LAN2 Dec 2023
LAN2 Dec 2023
TIME: 3HOURS
DATE OF EXAMINATIONS: December 2023
INSTRUCTIONS
1|Page
SECTIONA
Answer all the questions from this'section
A..network
B. physical
C. transport
D. link
D. 80 bit
A. X: 13.2.80,0/22; Y: 13.2.82.0/23; Z:
13.2.84.0/23
B. X: 13.2.80.0/22:; Y: 13.2.84.0/23;Z: 13.2.86.0/23
|
2 Pag e
C. X: 13.2.84.0/23; Y:
13.2.80.0/23; Z: 13.2.82.0/23
D. X:13.2.88.0/23: Y:
13.2.84.0/22; Z: 13.2.80.0/22
i. Hub
ii. Bridge
ii. Switch
iv. Router
Hub Switch
8. In a telephone
network, which component is responsible for
subscribers to the network and connecting individual
converting their voice signals
into clectrical
transmission? signals for
A. Switch
B. Modem
C. Router
D. Terminal
|
3 Pa ge
10. In a client'server
connection using HTTP over TCP, if
the same TCP multiple objects are sent over
connection, then the connection is
classified as:
A. Stateless
B. Persistant
C. Non-persistant
D. Stable
SECTION B
Answer all the questions
Question one
Front desk,Marketing and one for public use. List each subnet indicating the subnet mask,
number of usable hosts, host ID range and broadcast ID.
Question two
Figure 1 below showsa network set up for Vulcan Fire Services. As the network
administrator for the company,you're required to configure all the network devices.
Hostnanme
Banner
Interface description
Passwords
4|Page
ttcascont isostrse s2
SZ(confl)sesatle secret tid
Host ng me
31{ctafiz-if;vöascrtptios Zst coanecti0a to s2
31(tanfig-kinsj#password
S2(csafiz-iine,elegta
cersele
Passwords
51{Cniiie)*ise vty s 15
31(centiz-line4password telaet
S2(caafiz-lingj #login
lp qddrers,SUbnet
S1(csafig-ifjp adáress ISI.X69.8.17 255.255.253.246
3l(cenfig-ifj *ne sut depeult
S1{canfiz-if) sexit
31(cntisi#banRs this is y S1 suttco
t
S1(cmtigtexit
Figure 1
FO/O
FO/8
FO/15 FO/17
FO/16 FO/18
FO/1 FO/1
FO/2 FO5 FOJ5 FO/2
T92168.1o t9/28 2168.10. TB 28
FO/6 FO/6
FO/3 FO4 FO/3 FOF4
a) Write down the commands necessary to configure the S2 and S3 switches respectively v
using all the paranmeters in S1
b) Verify the MAC address table for each switch by writing down the necessary
commarnds
5|Page
Question Three
examples
of gateways in telephone systems. Provide
Explain the significance and functions
between different networks and
communication
of how gateways are used to enable
of
the role of gateways in facilitating the
integration
technologies. Additionally, describe
Question Four X
Question Five
wireless network?
why IEEE 802.16 has failed to compete with 3/4G
b) Outline any five (5)reasons
technologies in data transmission.
Question Six
protocols:
DNS
i.
DHCP
v
ii.
iii, TCP
iv. Http
V. IP /
vi. Telnet
vii. ARP
viii. SSH
4
6| Page
C
SECTION
section.
Answer any question from
this
Question One
by each.
i. IEEE 802.1Q
ii. IEEE 802.1D
ii. IEEE 802.lx
v. IEEE 802.6
from IEEE 802.16?
b) Discus how IEEE802.11 differs
WPA? Why is that?
better security between WEP and
c) Which protocol offers order and briefly
model in hierarchical
of the OSI reference
d) List down the 7 layers
of each layer.
explain the significance
protocol (IP)address.
an internet
e) A web server has
of an IP address.
Give three characteristics
only to
to send data
that uses the IP address
ii. Identify the network component
i. Telephone
iii. Switch
v. Trunk Line
7|Page
of a trunk line in a telephone network? How does it differ from a local
(c) What is the role
telephone line?
Discuss the difference between a landline telephone network and a modern cellular
(d)
(e) How has the advancement of digital technology, such as Voice over IP (VoIP), impacted
traditional telephone networks? Provide examples of how VolP has changed communication
methods.
()In the context of network security, explain one potential vulnerability or threat to a