0% found this document useful (0 votes)
642 views

Solution - Session (NETWORK) From 2010-1-To 2018-2 - BT3 Information Technology

session network bt3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
642 views

Solution - Session (NETWORK) From 2010-1-To 2018-2 - BT3 Information Technology

session network bt3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 64

Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2010-1- BT3 Information Technology

Three units need to be connected using a wireless connection:

a. Enumerate two possible modes of connections:

 Ad-Hoc Mode: Direct connection between the units without the need for
a central access point.
 Infrastructure Mode: Connection through a central access point, such as
a wireless router.

b. Represent schematically the two connection modes:

 Ad-Hoc Mode:

Unit1 <-------> Unit2 <-------> Unit3


 Infrastructure Mode:

Unit1 <-------> Access Point <-------> Unit2


|
Unit3

c. Talk about the security in the wireless networks:

Wireless networks are susceptible to several security threats such as


eavesdropping, unauthorized access, and data interception. To enhance
security, various protocols like WPA2 (Wi-Fi Protected Access 2) and WPA3
are used. These protocols employ encryption techniques to secure data
transmission. Additionally, secure authentication methods like WPA-
Enterprise can be implemented to ensure only authorized users can access the
network. It is also recommended to regularly update the firmware of wireless
devices and use strong, unique passwords for wireless networks.

Question 2: OSI Model

2. Describe the OSI model: a. Utility (reason of existence):

The OSI (Open Systems Interconnection) model provides a standardized


framework for networking protocols to ensure different systems can
communicate effectively. It breaks down the communication process into

PREPARED BY SAMAR.I.SHOUMAN Page 1


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

seven layers, each with specific functions, allowing interoperability


between various hardware and software.

b. Represent the model schematically:

+-----------------+
| 7. Application |
+-----------------+
| 6. Presentation |
+-----------------+
| 5. Session |
+-----------------+
| 4. Transport |
+-----------------+
| 3. Network |
+-----------------+
| 2. Data Link |
+-----------------+
| 1. Physical |
+-----------------+

c. Talk about one of its layers:

Transport Layer (Layer 4): The Transport layer is responsible for


ensuring complete data transfer. It provides error checking, flow
control, and segmentation of data. Protocols like TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol) operate at this
layer. TCP is connection-oriented, providing reliable data transfer with
error correction and acknowledgment mechanisms, whereas UDP is
connectionless, offering faster data transfer without reliability
guarantees. The Transport layer ensures that data is transferred from
source to destination accurately and in the correct sequence.

Question 3: Collision and Packet Reception

3. For the above exhibit, answer the following questions:

a. Which units, if they emit simultaneously, may cause collisions?


Justify your answer.
PREPARED BY SAMAR.I.SHOUMAN Page 2
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

In a shared medium network like Ethernet, any two units transmitting


at the same time can cause collisions because the medium is shared.
For instance, if PC1 and PC2 transmit simultaneously, their signals will
collide, leading to data corruption.

b. If a packet is sent from PC3 to PC2, which unit(s) will receive this
packet? Justify your answer.

In a typical Ethernet setup, all units in the same collision domain will
receive the packet, but only PC2 will process it because the packet's
destination address matches PC2's address. Other units will discard
the packet.

c. If a packet is sent from PC1 to PC3, which unit(s) will receive this
packet? Justify your answer.

Similar to the previous answer, all units in the same collision domain
will receive the packet, but only PC3 will process it since the packet is
addressed to PC3.

d. If a packet is sent from PC2 to PC4, which unit(s) will receive this
packet? Justify your answer.

Assuming a basic Ethernet network, all units in the same collision


domain will receive the packet, but only PC4 will process it because it
is the intended recipient.

Question 4: ADSL and Connectivity

4. ADSL and connectivity:

a. How ADSL differs from HDSL?

ADSL (Asymmetric Digital Subscriber Line): Provides asymmetric


data rates, meaning higher download speeds compared to upload
speeds. It is commonly used for residential internet connections.

HDSL (High-bit-rate Digital Subscriber Line): Provides symmetric


data rates, meaning equal upload and download speeds. It is often used

PREPARED BY SAMAR.I.SHOUMAN Page 3


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

for business and enterprise connections requiring high reliability and


equal bandwidth in both directions.

b. How can we test the connectivity between a station and an ADSL


modem?

Connectivity can be tested using the ping command to send ICMP


(Internet Control Message Protocol) echo requests to the modem's IP
address and check for responses. This verifies that the station can
reach the modem.

c. How can we allow many stations to access simultaneously the


modem?

A router can be used to connect multiple stations to the modem. The


router manages the network traffic and assigns IP addresses to each
connected device using DHCP (Dynamic Host Configuration Protocol).
Additionally, a switch can be used to expand the number of available
Ethernet ports for wired connections.

Question 5: IP Address

5. IP Address:

a. Give its binary representation.

172.16.11.0 in binary: 10101100.00010000.00001011.00000000

b. What is its class? Justify your answer.

Class B. IP addresses from 128.0.0.0 to 191.255.255.255 fall within


Class B. The first octet of 172.16.11.0 is 172, which lies within this
range.

c. What is the value of its default subnet mask?

The default subnet mask for Class B is 255.255.0.0.

d. What is its network address?

PREPARED BY SAMAR.I.SHOUMAN Page 4


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

The network address is 172.16.0.0, derived by applying the subnet


mask 255.255.0.0 to the IP address.

a. What is its broadcast address?

The broadcast address is 172.16.255.255, which is the highest address in


the network range.

a. What is the maximum number of valid users in this network?

The maximum number of valid hosts in a Class B network is 2^16 - 2


= 65534 (subtracting 2 for the network and broadcast addresses).

Question 6: TCP/IP Attacks


6. Enumerate and describe two types of TCP/IP attacks:

Denial of Service (DoS) Attack: This attack aims to make a network


service unavailable by overwhelming it with a flood of illegitimate
requests. This can cause the targeted server or network to become
overloaded, leading to service disruption for legitimate users.

Man-in-the-Middle (MitM) Attack: In this attack, an attacker


intercepts and potentially alters the communication between two
parties without their knowledge. This can lead to data theft,
unauthorized data modification, and eavesdropping. Techniques like
ARP spoofing and DNS spoofing are often used to carry out MitM
attacks.

Solution – Session 2010-2- BT3 Information Technology


PREPARED BY SAMAR.I.SHOUMAN Page 5
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

1. Topologies
a. Bus Topology
Advantages:

 Easy to install and extend.


 Requires less cable length than a star topology.
 Well-suited for small networks.

Disadvantages:

 Difficult to troubleshoot.
 Limited cable length and number of stations.
 A failure in the main cable (bus) will cause the whole network to go
down.

b. Ring Topology
Advantages:

 Data packets travel at greater speed.


 No collisions, as each packet travels in one direction.
 Easy to identify and isolate faults.

Disadvantages:

 A failure in any cable or device can disrupt the entire network.


 Difficult to install and reconfigure.
 More expensive than bus topology due to additional cables and hardware.

c. Star Topology
Advantages:

 Easy to install and manage.


 Failure of one node does not affect the rest of the network.
 Easy to add new nodes.

Disadvantages:

 Requires more cable than bus and ring topologies.


 If the central hub fails, the whole network goes down.
 More expensive due to the cost of the central device.
PREPARED BY SAMAR.I.SHOUMAN Page 6
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

2. Types of Cables
a. Coaxial Cable
 Description: Consists of a core conductor (usually copper), surrounded
by insulation, a metallic shield, and a plastic outer jacket.
 Usage: Used in older Ethernet networks, television, and radio signal
transmission.

b. Twisted Pair Cable


 Description: Composed of pairs of insulated copper wires twisted
together. It comes in two types: shielded (STP) and unshielded (UTP).
 Usage: Commonly used in Ethernet networks, telephone systems, and
computer networking.

c. Fiber Optic Cable


 Description: Contains glass or plastic fibers that transmit data as light
pulses.
 Usage: Used for long-distance and high-bandwidth network connections.
Suitable for Internet backbone, cable TV, and telephone networks.
3. Comparison Table: Router, Hub, and Switch
Feature Router Hub Switch
Connects devices
Routes data between Connects multiple
Function within the same
different networks Ethernet devices
network
Network Layer (Layer Physical Layer Data Link Layer
OSI Layer
3) (Layer 1) (Layer 2)
Data Broadcasts to all Forwards data to
Packet switching
Transmission ports specific ports
Intelligence High None Medium
Bandwidth High Shared Dedicated
Cost High Low Medium
Use Case Connecting different Small networks, Medium to large
networks (LAN to simple connections networks

PREPARED BY SAMAR.I.SHOUMAN Page 7


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Feature Router Hub Switch


WAN)
4. Definitions
a. RJ45
 Description: A type of connector commonly used for Ethernet
networking. It has 8 pins and is used to connect computers to local area
networks (LANs).

b. DHCP
 Description: Dynamic Host Configuration Protocol. It automatically
assigns IP addresses and other network configuration details to devices
on a network.

c. CSMA/CD
 Description: Carrier Sense Multiple Access with Collision Detection. A
network protocol used in Ethernet networks to manage data
transmission and avoid collisions.

d. Telnet
 Description: A network protocol that allows for remote control of
computers over a network. It provides a bidirectional interactive text-
oriented communication facility.

e. ARP
 Description: Address Resolution Protocol. It maps IP addresses to MAC
(Media Access Control) addresses, allowing devices on a local network to
discover each other.

f. Ping
 Description: A network utility used to test the reachability of a host on
an IP network. It measures the round-trip time for messages sent from
the originating host to a destination computer.

g. SMTP
 Description: Simple Mail Transfer Protocol. It is used for sending emails
between servers and from email clients to servers.

PREPARED BY SAMAR.I.SHOUMAN Page 8


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

h. Phishing
 Description: A fraudulent attempt to obtain sensitive information such
as usernames, passwords, and credit card details by disguising as a
trustworthy entity in electronic communications.

5. IP Address Analysis: 192.168.211.11


a. Binary Representation
 Answer: 11000000.10101000.11010011.00001011

b. Class
 Answer: Class C (First octet: 192, which is between 192 and 223)

c. Default Subnet Mask


 Answer: 255.255.255.0

d. Network Address
 Answer: 192.168.211.0 (Network address is obtained by performing a
bitwise AND between the IP address and the subnet mask)

e. Broadcast Address
 Answer: 192.168.211.255 (Broadcast address is obtained by setting all
host bits to 1 in the subnet)

f. Maximum Number of Valid Users


 Answer: 254 (2^8 - 2 = 256 - 2 = 254, subtracting 2 for network and
broadcast addresses)

g. Dividing into Four Subnets


 Answer: Change the subnet mask to 255.255.255.192 to divide the
network into four subnets.

h. Subnetwork Addresses
 Answer:
o 192.168.211.0
o 192.168.211.64
o 192.168.211.128
o 192.168.211.192

PREPARED BY SAMAR.I.SHOUMAN Page 9


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

6. Network Security
a. Definitions
 Spyware: Malicious software designed to gather information from a
computer without the user's knowledge.
 Malware: General term for any software designed to cause harm to a
computer system, including viruses, worms, trojans, and spyware.
 Adware: Software that automatically displays or downloads advertising
material when a user is online.

b. Protection Methods
 Spyware Protection: Use anti-spyware software, keep software up to
date, avoid clicking on unknown links or attachments.
 Malware Protection: Use antivirus and anti-malware software, keep
systems and software updated, practice safe browsing and email habits.
 Adware Protection: Use ad-blocking software, avoid downloading
software from untrusted sources, regularly scan the system for adware.

Solution – Session 2011-1- BT3 Information Technology

PREPARED BY SAMAR.I.SHOUMAN Page 10


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

1. Concepts
a. Bandwidth
Bandwidth is the maximum rate at which data can be transmitted over a network or
internet connection in a given amount of time. It is usually measured in bits per
second (bps), with common multiples being megabits per second (Mbps) and
gigabits per second (Gbps). Higher bandwidth indicates a higher capacity for data
transfer, allowing more data to be sent or received simultaneously.

b. Data Transmission
Data transmission refers to the process of sending digital or analog data from one
point to another through a communication channel. This can be done using various
mediums such as copper wires, fiber optics, or wireless signals. The transmission
involves encoding data into signals that can be transmitted and decoded by the
receiving end to interpret the original information. Efficient data transmission
ensures that the data is delivered accurately and quickly, minimizing errors and
delays.

c. Security in Wireless Networks


Security in wireless networks is critical to protect sensitive data and ensure the
privacy and integrity of communications. Key measures include:

 Encryption: Using protocols like WPA3 to encrypt data transmitted over the
network, making it unreadable to unauthorized users.
 Authentication: Implementing robust methods to verify the identity of users
and devices trying to access the network.
 Firewalls and Intrusion Detection Systems: Monitoring network traffic to
detect and block unauthorized access attempts or malicious activities.
 Regular Updates and Patches: Keeping firmware and software up-to-date to
protect against vulnerabilities.

2. Network Characteristics
LAN (Local Area Network)
 Scope: Covers a small geographical area such as a single building or campus.
 Speed: Typically high, ranging from 100 Mbps to 10 Gbps.
 Configuration: Usually managed by a single organization or individual.
 Examples: Home networks, office networks.

PREPARED BY SAMAR.I.SHOUMAN Page 11


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

MAN (Metropolitan Area Network)


 Scope: Spans a larger geographic area than a LAN, such as a city or town.
 Speed: Generally slower than LAN but faster than WAN, around 1 Mbps to 1
Gbps.
 Configuration: Can be managed by multiple organizations or a single entity.
 Examples: City-wide networks, campus networks.

WAN (Wide Area Network)


 Scope: Covers a very large geographic area, such as a country or even
worldwide.
 Speed: Varies widely, typically from 56 Kbps to 100 Gbps.
 Configuration: Managed by multiple organizations and often requires
complex infrastructure.
 Examples: The Internet, corporate networks connecting multiple offices.

3. Schema Representation
The image shows different types of fiber optic connectors.

These connectors are used to join optical fibers where a connect/disconnect


capability is needed.

They ensure that light can pass through with minimal loss or interference,

which is critical for high-speed data transmission.

4. IP Address Calculation
a. IP Address Class
The IP address 162.15.11.0 belongs to Class B.

 Justification: Class B addresses range from 128.0.0.0 to 191.255.255.255. The


first octet of the given IP (162) falls within this range.

b. Network Address
For a Class B address, the default subnet mask is 255.255.0.0. Therefore, the
network address is 162.15.0.0.

PREPARED BY SAMAR.I.SHOUMAN Page 12


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

c. Broadcast Address
The broadcast address for a Class B network with the given IP address and subnet
mask is 162.15.255.255.

d. Maximum Number of Valid Users


For a Class B network:

 Total addresses: 216=655362^{16} = 65536216=65536


 Subtracting the network and broadcast addresses, the maximum number of
valid users is 65536−2=6553465536 - 2 = 6553465536−2=65534.

5. Dynamic Host Configuration Protocol (DHCP)


a. Functioning
DHCP automatically assigns IP addresses and other network configuration
parameters to devices on a network, allowing them to communicate efficiently. The
process involves a DHCP server that manages a pool of IP addresses and leases
them to clients.

b. Utility
DHCP simplifies network administration by automatically managing IP address
assignments, reducing the risk of conflicts and errors associated with manual
configuration.

c. Advantages
 Ease of Management: Reduces administrative workload by automating IP
address assignment.
 Flexibility: Easily accommodates changes in network topology.
 Scalability: Suitable for both small and large networks.

d. Disadvantages
 Single Point of Failure: If the DHCP server fails, new devices cannot join the
network.
 Security Risks: Unauthorized devices may obtain IP addresses if network
security is weak.

e. Obligatory and Optional Parameters


 Obligatory Parameters: IP Address, Subnet Mask, Default Gateway.

PREPARED BY SAMAR.I.SHOUMAN Page 13


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 Optional Parameters: DNS Server, WINS Server, NTP Server.

6. Internet Connection and Network Equipment


a. Establishing an Internet Connection
An internet connection is established by connecting a device to an Internet Service
Provider (ISP) using various methods such as DSL, fiber, cable, or wireless. The
device communicates with the ISP’s infrastructure to access the internet.

b. Specialized Equipment for Physical Connection


 Modem: Converts digital data to analog signals for transmission over phone
lines or vice versa.
 Router: Directs data packets between networks, often connecting local
networks to the internet.
 Switch: Connects devices within a local network, allowing them to
communicate.

c. Data Protocol Unit of Layer 1


The data protocol unit of the Physical Layer (Layer 1) is the bit.

d. Data Protocol Unit of Layer 2


The data protocol unit of the Data Link Layer (Layer 2) is the frame.

e. Data Protocol Unit of Layer 3


The data protocol unit of the Network Layer (Layer 3) is the packet.

f. URL Display Protection


URL Display Protection involves measures to prevent phishing attacks and other
malicious activities by ensuring that the URL displayed in a browser accurately
reflects the true destination of the link, protecting users from deceptive practices.

7. Numerical Bases and Conversions


a. Numerical Base for Hexadecimal Numbers
The numerical base for hexadecimal numbers is 16.

b. Total Number of Possible Combinations on 8 Bits


The total number of possible combinations of a binary representation on 8 bits is
28=2562^8 = 25628=256.

PREPARED BY SAMAR.I.SHOUMAN Page 14


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

c. Decimal to Binary Conversion


The decimal number 231 converts to binary as 111001111110011111100111.

d. Network Address Calculation


Given IP address: 172.16.20.23 and subnet mask: 255.255.248.0

 Subnet Mask in Binary: 11111111.11111111.11111000.00000000


 IP Address in Binary: 10101100.00010000.00010100.00010111
 Perform a bitwise AND operation between the IP address and the subnet
mask:
 Network Address: 172.16.16.0

PREPARED BY SAMAR.I.SHOUMAN Page 15


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2012-1- BT3 Information Technology


1. (7 pts.)
a) Among the following characteristics, indicate those that are of local
network and those of wide network:
 Long distance: Wide network (WAN)
 Rapidity: Local network (LAN)
 Security: Can apply to both LAN and WAN
 Large number of users: Wide network (WAN)

b) Draw a network with a star topology. Name all the devices and
materials that you have used in your drawing.
Devices and materials:

 Central switch or hub


 Computers or workstations
 Network cables (Ethernet cables)

[Computer 1]
|
[Computer 2] - [Switch/Hub] - [Computer 3]
|
[Computer 4]
c) Draw the OSI model while appearing all its layers.
+---------------------+
| Application |
+---------------------+
| Presentation |
+---------------------+
| Session |
+---------------------+
| Transport |
+---------------------+
| Network |
+---------------------+
| Data Link |
PREPARED BY SAMAR.I.SHOUMAN Page 16
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

+---------------------+
| Physical |
+---------------------+
d) What is a virus? How can you hide your network in order to be
inaccessible from the outside?
 Virus: A virus is a malicious software program designed to replicate itself
and spread from one computer to another, often causing harm to the data
and system.
 Hiding a network: Use a firewall to block unauthorized access, employ
network address translation (NAT), disable SSID broadcasting on Wi-Fi
networks, and use strong encryption methods like WPA3.

e) What is WWW?
 WWW (World Wide Web): A system of interlinked hypertext documents
accessed via the internet using web browsers.

f) What is a "Browser"?
 Browser: A software application used to access and view websites on the
World Wide Web. Examples include Chrome, Firefox, and Safari.

g) What is a URL?
 URL (Uniform Resource Locator): A reference (an address) to a
resource on the Internet. It specifies the location of a resource and the
protocol used to access it (e.g., http://www.example.com).

2. Give some examples of browsers. (1 pt)


 Google Chrome
 Mozilla Firefox
 Microsoft Edge
 Apple Safari
 Opera

3. What is the difference between a personal firewall and a network


firewall? (1 pt)
 Personal Firewall: Software installed on individual computers to
monitor and control incoming and outgoing network traffic based on
security rules.

PREPARED BY SAMAR.I.SHOUMAN Page 17


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 Network Firewall: A hardware or software-based system designed to


protect an entire network by controlling the incoming and outgoing
network traffic based on predetermined security rules.

4.
a) Give the names of devices shown in "figure 1" and "figure 2" (1 pt)

The two devices shown in the images are BNC (Bayonet Neill-Concelman)
connectors. The first image is a BNC T-connector, and the second image is a
BNC plug connector with a green cover.

Here's how you can use these devices in a network diagram:

1. BNC T-connector: This is typically used to connect three BNC cables


together, often in a coaxial network.
2. BNC Plug Connector: This connects a coaxial cable to a device like a
router, switch, or another network device with a BNC port.

Let's draw a simple network that shows the use of these two devices:

1. Central Device: A central device like a router or a switch with a BNC


port.
2. Coaxial Cables: Three coaxial cables.
3. BNC T-connector: Connecting three coaxial cables.
4. End Devices: Devices like computers or network cameras that connect
via BNC connectors.

Network Diagram:
Device 1 (BNC Plug Connector)
|
|
(Cable 1)
|
|
(BNC T-connector)
/ \
/ \
(Cable 2) (Cable 3)
PREPARED BY SAMAR.I.SHOUMAN Page 18
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

/ \
/ \
Device 2 (BNC Plug) Device 3 (BNC Plug)

In this diagram:

 Device 1 connects to the BNC T-connector via Cable 1 using a BNC plug
connector.
 Device 2 and Device 3 connect to the BNC T-connector via Cables 2 and 3
respectively using BNC plug connectors.
 The BNC T-connector is the central point where all three cables meet,
enabling the connection between Device 1, Device 2, and Device 3.

b) When will you use each one of the two devices? (1 pt)
 Switch: Used within a local area network (LAN) to connect multiple
devices and facilitate communication within the network.
 Router: Used to connect different networks together, such as connecting
a home network to the internet.

c) Draw a network that shows the use of these two devices. (1 pt)
[Internet]
|
[Router]
|
[Switch]
/ | \
[PC1][PC2][PC3]
5. Give the slash notation of the following subnet masks: (1 ½ pts)
a) 255.255.0.0 -> /16 b) 255.0.0.0 -> /8 c) 255.255.255.0 -> /24

6. Indicate the network portion of each of the following addresses: (1 ½


pts)
a) 172.10.0.0 255.255.0.0 -> 172.10.0.0 b) 172.16.0.0 /16 -> 172.16.0.0 c)
192.168.1.0 255.255.255.0 -> 192.168.1.0 d) 192.168.10.0 /24 -> 192.168.10.0
e) 10.0.0.0 /8 -> 10.0.0.0 f) 123.0.0.0 255.0.0.0 -> 123.0.0.0

PREPARED BY SAMAR.I.SHOUMAN Page 19


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

7. Answer to the following questions and justify your answers: (1 pt)


a) Given the class C of the network 201.125.52.0, we want to create 20
subnets. What is the mask to be used?
 Subnet Mask: 255.255.255.240 (/28)
 Justification: Class C default subnet mask is /24. To create 20 subnets,
you need 5 bits (2^5 = 32 subnets). So, /24 + 4 bits = /28.

b) Given the class C of the network 192.168.4.0, we want subnets each


containing 80 machines. What is the mask to be used?
 Subnet Mask: 255.255.255.128 (/25)
 Justification: To accommodate 80 machines, you need 7 bits for hosts
(2^7 - 2 = 126 hosts). So, /24 + 1 bit = /25.

8. A machine has an IP address 172.15.0.1 (2 pts)


a) What is its class address? Justify your answer.
 Class: Class B
 Justification: The IP address 172.15.0.1 falls within the range of Class B
addresses (128.0.0.0 - 191.255.255.255).

b) What is the maximum number of valid users in this network?


 Maximum Number of Users: 65,534
 Justification: Class B network has a default subnet mask of /16, allowing
for 2^16 - 2 = 65,534 hosts.

c) What are the usable addresses? Justify your answer.


 Usable Addresses: 172.15.0.1 to 172.15.255.254
 Justification: The first address (172.15.0.0) is the network address, and
the last address (172.15.255.255) is the broadcast address, so usable
addresses range from 172.15.0.1 to 172.15.255.254.

d) Is it a private or a public address? Justify your answer.


 Public Address
 Justification: The address 172.15.0.1 is not within the private IP address
range for Class B (172.16.0.0 to 172.31.255.255).

PREPARED BY SAMAR.I.SHOUMAN Page 20


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

9. Your institute is covered by a Wi-Fi network and you want to access the
internet, from your laptop, through this network. (2 pts)
a) What hardware and software configuration must be present on your
laptop so that you can access the internet?
 Hardware: Wi-Fi adapter
 Software: Operating system with network drivers, web browser, Wi-Fi
management software

b) Does the Wi-Fi network you ensure a total protection? Justify your
answer.
 No, it does not ensure total protection.
 Justification: Wi-Fi networks can be vulnerable to various attacks (e.g.,
man-in-the-middle, deauthentication). While using strong encryption
(WPA3) and secure configurations enhances security, it cannot guarantee
total protection against all threats.

PREPARED BY SAMAR.I.SHOUMAN Page 21


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2012-2- BT3 Information Technology


1. Local Area Network (LAN) Device Usage
a. Switch:

 Use Case: When you need to connect multiple devices within a network
to allow them to communicate efficiently by directing data only to the
device it is intended for. It operates at the Data Link layer (Layer 2) of the
OSI model.

b. Hub:

 Use Case: When you need a simple device to connect multiple Ethernet
devices in a network, primarily used in small networks where traffic is
light and there is no need for data filtering or intelligence. It operates at
the Physical layer (Layer 1) of the OSI model.

c. Bridge:

 Use Case: When you need to connect and filter traffic between two
network segments, helping to reduce traffic on a LAN by dividing it into
segments and reducing collisions. It operates at the Data Link layer
(Layer 2) of the OSI model.

d. Router:

 Use Case: When you need to connect multiple networks together and
route traffic between them. It determines the best path for data to travel
from source to destination across networks. It operates at the Network
layer (Layer 3) of the OSI model.

PREPARED BY SAMAR.I.SHOUMAN Page 22


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

2. Subnet Mask Calculation


a. Class B Network 160.125.0.0 for 2000 Subnets:

 Subnet Mask: To accommodate 2000 subnets, you need enough bits to


cover 2000 subnets. 211=20482^{11} = 2048211=2048 is the smallest
power of 2 greater than 2000, so you need 11 bits for subnetting. Class B
has a default subnet mask of 255.255.0.0 (16 bits for network). Adding 11
bits for subnets gives you 16+11=2716 + 11 = 2716+11=27 bits for the
network and subnet combined, leaving 32−27=532 - 27 = 532−27=5 bits
for hosts.
 Calculated Subnet Mask: 255.255.255.224

b. Class C Network 200.168.4.0 for Subnets Each with 80 Machines:

 Subnet Mask: To accommodate 80 machines, you need at least


27=1282^{7} = 12827=128 addresses (since 2 bits are reserved for
network and broadcast addresses). Therefore, you need 7 bits for hosts.
Class C has a default subnet mask of 255.255.255.0 (24 bits for network).
Subtracting 7 bits for hosts leaves 32−7=2532 - 7 = 2532−7=25 bits for
the network and subnet combined.
 Calculated Subnet Mask: 255.255.255.128

3. Difference Between LAN and WAN


 LAN (Local Area Network):
o Scope: Covers a small geographical area such as a single building or
a campus.
o Speed: Typically offers higher data transfer rates.
o Ownership: Usually owned, managed, and maintained by a single
organization.
 WAN (Wide Area Network):
o Scope: Covers a large geographical area, often spanning cities,
countries, or continents.
o Speed: Typically offers lower data transfer rates compared to LANs
due to the longer distances and more complex infrastructure.
o Ownership: Usually consists of multiple LANs connected by
external service providers, and often involves leased
telecommunication lines.

PREPARED BY SAMAR.I.SHOUMAN Page 23


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

4. Types of Cable Used in a Network


 Twisted Pair Cable (e.g., Cat5e, Cat6)
 Coaxial Cable
 Fiber Optic Cable

5. IP Address Analysis
a. Class:

 Answer: Class B (since 172.15.0.1 falls within the range 128.0.0.0 to


191.255.255.255)

b. Default Subnet Mask:

 Answer: 255.255.0.0

c. Network Address:

 Answer: 172.15.0.0

d. Broadcast Address:

 Answer: 172.15.255.255

e. Maximum Number of Valid Users:

 Answer: 216−2=655342^{16} - 2 = 65534216−2=65534 (since Class B


has 16 bits for hosts)

f. Usable Addresses:

 Answer: 172.15.0.1 to 172.15.255.254

g. Private or Public Address:

 Answer: Public (since 172.15.0.1 is not within the private IP range


172.16.0.0 to 172.31.255.255)

h. Binary Representation:

 Answer: 10101100.00001111.00000000.00000001

PREPARED BY SAMAR.I.SHOUMAN Page 24


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

6. MAC Address Information


a. Number of Bits:

 Answer: 48 bits

b. Uniqueness:

 Answer: Unique in a local network, designed to be globally unique.

c. Modifiability:

 Answer: Yes, it can be modified through software, although it is assigned


by the manufacturer.

7. Differences Between Modems and Browser History


a. ADSL vs. HDSL Modem:

 ADSL (Asymmetric Digital Subscriber Line):


o Different upload and download speeds (download typically faster).
o Suitable for residential and small business users.
 HDSL (High bit-rate Digital Subscriber Line):
o Equal upload and download speeds.
o Suitable for businesses needing consistent and high-speed data
transfer in both directions.

b. Clearing Browser History:

 Reason for Protection:


o Removing stored data such as cookies, cached files, and browsing
history helps protect privacy and sensitive information from being
accessed by unauthorized users.
o Prevents tracking by websites and third-party advertisers, thereby
reducing targeted ads and potential data breaches.

PREPARED BY SAMAR.I.SHOUMAN Page 25


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2013-1- BT3 Information Technology

Question 1
a. What is the length in bytes of an IP address?
 IPv4: An IPv4 address is 4 bytes long (32 bits).
 IPv6: An IPv6 address is 16 bytes long (128 bits).

b. What is the difference between an IP address and a MAC address?


 IP Address: A logical address assigned to a device on a network for
identification and location addressing. It can be IPv4 or IPv6.
 MAC Address: A physical address assigned to the network interface card
(NIC) of a device. It is unique to each hardware device and is 6 bytes (48
bits) long.

c. Enumerate the topologies used in local networks.


1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology

d. What are the layers of the OSI model?


1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer

PREPARED BY SAMAR.I.SHOUMAN Page 26


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

7. Application Layer

e. Explain the operation of "peer to peer" networks.


 In a peer-to-peer (P2P) network, each device (peer) can act as both a
client and a server. Peers share resources directly with each other
without a centralized server. This type of network is often used for file
sharing and decentralized communications.

f. Define the term "bandwidth".


 Bandwidth: The maximum rate of data transfer across a given path. It is
typically measured in bits per second (bps) and represents the capacity of
a network to transfer data.

Question 2
The access to Internet is accomplished through modems of different
types. Enumerate these modems and describe one of them.
1. Dial-up Modems
2. DSL Modems
3. Cable Modems
4. Fiber Optic Modems
5. Satellite Modems

Description of DSL Modem:

 A DSL (Digital Subscriber Line) modem uses existing telephone lines to


provide high-speed internet access. It separates the internet and voice
signals, allowing both services to be used simultaneously. DSL modems
can offer speeds ranging from hundreds of Kbps to several Mbps.

Question 3
a. Given the class B network 172.16.0.0, we need 200 subnets, what is the
subnet mask to be used? Justify your answer.
 Class B default subnet mask: 255.255.0.0
 Required subnets: 200
 To find the required subnet mask, calculate the number of bits needed for
subnetting: 2n≥2002^n \geq 2002n≥200.
 n=8n = 8n=8 (since 28=2562^8 = 25628=256 is the smallest power of 2
greater than 200).

PREPARED BY SAMAR.I.SHOUMAN Page 27


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 Therefore, 8 bits are needed for subnetting.


 New subnet mask: 255.255.255.0255.255.255.0255.255.255.0

b. Given the class C network 192.168.1.0, we want three subnets each


containing 80 machines. Is this achievable in this network? Justify your
answer.
 Class C default subnet mask: 255.255.255.0
 Number of subnets required: 3
 Number of hosts per subnet required: 80
 The nearest power of 2 greater than 80 is 128 (27=1282^7 =
12827=128). Hence, 7 bits are needed for hosts.
 This leaves 8−7=18 - 7 = 18−7=1 bit for subnetting, which provides
21=22^1 = 221=2 subnets.
 Since only 2 subnets can be created, it is not possible to create 3 subnets
each with 80 hosts in a Class C network using default subnetting.

Question 4
A machine has an IP address IP 172.32.33.34 and S/M 255.255.0.0
a. Is it a private or public address?
 Public address

b. What is the purpose of this address?


 The purpose of a public IP address is to identify a device on the wider
internet, making it accessible from outside its local network.

c. What is its class?


 Class B

d. What is the maximum number of valid users in this network?


 Subnet mask: 255.255.0.0
 Number of host bits: 16
 Maximum number of hosts: 216−2=655342^{16} - 2 =
65534216−2=65534

e. What is its network address?


 Network address: 172.32.0.0

PREPARED BY SAMAR.I.SHOUMAN Page 28


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

f. What is its broadcast address?


 Broadcast address: 172.32.255.255

g. What are the usable addresses?


 Usable addresses: 172.32.0.1 to 172.32.255.254

h. Can we use, for the purpose of subnetting, the following S/M: (Justify
your answer)
i. 255.255.0.0
 Yes: This is the default subnet mask for a Class B address and allows
subnetting.

ii. 255.255.64.0
 Yes: This subnet mask allows for larger subnets within the Class B
address space by borrowing 2 bits for subnetting (providing 4 subnets).

iii. 255.255.255.0
 Yes: This subnet mask allows for more subnets within the Class B address
space by borrowing 8 bits for subnetting (providing 256 subnets).

Question 5
Explain the security techniques used in wireless networks.
1. WEP (Wired Equivalent Privacy)
2. WPA/WPA2 (Wi-Fi Protected Access)
3. WPA3
4. MAC Address Filtering
5. SSID Hiding
6. Network Encryption (e.g., AES)
7. Firewalls
8. Intrusion Detection Systems (IDS)

Question 6
Talk about dynamic security protection in Internet networks.
 Dynamic security protection: Refers to adaptive and real-time
measures taken to protect networks from evolving threats. It includes
technologies like Intrusion Detection and Prevention Systems (IDPS),
firewalls, anti-malware software, Security Information and Event
Management (SIEM), and advanced threat protection (ATP). These
PREPARED BY SAMAR.I.SHOUMAN Page 29
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

systems continuously monitor network traffic, detect anomalies, and


respond to threats dynamically to ensure robust security.

Solution – Session 2013-2- BT3 Information Technology


1.

a. Define the term “attack” in a network.

An "attack" in a network refers to any attempt to disrupt, disable, destroy, or


gain unauthorized access to or make unauthorized use of a network and its
resources. This can include activities like hacking, malware deployment,
denial-of-service (DoS) attacks, and data breaches.

b. Define the term "security mechanism."

A "security mechanism" refers to methods or tools designed to prevent, detect,


and respond to security threats. These mechanisms include firewalls,
encryption, authentication protocols, intrusion detection systems, and security
policies aimed at protecting information and resources.

c. What is the purpose of the DTE/DCE junction?

The DTE (Data Terminal Equipment) and DCE (Data Circuit-terminating


Equipment) junction is used to establish communication between a terminal
and a network. DTE typically represents end devices like computers, while DCE
includes devices like modems and routers that connect to the network. The
junction ensures proper signal conversion and synchronization for data
transmission.

PREPARED BY SAMAR.I.SHOUMAN Page 30


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

d. What is the difference between FTP and TFTP?

FTP (File Transfer Protocol) is a standard network protocol used to transfer


files between a client and server on a network. It provides functions like
authentication, directory operations, and data transfer modes. TFTP (Trivial
File Transfer Protocol) is a simplified version of FTP that uses UDP instead of
TCP and lacks authentication and directory functionality, making it faster but
less secure.

e. What are the uses of protocols POP3 and IMAP4 and how do they
differ?

POP3 (Post Office Protocol version 3) and IMAP4 (Internet Message Access
Protocol version 4) are protocols used by email clients to retrieve messages
from a mail server.

 POP3: Downloads emails from the server to the client and typically
deletes them from the server. It is suitable for users who want to store
their emails locally and access them from a single device.
 IMAP4: Allows multiple devices to access the same email account by
synchronizing the email content across devices. Emails are stored on the
server, allowing users to manage their emails from various devices.

f. Define the field of use of the patch panel.

A patch panel is a hardware device that provides a centralized location for


connecting and managing network cables. It is used in data centers and
telecommunication closets to organize and route Ethernet cables, making it
easier to manage connections, troubleshoot issues, and maintain the network
infrastructure.

PREPARED BY SAMAR.I.SHOUMAN Page 31


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

2.

Two computers are connected to the same central unit by an Ethernet


interface. Describe in detail the process used by this unit in order to
determine where to send the message if the central unit is a:

a. Switch:

A switch operates at the data link layer (Layer 2) of the OSI model. When a
switch receives a data packet, it examines the packet's destination MAC
address and compares it to the MAC address table it maintains. If the
destination MAC address is found in the table, the switch forwards the packet
only to the port associated with that MAC address. If the address is not found,
the switch broadcasts the packet to all ports except the one it was received on,
and then it waits for a reply to learn the address and update its table.

b. Router:

A router operates at the network layer (Layer 3) of the OSI model. When a
router receives a packet, it examines the packet's destination IP address and
consults its routing table to determine the best path for forwarding the packet.
The router uses the IP address to determine which interface to send the packet
out on, based on the network address and subnet mask. If the destination
network is directly connected, the router forwards the packet to the
appropriate interface; otherwise, it sends the packet to the next hop router.

3.
Comparative table between OSI and TCP/IP data models:
Layer OSI Model TCP/IP Model

Application Application, Presentation, Session Application

Transport Transport Transport

Network Network Internet

Data Link Data Link, Physical Network Interface (Link)

PREPARED BY SAMAR.I.SHOUMAN Page 32


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

4. A machine has an IP address 10.32.33.34 and S/M 255.255.0.0:

a. Is it a private or public address? Justify your answer.

It is a private address. The IP address 10.32.33.34 falls within the private IP


address range defined by RFC 1918 for the 10.0.0.0 to 10.255.255.255
network.

b. What is the purpose of this address?

The purpose of this address is for use within a private network. It is not
routable on the public internet and is used for internal communication within
an organization.

c. What is its class?

The IP address 10.32.33.34 belongs to Class A, which includes addresses from


10.0.0.0 to 10.255.255.255.

d. What is the maximum number of valid users in this sub network?

With a subnet mask of 255.255.0.0, there are 16 bits available for host
addresses. The maximum number of valid users (hosts) in this subnet is
216−2=655342^{16} - 2 = 65534216−2=65534 (subtracting 2 for the network
and broadcast addresses).

e. What is its sub network address?

The subnet address is 10.32.0.0. This is obtained by performing a bitwise AND


operation between the IP address and the subnet mask.

f. What is its broadcast address?

The broadcast address is 10.32.255.255. This is obtained by setting all the host
bits to 1 in the subnet.

g. What are its usable addresses?

The usable addresses range from 10.32.0.1 to 10.32.255.254. These addresses


can be assigned to devices in the subnet.
PREPARED BY SAMAR.I.SHOUMAN Page 33
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

h. Can we assign the IP 10.0.255.255 to a host in the sub network


mentioned above? Justify your answer.

No, we cannot assign the IP 10.0.255.255 to a host in the subnet 10.32.0.0/16.


The IP 10.0.255.255 belongs to a different subnet (10.0.0.0/16).

i. Can we assign the IP 10.255.0.0 to a host in the sub network mentioned


above? Justify your answer.

No, we cannot assign the IP 10.255.0.0 to a host in the subnet 10.32.0.0/16.


The IP 10.255.0.0 belongs to a different subnet (10.255.0.0/16).

5. For a MAC address, answer the following questions:

a. How many bits does it consist of?

A MAC address consists of 48 bits.

b. With what form is it usually represented by? (base and separation)

A MAC address is usually represented in hexadecimal format, separated by


colons or hyphens. Example: 00:1A:2B:3C:4D:5E or 00-1A-2B-3C-4D-5E.

c. What is its structure?

The structure of a MAC address includes two parts: the Organizationally


Unique Identifier (OUI), which is the first 24 bits, and the Network Interface
Controller (NIC) specific portion, which is the last 24 bits.

d. Give an example of a MAC address.

Example of a MAC address: 00:1A:2B:3C:4D:5E

e. How many distinct addresses are there?

There are 2482^{48}248 distinct MAC addresses, which equals


281,474,976,710,656 possible addresses.

PREPARED BY SAMAR.I.SHOUMAN Page 34


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

f. How is a broadcast address represented?

A MAC broadcast address is represented as FF:FF:FF:FF:FF

Solution – Session 2014-1- BT3 Information Technology


1. Address Information
For the given IP addresses:

1. 145.245.45.225
o Class: B
o Default Subnet Mask: 255.255.0.0
o Network Address: 145.245.0.0
o Modified Mask for 60 Subnets:
 26=642^6 = 6426=64 (sufficient for 60 subnets)
 New Subnet Mask: 255.255.252.0 (3 bits for subnetting, 6 bits
for hosts)
 Network Address of this Subnet: 145.245.44.0
2. 202.2.48.149
o Class: C
o Default Subnet Mask: 255.255.255.0
o Network Address: 202.2.48.0
o Modified Mask for 15 Subnets:
 24=162^4 = 1624=16 (sufficient for 15 subnets)
 New Subnet Mask: 255.255.255.240 (4 bits for subnetting)
 Network Portion in Binary:
11001010.00000010.00110000.1001****
3. 97.124.36.142

PREPARED BY SAMAR.I.SHOUMAN Page 35


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

o Class: A
o Default Subnet Mask: 255.0.0.0
o Network Address: 97.0.0.0
o Modified Mask for 200 Subnets:
 28=2562^8 = 25628=256 (sufficient for 200 subnets)
 New Subnet Mask: 255.255.255.0 (8 bits for subnetting)
 Machine Portion in Binary:
10001001.01111110.00100100.****

2. Difference between LAN and WAN


Local Area Network (LAN):

 Limited to a small geographic area like a single building or campus.


 Higher data transfer rates.
 Lower latency.
 Owned and managed by a single organization.

Wide Area Network (WAN):

 Covers a large geographic area, often a country or continent.


 Lower data transfer rates compared to LAN.
 Higher latency.
 Often involves leased telecommunication lines and managed by multiple
organizations.

3. Binary and Byte Conversion


1. Binary to Decimal:
o 101011 in binary is 43 in decimal.
2. Kilobyte to Bytes:
o 1 kilobyte = 1024 bytes.

4. Network Packet Transmission


Given the network diagram:

1. Broadcast Packet from Machine A:


o Machines in the same subnet will receive it.
2. Packet from Machine A to Machine C:
o Only Machine C will receive it (assuming a switch or router directs
the traffic correctly).
PREPARED BY SAMAR.I.SHOUMAN Page 36
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

3. Packet from Machine A to Machine E:


o Only Machine E will receive it (assuming correct routing).

5. Network Design
For the given network:

 Rectangles A, B, C, D, E, F, and G:
o A, D, F, G: Switches (for local network traffic).
o C, E: Routers (for interconnecting subnets and providing Internet
access).
6. Best Solution for Required Wiring

a. Network Connectivity Between Three Buildings on a Single Campus

 Solution: Fiber Optic Cable


 Justification:
o Resilience to Environmental Conditions: Fiber optic cables are
highly resistant to electromagnetic interference, which is crucial in
regions with frequent storms. They are not affected by lightning or
other electrical disturbances that could disrupt network
connectivity.
o High Bandwidth and Long-Distance Capability: Fiber optic cables
support high data transfer rates and can cover long distances
without significant signal degradation. This makes them ideal for
connecting multiple buildings on a campus.

b. Connectivity Between Two Buildings 1 Km Apart

 Solution: Fiber Optic Cable


 Justification:
o Long-Distance Communication: Fiber optic cables can efficiently
transmit data over long distances, such as 1 km, without significant
loss of signal quality.
o High Data Transfer Rates: They support higher bandwidth
compared to copper cables, ensuring robust connectivity and future-
proofing the network for higher data demands.
PREPARED BY SAMAR.I.SHOUMAN Page 37
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

o Durability and Reliability: Fiber optics are less prone to damage


from environmental factors and electrical interference, providing a
stable connection between the buildings.

c. 100 Mbps Connectivity in Office with 60m Maximum Distance

 Solution: Category 5e (Cat 5e) or Category 6 (Cat 6) Ethernet Cable


 Justification:
o Sufficient Bandwidth: Both Cat 5e and Cat 6 cables support 100
Mbps speeds. Cat 6 cables offer additional headroom for future
upgrades to higher speeds (up to 1 Gbps).
o Cost-Effective: These Ethernet cables are cost-effective for short-
distance runs within an office environment.
o Ease of Installation: Ethernet cables are easy to install and
terminate, making them ideal for office setups.

Solution – Session 2015-1- BT3 Information Technology


1. For the Internet connections:

a. Name 4 different modes of connections.


1. Dial-up
2. DSL (Digital Subscriber Line)
3. Cable Internet
4. Fiber Optic Internet

b. What are the necessary materials for each type of connection?

1. Dial-up:
o Phone line

o Modem
o Computer with dial-up software
PREPARED BY SAMAR.I.SHOUMAN Page 38
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

2. DSL (Digital Subscriber Line):

o DSL modem
o Phone line
o DSL filters (splitters)
o Ethernet cable
3. Cable Internet:

o Cable modem
o Coaxial cable
o Ethernet cable
o Router (optional)
4. Fiber Optic Internet:

o Fiber optic modem (ONT - Optical Network Terminal)


o Fiber optic cables
o Ethernet cable
o Router (optional)

2. Determine in the following cases the best solution for the cabling
requirements, and justify your answer:

a. A company must provide network connectivity between three


buildings of one campus. The cables must be installed outside and
thunderstorms are frequent in the region.

Solution: Fiber optic cables. Justification: Fiber optic cables are immune to
electromagnetic interference, which is crucial in regions with frequent
thunderstorms. They also offer high-speed and long-distance connectivity.

PREPARED BY SAMAR.I.SHOUMAN Page 39


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

b. A company must provide network connectivity between two buildings


situated at 1 km of each other.

Solution: Fiber optic cables. Justification: Fiber optic cables can cover long
distances without significant signal loss and provide high bandwidth, making
them ideal for a 1 km span.

c. A company must provide a connectivity of 100Mb/s to the office of the


users by installing cables from the central switch to each office
individually. The maximum distance from the switch to a working station
is 60m.

Solution: Cat 5e or Cat 6 Ethernet cables. Justification: Both Cat 5e and Cat 6
Ethernet cables can support 100Mb/s speeds over distances up to 100 meters,
which is sufficient for the 60m maximum distance requirement.

3. An enterprise is assigning to you the IP address 204.120.15.0. You


must create 10 distinct sub-networks for the 10 departments of the
enterprise, from this IP address.

a. What is the network class?

Answer: Class C.

b. Which subnet-mask you must use?

Answer: 255.255.255.240 (/28).

c. How many IP addresses can each sub-network receive?

Answer: 16 IP addresses (14 usable IP addresses, excluding network and


broadcast addresses).

d. What is the network and broadcasting address of the 6th usable sub-
network?

Answer:

 6th Sub-network: 204.120.15.80/28


PREPARED BY SAMAR.I.SHOUMAN Page 40
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 Network Address: 204.120.15.80


 Broadcast Address: 204.120.15.95

4. Why do we use a TCP/IP network with dynamic address? Which


protocol offers this type of configuration and how does it work?

Answer:
 Reason: Using a dynamic IP address simplifies network management,
conserves IP addresses, and makes it easier to allocate addresses to
devices that join and leave the network frequently.
 Protocol: DHCP (Dynamic Host Configuration Protocol).
 Working: DHCP assigns IP addresses dynamically from a pool of
available addresses. When a device connects to the network, it sends a
DHCP discover message. A DHCP server responds with an offer, and upon
acceptance, assigns an IP address to the device for a specified lease time.

5. A computer is not able to connect to the network. Name the different


possible reasons and your approach to repair it.

Possible Reasons:
1. Faulty or disconnected cables
2. Incorrect IP configuration
3. Network adapter issues
4. Router or switch problems
5. Firewall settings
6. Driver issues
7. Hardware failure

Approach to Repair:
1. Check physical connections and cables.
2. Verify IP configuration settings.
3. Restart the network adapter.
4. Restart the router/switch.
PREPARED BY SAMAR.I.SHOUMAN Page 41
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

5. Check firewall settings and disable temporarily if needed.


6. Update or reinstall network drivers.
7. Test the hardware with another device to ensure it is not a hardware
issue.

6. Name the OSI model Layers and specify in which layer works each of
the following equipment and protocols: switch, hub, router, TCP, ARP,
UDP, IP, bridge.

OSI Model Layers:


1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

Equipment and Protocols:


 Switch: Data Link Layer
 Hub: Physical Layer
 Router: Network Layer
 TCP: Transport Layer
 ARP: Data Link Layer
 UDP: Transport Layer
 IP: Network Layer
 Bridge: Data Link Layer

PREPARED BY SAMAR.I.SHOUMAN Page 42


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

7. Taking into account the private and public addresses, give the number
of the available networks on the internet in class A, as well as the number
of maximal hosts in each network.

Answer:
 Class A Networks: 128 available networks (1.0.0.0 to 126.0.0.0, 127.0.0.0
is reserved).
 Maximal Hosts in Each Network: 16,777,214 hosts (2^24 - 2).

8. What is the TCP/IP attack principle? Name 3 types. How to prevent this
type of attack on a data network?

TCP/IP Attack Principle:

TCP/IP attacks exploit vulnerabilities in the TCP/IP protocol suite to disrupt or


intercept network communications.

Types of Attacks:
1. Denial of Service (DoS)
2. Man-in-the-Middle (MitM)
3. IP Spoofing

Prevention:
1. Use firewalls and intrusion detection systems.
2. Implement encryption (e.g., TLS) for data transmission.
3. Employ anti-spoofing measures and IP address verification.
4. Regularly update and patch systems.
5. Use secure authentication methods.

9. Given the below schema:

a. Propose the necessary network interconnection materials (material_1,


material_2, and material_3) and briefly justify your choice.
 Material_1: Router (to manage and route traffic between different
networks).
PREPARED BY SAMAR.I.SHOUMAN Page 43
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 Material_2: Switch (to connect multiple devices within the same network
and manage internal traffic).
 Material_3: Firewall (to protect the network from external threats and
control incoming/outgoing traffic).

b. Propose a possible IP addressing for the material_3.

Answer:

 IP Address: 192.168.1.1 (assuming a private network 192.168.1.0/24)


 Subnet Mask: 255.255.255.0

PREPARED BY SAMAR.I.SHOUMAN Page 44


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2015-2- BT3 Information Technology


1. How to secure a WLAN? (2 pts)
To secure a WLAN (Wireless Local Area Network):

 Use WPA3 Encryption: Ensure your network uses WPA3 encryption,


which is more secure than WPA2.
 Change Default Passwords: Change default router passwords to strong,
unique passwords.
 Disable SSID Broadcasting: Make your network harder to find by
disabling SSID broadcasting.
 Enable MAC Address Filtering: Allow only specific devices to connect to
the network by enabling MAC address filtering.
 Keep Firmware Updated: Regularly update the router’s firmware to
protect against vulnerabilities.

2. DHCP Protocol: (2 pts)


a. Its role: DHCP (Dynamic Host Configuration Protocol) automatically assigns
IP addresses and other network configuration parameters to devices on a
network, allowing them to communicate effectively. b. One advantage and
one disadvantage:

 Advantage: Simplifies network management by automatically assigning


IP addresses.
 Disadvantage: If the DHCP server fails, devices may not receive IP
addresses, causing network connectivity issues.
3. Fill the table below: (3 pts)
IP Address MAC Address
Physical or logical address? Logical Physical
Name of OSI layer? Network (3) Data Link (2)
Number of bits? 32 48
4. Comparison between LAN and WAN: (2 pts)
LAN WAN
Short (within a building or Long (across cities or
Distance
campus) countries)
PREPARED BY SAMAR.I.SHOUMAN Page 45
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

LAN WAN
Flow rate or speed High Lower compared to LAN
Number of
Limited Can be very large
computers
Security Easier to secure Harder to secure
5. Enumerate some of the TCP/IP attacks. (2 pts)
 Denial of Service (DoS)
 Man-in-the-Middle (MITM)
 IP Spoofing
 Packet Sniffing
 SYN Flood

6. Internet (answer briefly): (3 pts)


a. Three examples of Internet browsers:

 Google Chrome
 Mozilla Firefox
 Microsoft Edge

b. Role of Parental Control: Parental control tools help monitor and restrict
the online activities of children, ensuring they are not exposed to
inappropriate content and limiting their screen time.

c. Difference between ADSL and SDSL:

 ADSL (Asymmetric Digital Subscriber Line): Different upload and


download speeds, typically faster download than upload.
 SDSL (Symmetric Digital Subscriber Line): Same upload and download
speeds.

7. A computer has the IP Address 165.1.15.40 (4 pts)


a. Class: Class B

 Justification: The first octet (165) falls between 128 and 191, which
corresponds to Class B. b. Default subnet mask: 255.255.0.0 c. Network
address: 165.1.0.0 d. Broadcast address: 165.1.255.255

PREPARED BY SAMAR.I.SHOUMAN Page 46


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

8. Given the network diagram. The computers on LAN1 cannot


communicate with the computers on LAN2. Give a solution for this
problem. (2 pts)
To enable communication between LAN1 and LAN2:

 Ensure Proper Routing: Use a router to connect both LANs, ensuring


that the router has the correct routing information to forward packets
between the two networks.
 Configure VLANs: If using switches that support VLANs, ensure that the
VLAN configurations allow traffic between LAN1 and LAN2.
 Check Firewall Rules: Verify that any firewalls between the LANs are
configured to allow traffic to pass between them.

These solutions should help secure a WLAN, understand DHCP, compare LAN
and WAN, identify TCP/IP attacks, and address issues with network
communication.

Solution – Session 2016-1- BT3 Information Technology


I. Choose the right answer(s): (2 pts)

PREPARED BY SAMAR.I.SHOUMAN Page 47


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

1. Among the following commands, which one can be used to display the IP
configuration of the system?
o b) ifconfig
o c) ipconfig
2. Among the following elements, which are the protocols of the transport
layer in the TCP/IP model? (Choose 2 answers.)
o b) UDP
o e) TCP
3. How are data encapsulated when transmitted to lower layers in the OSI
model?
o c) Data, segments, packets, frames, bits
4. Among the following equipment, which one can make a collision domain?
(Choose 2 answers.)
o b) A hub
o e) A repeater
5. What is attenuation?
o c) The degradation of a signal during its passage through a
transmission media.
6. Identify an advantage of using optical fibers in networks.
o c) Insensitive to electromagnetic interference.
7. Which layer does not contain any information about bits, any address or
any data and has only the role to move bits?
o a) Layer 1
8. What checks the command ping 127.0.0.1?
o a) The functioning of TCP/IP protocol, and this address is called the
internal loopback test.
II. The DHCP Protocol: (3 pts)
a. Definition:
 Dynamic Host Configuration Protocol (DHCP) is a network management
protocol used to dynamically assign IP addresses and other network
configuration parameters to devices on a network.
b. Mode of operation:
 DHCP operates based on a client-server model. The DHCP server
maintains a pool of available IP addresses and leases an IP address to a
DHCP client for a specified period. When a device joins the network, it
sends a DHCPDISCOVER message. The DHCP server responds with a

PREPARED BY SAMAR.I.SHOUMAN Page 48


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

DHCPOFFER, and the client replies with a DHCPREQUEST to accept the


offer. The server then sends a DHCPACK to confirm the lease.
c. Advantages:
 Simplifies network management by automating IP address assignment.
 Reduces the risk of IP address conflicts.
 Allows for centralized management of IP configuration.
 Supports mobile devices and devices that frequently join and leave the
network.
III. Connect each layer of the OSI model to its corresponding function: (2 pts)
a. Application - 6. FTP Application b. Presentation - 2. Data Format c. Session -
3. Exchanges Synchronization d. Transport - 7. TCP or UDP e. Network - 1.
Packet routing f. Link - 5. Physical address (MAC) g. Physical - 4. Binary
transmission (cables and connectors)
IV. Given the following IP address, coded over 32 bits, where bits are grouped
in bytes for easier reading: (3 pts) 10010011 11011000 01100111 10111110
a. Write the IP address in dotted decimal notation.
 147.216.103.190
b. Determine its class from the binary representation.
 Class B (since the first two bits are 10).
c. Write the network address in dotted decimal notation.
 147.216.0.0
d. What is the default subnet mask?
 255.255.0.0
e. What is the broadcast address of this network?
 147.216.255.255
f. Is it a private or public address? Justify your answer.
 Public address (It does not fall within the private IP ranges defined by
RFC 1918).
V. Given the following schema: (2½ pts)
Computer IP Address PC1 192.168.10.6 PC2 192.168.10.7 PC3 192.168.10.8
PC4 192.168.10.9 Server1 192.168.10.100 Server2 192.168.10.200
a. What is the network architecture?
 A class C network architecture.
b. Indicate the IP address of the network.
 192.168.10.0
c. Determine the number of machines that can connect to this network.

PREPARED BY SAMAR.I.SHOUMAN Page 49


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 254 (Class C network with a default subnet mask of 255.255.255.0,


allowing for 256 addresses minus 2 for the network and broadcast
addresses).
d. What are the different subnets obtained if the 4th byte of the new mask is
11000000?
 The new subnet mask is 255.255.255.192 (CIDR /26), creating 4 subnets:
o 192.168.10.0/26 (usable IP range: 192.168.10.1 - 192.168.10.62)
o 192.168.10.64/26 (usable IP range: 192.168.10.65 -
192.168.10.126)
o 192.168.10.128/26 (usable IP range: 192.168.10.129 -
192.168.10.190)
o 192.168.10.192/26 (usable IP range: 192.168.10.193 -
192.168.10.254)
VI. Compare the following transmission media according to: (1½ pts)
Transmission Media Cost Data Rate Installation
Twisted pair Low Medium Easy
Coaxial cable Medium Medium Moderate
Optical fiber High High Difficult
VII. Hacking and attacks: (4 pts)
a. Mention 3 types of computer threats (attacks).
 Phishing
 Malware (viruses, worms, ransomware)
 Denial of Service (DoS) attacks
b. Defining a TCP/IP attack.
 A TCP/IP attack exploits vulnerabilities in the TCP/IP protocol suite to
disrupt, intercept, or manipulate network communications.
c. Enumerate some types of TCP/IP attacks.
 IP Spoofing
 TCP SYN Flood
 Man-in-the-Middle (MitM)
 Session Hijacking
d. Describe the wireless security techniques.
 Using encryption protocols like WPA3, WPA2
 Implementing strong passwords and SSID hiding
 Enabling MAC address filtering
 Regularly updating firmware and software
 Using firewalls and VPNs to secure communications

PREPARED BY SAMAR.I.SHOUMAN Page 50


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

VIII. How can we distinguish ADSL from HDSL? (2 pts)


 ADSL (Asymmetric Digital Subscriber Line):
o Provides higher download speeds compared to upload speeds.
o Commonly used for residential internet access.
o Operates over standard telephone lines.
 HDSL (High bit-rate Digital Subscriber Line):
o Provides symmetric data rates, meaning equal upload and download
speeds.
o Often used for business applications requiring reliable upload
speeds.
o Requires higher quality copper lines and is typically used for leased
lines or T1/E1 services.

PREPARED BY SAMAR.I.SHOUMAN Page 51


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2016-2- BT3 Information Technology


I. Choose the right answer:
1. If the network administrator gives the same IP address to two different
machines on the network, what happens?
o b- The first machine that obtains the IP address works but not
the second.
2. The IP address 180.30.17.20 is an address of class:
o c- C
3. A network has an address 180.35.128.0 and a subnet mask
255.255.240.0. What is the broadcast address?
o c- 180.35.159.255
4. What type of Jack is used in a standard way for the network outlet?
o b- RJ45
5. Which statement describes correctly the repeater?
o d- It enables networks to span for longer distances.
6. What is the decimal representation of the binary number 11010011?
o c- 211
7. What is the binary representation of the decimal number 111?
o b- 01101111
8. Which of the following protocols of the application layer uses UDP
segments? (Choose 2)
o a- DNS
o d- TFTP
II. At Which layer of the OSI model works:
 a- A Hub? Layer 1 (Physical Layer)
 b- An Ethernet switch? Layer 2 (Data Link Layer)
 c- An IP router? Layer 3 (Network Layer)
III. What is the essential difference between the UDP and the TCP protocol?
 UDP is connectionless and does not guarantee delivery, while TCP is
connection-oriented, ensuring reliable data delivery through
acknowledgment, sequencing, and flow control mechanisms.
IV. Compare the following transmission media in terms of price, bit-rate, and
installation:
 a- Twisted pair: Generally inexpensive, medium bit-rate, easy installation.
 b- Coaxial cable: Moderate price, higher bit-rate than twisted pair,
moderate installation complexity.

PREPARED BY SAMAR.I.SHOUMAN Page 52


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 c- Optical fiber: Expensive, very high bit-rate, complex installation


requiring specialized skills.
V. The network address is 191.191.0.0/26:
 a- To what class does this IP belong? Class B
 b- What is the default subnet mask for this IP? 255.255.0.0
 c- How many bits are needed for the subnet? 6 bits (from /26)
 d- What is the total number of subnets? 64 (2^6)
 e- What is the total number of host addresses? 62 (2^6 - 2, subtracting
network and broadcast addresses)
 f- What is the total number of usable host addresses? 60 (since 2
addresses are reserved for network and broadcast)
 g- What is the total number of host bits? 6 bits
VI. A person is a part of a network having an IP address 199.100.17.0 and a
network mask: 255.255.255.224:
 a- What is the number of possible subnets in this network? 8 (2^3)
 b- What is the network address of each subnet? Subnet addresses
increment by 32 (since 224 in binary is 11100000)
VII. The DHCP protocol:
 a- How can a machine become a DHCP client? By sending a
DHCPDISCOVER message to locate a DHCP server.
 b- What are the minimum parameters that a client receives from DHCP
server? IP address, subnet mask, default gateway, DNS server
 c- How does a DHCP client search for a server? By broadcasting
DHCPDISCOVER messages on the network.
 d- How many frames do a server and client exchange before the
conclusion of a DHCP lease? 4 frames (DISCOVER, OFFER, REQUEST,
ACK)
 e- What is the name of these exchanged frames? DHCP messages
VIII. What are the safety precautions in wireless networks at the access point
level?
 Implementing encryption (like WPA2), disabling SSID broadcast, using
strong passwords, MAC address filtering, and regular firmware updates.
IX. Give the name of each of the following topology:
 a- Bus topology
 b- Star topology
 c- Ring topology

PREPARED BY SAMAR.I.SHOUMAN Page 53


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2017-1- BT3 Information Technology


I- Choose the right answer:
1. c) They operate at the layer 2 and use the MAC addresses to make
decisions.
2. a) Bits.
3. c) Record your browsing habits on the internet.
4. a) Block unauthorized incoming connections.
5. d) Proxy.
6. b) The default gateway address.
7. a) Two fibers are housed in separate envelops.
8. c) Provides maximum connectivity between network systems.
II- a) ICMP (Internet Control Message Protocol) is a network layer protocol
used to send error messages and operational information. b) Examples of
commands using ICMP include Ping and Traceroute.
III- a) The data link layer is divided into:
 LLC (Logical Link Control): Manages communication links.
 MAC (Media Access Control): Handles addressing and channel access
control. b) The destination MAC address of a broadcast frame is
FF:FF:FF:FF:FF:FF.
IV- DHCP (Dynamic Host Configuration Protocol):
 DHCP uses four types of messages: Discover, Offer, Request, and
Acknowledgment.
 It uses UDP (User Datagram Protocol) to send messages.
 Lease refers to the amount of time a DHCP client can use an IP address
before it must be renewed.
V- UDP (User Datagram Protocol) should be used rather than TCP for
applications where speed and efficiency are more important than reliability,
such as streaming media or online gaming.
VI- DSL (Digital Subscriber Line) technology: DSL provides high-speed internet
access over traditional copper telephone lines. Advantages: Faster speeds than
dial-up, always-on connection, and allows simultaneous use of phone and
internet. Characteristics: Distance-sensitive (performance degrades with
distance from the provider), available in different variants like ADSL, VDSL.

PREPARED BY SAMAR.I.SHOUMAN Page 54


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

VII- DMZ (Demilitarized Zone): A DMZ is a network segment that exposes an


organization's external-facing services to an untrusted network, usually the
internet. It adds an additional layer of security by separating internal and
external networks.
VIII- Given the network address 200.35.1.0/24:
a. This network belongs to Class C because its range is 192.0.0.0 to
223.255.255.255.
b. Default subnet mask for /24 is 255.255.255.0.
c. Broadcast address is 200.35.1.255.
d. Binary representation is 11001000.00100011.00000001.00000000.
e. Number of valid host addresses = 2^(32-24) - 2 = 254.
f. It's a public address because it's in the range of public IP addresses.
g. To accommodate at least 20 hosts, 5 bits (2^5 - 2 = 30 hosts) are needed. h.
Maximum number of host addresses per subnet = 2^(32-27) - 2 = 30.
i. Maximum number of subnets = 2^(32-24) = 256.
j. Subnet addresses: 200.35.1.0, 200.35.1.32, 200.35.1.64, ..., 200.35.1.224.
k. Broadcast address of the 2nd subnet = 200.35.1.63.

PREPARED BY SAMAR.I.SHOUMAN Page 55


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2017-2- BT3 Information Technology

I- True or False:

a- False. The TCP/IP model has 4 layers (Application, Transport, Internet,


Link).
b- b- True. Attenuation is the degradation of a signal in a transmission
medium.
c- False. Parity check is an error-checking technique, not encryption.
d- d- False. Optical fiber installation can be complex and requires
specialized skills.
e- e- False. Star topology uses less network media compared to other
topologies.
f- f- False. TCP (Transmission Control Protocol) operates at the transport
layer, not application.
g- g- True. The Ping command is used to test connectivity between two
stations.
h- h- False. ADSL (Asymmetric Digital Subscriber Line) is asymmetric,
meaning different upload and download speeds.
i- i- False. UDP (User Datagram Protocol) does not provide secure packet
delivery.

II- Advantages of switches over hubs:

1. Efficiency: Switches reduce collisions and provide dedicated bandwidth to


each connected device.
2. Security: Switches isolate traffic between devices, enhancing network
security.

PREPARED BY SAMAR.I.SHOUMAN Page 56


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

III- Physical topologies of computer networks:

1. Bus Topology: Devices are connected in a linear fashion along a single


backbone cable.
o

2. Star Topology: All devices are connected to a central hub or switch.

3. Ring Topology: Devices are connected in a circular manner, forming a


closed-loop.

IV- DHCP advantages and operation:

 Advantages: Simplifies IP address management, reduces configuration errors,


supports dynamic IP allocation.
 Operation: DHCP servers dynamically assign IP addresses and other network
configuration parameters to devices on a network, automating the process.

V- Modem and its role:

 Meaning: Modem stands for Modulator-Demodulator.


 Role: Converts digital signals from a computer into analog signals suitable for
transmission over telephone lines (for dial-up) or digital signals for
broadband.

VI- OSI model layers:

 Switch: Layer 2 (Data Link Layer)


 HTTP: Layer 7 (Application Layer)
 UDP: Layer 4 (Transport Layer)
 Router: Layer 3 (Network Layer)
 FTP: Layer 7 (Application Layer)
 Hub: Layer 1 (Physical Layer)

PREPARED BY SAMAR.I.SHOUMAN Page 57


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 MAC address: Layer 2 (Data Link Layer)


 IP: Layer 3 (Network Layer)
 SMTP: Layer 7 (Application Layer)
 Modem: Not strictly OSI, but generally considered to operate at the Physical
Layer.

VII- Private IPv4 addresses in Class C:

 Private addresses in Class C are in the range 192.168.0.0 to 192.168.255.255.

VIII- TCP/IP attacks and prevention:

 Types: Examples include Denial of Service (DoS), Man-in-the-Middle


(MitM), and TCP SYN Flood.
 Prevention: Use firewalls, intrusion detection/prevention systems (IDS/IPS),
secure configurations, and regular security audits.

IX- Interface configuration for host with address 172.16.19.40/21:

1. Subnet Mask: /21 corresponds to subnet mask 255.255.248.0.


2. Hosts per subnet: Each /21 subnet can contain 2^(32-21) - 2 = 2046 usable
hosts.

X- IP network 192.52.0.0 with 4 borrowed subnet bits:

1. Class of IP address: Class B.


2. Total number of subnets: 2^4 = 16 subnets.
3. Hosts per subnet: 2^(32-16) - 2 = 65,534 hosts per subnet.
4. Subnet mask: /16 subnet mask is 255.255.0.0.
5. Range of available host addresses on the second usable subnet: For the
second subnet:
o Subnet address: 192.52.16.0
o Usable host range: 192.52.16.1 to 192.52.31.254.

PREPARED BY SAMAR.I.SHOUMAN Page 58


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2018-1- BT3 Information Technology


I. Choose the right answer:
1. d) Regions A and B.
o Private addresses (like those in the ranges 192.168.x.x, 172.16-
31.x.x, and 10.x.x.x) are suitable for internal use, so regions A
(192.168.x.x) and B (172.16-31.x.x) are appropriate.
2. c) SMTP.
o SMTP (Simple Mail Transfer Protocol) is used by most email
programs for sending emails.
3. d) ARP.
o ARP (Address Resolution Protocol) converts IP addresses to MAC
addresses (which are layer 2 addresses).
4. c) DNS.
o DNS (Domain Name System) is used for host name resolution.
5. c) 00:B0:D0:5A:E1

PREPARED BY SAMAR.I.SHOUMAN Page 59


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

.
o This is a valid MAC address format.
6. a) The transmission capacity of a communication channels.
o Bandwidth in networking refers to the transmission capacity of a
communication channel.
7. a) To test the connectivity to a device on the network.
o The Ping command is used to test connectivity between devices on a
network.
8. b) Windows Defender.
o Windows Defender helps protect computers from various threats,
including spyware.
II. Associate descriptions with physical topologies:
1. c) A ring topology.
2. b) A bus topology.
3. d) An extended star topology.
4. a) A star topology.
5. e) A mesh topology.
III. DHCP:
a. DHCP stands for Dynamic Host Configuration Protocol, which automates the
assignment of IP addresses and other network configuration parameters to
devices on a network.
b. DHCP operates in a client-server model where a DHCP server dynamically
assigns IP addresses from a predefined range to DHCP clients. Clients request
IP addresses and other configuration settings, and the server responds with
the appropriate information.
c. Advantages of DHCP include:
 Simplifies IP address management.
 Reduces configuration errors.
 Supports mobility (devices can easily move between networks without
manual reconfiguration).
 Centralized network management.
IV. Modem:
a. A modem (Modulator-Demodulator) is a device that modulates digital data
into analog signals for transmission over analog communication links, and
demodulates analog signals back into digital data.
b. ADSL (Asymmetric Digital Subscriber Line) operates on existing copper
telephone lines to provide high-speed digital data transmission. It uses

PREPARED BY SAMAR.I.SHOUMAN Page 60


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

different frequencies for upstream and downstream communication, allowing


faster downloads than uploads.
V. Securing a wireless network:
Some techniques for securing a wireless network include:
 Enabling encryption (e.g., WPA2) to protect data transmissions.
 Changing default SSIDs and passwords.
 Disabling SSID broadcasting.
 Using MAC address filtering.
 Implementing firewall rules on wireless access points.
 Regularly updating firmware and security patches.
VI. Complete the table:
 Routers: Layer 3
 Switches: Layer 2
 NIC (Network Interface Card): Layer 1
 Hubs: Layer 1
VII. Differences between coaxial cable and optical fiber:
 Coaxial cable uses electrical signals for transmission, while optical fiber
uses light signals.
 Coaxial cable is less immune to electromagnetic interference compared to
optical fiber.
VIII. Computer network settings:
a. This IP address (200.100.10.60) belongs to Class C.
 Class C addresses have a range of 192.0.0.0 to 223.255.255.255.
b. Default subnet mask for Class C is 255.255.255.0.
c. It's a public address because it doesn't fall within the ranges reserved for
private addresses (192.168.x.x, 172.16-31.x.x, 10.x.x.x).
d. Binary representation: 11001000.01100100.00001010.00111100.
e. Subnetwork address: 200.100.10.32 (first address in the subnet).
f. Broadcast address of this subnet: 200.100.10.63 (last address in the subnet).
g. No, 200.100.10.35 does not belong to this subnet.
IX. Subnet mask for Class B address:
To have up to 1000 computers per subnet in a Class B network, you need a
subnet mask that allows for enough host addresses. The subnet mask that fits
this requirement is 255.255.248.0 (/21 in CIDR notation).

PREPARED BY SAMAR.I.SHOUMAN Page 61


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

Solution – Session 2018-2- BT3 Information Technology


I. Multiple Choice:
1. d) Five
2. c) Packets
3. c) WiMax
4. b) Encryption
5. d) Router
6. d) 100 m
7. b) Amplify and resynchronize network signals.
8. b) 64
II. Advantages and Disadvantages of Optical Fiber Transmission:
Advantages:
 High bandwidth capability

PREPARED BY SAMAR.I.SHOUMAN Page 62


Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

 Immunity to electromagnetic interference


Disadvantages:
 Costly installation and equipment
 Fragility of the fiber strands
III. Layers of the OSI Model and the Transport Layer:
Layers of the OSI Model:
1. Physical
2. Data Link
3. Network
4. Transport (Transport Layer handles end-to-end communication)
IV. Setting up a TCP/IP Network with Dynamic IP Addresses:
Reasons:
 Simplifies network administration
 Efficient utilization of IP addresses
Protocol:
 DHCP (Dynamic Host Configuration Protocol) assigns IP addresses
dynamically to devices on a network.
V. Virus Definition and Spread:
A virus is a malicious software program designed to alter the way a computer
operates, without the user's knowledge or permission.
Spread:
 Viruses typically spread through infected files, email attachments, or
downloads from the internet.
VI. Proxy Server Definition and Role:
A proxy server acts as an intermediary between clients and servers, forwarding
requests and responses.
Role:
 Enhances security by filtering content and blocking malicious websites
 Improves performance by caching frequently accessed web pages
VII. Definitions:
a. Protocol: A set of rules governing communication between devices. b.
Multiplexing: Combining multiple signals into one to share a medium. c. Modem:
Device that modulates digital data to analog signals for transmission over telephone
lines, and demodulates incoming analog signals back to digital data. d. MAC
Address: Unique identifier assigned to network interfaces for communication within
a network. e. ARP (Address Resolution Protocol): Protocol used to map IP
addresses to MAC addresses on a local network.
VIII. Topologies:
PREPARED BY SAMAR.I.SHOUMAN Page 63
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology

a. Bus Topology:
 Advantage: Simple to implement and cost-effective.
 Disadvantage: Single point of failure; performance decreases as more devices
are added.
b. Ring Topology:
 Advantage: Equal access to resources; no collisions.
 Disadvantage: Failure of one device can disrupt the entire network.
IX. IP Address Details (172.16.5.32/24):
1. Subnet Mask: 255.255.255.0
2. Binary: 11111111.11111111.11111111.00000000
3. Class: Class B
4. Network Address: 172.16.5.0
5. Broadcast Address: 172.16.5.255
X. Class B Network (255.255.240.0):
a. Maximum number of computers per subnet: 4094 b. Number of subnets: 16

PREPARED BY SAMAR.I.SHOUMAN Page 64

You might also like