You are on page 1of 9

NAME i: iMOHAMUD iMOHAMED iKHALID

REG iNO i: iCIS-0268-1-2020


UNIT iNAME i: iNETWORK iHARDWARE
UNIT iCODE: i iCISY i332

QUESTION iA

a) Define iia iinetwork iioperating iisystem ii(NOS) iiand iigive iitwo iiexamples iiof iiNOS ii(4 iimarks)
• Network iiOperating iiSystem iiis iia iicomputer iioperating iisystem iithat iifacilitates iito iiconnect
ii and iicommunicate iivarious iiautonomous iicomputers iiover iia iinetwork. ii
• Examples iiof iiNetwork iiOperating iiSystem iiare: iiMicrosoft iiWindows iiServer ii2003,
ii Microsoft iiWindows iiServer ii2008 iietc.

b) Draw iia iiblock iidiagram iishowing iihow iifour iiswitches iican iibe iiconnected iitogether iiwith
ii redundant iilinks iito iiform iithe iifollowing iihierarchy:
i) Network iiaccess iilevel iior iilayer ii(2 iimarks)
ii) The iiswitches iiconnected iito iia iicore iilayer iiof iithree iirouters ii(4 iimarks)

a) Name iia iitool iiand iishow iihow iiyou iiwould iiuse iiit iito iido iithe iifollowing:
i) The iiresponse iitime iibetween iiyour iicomputer iiand iia iigateway iiwhich iihas iiIP iiaddress
ii 192.0.1.1 ii(2 iimarks)
• Check iithe iiresponse iiof iihosts iion iithe iinetwork iiwith iithe iiping iicommand. iiIf iiyou iisuspect iia
ii physical iiproblem, iiyou iican iiuse iiping iito iifind iithe iiresponse iitime iiof iiseveral iihosts iion iithe
ii network. iiIf iithe iiresponse iifrom iione iihost iiis iinot iiwhat iiyou iiwould iiexpect, iiyou iican
ii investigate iithat iihost.
ii) To iiupload iiwebsite iifiles iion iithe iinetwork iiserver ii(2 iimarks)

• To iipublish iifiles iito iithe iiweb iiis iiby iiusing iian iiFTP ii(file iitransfer iiprotocol) iiprogram. iiThese
ii programs iicreate iia iilink iibetween iiyour iicomputer iiand iithe iiserver iithat iihosts iiyour iiaccount,
ii allowing iiyou iito iicopy iiand iipaste ii(or iiclick iiand iidrag) iiyour iiwebsite iifiles iito iiyour
ii HostPapa iihosting iispace. ii

iii) ii To iiaccess iiother iicomputers iiconnected iito iiyour iiLAN ii(2 iimarks)
• Clicking iiNetwork iilists iievery iiPC iithat’s iiconnected iito iiyour iiown iiPC iiin iia iitraditional
ii network. iiClicking iiHomegroup iiin iithe iiNavigation iiPane iilists iiWindows iiPCs iiin iiyour
ii Homegroup, iia iisimpler iiway iito iishare iifiles. iiTo iibrowse iifiles iion iiany iiof iithose iiPCs iiin
ii either iicategory, iijust iidouble-click iitheir iinames.

iv) To iilog iiout iia iiswitch iior iirouter iiin iiorder iito iiconfigure iiit ii(2 iimarks)
• Press ii<Ctrl+Shift+6>, iithen iipress iix. iiThis iisequence iireturns iiyou iito iithe iirouter iiconsole
ii while iikeeping iithe iiconsole iisession iito iithe iiswitch iimodule iiintact iiand iithen iiexits iithe
ii console iisession iito iithe iiswitch iimodule.This iiapply iito iiCisco iiswitches iiand iirouters ii

v) To iidisplay iithe iiroute ii(path) iiand iimeasure iitransit iidelays iiof iipackets iiacross iian iiIP
ii network ii(2 iimarks)
• You iineed iito iiuse iitraceroute iicommand, iiwhich iidisplay iithe iiroute iipackets iitake iito iinetwork
ii host iion iithe iiInternet. iiIt iitraces iia iipacket iifrom iiyour iicomputer iito iian iiInternet iihost,
ii showing iihow iimany iihops iithe iipacket iirequires iito iireach iithe iihost iiand iihow iilong iieach iihop
ii takes.

QUESTION iiB

a) An iiorganization iiis iiassigned iithe iinetwork iinumber ii193.1.1.0/24. iiThere iiis iineed iito
ii define iisix iisubnets. iiThe iilargest iisubnet iiis iirequired iito iisupport ii25. ii ii iiDesign iithe
ii relevant iisubnets. ii(6 iimarks)

255.255.255.224 = 11111111.11111111.11111111.11100000

193.1.1.0\24 = 11000001.00000001.000000001.00000000.11000001.00000001

𝑠𝑢𝑏𝑛𝑒𝑡 ii#0 ii: 11000001.00000001.00000 = 193.1.1.0\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#1 ii: 11000001.00000001.00000 = 193.1.1.32\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#2 ii: 11000001.00000001.00000 = 193.1.1.64\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#3 ii: 11000001.00000001.00000 = 193.1.1.96\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#4: 11000001.00000001.00000 = 193.1.1.128\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#5 ii: 11000001.00000001.00000 = 193.1.1.160\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#6 ii: 11000001.00000001.00000 = 193.1.1.192\27

𝑠𝑢𝑏𝑛𝑒𝑡 ii#7 ii: 11000001.00000001.00000 = 193.1.1.224\27

b) Define iia iivirtual iiprivate iinetwork ii(VPN) ii(2 iimarks)

• Virtual iiprivate iinetwork, iior iiVPN, iiis iian iiencrypted iiconnection iiover iithe iiInternet iifrom iia
ii device iito iia iinetwork. ii
i) Describe iifive iicomponents iineeded iito iibuild iia iiVPN ii(5 iimarks)
• Transit iinetwork iiThis iiis iithe iishared iinetwork iithat iithe iiencapsulated iidata iitraverses iito
ii connect iito iithe iiremote iinetwork. iiThis iiis iiusually iithe iiInternet.
• VPN iitunnel iiThis iiis iithe iilink, iior iiconnection, iithat iiencapsulates iiand iiencrypts iithe iiprivate
ii data
• Authentication iiThe iiidentity iiof iithe iiVPN iiclient iiand iiVPN iiserver iiare iiauthenticated iito
ii ensure iithat iineither iiend-point iiis iibeing iiimpersonated iiby iia iimalicious iiattacker.
• Address iiand iiname iiserver iiallocation iiThe iiVPN iiserver iiis iiresponsible iifor iiallocating iiIP
ii addresses iifrom iia iistatic iipool iiof iiaddresses iior iiusing iiDynamic iiHost iiConfiguration
ii Protocol ii(DHCP), iiand iiassigning iiDomain iiName iiSystem ii(DNS) iiand iiWindows iiInternet
ii Naming iiService ii(WINS) iiaddresses iito iiclients
• Tunneling iiprotocols iiThere iiare iitwo iiprotocols iithat iiare iiused iito iimanage iitunnels iiand
ii encapsulate iiprivate iidata: iiPoint-to-Point iiTunneling iiProtocol ii(PPTP), iiand iiLayer iiTwo
ii Transport iiProtocol ii(L2TP). iiPPTP iioperates iiwith iiuser-level iiPPP iiauthentication
ii methods, iias iiwell iias iiwith iiMicrosoft iiPoint-to-Point iiEncryption ii(MPPE) iifor iidata
ii encryption. iiL2TP/IPSec ii(Internet iiProtocol iiSecurity) iiused iiwith iicertificates iifor
ii authentication iiis iione iiof iithe iimost iisecure iimethods iiof iitransmitting iidata iiover iia iipublic
ii network. ii

c) What iiis iispanning iitree iiprotocol ii(STP) ii(1 iimark)


• Spanning iiTree iiProtocol ii(STP) iiis iia iiLayer ii2 iiprotocol iithat iiruns iion iibridges iiand iiswitches.
ii The iispecification iifor iiSTP iiis iiIEEE ii802.1D. iiThe iimain iipurpose iiof iiSTP iiis iito iiensure iithat
ii you iido iinot iicreate iiloops iiwhen iiyou iihave iiredundant iipaths iiin iiyour iinetwork. iiLoops iiare
ii deadly iito iia iinetwork.

(ii) iiAt iiwhat iilevel iiof iithe iiOSI iimodel iidoes iiSTP iifunction ii(1 iimark)

• Layer ii2 iitechnology iifor iipreventing iiLayer ii2 iiloops iibetween iiredundant iiswitch iipaths.

QUESTION iiC

a) Define iithe iiterm ii“network iiadministration” ii(2 iimarks)


• Network iiadministration iiaims iito iimanage, iimonitor, iimaintain, iisecure, iiand iiservice iian
ii organization’s iinetwork. iiHowever, iithe iispecific iitasks iiand iiprocedures iimay iivary
ii depending iion iithe iisize iiand iitype iiof iian iiorganization.
b) As iia iinewly iiemployed iinetwork iiadministrator iiin iian iiorganization, iiwhat iiwould iibe
ii your iifirst iireaction iiwhen iiyou iiobserve iithe iifollowing?
i) Network iihosts iiallow iiany iiemployee iito iilog iionto iithe iinetwork iiresources iiand iiutilize
ii them iiwithout iiauthentication ii(2 iimarks)
• You iilogin iito iithe iirouter iiand iiset iithe iiauthentication iiand iicreate iia iiconsole iifor iiregistering
ii users iito iilogin iito iithe iinetwork. iiThat iiis iiwhen iiemployees iiwant iito iilogin iihe/she iineeds iito
ii enter iiusername iiand iipassword iito iiaccess iithe iinetwork. ii

ii) The iiorganization iihas iia iiWLAN iibut iithe iisignal iiis iivery iiweak iiin iisome iioffices ii(2
ii marks)
• Install iimore iirepeaters iiand iiMove iiyour iirouter iito iia iimore iicentralized iilocation

c) Using iian iiappropriate iidiagram, iishow iihow iiyou iiwould iiencode iithe iibit iistream
ii 01001100011 iiusing iinon-return iito iizero iistrategy ii(3 iimarks)
d) The iidata iilink iilayer iiis iivery iiimportant iifor iinetworking.
i) State iithree iiservices iioffered iiby iithis iilayer ii(3 iimarks)
• Framing ii- iiData-link iilayer iitakes iipackets iifrom iiNetwork iiLayer iiand iiencapsulates iithem
ii into iiFrames.Then, iiit iisends iieach iiframe iibit-by-bit iion iithe iihardware. iiAt iireceiver’ iiend,
ii data iilink iilayer iipicks iiup iisignals iifrom iihardware iiand iiassembles iithem iiinto iiframes.
• Addressing ii- iiData-link iilayer iiprovides iilayer-2 iihardware iiaddressing iimechanism.
ii Hardware iiaddress iiis iiassumed iito iibe iiunique iion iithe iilink. iiIt iiis iiencoded iiinto iihardware iiat
ii the iitime iiof iimanufacturing.
• Error iiControl ii-Sometimes iisignals iimay iihave iiencountered iiproblem iiin iitransition iiand iithe
ii bits iiare iiflipped.These iierrors iiare iidetected iiand iiattempted iito iirecover iiactual iidata iibits. iiIt
ii also iiprovides iierror iireporting iimechanism iito iithe iisender.
ii) What iiprotocol iiis iiused iito iilink iitwo iicommunicating iiservices iion iia iinetwork iiusing
ii MAC iiaddress? iiWhat iidata iiunit iiis iiused? ii(3 iimarks)
• The iiAddress iiResolution iiProtocol(ARP) iiis iia iicommunication iiprotocol iiused iito
ii discover iithe iidata-link iilayer iiaddress(Layer ii2 iiaddress iilike iiMedia iiAccess
ii Control(MAC) iiaddress) iiassociated iiwith iian iiInternet iilayer iiaddress(Layer ii3
ii address iilike iiIpv4 iiaddress).
e) Describe iia iiFDDI) iinetwork. iiUse iidiagrams iito iishow iiits iiresilience iiagainst iicable
ii breaks ii(5 iimarks)
• FDDI ii(Fiber iiDistributed iiData iiInterface) iiis iia iinetwork iistandard iithat iiuses iifiber
ii optic iiconnections iiin iia iilocal iiarea iinetwork ii(LAN) iithat iican iiextend iiin iirange iiup iito
ii 200 iikilometers ii(124 iimiles). iiThe iiFDDI iiprotocol iiis iibased iion iithe iitoken iiring
ii protocol. iiA iiFDDI iiLAN iican iisupport iithousands iiof iiusers. iiWhile iiFDDI iiis
ii frequently iiused iion iithe iibackbone iifor iia iiwide iiarea iinetwork ii(WAN) iior iicampus
ii area iinetwork ii(CAN), iiit iihas iibeen iilargely iisuperseded iiby iiother iinetworking
ii technologies.
f) Explain iithe iihierarchical iinetwork iimanagement iiarchitecture. iiDraw iia iidiagram iito
ii depict iithis iiarchitecture, iigiving iione iiadvantage iiof iithe iiarchitecture ii(6 iimarks)
• Network iimanagement iiarchitecture iiis iia iicollection iiof iitools iifor iinetwork
ii monitoring iiand iicontrol iithat iiis iiintegrated iiin iithe iifollowing iisenses: iiA iisingle
ii operator iiinterface iiwith iia iipowerful iibut iiuser-friendly iiset iiof iicommands iifor
ii performing iimost iior iiall iinetwork iimanagement iitasks

Advantages ii

• Enhanced iiperformance ii-A iihierarchical iinetwork iidesign iimeans iidata iiis iirouted
ii through iiaggregated iiswitchport iilinks iiat iiclose iito iiwire iirate, iiinstead iiof iibeing iisent
ii through iilower iiperformance iiintermediary iiswitches.
• Improved iireliability ii- iiThe iimodular iinature iiof iia iihierarchical iinetwork iitranslates
ii into iia iimore iireliable iinetwork iias iia iiwhole, iias iisegments iithat iifail iior iibecome
ii degraded iican iibe iiisolated iiand iirouted iiaround. iiThe iirest iiof iithe iinetwork iiwon’t iibe
ii affected.
• Increased iiscalability ii- iiHierarchical iinetworks iiare iimore iiflexible iithan iitheir
ii counterparts. iiSegments iiand iielements iican iieasily iibe iiadded iiwithout iisignificantly
ii disrupting iithe iiexisting iinetwork.
• Better iisecurity ii- iiIn iiterms iiof iisecurity, iia iihierarchical iinetwork iipermits iia iigreater
ii level iiof iicontrol. iiAccess iicontrol iilists iican iibe iimore iicomplex iiand iigranular, iiand
ii traffic iican iibe iishaped iiand iiblocked iimore iieffectively.
• Increased iicost iiefficiency ii- iiIT iinetworking iiequipment iiis iian iiexpensive iinecessity.
ii However, iihierarchical iinetwork iidesign iican iireduce iicosts iibecause iithe
ii organization iican iilimit iithe iiamount iiof iiequipment iito iionly iiwhat iiis iineeded iibased
ii on iithe iilogical iistructure iiof iithe iienterprise.
g) When iiconfiguring iinetwork iiservices iilike iirouters, iidescribe iithe iiimportance iiof iithe
ii following iicommand: ii ii

ii ii ii ii ii ii ii ii ii ii ii ii ii ii Password ii(1 iimark)


• Passwords iiare iia iicritical iipart iiof iiinformation iiand iinetwork iisecurity. iiPasswords iiserve iito
ii protect iiuser iiaccounts iibut iia iipoorly iichosen iipassword, iiif iicompromised, iicould iiput iithe
ii entire iinetwork iiat iirisk. ii

ii ii ii ii ii ii ii ii ii ii ii Username ii(1 iimark)

• Username iiis iia iiunique iiidentifier iithat iienables iia iiuser iito iilog iion iito iia iicomputer iior iinetwork.
ii

ii ii ii ii ii ii ii ii ii ii ii Enable ii(1 iimark)

• Enabling iior iidisabling iirouter-advertisement ii(RA) iimessages iienables iiyou iito iicontrol iithe
ii routing iiconfiguration iifor iiselecting iithe iicorrect iinetwork iiinterface iito iicommunicate iiwith
ii its iineighbors.

ii ii ii ii ii ii ii Service iipassword iiencryption ii(1 iimark)

• Command iiallows iiyou iito iiencrypt iiall iipasswords iion iiyour iirouter iiso iithey iicannot iibe iieasily
ii guessed iifrom iiyour iirunning-config. iiThis iicommand iiuses iia iivery iiweak iiencryption
ii because iithe iirouter iihas iito iibe iivery iiquickly iidecode iithe iipasswords iifor iiits iioperation.

You might also like