a layered model larger than the DOD model.
  • B) So application developers can change only one layer’s protocols at a time
  • C) So different networks could communicate.
  • D) So Cisco could use the model.

10. The ______ method provides a one-time session key for two parties.

  • A) Diffie-Hellman
  • B) RSA
  • C) DES
  • D) AES

B: Write T for True and F for False (1 Mark each)

1. Request for Comments publicly describe protocols, processes, and technologies for the Internet but do not give implementation details.

2. An important function of the physical layer of the OSI model is to encode frames into electrical, optical, or radio wave signals.

3. Proper grounding connections are used to reduce the effect of crosstalk in copper cables.

4. Three security goals are Confidentiality, Integrity and Authentication.

5. Straight through connection in UTP is used to connect similar types of Ethernet equipment.

6. Router is a layer 2 networking device.

7. Once the network security policy is in place within the organization, the people it affects do not necessarily need to know it well.

8. Repeaters are used in transmission systems to generate analog or digital signals distorted by transmission loss.

9. Cut-through Switching technique is slower than store and forward because it performs error checking on frames.

10. A static IP address is simply a temporary address that remains associated with a single networking device over an extended period of time.


Question Two

a) What is Computer Networking; provide three arguments in favor of the use of a computer network in a modern organization and one argument against. (5 Marks)

b) Using their definitions, give the difference between LAN, MAN & WAN (include example of each). (6 Marks)

c) What is the disadvantage associated with using a repeater? And what problem could occur as a result of too much traffic on a network? (5 Marks)

d) List only 4 characteristics to be considered when a data is transferred through a media. (4 Marks)


Question Three

a) Explain how the collision is avoided in the below listed LAN technologies; (3 Marks Each)

i. Ethernet

ii. Token Ring

b) List down the four security objectives. (4 Marks)

c) With the help of a diagram, explain the four types of security attacks. (4 Marks)

d) Briefly explain 3 ways one can implement security defense mechanism. (2 Marks each)


Question Four

a) What was the motivation towards the evolution from IPv4 to IPv6? (2 Marks)

b) Find the class of the following addresses (2 Marks each)

i. 00000001 00010101 00001100 00001110

ii. 11110011 10011011 11001100 00000001

c) Briefly explain the TCP/IP Layers each with its functionalities. (8 Marks)

d) List the 4 things to be considered when choosing a network topology. (8 Marks)

Question Five

a) Provide reason on why copper cable used as data transfer media, are always twisted? (2 Marks)

b) List 2 advantages and 2 disadvantages of Fiber optic cable. (6 Marks)

c) List down only Four Cable testing devices you know. (4 Marks)

d) With the help of diagram, explain how confidentiality can be achieved using Symmetric Encryption. (8 Marks)


END OF EXAMINATION