**Introduction to Computer Networking - Exam

THE UNIVERSITY OF DODOMA
COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION
SCHOOL OF INFORMATICS

UNDERGRADUATE UNIVERSITY EXAMINATIONS
SECOND SEMESTER 2015/2016
TN 122: INTRODUCTION TO NETWORKING

Date: 20TH JULY, 2016
Time Allocated: 3 Hours

Instructions:

  1. This examination consists of six questions.
  2. Answer only FIVE questions; Question 1 & 6 are compulsory.
  3. All University of Dodoma examination regulations apply.

QUESTION ONE

(20 Marks)

A: Multiple Choice Questions

(1 Mark Each)

1. IPv6 addressed have a size of

  • A) 32 Bits
  • B) 64 Bits
  • C) 265 Bits
  • D) 128 Bits

2. Which of this is not a network edge device?

  • A) PC
  • B) Smartphones
  • C) Servers
  • D) Switch

3. TCP/IP reference model contains how many layers

  • A) 3
  • B) 6
  • C) 7
  • D) 4

4. With Dynamic Assignment which protocol assigns IP address to the client connected in the internet?

  • A) IP
  • B) HTTP
  • C) TCP
  • D) DHCP

5. Message ______ means that the data must arrive at the receiver exactly as sent.

  • A) Confidentiality
  • B) Integrity
  • C) Authentication
  • D) None of the above

6. In ______ resources are allocated on demand.

  • A) Circuit switching
  • B) Packet Switching
  • C) Line switching
  • D) Frequency switching

7. Which of the following is correct regarding Class B Address of IP address

  • A) Network bit - 16, Host bit - 14
  • B) Network bit - 14, Host bit - 16
  • C) Network bit - 18, Host bit - 16
  • D) Network bit - 12, Host bit - 14

8. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

  • A) CSMA/CD
  • B) CSMA/CA
  • C) CDMA
  • D) ALOHA

9. Transport layer aggregates data from different applications into a single stream before passing it to which layer

  • A) Data Link
  • B) Network
  • C) Application
  • D) Session

10. In IPV 4, the IP address 200.200.200.200 belongs to

  • A) Class A
  • B) Class B
  • C) Class C
  • D) Class D

B: True and False Questions

(Write T for True and F for False)
(1 Mark Each)

1. In Multicast addressing a packet sent will be delivered to all interfaces identified by that address.

2. A loopback address is used by a host to test itself without going into the network.

3. An important function of the physical layer of the OSI model is to encode frames into electrical, optical, or radio wave signals.

4. The most fundamental differences between SM and MM Optic Fibers are the size of the fiber’s core and the associated attenuation or loss and bandwidth of the fiber.

5. The network interface card converts serial data from the computer into parallel data for transmission over the network cable.

6. Three security goals are Confidentiality, Integrity and Authentication.

7. When it comes to security attacks; Interception is an attack on integrity.

8. One Ethernet node broadcasts its data to all other Ethernet nodes on a LAN.

9. Application Layer offers end to end service.

10. One major disadvantage of star topology is that once the connected node is faulty, the entire network becomes unusable.


C: Short Answers Questions

(1 Mark Each)

1. Specify the length of Physical address also known as MAC Address in terms of bits.

2. With Ethernet there is either straight through or crossover connections; between the two which connection type is used when connection computer to computer?

3. If 5 nodes are communicating using a hub on a 15-Mbps network, then what will each node get as far as bandwidth is concerned?

4. Mention three broad categories of malicious code.

5. Given 11111001 10011011 11111011 00001111; Provide its dotted-decimal notation.

6. Among the seven OSI layers, mention the layer which attempts to provide reliable communication over the physical layer interface.

7. Given the IP address as 200.12.54.234, what is the network address in which the given IP address belongs?

8. Name the TCP/IP Layer in which these protocols HTTP, FTP, SMTP exist.

9. Which topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design?

10. What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0?


QUESTION TWO

(15 Marks)

a) Define Computer Networking; provide three arguments in favor of the use of a computer network in an organization and one argument against.
(5 Marks)

b) Using their definitions, give the difference between LAN, MAN & WAN (include example of each case).
(6 Marks)

c) List only 4 design factors to be looked at when choosing a networking media.
(4 Marks)


QUESTION THREE

(15 Marks)

a) Why PROTOCOLS are needed in computer networking?
(2 Marks)

b) Why Layered Model in ISO’s OSI Model; Provide 4 reasons.
(4 Marks)

c) List the seven layers of ISO’s OSI model starting from layer number 1 (the order of arrangement should be adhered).
(3 Marks)

d) Briefly explain how the collision is avoided in the below listed LAN technologies
(3 Marks Each)

i. Ethernet

ii. Token Ring


QUESTION FOUR

(15 Marks)

a) Is worm the same as virus? Provide brief explanation
(1 Mark)

b) List down the four security objectives.
(4 Marks)

c) With diagrams, list the four types of security attacks.
(4 Marks)

d) Briefly explain 3 ways one can implement security defense mechanism.
(2 Marks Each)


QUESTION FIVE

(15 Marks)

a) Provide reason on why copper cable used as data transfer media are always twisted?
(2 Marks)

b) List two advantages and disadvantages of Fiber optic cable.
(4 Marks)

c) List two advantages and disadvantages of twisted pair.
(4 Marks)

d) List two limitations of star topology.
(2 Marks)

e) What is a hub? Briefly explain its types.
(3 Marks)


QUESTION SIX

(20 Marks)

a) What was a major motive towards IPv6?
(2 Marks)

b) Convert listed IP address into binary notation; in your conversion include the class where each address belongs.
(2 Marks Each)

i. 189.32.124.242

ii. 245.123.4.199

iii. 253.126.63.223

iv. 2.7.67.222

c) UDOM is granted the site address 207.168.45.0; the university has 6 colleges of which each one has its own network. Design the subnets. In your design you must show the following
(15 Marks)

i. The subnet mask

ii. The number of addresses in each subnet

iii. In each subnet determine the start address, range of usable IP address and the broadcast address.


END OF EXAMINATION PAPER