CST 303
CST 303
(10-Marks)
1. The user interface that allows users to request ------ tasks from the computer.
5. ------ establishes an insecure remote CLI connection to a device over the network.
7. -------- is the process of converting information into another acceptable form for
transmission.
8. Message --------- depend on the type of message and the channel that is used to
deliver the message.
9. The bits are -------- into a pattern of light, sound, or electrical impulses.
10. The destination host must -------- the signals to interpret the message.
12. Response --------- manages how long a device waits when it does not hear a reply
from the destination.
14. Some protocols are ------------ and attempt to prevent collisions; other protocols
are reactive and establish a recovery method after the collisions occurs.
15. Broadcasts are used in ------- networks, but are not an option for IPv6.
16. Documents may use the node icon, typically a ------, to represent all devices.
18. Network security is secure data to provide authentication, data --------, and data
encryption.
19. Service Discovery used for the automatic --------- of devices or services.
23. The next device in the path to the destination receives the bits and ------- the
frame, then decides what to do with it.
24. Physical layer standards address three functional areas are physical components,
encoding and ---------.
25. Hardware components are all specified in standards associated with the -------
layer.
26. Encoding converts the -------- of bits into a format recognized by the next device
in the network path.
28. The method of signaling will vary based on the type of ---------- being used.
29. Physical media properties, current technologies, and the laws of physics play a
role in determining -------- bandwidth.
30. ---------- is amount of time, including delays, for data to travel from one given
point to another.
2. Network Security - Identify some basic security threats and solution for all
networks.
5. Network Components - Explain how host and network devices are used.
12. Small Home Networks - connect a few computers to each other and the
Internet.
16. Ethernet WAN - This extends LAN access technology into the
WAN.
17. Network Architecture - refers to the technologies that support the
infrastructure that moves data across the
network.
18. Fault tolerant network - limits the impact of a failure by limiting the
number of affected devices.
19. Scalable network - can expand quickly and easily to support new
users and applications without impacting the
performance of services to existing users.
III. Write short notes for any FOUR on the following. (20-marks)
1. Host Roles (5-Marks)
Every computer on a network is called a host or end device.
Servers are computers that provide information to end devices:
• email servers
• web servers
• file server
Clients are computers that send requests to the servers to retrieve information:
• web page from a web server
• email from an email server
2. Peer-to-Peer (5-Marks)
It is possible to have a device be a client and a server in a Peer-to-Peer Network.
This type of network design is only recommended for very small networks.
8. LAN (5-Marks)
A LAN is a network infrastructure that spans a small geographical area.
-Interconnect end devices in a limited area.
-Administered by a single organization or individual.
-Provide high-speed bandwidth to internal devices.
9. WAN (5-Marks)
A WAN is a network infrastructure that spans a wide geographical area.
-Interconnect LANs over wide geographical areas.
-Typically administered by one or more service providers.
-Typically provide slower speed links between LANs.
There are many ways to connect users and organizations to the internet:
• Popular services for home users and small offices include broadband cable, broadband
digital subscriber line (DSL), wireless WANs, and mobile services.
• Organizations need faster connections to support IP phones, video conferencing and
data center storage.
• Business-class interconnections are usually provided by service providers (SP) and
may include: business DSL, leased lines, and Metro Ethernet.
Connection Description
Cable high bandwidth, always on, internet offered by cable television
service providers.
DSL high bandwidth, always on, internet connection that runs over a
telephone line.
Cellular uses a cell phone network to connect to the internet.
Satellite major benefit to rural areas without Internet Service Providers.
Dial-up an inexpensive, low bandwidth option using a modem.
telephone
VI.(a) Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP)
(8-Marks)
Key Characteristics of UTP
1. The outer jacket protects the copper wires from physical damage.
2. Twisted pairs protect the signal from interference.
3. Color-coded plastic insulation electrically isolates the wires from each other and
identifies each pair.
(b) Perform radix conversion of the decimal number (77.625)10 into a binary
number. (7-Marks)
• The Data Link layer is responsible for communications between end-device network
interface cards.
• It allows upper layer protocols to access the physical layer media and encapsulates
Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames.
• It also performs error detection and rejects corrupts frames.
The Data Link Layer consists of two sublayers. Logical Link Control (LLC)
and Media Access Control (MAC).
• The LLC sublayer communicates between the networking software at the
upper layers and the device hardware at the lower layers.
• The MAC sublayer is responsible for data encapsulation and media access
control.
The MAC sublayer is responsible for data encapsulation and accessing the media.
Data Encapsulation
IEEE 802.3 data encapsulation includes the following:
1. Ethernet frame - This is the internal structure of the Ethernet frame.
2. Ethernet Addressing - The Ethernet frame includes both a source and destination
MAC address
to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN.
3. Ethernet Error detection - The Ethernet frame includes a frame check sequence (FCS)
trailer
used for error detection.
Media Access
• The IEEE 802.3 MAC sublayer includes the specifications for different Ethernet
communications standards over various types of media including copper and fiber.
• Legacy Ethernet using a bus topology or hubs, is a shared, half-duplex medium.
Ethernet over a half-duplex medium uses a contention-based access method, carrier
sense multiple access/collision detection (CSMA/CD).
• Ethernet LANs of today use switches that operate in full-duplex. Full-duplex
communications with Ethernet switches do not require access control through
CSMA/CD.
---------------------------------------------------------
• higher bandwidth
• dedicated connections
• managed services
Encoding is the process of converting information into another acceptable form for
transmission.
• Decoding reverses this process to interpret the information.
(b) The Physical Layer (7-Marks)
• Transports bits across the network media
• Accepts a complete frame from the Data Link Layer and encodes it as a series of
signals that are transmitted to the local media
• This is the last step in the encapsulation process.
• The next device in the path to the destination receives the bits and re-encapsulates the
frame, then decides what to do with it.
VI.(a) Bandwidth (8-Marks)
• Bandwidth is the capacity at which a medium can carry data.
• Digital bandwidth measures the amount of data that can flow from one place to
another in a given amount of time; how many bits can be transmitted in a second.
• Physical media properties, current technologies, and the laws of physics play a role in
determining available bandwidth.
Bandwidth Terminology
Latency
• Amount of time, including delays, for data to travel from one given point to another
Throughput
• The measure of the transfer of bits across the media over a given period of time
Goodput
• The measure of usable data transferred over a given period of time
• Goodput = Throughput - traffic overhead
VII.(a) Providing Access to Media and Data Link Layer Standards (8-Marks)
Packets exchanged between nodes may experience numerous data link layers and media
transitions.
At each hop along the path, a router performs four basic Layer 2 functions:
• Accepts a frame from the network medium.
• De-encapsulates the frame to expose the encapsulated packet.
• Re-encapsulates the packet into a new frame.
• Forwards the new frame on the medium of the next network segment.
• The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes.
The preamble field is not included when describing the size of the frame.
• Any frame less than 64 bytes in length is considered a “collision fragment” or “runt
frame” and is automatically discarded.
Frames with more than 1500 bytes of data are considered “jumbo” or “baby giant
frames”.
• If the size of a transmitted frame is less than the minimum, or greater than the
maximum, the receiving device drops the frame.
Dropped frames are likely to be the result of collisions or other unwanted signals.
They are considered invalid. Jumbo frames are usually supported by most Fast Ethernet
and Gigabit Ethernet switches and NICs.
--------------------------------------------------