0% found this document useful (0 votes)
49 views19 pages

CST 303

The document contains a series of multiple-choice questions, matching exercises, and short notes related to computer networking concepts. It covers topics such as network components, protocols, security, and various types of networks including LANs and WANs. Additionally, it discusses internet access technologies, message timing, and the data link layer, providing a comprehensive overview of networking fundamentals.

Uploaded by

Ai Dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views19 pages

CST 303

The document contains a series of multiple-choice questions, matching exercises, and short notes related to computer networking concepts. It covers topics such as network components, protocols, security, and various types of networks including LANs and WANs. Additionally, it discusses internet access technologies, message timing, and the data link layer, providing a comprehensive overview of networking fundamentals.

Uploaded by

Ai Dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

I. Choose the correct answer.

(10-Marks)

1. The user interface that allows users to request ------ tasks from the computer.

a) specific b) special c) same d) social

2. Communicates between the hardware and software of a computer and manages


how hardware resources are used to meet ------- requirements.

a) material b) software c) hardware d) raw

3. The physical part of a computer including ------- electronics.

a) base b) underlying c) basic d) unify

4. SSH establishes a secure remote CLI connection to a device, through a virtual


interface, over a --------.

a) real b) virtual c) network d) circuit

5. ------ establishes an insecure remote CLI connection to a device over the network.

a) Telnet b) Console c) Command d) Putty

6. Terminal emulation programs are used to connect to a network device by either a


console port or by an SSH/--------- connection.

a) SSH b) Console c) Telnet d) Command

7. -------- is the process of converting information into another acceptable form for
transmission.

a) Coding b) Encoding c) Decoding d) Coder

8. Message --------- depend on the type of message and the channel that is used to
deliver the message.

a) forms b) formats c) files d) fields

9. The bits are -------- into a pattern of light, sound, or electrical impulses.

a) encoded b) decoded c) coded d) coder

10. The destination host must -------- the signals to interpret the message.

a) decode b) encode c) coded d) coder


11. -------- manages the rate of data transmission and defines how much information
can be sent and the speed at which it can be delivered.

a) Error Control b) Error Correction c) Flow Control d) Data Flow

12. Response --------- manages how long a device waits when it does not hear a reply
from the destination.

a) Timeout b) Pattern c) Method d) Time

13. There may be -------------- rules governing issues like ‘collisions’.

a) same b) different c) more d) various

14. Some protocols are ------------ and attempt to prevent collisions; other protocols
are reactive and establish a recovery method after the collisions occurs.

a) proactive b) active c) reactive d) auto

15. Broadcasts are used in ------- networks, but are not an option for IPv6.

a) IP b) IPSec c) IPv4 d) ARP

16. Documents may use the node icon, typically a ------, to represent all devices.

a) path b) circle c) pattern d) part

17. Network protocols define a -------- set of rules.

a) common b) main c) first d) second

18. Network security is secure data to provide authentication, data --------, and data
encryption.

a) availability b) authentication c) integrity d) reputation

19. Service Discovery used for the automatic --------- of devices or services.

a) detection b) correction c) error d) control

20. Addressing identifies -------- and receiver.

a) sender b) transmitter c) source d) supplier

21. Sequencing uniquely labels each ----------- segment of data.

a) sender b) transmitted c) source d) supplier


22. Before any network communications can occur, a physical connection to a local
------ must be established.

a) network b) internet c) communication d) medium

23. The next device in the path to the destination receives the bits and ------- the
frame, then decides what to do with it.

a) re-encapsulates b) encapsulates c) re-cover d) cover

24. Physical layer standards address three functional areas are physical components,
encoding and ---------.

a) coding b) signal c) signaling d) decoding

25. Hardware components are all specified in standards associated with the -------
layer.

a) transport b) physical c) session d) application

26. Encoding converts the -------- of bits into a format recognized by the next device
in the network path.

a) stream b) serial c) parallel d) path

27. Examples of encoding methods include Manchester, 4B/5B, and 8B/-------.

a) 9B b) 23B c) 10B d) 11B

28. The method of signaling will vary based on the type of ---------- being used.

a) media b) medium c) message d) data

29. Physical media properties, current technologies, and the laws of physics play a
role in determining -------- bandwidth.

a) available b) various c) same d) different

30. ---------- is amount of time, including delays, for data to travel from one given
point to another.

a) Throughput b) Goodput c) Passover d) Latency


II. Match the following each sentence. (10-Marks)

1. Network Trends - Explain how trends such as BYOD, online


collaboration, video, and cloud computing are changing the way we interact.

2. Network Security - Identify some basic security threats and solution for all
networks.

3. IT Professional - Explain employment opportunities in the networking


field.

4. Internet Connections - Explain how LANs and WANs interconnected to


the internet.

5. Network Components - Explain how host and network devices are used.

6. Email - Email server runs email server software.

7. File - File server stores corporate and user files.

8. Easy to set up - No centralized administration

9. Less complex - Not as secure

10. Fiber-optic cable - Uses pulses of light

11. Wireless transmission - Uses modulation of specific frequencies of


electromagnetic waves.

12. Small Home Networks - connect a few computers to each other and the
Internet.

13. Cellular - uses a cell phone network to connect to the


internet.

14. Satellite - major benefit to rural areas without Internet


Service Providers

15. Dial-up telephone - an inexpensive, low bandwidth option using a


modem.

16. Ethernet WAN - This extends LAN access technology into the
WAN.
17. Network Architecture - refers to the technologies that support the
infrastructure that moves data across the
network.

18. Fault tolerant network - limits the impact of a failure by limiting the
number of affected devices.

19. Scalable network - can expand quickly and easily to support new
users and applications without impacting the
performance of services to existing users.

20. Network designers - follow accepted standards and protocols in order


to make the networks scalable.

III. Write short notes for any FOUR on the following. (20-marks)
1. Host Roles (5-Marks)
Every computer on a network is called a host or end device.
Servers are computers that provide information to end devices:
• email servers
• web servers
• file server
Clients are computers that send requests to the servers to retrieve information:
• web page from a web server
• email from an email server
2. Peer-to-Peer (5-Marks)
It is possible to have a device be a client and a server in a Peer-to-Peer Network.
This type of network design is only recommended for very small networks.

3. End Devices (5-Marks)


An end device is where a message originates from or where it is received.
Data originates with an end device, flows through the network, and arrives at an end
device.
4. Intermediary Network Devices (5-Marks)
An intermediary device interconnects end devices. Examples include switches, wireless
access points, routers, and firewalls.
Management of data as it flows through a network is also the role of an intermediary
device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.
5. Network Media (5-Marks)
Communication across a network is carried through a medium which allows a message
to travel from source to destination.
Media Types Description
Metal wires within cables Uses electrical impules
Glass or plastic fibers within cables Uses pulses of light
Wireless transmission Uses modulation of specific frequencies of
electromagnetic waves

6. Network Representations (5-Marks)


Network diagrams, often called topology diagrams, use symbols to represent devices
within the network.
Important terms to know include:
• Network Interface Card (NIC)
• Physical Port
• Interface
Often, the terms port and interface are used interchangeably

7. Networks of Many Sizes (5-Marks)


• Small Home Networks – connect a few computers to each other and the Internet
• Small Office/Home Office – enables computer within a home or remote office to
connect to a corporate network
• Medium to Large Networks – many locations with hundreds or thousands of
interconnected computers
• World Wide Networks – connects hundreds of millions of computers worldwide –
such as the internet

8. LAN (5-Marks)
A LAN is a network infrastructure that spans a small geographical area.
-Interconnect end devices in a limited area.
-Administered by a single organization or individual.
-Provide high-speed bandwidth to internal devices.

9. WAN (5-Marks)
A WAN is a network infrastructure that spans a wide geographical area.
-Interconnect LANs over wide geographical areas.
-Typically administered by one or more service providers.
-Typically provide slower speed links between LANs.

10. The Internet (5-Marks)


The internet is a worldwide collection of interconnected LANs and WANs.
• LANs are connected to each other using WANs.
• WANs may use copper wires, fiber optic cables, and wireless transmissions.
The internet is not owned by any individual or group.
The following groups were developed to help maintain structure on the internet:
• IETF
• ICANN
• IAB
11. Intranets and Extranets (5-Marks)
An intranet is a private collection of LANs and WANs internal to an organization that is
meant to be accessible only to the organizations members or others with authorization.
An organization might use an extranet to provide secure access to their network for
individuals who work for a different organization that need access to their data on their
network.

12. Network Architecture (5-Marks)


Network Architecture refers to the technologies that support the infrastructure that
moves data across the network.
There are four basic characteristics that the underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security

13. Fault Tolerance (5-Marks)


A fault tolerant network limits the impact of a failure by limiting the number of affected
devices.
Multiple paths are required for fault tolerance.
Reliable networks provide redundancy by implementing a packet switched network:
• Packet switching splits traffic into packets that are routed over a network.
• Each packet could theoretically take a different path to the destination.
This is not possible with circuit-switched networks which establish dedicated circuits.

14. Scalability (5-Marks)


A scalable network can expand quickly and easily to support new users and applications
without impacting the performance of services to existing users.
Network designers follow accepted standards and protocols in order to make the
networks scalable.
15. Quality of Service (5-Marks)
Voice and live video transmissions require higher expectations for those services being
delivered.
Have you ever watched a live video with constant breaks and pauses?
This is caused when there is a higher demand for bandwidth than available – and QoS
isn’t configured.
• Quality of Service (QoS) is the primary mechanism used to ensure reliable delivery of
content for all users.
• With a QoS policy in place, the router can more easily manage the flow of data and
voice traffic.

IV.(a) Internet Access Technologies (8-Marks)

There are many ways to connect users and organizations to the internet:
• Popular services for home users and small offices include broadband cable, broadband
digital subscriber line (DSL), wireless WANs, and mobile services.
• Organizations need faster connections to support IP phones, video conferencing and
data center storage.
• Business-class interconnections are usually provided by service providers (SP) and
may include: business DSL, leased lines, and Metro Ethernet.

Connection Description
Cable high bandwidth, always on, internet offered by cable television
service providers.
DSL high bandwidth, always on, internet connection that runs over a
telephone line.
Cellular uses a cell phone network to connect to the internet.
Satellite major benefit to rural areas without Internet Service Providers.
Dial-up an inexpensive, low bandwidth option using a modem.
telephone

(b) Access Methods


• Console – A physical management port used to access a device in order to provide
maintenance, such as performing the initial configurations.
• Secure Shell (SSH) – Establishes a secure remote CLI connection to a device, through
a virtual interface, over a network. (Note: This is the recommended method for
remotely connecting to a device.)
• Telnet – Establishes an insecure remote CLI connection to a device over the network.
(Note: User authentication, passwords and commands are sent over the network in
plaintext.) (7-Marks)

V.(a) Message Timing (8-Marks)


Message timing includes the following:
Flow Control – Manages the rate of data transmission and defines how much
information can be sent and the speed at which it can be delivered.
Response Timeout – Manages how long a device waits when it does not hear a reply
from the destination.
Access method - Determines when someone can send a message.
• There may be various rules governing issues like “collisions”. This is when more than
one device sends traffic at the same time and the messages become corrupt.
• Some protocols are proactive and attempt to prevent collisions; other protocols are
reactive and establish a recovery method after the collision occurs.

(b) The Physical Connection


• Before any network communications can occur, a physical connection to a local
network must be established.
• This connection could be wired or wireless, depending on the setup of the network.
• This generally applies whether you are considering a corporate office or a home.
• A Network Interface Card (NIC) connects a device to the network.
• Some devices may have just one NIC, while others may have multiple NICs.
• Not all physical connections offer the same level of performance. (7-Marks)

VI.(a) Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP)
(8-Marks)
Key Characteristics of UTP
1. The outer jacket protects the copper wires from physical damage.
2. Twisted pairs protect the signal from interference.
3. Color-coded plastic insulation electrically isolates the wires from each other and
identifies each pair.

Key Characteristics of STP


1. The outer jacket protects the copper wires from physical damage
2. Braided or foil shield provides EMI/RFI protection
3. Foil shield for each pair of wires provides EMI/RFI protection
4. Color-coded plastic insulation electrically isolates the wires from each other and
identifies each pair

(b) Perform radix conversion of the decimal number (77.625)10 into a binary
number. (7-Marks)

VII.(a) The Data Link Layer (8-Marks)

• The Data Link layer is responsible for communications between end-device network
interface cards.
• It allows upper layer protocols to access the physical layer media and encapsulates
Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames.
• It also performs error detection and rejects corrupts frames.

The Data Link Layer consists of two sublayers. Logical Link Control (LLC)
and Media Access Control (MAC).
• The LLC sublayer communicates between the networking software at the
upper layers and the device hardware at the lower layers.
• The MAC sublayer is responsible for data encapsulation and media access
control.

(b) MAC Sublayer (7-Marks)

The MAC sublayer is responsible for data encapsulation and accessing the media.
Data Encapsulation
IEEE 802.3 data encapsulation includes the following:
1. Ethernet frame - This is the internal structure of the Ethernet frame.
2. Ethernet Addressing - The Ethernet frame includes both a source and destination
MAC address
to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN.
3. Ethernet Error detection - The Ethernet frame includes a frame check sequence (FCS)
trailer
used for error detection.

Media Access
• The IEEE 802.3 MAC sublayer includes the specifications for different Ethernet
communications standards over various types of media including copper and fiber.
• Legacy Ethernet using a bus topology or hubs, is a shared, half-duplex medium.
Ethernet over a half-duplex medium uses a contention-based access method, carrier
sense multiple access/collision detection (CSMA/CD).
• Ethernet LANs of today use switches that operate in full-duplex. Full-duplex
communications with Ethernet switches do not require access control through
CSMA/CD.
---------------------------------------------------------

IV.(a) Businesses Internet Connections (8-Marks)

Corporate business connections may require:

• higher bandwidth

• dedicated connections

• managed services

Type of Connection Description


Dedicated Leased Line These are reserved circuits within the service provider’s
network that connect distant offices with private voice and/or
data networking.
Ethernet WAN This extends LAN access technology into the WAN.
DSL Business DSL is available in various formats including
Symmetric Digital Subscriber Lines (SDSL).
Satellite This can provide a connection when a wired solution is not
available.

(b Navigation Between IOS Modes


 Privileged EXEC Mode:
• To move from user EXEC mode to privilege EXEC mode, use the enabled command.
 Global Configuration Mode:
• To move in and out of global configuration mode, use the configure terminal
command.
To return to privilege EXEC mode, use the exit command.
 Line Configuration Mode:
• To move in and out of line configuration mode, use the line command followed by
the management line type.
To return to global configuration mode, use the exit command.(7-Marks)

V.(a) Network Protocol Requirements and Message Encoding (8-Marks)

Common computer protocols must be in agreement and include the following


requirements:
• Message encoding
• Message formatting and encapsulation
• Message size
• Message timing
• Message delivery options

Encoding is the process of converting information into another acceptable form for
transmission.
• Decoding reverses this process to interpret the information.
(b) The Physical Layer (7-Marks)
• Transports bits across the network media
• Accepts a complete frame from the Data Link Layer and encodes it as a series of
signals that are transmitted to the local media
• This is the last step in the encapsulation process.
• The next device in the path to the destination receives the bits and re-encapsulates the
frame, then decides what to do with it.
VI.(a) Bandwidth (8-Marks)
• Bandwidth is the capacity at which a medium can carry data.
• Digital bandwidth measures the amount of data that can flow from one place to
another in a given amount of time; how many bits can be transmitted in a second.
• Physical media properties, current technologies, and the laws of physics play a role in
determining available bandwidth.
Bandwidth Terminology
Latency
• Amount of time, including delays, for data to travel from one given point to another
Throughput
• The measure of the transfer of bits across the media over a given period of time
Goodput
• The measure of usable data transferred over a given period of time
• Goodput = Throughput - traffic overhead

(b) radix conversion of the decimal number (67.6875)10 into


an octal number. (7-Marks)

VII.(a) Providing Access to Media and Data Link Layer Standards (8-Marks)

Packets exchanged between nodes may experience numerous data link layers and media
transitions.
At each hop along the path, a router performs four basic Layer 2 functions:
• Accepts a frame from the network medium.
• De-encapsulates the frame to expose the encapsulated packet.
• Re-encapsulates the packet into a new frame.
• Forwards the new frame on the medium of the next network segment.

Data link layer protocols are defined by engineering organizations:


• Institute for Electrical and Electronic Engineers (IEEE).
• International Telecommunications Union (ITU).
• International Organizations for Standardization (ISO).
• American National Standards Institute (ANSI).

(b) Ethernet Frame Fields (7-Marks)

• The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes.
The preamble field is not included when describing the size of the frame.
• Any frame less than 64 bytes in length is considered a “collision fragment” or “runt
frame” and is automatically discarded.
Frames with more than 1500 bytes of data are considered “jumbo” or “baby giant
frames”.
• If the size of a transmitted frame is less than the minimum, or greater than the
maximum, the receiving device drops the frame.
Dropped frames are likely to be the result of collisions or other unwanted signals.
They are considered invalid. Jumbo frames are usually supported by most Fast Ethernet
and Gigabit Ethernet switches and NICs.

--------------------------------------------------

IV.(a) The Converging Network (8-Marks)


Before converged networks, an organization would have been separately cabled for
telephone, video, and data.
Each of these networks would use different technologies to carry the signal.
Each of these technologies would use a different set of rules and standards.
Converged data networks carry multiple services on one link including:
• data
• voice
• video
Converged networks can deliver data, voice, and video over the same network
infrastructure.
The network infrastructure uses the same set of rules and standards.
(b) Device Names (7-Marks)
• The first configuration command on any device should be to give it a unique
hostname.
• By default, all devices are assigned a factory default name.
For example, a Cisco IOS switch is "Switch.”
• Guideline for naming devices:
• Start with a letter
• Contain no spaces
• End with a letter or digit
• Use only letters, digits, and dashes
• Be less than 64 characters in length

V.(a) Network Protocol Functions (8-Marks)


• Devices use agreed-upon protocols to communicate.
• Protocols may have may have one or functions.
Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network
applications

(b) Encoding (7-Marks)


• Encoding converts the stream of bits into a format recognizable by the next device in
the network path.
• This ‘coding’ provides predictable patterns that can be recognized by the next device.
• Examples of encoding methods include Manchester (4B/5B, and 8B/10B).
Signaling
• The signaling method is how the bit values, “1” and “0” are represented on the
physical medium.
• The method of signaling will vary based on the type of medium being used.

VI.(a) Characteristics of Copper Cabling (8-Marks)


Copper cabling is the most common type of cabling used in networks today.
It is inexpensive, easy to install, and has low resistance to electrical current flow.
Limitations:
• Attenuation – the longer the electrical signals have to travel, the weaker they get.
• The electrical signal is susceptible to interference from two sources, which can distort
and corrupt the data signals (Electromagnetic Interference (EMI) and Radio Frequency
Interference (RFI) and Crosstalk).
Mitigation:
• Strict adherence to cable length limits will mitigate attenuation.
• Some kinds of copper cable mitigate EMI and RFI by using metallic shielding and
grounding.
• Some kinds of copper cable mitigate crosstalk by twisting opposing circuit pair wires
together.

(b) Perform radix conversion of the binary number (1001101.101)2 into a


decimal number. (7-Marks)

VII.(a) LAN Topologies and Half and Full Duplex Communication


(8-Marks)
End devices on LANs are typically interconnected using a star or extended star
topology.
Star and extended star topologies are easy to install, very scalable and easy to
troubleshoot.
Early Ethernet and Legacy Token Ring technologies provide two additional topologies:
• Bus – All end systems chained together and terminated on each end.
• Ring – Each end system is connected to its respective neighbors to form a ring.
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.

(b) Frame Processing (7-Marks)

• When a device is forwarding a message to an Ethernet network, the Ethernet header


includes a Source MAC address and a Destination MAC address.
• When a NIC receives an Ethernet frame, it examines the destination MAC address to
see if it matches the physical MAC address that is stored in RAM. If there is no match,
the device discards the frame.
If there is a match, it passes the frame up the OSI layers, where the de-encapsulation
process takes place.
• Any device that is the source or destination of an Ethernet frame, will have an
Ethernet NIC and therefore, a MAC address.
This includes workstations, servers, printers, mobile devices, and routers.

You might also like