You are on page 1of 5

KCA UNIVERSITY MAIN CAMPUS

FULL TIME

DAY LERNING

JOY NTINYARI KIMATHI

REF: 20/05230

BAC

LECTURER: CLIVE ONSOMU

UNIT CODE: BAC 1206

EXAMINATION

NETWORKING ESSENTIALS.
QUESTION ONE [20 MARKS]

a). Explain the following concerning wireless networks

i) Most wireless access points and devices have the option of encrypting traffic. Which
OSI layer is that encryption-taking place? [3 Marks]

The presentation layer, layer seven of the OSI model does the encryption. Here, encryption
methods and keys are exchanged between the two communicating devices. Thus, only the
sender and receiver can properly encode and decode data so it returns to a readable
format.

ii) Which principle of Internet design does the encryption in part (a) (appear to) violate?
Explain your answer. [3 Marks]

b). Transport protocols rely on different types of checksums to verify whether segments have
transmission errors. Briefly explain TWO frequently used checksums [4 Marks]

The two most important protocols in the Transport Layer are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP). Where TCP provides reliable data
delivery service with end-to-end error detection and correction while UDP provides low-
overhead, connectionless datagram delivery service. They both deliver data between the
Application Layer and the Internet Layer.

c). By using your knowledge of the Internet checksum, can you find a transmission error that
will not be detected by the Internet checksum ? Explain. [6 Marks]
Transmission errors which will not be detected are; First, when bits are
swapped. In that if two bits are swapped during transmission e.g. 1001
becomes 1100 it means the checksum values are the same and undetectable.

Secondly, when data value is increased. In that the value of one data item is
increased or increased maliciously or intentionally the checksum cannot
detect these changes.

Thirdly, if data is changed. In that one or more data is changed in such a way
that the change is a multiple of 216 − 1, the sum or the checksum cannot
detect the changes.

d). Explain the application of the following protocols:

i) HTTP [2 Marks]

It is a protocol which allows the fetching of resources such as HTML document. It is a


foundation of any data exchange on the web and a client server protocol where requests are
initiated by the recipient.
ii) UDP [2 Marks]

It is a communication protocol that facilitates the exchange of messages between computing


devices in a network. It is called User Datagram Protocol in full.
QUESTION TWO [20 MARKS]

a) Explain the importance of Layering as used in Computer networks [2 Marks]

b) Why is CSMA/CD not practical for wireless networks? Discuss TWO reasons [6 Marks]

c) Using relevant diagrams, describe FOUR network topologies. Justify appropriate


application for each. [12 Marks]
QUESTION THREE [10 MARKS]

a) What is guided communication medium? Give TWO examples. [1 Marks]

b) Characterize the spread, bandwidth, latency, error rate, scalability and administrability of
the MAN. [3 Marks]

c) Describe the structure, characteristics or limitations of the following communication


medium: [3 Marks]

i). twisted pair;

ii). coaxial cable;

iii). fiber optics;

d) Give THREE examples of distinct applications for which connection-less communication


is appropriate. [3 Marks]

You might also like