**Introduction to Computer Networking - Exam
2017/2018 ACADEMIC YEAR (SECOND SEMESTER)
THE UNIVERSITY OF DODOMA
COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION
SCHOOL OF INFORMATICS
UNDERGRADUATE UNIVERSITY EXAMINATIONS
SECOND SEMESTER 2017/2018
TN 122: INTRODUCTION TO COMPUTER NETWORKING
Date: 06th July, 2018
Time Allocated: 3 Hours
Instructions:
-
This examination consists of six questions.
-
Attempt all questions from section A and only three questions from section B.
-
All University of Dodoma examination regulations apply.
SECTION A (40 Marks)
Question One
Part A: Multiple choice Questions (1 Mark Each)
1. Layering is commonly used in computer networks because:
- A. It forces all network software to be written in ANSI ‘C’.
- B. Encapsulation is the lowest overhead method to transmit data.
- C. It allows widespread code and implementation re-use.
- D. It keeps networks warm enabling them to run faster.
Answer (Click to show)
C. It allows widespread code and implementation re-use.
2. A message is sent to all hosts on a remote network. Which type of message is it?
- A. Limited Broadcast
- B. Unicast
- C. Multicast
- D. Direct Broadcast
Answer (Click to show)
D. Direct Broadcast
3. In an Ethernet network, which of the following are true:
- A. Ethernet switches learn addresses by looking at the destination address of packets as they pass by.
- B. Ethernet hubs and repeaters learn addresses by looking at the addresses of packets as they pass by.
- C. A correctly operating Ethernet switch never sends a packet to the wrong outgoing port
- D. Ethernet switches learn addresses by looking at the source address of packets as they pass by.
Answer (Click to show)
D. Ethernet switches learn addresses by looking at the source address of packets as they pass by.
4. The frequency of failure and network recovery time after a failure is measures of the ______ of a network.
- A. Performance
- B. Security
- C. Feasibility
- D. Reliability
Answer (Click to show)
D. Reliability
5. An IPv6 address can have up to ______ hexadecimal digits
- A. 16
- B. 8
- C. 128
- D. 32
Answer (Click to show)
D. 32
6. If your computer has the IP address 128.96.10.123, and the subnet mask is set to 255.255.0.0, your computer will connect directly to all computers whose IP address starts with ______.
Answer (Click to show)
128.96
7. Which network design consideration would be more important to a large corporation than to a small business?
- A. Internet Router
- B. Firewall
- C. Low Port Density Switch
- D. Redundancy
Answer (Click to show)
D. Redundancy
8. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
- A. An Internet
- B. An Extranet
- C. An Intranet
- D. A Local Area Network
Answer (Click to show)
C. An Intranet
9. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
- A. Application
- B. Transport
- C. Data Link
- D. Physical
Answer (Click to show)
C. Data Link
10. Given the IP address 192.168.10.5. In the Network block in which the just mentioned address belong there are 3 printers that need to use reserved static IP addresses from the address pool. How many IP addresses in the pool are left to be assigned to other hosts?
- A. 254
- B. 252
- C. 251
- D. 253
Answer (Click to show)
D. 253
Part B: True and False Questions (1 Mark Each)
1. When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.
Answer (Click to show)
True
2. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.
Answer (Click to show)
True
3. Hubs are considered to be fairly unsophisticated devices, since they inefficiently rebroadcast all traffic on every port.
Answer (Click to show)
True
4. One of the characteristics of Circuit Switched Networks is that; if all circuits are busy, a new call cannot be placed.
Answer (Click to show)
True
5. The Ping command is used on a Windows PC to see the IP configuration of that computer.
Answer (Click to show)
False (ipconfig is used for IP configuration)
6. The PDU format used when bits are received from the network medium by the NIC of a host is called a segment.
Answer (Click to show)
False (It’s called a frame at Data Link layer)
7. The organization responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers is called IETF.
Answer (Click to show)
False (It’s ICANN - Internet Corporation for Assigned Names and Numbers)
8. 802.11a can give a speed of up to 54Mbps; the only problem with it is the backward compatibility with the earliest versions.
Answer (Click to show)
True
9. Among the 4 pairs of UTP cable, White-Orange Pair is used for Transmission of signals while White-Green Pair is used for Reception.
Answer (Click to show)
True
10. The two main functions of an Internet Protocol router are the forwarding of individual packets and the maintenance of routing tables.
Answer (Click to show)
True
Part C: Short Answers Questions (1 Mark Each)
1. DHCP uses UDP port number ______ for sending data to the server.
Answer (Click to show)
67
2. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is ______.
Answer (Click to show)
32,000 bps (4000 frames/s × 8 bits/frame)
3. In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ______.
Answer (Click to show)
10 Mbps (the slowest link determines throughput)
4. Given the IP address 146.34.256.78; the Network ID in which the address belong is ______.
Answer (Click to show)
Invalid IP address (256 is out of range 0-255)
5. Sometimes we refer to it as a microwave repeater in space; ______.
Answer (Click to show)
Satellite
6. There are two connection types as long as cable termination to RJ-45 is concerned. Among the two, which one is used when connecting a router and a router?
Answer (Click to show)
Crossover
7. Given the IP address 198.251.45.99, this address belongs to class ______ and its hexadecimal equivalence is ______.
Answer (Click to show)
Class C, C6.FB.2D.63
8. An endpoint of an inter-process communication flow across a computer network is called a ______ destination.
Answer (Click to show)
Socket
9. The three layers of Fiber Optic cable are Plastic socket, glass or plastic cladding and ______ fiber core.
Answer (Click to show)
Glass
10. If 10 nodes are communicating using a Hub on a 20-Mbps network, then what will each node get as far as bandwidth is concerned?
Answer (Click to show)
2 Mbps
Question Two
a. Why the IPv6 while we already have IPv4? (1 Marks)
Answer (Click to show)
IPv4 address exhaustion and need for larger address space
b. Perform the following conversion between the below notations (2 Marks Each)
i. 10001111 01110000 11111110 10101010 to Decimal Notation
Answer (Click to show)
143.112.254.170
ii. 176.67.249.189 to Hexadecimal Notation
Answer (Click to show)
B0.43.F9.BD
iii. 0XAB671DCF to Decimal Notation
Answer (Click to show)
2875590095
c. Given the IP address 219.45.78.138; answer the below questions (1 Mark Each)
i. What is the Network ID of the block in which the given address belong?
Answer (Click to show)
219.45.78.0
ii. The range of addresses in the block
Answer (Click to show)
219.45.78.0 to 219.45.78.255
iii. The usable range of addresses in the block
Answer (Click to show)
219.45.78.1 to 219.45.78.254
SECTION B (60 Marks)
Question Three
a. With examples discuss and compare LAN, MAN and WAN (6 Marks)
Answer (Click to show)
LAN (Local Area Network): Small geographical area, high speed, single ownership. Example: Office network
MAN (Metropolitan Area Network): City-wide coverage, medium speed. Example: City cable network
WAN (Wide Area Network): Large geographical area, lower speed, multiple ownership. Example: Internet
b. Briefly explain the roles of the below-listed devices in computer networking (5 Marks)
i. Repeater
Answer (Click to show)
Regenerates signals to extend network distance
ii. Bridge
Answer (Click to show)
Connects and filters traffic between network segments
iii. Switch
Answer (Click to show)
Intelligent device that forwards data to specific devices
iv. Router
Answer (Click to show)
Connects different networks and routes packets between them
v. Gateway
Answer (Click to show)
Connects networks with different protocols
d. Differentiate between Internet, Extranet and Intranet. (5 Marks)
Answer (Click to show)
Internet: Global public network
Intranet: Private network within organization
Extranet: Extended intranet for partners/vendors
Question Four
a. Mention the three reasons of having a LAYERED OSI Model (3 Marks)
Answer (Click to show)
Modularity: Easy to modify individual layers
Interoperability: Multi-vendor compatibility
Easier Troubleshooting: Isolate problems to specific layers
b. Mention the 4 TCP/IP Layer. (2 Marks)
Answer (Click to show)
Application
Transport
Internet
Network Access
c. Starting from the first layer to the last one; list the OSI layers providing in brief the function of each layer. (6 Marks)
Answer (Click to show)
Physical: Bit transmission
Data Link: Frame delivery
Network: Packet routing
Transport: End-to-end delivery
Session: Connection management
Presentation: Data formatting
Application: User interface
d. Briefly describe how collision are avoided in the below-listed LAN technologies:
i. Ethernet (2 Marks)
Answer (Click to show)
CSMA/CD: Listen before transmit, detect collisions, backoff and retry**
ii. Token Passing (2 Marks)
Answer (Click to show)
Use token passing: Only station with token can transmit
Question Five
a. Mention five design factors when choosing a networking transmission media. (5 Marks)
Answer (Click to show)
- Bandwidth: The data-carrying capacity of the medium.
- Cost: The total expense of the material, installation, and maintenance.
- Attenuation: The degree of signal loss over distance.
- Immunity to Electromagnetic Interference (EMI): The ability to resist external noise.
- Maximum Segment Length: The maximum reliable transmission distance.
b. What does STP offers more compared to UTP? (2 Marks)
Answer (Click to show)
STP (Shielded Twisted Pair) offers greater immunity to Electromagnetic Interference (EMI) compared to UTP due to an additional metallic shielding around the twisted pairs.
c. Mention two advantages and two disadvantages of Twisted pair wires. (4 Marks)
Answer (Click to show)
- Advantages:
- Low Cost: It is the cheapest form of network transmission media.
- Easy Installation: It is lightweight, flexible, and easy to install.
- Disadvantages:
- Susceptible to EMI: UTP is highly vulnerable to electromagnetic interference.
- Attenuation: Suffers from significant signal loss over long distances.
d. What is the fundamental difference between the Single-mode Fiber and Multi-mode fiber? Explain the rule of thumb governing the relationship between the earlier said difference and the fiber’s bandwidth and the attenuation. (4 Marks)
Answer (Click to show)
- Fundamental Difference: The core diameter. Single-mode fiber (SMF) has a narrow core (8-10 microns) for one light path, while Multi-mode fiber (MMF) has a larger core (50 or 62.5 microns) for multiple light paths.
- Rule of Thumb: Because the single light mode in SMF does not disperse, it can carry signals over much longer distances with significantly higher bandwidth and lower attenuation. MMF suffers from modal dispersion, which limits its bandwidth and maximum distance.
e. Mention two advantages and two disadvantages of Fiber Optic cable. (4 Marks)
Answer (Click to show)
- Advantages:
- High Bandwidth: Supports extremely high data rates.
- Immunity to EMI: Completely immune to electromagnetic interference.
- Disadvantages:
- High Cost: Significantly more expensive than copper cables.
- Installation/Specialized Skills: Requires specialized equipment and trained technicians.
Question Six
a) Why do we need to have security in computer networks? (2 Marks)
Answer (Click to show)
To protect sensitive data from theft or manipulation, ensure the continuity of services, and maintain the privacy and trust of users, thereby preventing financial loss, reputational damage, and legal consequences.
b) Briefly explain the security goals. (3 Marks)
Answer (Click to show)
The primary security goals (CIA triad) are:
- Confidentiality: Ensuring data is accessed only by authorized parties.
- Integrity: Protecting the accuracy and completeness of data.
- Availability: Ensuring systems and data are accessible to authorized users when needed.
c) With the help of diagrams, explain brief the 4 types of security attack. In your explanation you must specify the security service being compromised in each of the attack and also which among the attacks are active as well as passive. (8 Marks)
Answer (Click to show)
1. Interception (Attack on Confidentiality)
- Diagram:
[User A] -----> [Data: "Secret"] -----> [User B] ˄ | [Attacker Eve]
- Security Service Compromised: Confidentiality
- Active/Passive: Passive
2. Modification (Attack on Integrity)
- Diagram:
[User A] -----> [Data: "Send $100"] --X--> [Attacker Mallory] -----> [Data: "Send $1000"] -----> [User B]
- Security Service Compromised: Integrity
- Active/Passive: Active
3. Fabrication (Attack on Authenticity)
- Diagram:
[User A] -----> [Data: "Hi, it's A"] -----> [User B] ˄ | [Attacker Mallory] (Inserts fake message: "I'm A, send me files.")
- Security Service Compromised: Authenticity
- Active/Passive: Active
4. Interruption (Attack on Availability)
- Diagram:
[Legitimate User] -----> [Service/Server] ˄ | (Overwhelmed with traffic) | [Attacker] -----> [Flood of Requests]
- Security Service Compromised: Availability
- Active/Passive: Active
d) Briefly explain only three common security attacks you are aware of; a mitigation strategy should be provided for each of the explained attack. (6 Marks)
Answer (Click to show)
1. Phishing
- Explanation: A social engineering attack using fraudulent messages to trick users into revealing sensitive information.
- Mitigation Strategy: User education, advanced email filtering, and multi-factor authentication (MFA).
2. Malware (e.g., Ransomware)
- Explanation: Malicious software that infects a system; ransomware encrypts files for ransom.
- Mitigation Strategy: Regular data backups, updated anti-virus software, and prompt patching of vulnerabilities.
3. Denial-of-Service (DoS/DDoS)
- Explanation: An attack that floods a target with traffic to exhaust resources and deny service to legitimate users.
- Mitigation Strategy: Using DDoS mitigation services, configuring firewalls, and ensuring sufficient capacity.
END OF EXAMINATION PAPER