You are on page 1of 6

lOMoARcPSD|29157911

BISF 2207 PAST Paper( Revised)

Network System Administration (KCA University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Victor Sebstar (victorsebstar@gmail.com)
lOMoARcPSD|29157911

BISF 2207 PAST PAPER.


QUESTION ONE (20 Marks) Compulsory
a) Define the following networking terminologies:
i) Bandwidth [2 Marks]- the maximum data transfer rate of a network or internet
connection.
ii) Throughput [2 Marks]- The measure of the rate of data transfer over a network within a
given timeframe.
iii) Latency [2 Marks]- The time it takes for data to pass from one point on a network to
another. It is the network-facing access handle to the network socket.
b) Define socket pairs and their role in network communication. [4 Marks]
 A socket pair is a pair of connected sockets. It’s very similar to a pipe and is
used in much the same way.

 Role in Network Communication:


i. Endpoint of Communication: Socket pairs are one endpoint of a two-way
communication link between two programs running on the network.
ii. Inter-Process Communication (IPC): The socket mechanism provides a
means of inter-process communication by establishing named contact points
between which the communication takes place.
iii. Data Transfer: Socket pairs allow data to be read and written between
processes.
iv. Protocol Stack: Each process establishes a network socket in its own instance
of the protocol stack and uses the networking API to connect to the
application.
v. Socket Address: Each process presents its own socket address for use by the
application.
c) Explain the following command line tools:
i) Ping [2 Marks]- A software application, utility, or a tool that is used to test and diagnose
connectivity-related issues on a network. It is based on the ICMP protocol.
ii) Tracert/Traceroute [2 Marks]- A command-line tool that allows you to use a set of
computer network diagnostic commands to troubleshoot TCP/IP problems.
iii) nslookup [2Marks]- A command-line tool that queries the Domain Name System (DNS)
to obtain information about domain names, IP addresses, and other DNS records.
d) Explain the communication process between a DHCP client and a DHCP server in obtaining
an IP address, subnetmask, default gateway and DNS server details.

Downloaded by Victor Sebstar (victorsebstar@gmail.com)


lOMoARcPSD|29157911

[4Marks]
 DHCP Discover: The client sends a broadcast message (DHCP Discover) on the
network in search of a DHCP server.
 DHCP Offer: Any DHCP servers on the network respond to the broadcast by
offering an IP address to the client. This message also includes other network
configuration details like subnet mask, default gateway, and DNS server details.
 DHCP Request: The client receives the offer(s) and selects one. It then sends a
DHCP Request message back to the server indicating that it accepts the offer.
 DHCP Acknowledgement (ACK): The DHCP server sends a DHCP ACK message to
the client, acknowledging that the IP address has been officially leased to the client
for a specific amount of time.
 IP Lease: The client can now use the IP address and other network configuration
details to communicate on the network. The lease lasts for a specific period, after
which the client must renew the lease or obtain a new one.
QUESTION TWO (15 Marks)
a) Distinguish between layer 2 and layer 3 devices. [5 Marks]
Layer 2 Devices:

Operate on the Data Link Layer of the OSI model.

Use MAC addresses for communica琀椀on.

Send data in the form of frames.

Cannot connect to di昀昀erent networks.

O昀琀en used to reduce data tra昀케c on a LAN.

Examples include switches and bridges.

Layer 3 Devices:

Operate on the Network Layer of the OSI model1.

Use IP addresses for communica琀椀on.

Send data in the form of packets.

Can connect di昀昀erent networks.

Primarily used to operate VLANs and improve security.

Examples include routers.

b) Outline and explain each of the layers in the TCP/IP model [10 Marks]

Downloaded by Victor Sebstar (victorsebstar@gmail.com)


lOMoARcPSD|29157911

Application Layer: This is the highest level of the TCP/IP model. It interacts with software
applications to implement a communicating component.
Transport Layer: This layer is designed to give the source and destination the ability to
have end-to-end conversation. In the TCP/IP model, there are two defined protocols that
can operate in this layer; TCP and UDP.
Internet Layer: This layer is responsible for the packaging and transfer of data between
different networks.
Network Interface Layer: This layer is concerned with the packaging and transfer of data
within a network.
Physical Layer: This layer is responsible for the physical connection between the devices. It
includes the hardware such as the cables and switches.

QUESTION THREE (15 Marks)


a) Identify and explain the two main types of Network Operating systems and give examples of
each. [5 Marks]
i. Peer-to-Peer Network Operating System:
 This type of NOS allows all devices on the network to act as both clients and
servers1.
 Each device can share resources with other devices on the network1.
 It is commonly used in smaller settings with no more than 25 workstations2.
 Examples include Microsoft Windows 7, Windows 8, and Windows 102.

ii. Client-Server Network Operating System:


 This type of NOS is designed to allow multiple clients to access and share resources
from a central server1.
 It is more secure and common for business-based networks1.
 Examples include Microsoft Windows Server, UNIX, and Linux2.

b) Explain the features of NOS as found in a networked environment. [10Marks]


 File and Printer Sharing: NOS allows multiple users on the network to access
shared resources such as files and printers.
 Data Security and Authentication: It provides high-security features such as user
authorization, restrictions on shared data, and hardware authentication. This
includes specific control of features such as user management, log-on controls, and
passwords.
 Distributed Applications: NOS supports applications that run on multiple
networked computers, allowing them to communicate and coordinate their actions.

Downloaded by Victor Sebstar (victorsebstar@gmail.com)


lOMoARcPSD|29157911

 Messaging: It provides a platform for communication between the devices on the


network.
 Centralized Administration: NOS allows network administrators to manage and
monitor the network from a central location.
 Basic Operating System Features: This includes protocol support, hardware
detection, and multiprocessing for applications.
 Name and Directory Services: NOS provides services to translate network names
into their respective network addresses.
 Network Monitoring and Troubleshooting: NOS provides tools for monitoring
network performance and troubleshooting network issues.
 Resource Management: NOS is responsible for managing and configuring resources
on the network.
 Remote Access: NOS provides features for remote access, allowing users to connect
to the network from different locations.
QUESTION FOUR (15 Marks)
a) Highlight the main tasks associated with network administration. [5Marks]
 Design, Installa琀椀on, and Evalua琀椀on of the Network: Network administrators are responsible
for the design, installa琀椀on, and evalua琀椀on of the network.
 Execu琀椀on and Administra琀椀on of Regular Backups: Regular backups are crucial for data
recovery in case of data loss.
 Crea琀椀on of Precise Technical Documenta琀椀on: This includes network diagrams, network cabling
documents, etc.
 Provision for Precise Authen琀椀ca琀椀on to Access Network Resources: Network administrators
enable precise authen琀椀ca琀椀on provisions for access to network resources.
 Troubleshoo琀椀ng Hardware, So昀琀ware, Connec琀椀vity, and Server Issues: Network administrators
are responsible for iden琀椀fying and resolving network issues.

b) Subnet the IP address 192.168.10.0/24 to come up with an address scheme that can support at
least 60 users. (Show your working process)
[10Marks]
i. Determine the new subnet mask that will apply for the networks.
A /24 network has 256 addresses, but we need to support at least 60 users. The closest power of 2
that is greater than 60 is 64 (2^6). So, we need 6 bits for hosts. This leaves us with 32-6=26 bits for the
network. Therefore, the new subnet mask is /26 or 255.255.255.192.

ii. Identify how many subnets will be available.


We have borrowed 2 bits (from 24 to 26) for subne琀�ng. So, the number of subnets will be 2^2 = 4.

iii. Identify how many useable IPs will be in each subnet.

Downloaded by Victor Sebstar (victorsebstar@gmail.com)


lOMoARcPSD|29157911

Each /26 subnet has 2^(32-26) = 64 addresses. However, we cannot use the 昀椀rst address (network
address) and the last address (broadcast address) in each subnet. So, the number of usable IPs in each
subnet is 64-2 = 62.

So, the address scheme that can support at least 60 users is 192.168.10.0/26, with 4 subnets and 62
usable IPs in each subnet. The four subnets are: 192.168.10.0/26, 192.168.10.64/26,
192.168.10.128/26, and 192.168.10.192/26.

Downloaded by Victor Sebstar (victorsebstar@gmail.com)

You might also like