**Introduction to Computer Networking - Exam
2014/2015 ACADEMIC YEAR (SECOND SEMESTER)
THE UNIVERSITY OF DODOMA
COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION
SCHOOL OF INFORMATICS
UNDERGRADUATE UNIVERSITY EXAMINATIONS
SECOND SEMESTER 2014/2015
TN122: INTRODUCTION TO NETWORKING
Date: 24th June 2015
Time Allocated: 3 Hours
Instructions:
-
This examination consists of FIVE questions.
-
Answer ALL questions.
-
All University of Dodoma examination regulations apply.
Question One
A: Write a letter of the correct answer. (1 Mark each)
1. Message ______ means that the data must arrive at the receiver exactly as sent.
- A) Confidentiality
- B) Integrity
- C) Authentication
- D) None of the above
Answer (Click to show)
B) Integrity
2. Which of the following is not a guided medium?
- A) Fiber-optic cable
- B) Coaxial cable
- C) Twisted-pair cable
- D) Atmosphere
Answer (Click to show)
D) Atmosphere
3. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable?
- A) Insulating material
- B) Inner conductor
- C) Diameter of cable
- D) Outer conductor
Answer (Click to show)
D) Outer conductor
4. In ______, the chance of collision can be reduced if a station senses the medium before trying to use it.
- A) CSMA
- B) MA
- C) CDMA
- D) FDMA
Answer (Click to show)
A) CSMA
5. A ______ is a data communication system spanning states, countries, or the whole world.
- A) MAN
- B) LAN
- C) WAN
- D) None of the above
Answer (Click to show)
C) WAN
6. The network layer concerns with
- A) Bits
- B) Frames
- C) Packets
- D) None of the above
Answer (Click to show)
C) Packets
7. How long is an IPv6 address?
- A) 32 bits
- B) 128 bytes
- C) 64 bytes
- D) 128 bits
Answer (Click to show)
D) 128 bits
8. Where is a hub specified in the OSI model?
- A) Session layer
- B) Physical layer
- C) Data Link layer
- D) Application layer
Answer (Click to show)
B) Physical layer
9. What is the main reason the OSI model was created?
- A) To create a layered model larger than the DOD model.
- B) So application developers can change only one layer’s protocols at a time
- C) So different networks could communicate.
- D) So Cisco could use the model.
Answer (Click to show)
C) So different networks could communicate.
10. The ______ method provides a one-time session key for two parties.
- A) Diffie-Hellman
- B) RSA
- C) DES
- D) AES
Answer (Click to show)
A) Diffie-Hellman
B: Write T for True and F for False (1 Mark each)
1. Request for Comments publicly describe protocols, processes, and technologies for the Internet but do not give implementation details.
Answer (Click to show)
False
2. An important function of the physical layer of the OSI model is to encode frames into electrical, optical, or radio wave signals.
Answer (Click to show)
True
3. Proper grounding connections are used to reduce the effect of crosstalk in copper cables.
Answer (Click to show)
True
4. Three security goals are Confidentiality, Integrity and Authentication.
Answer (Click to show)
True
5. Straight through connection in UTP is used to connect similar types of Ethernet equipment.
Answer (Click to show)
False
6. Router is a layer 2 networking device.
Answer (Click to show)
False
7. Once the network security policy is in place within the organization, the people it affects do not necessarily need to know it well.
Answer (Click to show)
False
8. Repeaters are used in transmission systems to generate analog or digital signals distorted by transmission loss.
Answer (Click to show)
True
9. Cut-through Switching technique is slower than store and forward because it performs error checking on frames.
Answer (Click to show)
False
10. A static IP address is simply a temporary address that remains associated with a single networking device over an extended period of time.
Answer (Click to show)
False
Question Two
a) What is Computer Networking; provide three arguments in favor of the use of a computer network in a modern organization and one argument against. (5 Marks)
Answer (Click to show)
Computer Networking is the interconnection of computers and devices to share resources and exchange information.
Arguments in Favor:
Resource sharing reduces costs
Enhanced communication and collaboration
Centralized data management and backup
Argument Against:Security vulnerabilities and management complexity
b) Using their definitions, give the difference between LAN, MAN & WAN (include example of each). (6 Marks)
Answer (Click to show)
LAN: Local area, single building/campus. Example: Office network
MAN: Metropolitan area, city-wide. Example: City government network
WAN: Wide area, countries/continents. Example: Internet
c) What is the disadvantage associated with using a repeater? And what problem could occur as a result of too much traffic on a network? (5 Marks)
Answer (Click to show)
Repeater disadvantage: Regenerates noise along with signal
Too much traffic problem: Network congestion and collisions
d) List only 4 characteristics to be considered when a data is transferred through a media. (4 Marks)
Answer (Click to show)
Bandwidth
Attenuation
Interference
Security
Question Three
a) Explain how the collision is avoided in the below listed LAN technologies; (3 Marks Each)
i. Ethernet
Answer (Click to show)
Uses CSMA/CD: Listen before transmit, detect collisions, backoff randomly
ii. Token Ring
Answer (Click to show)
Uses token passing: Only station with token can transmit
b) List down the four security objectives. (4 Marks)
Answer (Click to show)
Confidentiality
Integrity
Availability
Authentication
c) With the help of a diagram, explain the four types of security attacks. (4 Marks)
Answer (Click to show)
Interruption (Break connection)
Interception (Eavesdrop)
Modification (Alter data)
Fabrication (Create fake data)
d) Briefly explain 3 ways one can implement security defense mechanism. (2 Marks each)
Answer (Click to show)
Access Control: Restrict unauthorized access
Encryption: Protect data confidentiality
Firewalls: Filter network traffic
Question Four
a) What was the motivation towards the evolution from IPv4 to IPv6? (2 Marks)
Answer (Click to show)
IPv4 address exhaustion and need for larger address space
b) Find the class of the following addresses (2 Marks each)
i. 00000001 00010101 00001100 00001110
Answer (Click to show)
Class A (First bit is 0)
ii. 11110011 10011011 11001100 00000001
Answer (Click to show)
Class E (First 4 bits are 1111)
c) Briefly explain the TCP/IP Layers each with its functionalities. (8 Marks)
Answer (Click to show)
Application: User applications and services
Transport: End-to-end communication
Internet: Routing and addressing
Network Access: Physical transmission
d) List the 4 things to be considered when choosing a network topology. (8 Marks)
Answer (Click to show)
Cost
Scalability
Reliability
Management complexity
Question Five
a) Provide reason on why copper cable used as data transfer media, are always twisted? (2 Marks)
Answer (Click to show)
To reduce crosstalk and electromagnetic interference
b) List 2 advantages and 2 disadvantages of Fiber optic cable. (6 Marks)
Answer (Click to show)
Advantages:
High bandwidth
Immune to EMI
Disadvantages:High cost
Difficult installation
c) List down only Four Cable testing devices you know. (4 Marks)
Answer (Click to show)
Cable tester
Multimeter
Toner probe
OTDR
d) With the help of diagram, explain how confidentiality can be achieved using Symmetric Encryption. (8 Marks)
Answer (Click to show)
Same key used for encryption and decryption
Diagram: Plaintext → [Encryption Key] → Ciphertext → [Decryption Key] → Plaintext
END OF EXAMINATION