Professional Documents
Culture Documents
LECTURER: J. SIRMA
1. Security - an Ethernet connection has higher levels of security unlike Wifi where it is
prone to attacks. With an ethernet connection, one can always have the control over
who is using the network.
1
d) Explain any three differences between MAC and IP address
iii. Virtual LAN (VLAN) - is a logical overlay network that groups together a subset of
devices that share a physical LAN, isolating the traffic for each group.
QUESTION TWO
2
a) Using a diagram, explain the differences between OSI reference model and the TCP/IP
protocol suite
3
TCP UDP
QUESTION THREE
4
2**n = Subnet Size
2**5 = Subnet Sizes for each subnet.
2*2*2 = 8
Ipv4 - Slash notation is a compact way to show or write an IPv4 subnet mask. When you
use slash notation, you write the IP address, a forward slash (/), and the subnet mask
number.
In IPv6, slash notation is used to represent the network identifier prefix for an IPv6
network. The prefix is expressed as a slash (/) followed by the prefix size, which is a
decimal number between 1 and 128.
QUESTION FOUR
i. SNMP Manager – It’s a system used to monitor network. Its also known as
Network Management Station (NMS)
ii. SNMP Agent – It’s a software module installed on a managed device. Managed
devices can be network devices like PC, routers, switches etc.
iii. Management Information Base – this consists of information on resources that
are to be managed. This information is organized hierarchically. It also consists
of objects instances which are essentially variables.
It operates in the physical and medium access control (MAC layer) of the Open
Systems Interconnection (OSI) network model.
5
It is used in LANs up to 200 kilometers for long distance voice and multimedia
communication.
It uses ring based token passing mechanism and is derived from IEEE 802.4 token
bus standard.
It contains two token rings, a primary ring for data and token transmission and a
secondary ring that provides backup if the primary ring fails.
QUESTION FIVE
I. ATM is easy to integrate with LAN, MAN and WAN network types i.e. seamless
integration.
II. It is QoS oriented and high speed oriented.
III. ATM enables efficient use of network resources using bandwidth on demand
concept.
IV. ATM also uses simplified network infrastructure.
b) Explain the following cryptography techniques used to secure data being transmitted in a
computer network
i. A secret key is the piece of information or parameter that is used to encrypt and
decrypt messages in a symmetric, or secret-key, encryption. A secret key may also be
known as a private key.
ii. Public key cryptography is a method of encrypting or signing data with two different
keys and making one of the keys, the public key, available for anyone to use.