You are on page 1of 2

Faculty of Engineering and Technology

Department of Computer Science Question


Sheet
Course Title: Network Strategies Course Code: CS-204
Exam type: Open Book Program: BCS
Instructor: Zabihullah Atal Instructor Email: z.atal@kardan.edu.af
Exam: Makeup Midterm Examination Term: Fall 2020
Total Marks: 25 Session: Morning
Opening Date: 13-Dec-2020 – 04:00 PM Closing Date: 13-Dec-2020 – 08:00 PM

Note: Complete your 25 marks by solving the following tasks. We are encouraging you to write
your findings in your own words and Copying the contents from any source will be considered
plagiarism and such an attempt will be considered as a UFM Case.

Task A (7)
As a Network Strategies Subject student if you are assigned to configure a newly purchased switch, what
tasks will be included in your configuration. List all your configuration tasks and also write how and why
you will do that?
Note: Your answer must consist of all the details to fully elaborate on your configuration tasks.
Task B (7)
Organizations use switched networks as a communication infrastructure and organization productivity
depends on the switched network's performance. As a network strategies subject student mention and
elaborate in your words all those factors which can affect network performance.
Task C (9)
AT&T, which is an International level Internet Service Provider, is dealing with two National level
customers from Afghanistan, where AT&T has an 85.0.0.0/8 Subnet.
The following are the customer’s hierarchy, which is requesting for a unique set of Subnets, from AT&T.
Define and assign them appropriate subnet according to their requirement.
The following are the requirements:
1) Afghan Telecom = Single Subnet of 5000 IP Addresses
i) ABC Telecom= Single Subnet of 1500 IP Addresses
ii) ii) XYZ Telecom= Single Subnet of 900 IP Addresses
2) AWCC = Single Subnet of 1000 IP Addresses
i) ABC University= Single Subnet of 12 IP Addresses
ABC
Afghan Telecom
Telecom XYZ
AT&T Telecom

AWCC ABC
University

Task D (9)
Do as directed:
1. Draw a hierarchical network topology.
2. Write about the role and importance of port security in a hierarchical switched network.
3. Specify unused ports and disable them in access layer switches.
4. Enable port security in access layer switches to use ports.

Note: Add the diagram of your topology.

-Good Luck-

You might also like