Professional Documents
Culture Documents
FULL TIME
DAY LERNING
REF: 20/05230
BAC
EXAMINATION
NETWORKING ESSENTIALS.
QUESTION ONE [20 MARKS]
i) Most wireless access points and devices have the option of encrypting traffic. Which
OSI layer is that encryption-taking place? [3 Marks]
The presentation layer, layer seven of the OSI model does the encryption. Here, encryption
methods and keys are exchanged between the two communicating devices. Thus, only the
sender and receiver can properly encode and decode data so it returns to a readable
format.
ii) Which principle of Internet design does the encryption in part (a) (appear to) violate?
Explain your answer. [3 Marks]
b). Transport protocols rely on different types of checksums to verify whether segments have
transmission errors. Briefly explain TWO frequently used checksums [4 Marks]
The two most important protocols in the Transport Layer are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP). Where TCP provides reliable data
delivery service with end-to-end error detection and correction while UDP provides low-
overhead, connectionless datagram delivery service. They both deliver data between the
Application Layer and the Internet Layer.
c). By using your knowledge of the Internet checksum, can you find a transmission error that
will not be detected by the Internet checksum ? Explain. [6 Marks]
Transmission errors which will not be detected are; First, when bits are
swapped. In that if two bits are swapped during transmission e.g. 1001
becomes 1100 it means the checksum values are the same and undetectable.
Secondly, when data value is increased. In that the value of one data item is
increased or increased maliciously or intentionally the checksum cannot
detect these changes.
Thirdly, if data is changed. In that one or more data is changed in such a way
that the change is a multiple of 216 − 1, the sum or the checksum cannot
detect the changes.
i) HTTP [2 Marks]
b) Why is CSMA/CD not practical for wireless networks? Discuss TWO reasons [6 Marks]
b) Characterize the spread, bandwidth, latency, error rate, scalability and administrability of
the MAN. [3 Marks]