Professional Documents
Culture Documents
3 HOURS
INSTRUCTION TO CANDIDATES
Question 1
(a) Name and describe the purpose and functions of the devices named A to F in Figure 1
below. [12 marks]
Many businesses have adopted the use Internet in their day to day transactions. Whilst there
Describe the operation of RSA [10 marks]
Figure 1 Topology
A – server Network management software, shared data
C – IP phone Telephony
D, E – Router Connect multiple networks and forward packets destined either for its own
networks or other networks
(b) Name and describe the layers of the ISO OSI reference model. [7 marks]
(c) What is the name of the protocol suite used in Internet communication. [1 marks]
TCP/IP
Question 2
You have been allocated a block of IP addresses 172.16.128.0/17. You are required to
address devices in this network:
Add 3 marks to every script for missing instructions (R1, R2 and R3 are given the last
address in the subnet)
Question 3
(a) With the aid of a diagram, give a full description of the Ethernet frame. [10 marks]
(b) Draw and label any cable used in networking. [7 marks]
Figure 4 UTP
(a) Describe the advantages and disadvantages of using the IEEE802.11 LAN.
Advantages [11 marks]
The IEEE 802.11 is easy to installation.
It has higher frequency range.
It has efficient coding technique.
The IEEE 802.11 has reduced wiring expense.
It is less cost effective.
Simultaneously use of equipment.
It use unlicensed part of the radio spectrum.
Disadvantages
o It has traffic disruptions.
o Network security and the maintenance needed to stay secured.
o It is required periodic maintenance.
o Data transmitted over radio waves can be captured by any Wi-Fi ready devices in the
area.
o Unauthorized use.
o It has unauthorized uses.
o Frame spoofing.
o Session hijacking.
(b) Describe the four requirements that are addressed in network security. [4 marks]
Authentication - Verify the identity of the source of the data that is sent. This is necessary to
guard against a number of attacks that depend on spoofing the identity of the sender.
Authentication ensures that the connection is made with the desired communication partner. The
receiver can authenticate the source of the packet by certifying the source of the information.
Anti-Replay Protection - This is the ability to detect and reject replayed packets and helps
prevent spoofing. Anti-replay protection verifies that each packet is unique and not duplicated.
Packets are protected by comparing the sequence number of the received packets with a
sliding window on the destination host or security gateway. A packet that has a sequence
number that is before the sliding window is considered to be late or a duplicate packet. Late
and duplicate packets are dropped.
(c) What are the standards that define the following: [5 marks]
(i) Wireless LAN IEEE802.11
(ii) Bluetooth IEEE802.16
(iii) Wireless personal area networks (WPAN) IEEE802.15
(iv) MAC layer for token ring networks. IEEE802.5
(v) Ethernet MAC layer for bus networks that use CSMA/CD. IEEE802.3
Question 5
vertex u v w x y z
U 0 2u 5u 1u ∞ ∞
V 0 2u 5v 1u ∞ ∞
X 0 2u 4x 1u 2x ∞
Y 0 2u 3y 1u 2x 4y
b) Describe how the DHCP protocol works specifying at which layer it operates on. [5
marks]