You are on page 1of 3

MOUNT KENYA UNIVERSITY THIKA CAMPUS.

NAME : SHARON SAINAPEI SENTERO.

REG: CIT/2020/61215.

UNIT: NETWORK SET UP AND DESIGN.

UNIT CODE: CIT2207.

NETWORK SET UP CAT.

1. Discuss how DHCP functions in a local area network.


 Managing IP addresses. The DHCP server controls a range of IP addresses and allocates
them to client server, either permanently or for a defined period of time.
 Providing network configuration for clients. The server assigns an IP address and provides
other information for network configuration, such as a host name and broadcast address.

2. Discuss three network commands and show how they are used.

 IP Config. The command IP Config will display basic details about the devices IP address
configuration . Just type the IP Config in the windows prompt and the IP, subnet mask will be
presented.
 Tracert . This is a command prompt which is used to get the network packet being sent and
received, and the number of hops reguired for the packet to reach the target.
 Hostname. For a computer to communicate with each other it needs a unique address,
hostname can be alphabetic or alphanumeric and contain specific symbols used specifically
to define a specific node or device in the network.

3. Discuss the main functions of the following,

 DNS. This stands for Domain name system. The main functions of DNS is to translate domain
names into IP addresses, which computers can understand.
 RJ45. This is a type of cable connector mainly used in computer networks. It is mainly used for
Ethernet networking which is used to connect different types of devices like a switch, Hub and
a PC to each other.
4.using a diagram illustrate how three labs will be connected together to form one LAN that has
internet connection.show all the devices required for connectivity.

Lab1
Comp
Access
point. Wi fi
Internet
wa Switc Comp
h
Router
Switch Comp

Server Switch Comp

Comp
Comp

Comp Switch
Comp

Comp

5. Explain the following terms as used in Networking.

 Demodulation. This is extracting the original information bearing signal from the carrier wave.
 Attenuation. This is the loss of signal strength in Networking cables or connection. It is
measured in decibels or voltage and can occur due to a variety of factors.
 Bandwidth. It is calculated in megabits per second. This is the maximum amount of data
transmitted over an internet connection in a given amount of time.
 User account. This is a location on a network sever used to store a computer username,
password, and other information.

6. Explain the process of terminating a straight through twisted pair cable using Type B, starndand .
Further, draw the arrangements of the 8 color coded copper wires.

The process of terminating a twisted pair cable.

 Use the tools needed such as jacket striper and wire cutters.
 Insert cables into stripping tool to the desired strip length.
 Determine the wiring scheme and properly align all four cable according on the jack.
 Preserve the pair twist as close as possible to the point of termination.

The arrangement of the 8 color coded wires.

Pair shield.

7. Give the main differences between the following term as used in computer networks.

 Half and Full duplex. Half duplex can only transmit in one direction at one time, while full
duplex device is capable of bi_direction network data transmission at the same time.
 Mac address and IP address. Mac address is used to ensure the physical address of computer
uniquely identifies the devices on a network. While IP addresses are used to uniquely identify
the connection of network when that device takes part in a network.
Outer jacket.

Shield.

 Logical and physical topologies. A logical topology is how devices appear connected to the user,
while a physical topology is how devices are actually interconnected with wires and cables.

You might also like