**Introduction to Computer Networking - Exam

2018/2019 ACADEMIC YEAR (SECOND SEMESTER)

THE UNIVERSITY OF DODOMA
COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION
SCHOOL OF INFORMATICS
UNDERGRADUATE UNIVERSITY EXAMINATIONS
SECOND SEMESTER 2018/2019
TN 122: INTRODUCTION TO NETWORKING
Date: 3rd July, 2019
Time Allocated: 3 Hours

Instructions:

  1. This examination consists of six questions.
  2. Answer only FOUR questions; Section A is compulsory and any other three (3) questions from section B.
  3. All University of Dodoma examination regulations apply.

SECTION A (40 Marks)

Question One

A: Multiple Choice questions (1 Mark Each)

1. In TCP/IP, port addresses are of length

  • A) 4 Bits
  • B) 16 Bits
  • C) 32 Bits
  • D) 48 Bits

2. What is the hexadecimal equivalent of the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111?

  • A) 5A-11-55-18-AA-OF
  • B) 5A-11-55-18-AC-OF
  • C) 5A-14-55-18-AA-OF
  • D) 5A-11-55-18-BA-OF

3. Loss in signal power as light travels down the fiber is called?

  • A) Propagation
  • B) Attenuation
  • C) Scattering
  • D) Interruption

4. Which of the following is correct regarding class B address of IP address

  • A) Network bit - 14 Host bit -16
  • B) Network bit - 16 Host bit - 14
  • C) Network bit - 16 Host bit -16
  • D) Network bit - 18 Host bit - 16

5. Message ______ means that the data must arrive at the receiver exactly as sent.

  • A) Confidentiality
  • B) Availability
  • C) Authentication
  • D) Integrity

6. Which of the following layer of the OSI model is also called Process to Process layer?

  • A) Session
  • B) Transport
  • C) Data Link
  • D) Network

7. What is the network address of the block in which this IP address 215.100.123.256 belong?

  • A) 225.100.0.0
  • B) 225.100.123.72
  • C) 225.100.123.0
  • D) No answer

8. A protocol named TCP, divides a stream of data into smaller units that are called

  • A) Packets
  • B) Segments
  • C) Frames
  • D) Chunks

9. Which of the following is not true about Subnetting?

  • A) It can be applied only for single network
  • B) Bits are borrowed off network ID portion
  • C) It is used to improve security portion
  • D) Bits are borrowed off host ID portion

10. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?

  • A) 1022
  • B) 1023
  • C) 2046
  • D) 2048

B: True and False Questions: (Write T for True and F for False) (1 Mark Each)

1. The OSI model protocol is the standard against which protocols are judged.

2. Peer-to-peer networks have computers that are permanently assigned as network servers.

3. A switch broadcasts all the packets it receives to all the computers that are connected to the switch.

4. Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.

5. LANs provide global connections for thousands of computers.

6. A hub connects two different LANs.

7. In Circuit switching type of network; data is broken up into packets before it’s sent over the network.

8. The number of addresses in class C is smaller than the needs of most organizations.

9. The most fundamental differences between SM and MM Optic Fibers are the size of the fiber’s core and the associated attenuation or loss and bandwidth of the fiber

10. An IPv4 packet sent to all workstations on the network is called a Multicast.


C: Short Answers Questions (1 Mark Each)

1. An organization has a class B network and wishes to form subnets for 64 departments. What would be the subnet mask?

2. Mention the topology in which each computer on the network connects to every other, creating a point-to-point connection between every device on the network.

3. When it comes to Port Address, which port number does HTTP use?

4. What is the subnetwork address if the destination address is 203.145.4.56 and the subnet mask is 255.255.240.0?

5. How Many Devices Can Be Connected To One USB Port?

6. How long is an IPv6 address as far as bits are concerned?

7. Mention four “versions” of Ethernet available for commercial use.

8. Given a class C IP address, you need to subnet a network that has 12 subnets, each with at least 10 hosts. Which subnet mask would you use?

9. Name the authority that oversees global IP address allocation.

10. If 10 nodes are communicating using a Hub on a 10-Mbps network and 8 of them are active, then what will each node get as far as bandwidth is concerned?


Question Two

a) Convert listed IP address into the stated notation; in your conversion include the class where each address belongs. (1 Marks Each)

i. 149.30.211.99 to Binary notation

ii. 10001111 11111101 00011001 00011101 to Decimal notation

iii. 201.45.178.89 to Hexadecimal notation

b) An Organization has been granted an IP address 219.200.37.0 and has 12 separate departments of which each of the department is supposed to have its own network. Design the subnets. In your network design show the following

i. The subnet mask (1 Marks)

ii. The number of host addresses in each subnet (1 Marks)

iii. The first available host address in the second subnet (2 Marks)

iv. The range of available addresses in the fourth subnet. (3 Marks)


SECTION B (60 Marks)

Question Three

a) (i) Define Computer Networking; (1 Mark)

(ii) Provide two arguments in favor of the use of a computer network in an organization and one argument against. (3 Marks)

b) Based on their definitions, differentiate between LAN, MAN & WAN (include example of each case). (6 Marks)

c) List only four (4) design factors to be looked at when choosing a networking media. (4 Marks)

d) Write short notes about the listed topologies (include diagram for each in your notes) (2 Marks Each)

i. Star Topology

ii. Mesh Topology

iii. Ring Topology


Question Four

a) Why do we have protocols in computer networking? (2 Marks)

b) Why the OSI model was formulated in layers? Provide 4 reasons. (4 Marks)

c) List the seven layers of ISO’s OSI model starting from layer number 1, when listing briefly explain the function of each layer (the order of arrangement should be adhered) (8 Marks)

d) Briefly explain how the collision is avoided in the below listed LAN technologies: (3 Marks Each)

i. Ethernet

ii. Token Ring


Question Five

a) Is worm the same as virus? Provide briefly explanation (2 Mark)

b) Define the following i. Security Attack (1 Mark)

ii. Security mechanism (1 Mark)

iii. Security service (1 Mark)

c) Give brief explanation on why do we need Computer Network Security. (3 Marks)

d) With diagrams, list the four types of security attacks and alongside them mention each security service does it affect. (6 Marks)

e) Briefly explain four (4) ways one can implement security defense mechanism. (6 Marks)


Question Six

a) Briefly explain two environments where layer 3 switches come into use. (4 Marks)

b) Why do we configure switches? Briefly explain three reasons. (6 Marks)

c) When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well? Briefly explain. (4 Marks)

d) Mention two advantages and 2 disadvantages of twisted pair. (4 Marks)

e) Outline the two limitations of star topology. (2 Marks)


END OF EXAMINATION