**Introduction to Computer Networking - Exam
THE UNIVERSITY OF DODOMA
COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION
SCHOOL OF INFORMATICS
UNDERGRADUATE UNIVERSITY EXAMINATIONS
SECOND SEMESTER 2015/2016
TN 122: INTRODUCTION TO NETWORKING
Date: 20TH JULY, 2016
Time Allocated: 3 Hours
Instructions:
- This examination consists of six questions.
- Answer only FIVE questions; Question 1 & 6 are compulsory.
- All University of Dodoma examination regulations apply.
QUESTION ONE
(20 Marks)
A: Multiple Choice Questions
(1 Mark Each)
1. IPv6 addressed have a size of
- A) 32 Bits
- B) 64 Bits
- C) 265 Bits
- D) 128 Bits
Answer (Click to show)
D) 128 Bits
2. Which of this is not a network edge device?
- A) PC
- B) Smartphones
- C) Servers
- D) Switch
Answer (Click to show)
D) Switch
3. TCP/IP reference model contains how many layers
- A) 3
- B) 6
- C) 7
- D) 4
Answer (Click to show)
D) 4
4. With Dynamic Assignment which protocol assigns IP address to the client connected in the internet?
- A) IP
- B) HTTP
- C) TCP
- D) DHCP
Answer (Click to show)
D) DHCP
5. Message ______ means that the data must arrive at the receiver exactly as sent.
- A) Confidentiality
- B) Integrity
- C) Authentication
- D) None of the above
Answer (Click to show)
B) Integrity
6. In ______ resources are allocated on demand.
- A) Circuit switching
- B) Packet Switching
- C) Line switching
- D) Frequency switching
Answer (Click to show)
B) Packet Switching
7. Which of the following is correct regarding Class B Address of IP address
- A) Network bit - 16, Host bit - 14
- B) Network bit - 14, Host bit - 16
- C) Network bit - 18, Host bit - 16
- D) Network bit - 12, Host bit - 14
Answer (Click to show)
A) Network bit - 16, Host bit - 14
8. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
- A) CSMA/CD
- B) CSMA/CA
- C) CDMA
- D) ALOHA
Answer (Click to show)
B) CSMA/CA
9. Transport layer aggregates data from different applications into a single stream before passing it to which layer
- A) Data Link
- B) Network
- C) Application
- D) Session
Answer (Click to show)
B) Network
10. In IPV 4, the IP address 200.200.200.200 belongs to
- A) Class A
- B) Class B
- C) Class C
- D) Class D
Answer (Click to show)
C) Class C
B: True and False Questions
(Write T for True and F for False)
(1 Mark Each)
1. In Multicast addressing a packet sent will be delivered to all interfaces identified by that address.
Answer (Click to show)
T
2. A loopback address is used by a host to test itself without going into the network.
Answer (Click to show)
T
3. An important function of the physical layer of the OSI model is to encode frames into electrical, optical, or radio wave signals.
Answer (Click to show)
T
4. The most fundamental differences between SM and MM Optic Fibers are the size of the fiber’s core and the associated attenuation or loss and bandwidth of the fiber.
Answer (Click to show)
T
5. The network interface card converts serial data from the computer into parallel data for transmission over the network cable.
Answer (Click to show)
F
6. Three security goals are Confidentiality, Integrity and Authentication.
Answer (Click to show)
T
7. When it comes to security attacks; Interception is an attack on integrity.
Answer (Click to show)
F
8. One Ethernet node broadcasts its data to all other Ethernet nodes on a LAN.
Answer (Click to show)
T
9. Application Layer offers end to end service.
Answer (Click to show)
F
10. One major disadvantage of star topology is that once the connected node is faulty, the entire network becomes unusable.
Answer (Click to show)
F
C: Short Answers Questions
(1 Mark Each)
1. Specify the length of Physical address also known as MAC Address in terms of bits.
Answer (Click to show)
48 bits
2. With Ethernet there is either straight through or crossover connections; between the two which connection type is used when connection computer to computer?
Answer (Click to show)
Crossover
3. If 5 nodes are communicating using a hub on a 15-Mbps network, then what will each node get as far as bandwidth is concerned?
Answer (Click to show)
3 Mbps
4. Mention three broad categories of malicious code.
Answer (Click to show)
Viruses, Worms, Trojan Horses
5. Given 11111001 10011011 11111011 00001111; Provide its dotted-decimal notation.
Answer (Click to show)
249.155.251.15
6. Among the seven OSI layers, mention the layer which attempts to provide reliable communication over the physical layer interface.
Answer (Click to show)
Data Link Layer
7. Given the IP address as 200.12.54.234, what is the network address in which the given IP address belongs?
Answer (Click to show)
200.12.54.0
8. Name the TCP/IP Layer in which these protocols HTTP, FTP, SMTP exist.
Answer (Click to show)
Application Layer
9. Which topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design?
Answer (Click to show)
Mesh Topology
10. What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0?
Answer (Click to show)
200.45.32.0
QUESTION TWO
(15 Marks)
a) Define Computer Networking; provide three arguments in favor of the use of a computer network in an organization and one argument against.
(5 Marks)
Answer (Click to show)
**Computer networking is the practice of connecting computers and other devices to share resources and information.
Arguments in favor:
- Resource sharing (printers, files)
- Improved communication
- Centralized data management
Argument against:
Security vulnerabilities and increased risk of data breaches**
b) Using their definitions, give the difference between LAN, MAN & WAN (include example of each case).
(6 Marks)
Answer (Click to show)
LAN (Local Area Network): Small geographical area, e.g., office building
MAN (Metropolitan Area Network): City-wide coverage, e.g., city cable network
WAN (Wide Area Network): Large geographical area, e.g., internet
c) List only 4 design factors to be looked at when choosing a networking media.
(4 Marks)
Answer (Click to show)
1. Bandwidth
2. Cost
3. Distance
4. Security
QUESTION THREE
(15 Marks)
a) Why PROTOCOLS are needed in computer networking?
(2 Marks)
Answer (Click to show)
Protocols define rules for communication, ensuring devices can understand each other and exchange data reliably.
b) Why Layered Model in ISO’s OSI Model; Provide 4 reasons.
(4 Marks)
Answer (Click to show)
1. Modular design
2. Easier troubleshooting
3. Technology independence
4. Standardized interfaces
c) List the seven layers of ISO’s OSI model starting from layer number 1 (the order of arrangement should be adhered).
(3 Marks)
Answer (Click to show)
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
d) Briefly explain how the collision is avoided in the below listed LAN technologies
(3 Marks Each)
i. Ethernet
Answer (Click to show)
Uses CSMA/CD: Listen before transmit, detect collisions, random backoff
ii. Token Ring
Answer (Click to show)
Uses token passing: Only station with token can transmit
QUESTION FOUR
(15 Marks)
a) Is worm the same as virus? Provide brief explanation
(1 Mark)
Answer (Click to show)
No. Viruses need host programs to spread, while worms are self-replicating and spread independently.
b) List down the four security objectives.
(4 Marks)
Answer (Click to show)
1. Confidentiality
2. Integrity
3. Availability
4. Authenticity
c) With diagrams, list the four types of security attacks.
(4 Marks)
Answer (Click to show)
1. Interruption (Availability)
2. Interception (Confidentiality)
3. Modification (Integrity)
4. Fabrication (Authenticity)
d) Briefly explain 3 ways one can implement security defense mechanism.
(2 Marks Each)
Answer (Click to show)
1. Firewalls - Control network traffic
2. Encryption - Protect data confidentiality
3. Access Control - Restrict user permissions
QUESTION FIVE
(15 Marks)
a) Provide reason on why copper cable used as data transfer media are always twisted?
(2 Marks)
Answer (Click to show)
To reduce electromagnetic interference and crosstalk between adjacent pairs
b) List two advantages and disadvantages of Fiber optic cable.
(4 Marks)
Answer (Click to show)
Advantages: High bandwidth, immunity to EMI
Disadvantages: High cost, difficult installation
c) List two advantages and disadvantages of twisted pair.
(4 Marks)
Answer (Click to show)
Advantages: Low cost, easy installation
Disadvantages: Limited distance, susceptible to interference
d) List two limitations of star topology.
(2 Marks)
Answer (Click to show)
1. Single point of failure (central device)
2. Requires more cable than bus topology
e) What is a hub? Briefly explain its types.
(3 Marks)
Answer (Click to show)
Hub is a network device that connects multiple devices. Types: Passive hub (no signal amplification), Active hub (signal regeneration), Intelligent hub (managed features)
QUESTION SIX
(20 Marks)
a) What was a major motive towards IPv6?
(2 Marks)
Answer (Click to show)
IPv4 address exhaustion and need for larger address space
b) Convert listed IP address into binary notation; in your conversion include the class where each address belongs.
(2 Marks Each)
i. 189.32.124.242
Answer (Click to show)
10111101.00100000.01111100.11110010 (Class B)
ii. 245.123.4.199
Answer (Click to show)
11110101.01111011.00000100.11000111 (Class E)
iii. 253.126.63.223
Answer (Click to show)
11111101.01111110.00111111.11011111 (Class E)
iv. 2.7.67.222
Answer (Click to show)
00000010.00000111.01000011.11011110 (Class A)
c) UDOM is granted the site address 207.168.45.0; the university has 6 colleges of which each one has its own network. Design the subnets. In your design you must show the following
(15 Marks)
i. The subnet mask
Answer (Click to show)
255.255.255.224 (/27)
ii. The number of addresses in each subnet
Answer (Click to show)
32 addresses per subnet (30 usable)
iii. In each subnet determine the start address, range of usable IP address and the broadcast address.
Answer (Click to show)
Subnet 1: Start 207.168.45.0, Range 207.168.45.1-30, Broadcast 207.168.45.31
Subnet 2: Start 207.168.45.32, Range 207.168.45.33-62, Broadcast 207.168.45.63
Subnet 3: Start 207.168.45.64, Range 207.168.45.65-94, Broadcast 207.168.45.95
Subnet 4: Start 207.168.45.96, Range 207.168.45.97-126, Broadcast 207.168.45.127
Subnet 5: Start 207.168.45.128, Range 207.168.45.129-158, Broadcast 207.168.45.159
Subnet 6: Start 207.168.45.160, Range 207.168.45.161-190, Broadcast 207.168.45.191
END OF EXAMINATION PAPER