0% found this document useful (0 votes)
3 views

LAN2 Dec 2023

Hhhhgf

Uploaded by

john kamboyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

LAN2 Dec 2023

Hhhhgf

Uploaded by

john kamboyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

otormatio

INFORMATION AND COMMUNICATIONS UNIVERSITY


INTERNETWORKING DESIGN AND LAN/MAN ADMINISTRATION II

END OF SEMESTER EXAMINATION

TIME: 3HOURS
DATE OF EXAMINATIONS: December 2023

INSTRUCTIONS

J. This paper contains THREE sections namely A, B and C


2. Answer all the questions from section A.

3. Answer all the questions from section B


4. Answer only one question fom section C
5. Please write as clearly as possible as illegible handwriting cannot be marked.

6. Number the answers to the questions clearly before answering.

1|Page
SECTIONA
Answer all the questions from this'section

1. Which layer has the primary


responsibility for communications between one
device
and the devices connected
to it.

A..network
B. physical
C. transport
D. link

2. What is the size of an


IPv4 address?
A. 32 bit
B. 48 bit
C.64 bit

D. 80 bit

3. What is the port number for SMTP?


A. 21
B. 25
C. 65
D. 70
4. Consider the Go-Back-N protocol
window size of
with a sender and a sequence N=4
number range of 1024. Suppose at time
the next in-order packet that the
that t
is expecting has receiver
sequence number 228. ASsume that the medium
does not reorder
messages. Which of the following is a possible
pair of values for the senders send
base and nextseqnum pointers at time t?

A. send base-224; nextseqnum=226


B. send base-225; nextseqnum-228
C. send base-227; nextseqnum=232
D. send base-228; nextseqnum=233

5. Which of the following MAC protocols is used by Ethernet?


A. Slotted Aloha
B. CSMA/CA
C. CSMA/CD
D. TDMA

6. Consider a router that interconnects three


subnets: X, Y, and Z. Supposeall of the
interfaces in each of these subnets are required
to have the prefix 13.2.80.0/2l.
Suppose subnet X is required to support 1000 interfaces, and subnets Y and Z are
each required to support 500 interfaces. Which set of network addresses for X, Y and
Z satisfies these constraints?

A. X: 13.2.80,0/22; Y: 13.2.82.0/23; Z:
13.2.84.0/23
B. X: 13.2.80.0/22:; Y: 13.2.84.0/23;Z: 13.2.86.0/23

|
2 Pag e
C. X: 13.2.84.0/23; Y:
13.2.80.0/23; Z: 13.2.82.0/23
D. X:13.2.88.0/23: Y:
13.2.84.0/22; Z: 13.2.80.0/22

7. Inthe following exhibit, identify the number of


in each specified
collision domains and broadcast domains
device. Each device is
represented by a letter:

i. Hub
ii. Bridge
ii. Switch
iv. Router

Hub Switch

8. In a telephone
network, which component is responsible for
subscribers to the network and connecting individual
converting their voice signals
into clectrical
transmission? signals for

A. Switch
B. Modem
C. Router
D. Terminal

9. Which ofthe following applications will


A. Email x effectively run on UDP?
B. File transfer %
C.Web
D. Multimedia
streaming

|
3 Pa ge
10. In a client'server
connection using HTTP over TCP, if
the same TCP multiple objects are sent over
connection, then the connection is
classified as:

A. Stateless
B. Persistant

C. Non-persistant
D. Stable

SECTION B
Answer all the questions

Question one

You are the network administrator


for Lam Food and Beverages Company. Given the
network ID 192.168.4.0/244 subnets for the following departments: Administration,
create

Front desk,Marketing and one for public use. List each subnet indicating the subnet mask,
number of usable hosts, host ID range and broadcast ID.

Question two

Figure 1 below showsa network set up for Vulcan Fire Services. As the network
administrator for the company,you're required to configure all the network devices.

Connection to S1 has the following parameters and configuration commands:

Hostnanme

Banner

Interface description

Passwords

• P address,subnet mask, default gateway

4|Page
ttcascont isostrse s2
SZ(confl)sesatle secret tid

Host ng me
31{ctafiz-if;vöascrtptios Zst coanecti0a to s2

33{33nfiif) NESCrigtion Znd coase ctian to $3

Si(coafz-5ij *descrigttoa ist conectioa to $2


Banne
32{snfiz-$i;9* fefxa
$3(csafiz-*f)#éesrtptia 2d canrectisz to s2
S1{caafiz-$fj snt fafs loterpecQ clescpton
S1(catig-4*ine cos

31(tanfig-kinsj#password
S2(csafiz-iine,elegta
cersele
Passwords
51{Cniiie)*ise vty s 15
31(centiz-line4password telaet

S2(caafiz-lingj #login
lp qddrers,SUbnet
S1(csafig-ifjp adáress ISI.X69.8.17 255.255.253.246
3l(cenfig-ifj *ne sut depeult
S1{canfiz-if) sexit
31(cntisi#banRs this is y S1 suttco
t
S1(cmtigtexit

Qestinatian fiianE ftartap-caafig}? Eenter]


Building cunfiguratio...

Figure 1

FO/O

FO/8

FO/15 FO/17

FO/16 FO/18

FO/1 FO/1
FO/2 FO5 FOJ5 FO/2
T92168.1o t9/28 2168.10. TB 28
FO/6 FO/6
FO/3 FO4 FO/3 FOF4

a) Write down the commands necessary to configure the S2 and S3 switches respectively v
using all the paranmeters in S1
b) Verify the MAC address table for each switch by writing down the necessary
commarnds

c) Explain the differences between a hub, switch, bridge and router? N

5|Page
Question Three

examples
of gateways in telephone systems. Provide
Explain the significance and functions
between different networks and
communication
of how gateways are used to enable
of
the role of gateways in facilitating the
integration
technologies. Additionally, describe

legacy telephone systems with


modern digital networks.

Question Four X

rated at 10 Mbps full-duplex. Each user requires 1


An office has an (Internet) access link

each user is active 10% of the time.


Mbps when transmitting and
of bandwidth is made for each user. How many users can the
(i) Initially a static allocation

access link support?


What is the probability that a
(11 )The office opts for a pure packet-switched access link.

given user is transmitting?


What the probability
(iii )The office supports 35 users on the packet-switched access link. is

that exactly n users are transmitting simultaneously?

11 or more users transmitting simultaneously.


(iv )Find the probability that there are

Question Five

of wireless networks over wired networks.


a) Discuss the advantages and disadvantages
What issues must one consider when designing and implementing an enterprise

wireless network?
why IEEE 802.16 has failed to compete with 3/4G
b) Outline any five (5)reasons
technologies in data transmission.

Question Six

TCP/IP Protocol Suite is composed of several protocols that work


together to
(a) The
over a network. Explain each of the following network
facilitate communication

protocols:
DNS
i.
DHCP
v
ii.

iii, TCP
iv. Http
V. IP /

vi. Telnet
vii. ARP
viii. SSH

4
6| Page
C
SECTION
section.
Answer any question from
this

Question One

stating the services provided


clearly
a) Explain the following
IEEE standards in detail,

by each.
i. IEEE 802.1Q
ii. IEEE 802.1D
ii. IEEE 802.lx

iv. IEEE 802.1w

v. IEEE 802.6
from IEEE 802.16?
b) Discus how IEEE802.11 differs
WPA? Why is that?
better security between WEP and
c) Which protocol offers order and briefly
model in hierarchical
of the OSI reference
d) List down the 7 layers
of each layer.
explain the significance

protocol (IP)address.
an internet
e) A web server has
of an IP address.
Give three characteristics
only to
to send data
that uses the IP address
ii. Identify the network component

its correct destination.

Question Two key components, such as


Be sure to include
of a telephone network.
Sketch a diagram
elements.
any other relevant
lines, switches,and
telephones,telephone
denonstrate your
understanding.
to
on your diagram
Label the components

of the following components:


label and describe the function
(a) In your diagranm,

i. Telephone

ii. Telephone Line

iii. Switch

iv. Central Office (CO)

v. Trunk Line

How does it connect


Office (CO)in a telephone network.
of aCentral
(b) Explain the purpose

between different telephones?


calls

7|Page
of a trunk line in a telephone network? How does it differ from a local
(c) What is the role

telephone line?

Discuss the difference between a landline telephone network and a modern cellular
(d)

network. What advantages and disadvantages do each have?

(e) How has the advancement of digital technology, such as Voice over IP (VoIP), impacted

traditional telephone networks? Provide examples of how VolP has changed communication

methods.

()In the context of network security, explain one potential vulnerability or threat to a

telephone network. How can such threats be mitigated?

You might also like