Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Computer Network Management Question Paper

Computer Network Management 

Course:Business Information Technology

Institution: Kenya Methodist University question papers

Exam Year:2011



ANSWER QUESTION NUMBER ONE AND ANY TWO.

1. (a) what is a topology? (2mks)
(b) KEMU University wants to interlink the various departments fro the purpose of sharing resources and information. Propose the appropriate topology that can be convenient for this plan and why? (8mks).

2. (a) A beam of light moves from one medium to another with less density. The critical angle is 60. What will be the behavior of light for each of the following incident angles? Show the bending of light ray in each case.

(i) 500
(ii) 600
(iii) 700
(6mks)
(b). Are the processes of creating a MAC and of a signing a hash the same? What are the differences? (4mks).

3. (a). How can a system prevent a guessing attack on a password? How can a bank prevent PIN guessing if someone has found or stolen a bank card and tried to use it?
(5mks).

(b)Assume TCP is sending segments using a maximum window size (64 Kbytes) on a channel that has infinite bandwidth and an average roundtrip time of 20 milliseconds.
What is the maximum throughput?
How does throughput change if the roundtrip time increases to 40 milliseconds (while bandwidth remains infinite)?
(5mks)
4. (a) What is computer Network? (2mks)
(b) Discuss in detail the LAN Hardware and software (8mks)


SECTION B. (40mks)

Answer Any Two Questions.
5. (a). Muhando, protocol designer has been asked to design a scheme to prevent messages from being modified by an intruder .Muhando decides to append to each message a hash of that message.
How can this solve the problem and why? (10mks)

(b).Describe the strategies and tools used to find resources over the Network.
(10mks).

6. (a) What is the significance of the twisting in twisted pair cable?
(5mks).
(b) Calculate the bandwidth of light for the following wavelength ranges.(Assume the propagation speed of 2*108M
(i) 1000 to 1200nm (5mks).
(ii) 1000 to 1400nm (5mks).
(c) When a person uses a money machine to get cash, is this a message authentication, an entity authentication or both? Explain (5mks)
7.(a) Suppose a computer sends a packet at the network layer to another computer somewhere in the internet. The logical destination address of the packet corrupted. What happens to the packet? How can the source computer be informed of the situation? (5mks)
(b) Discuss the characteristics of a good fault tolerant disk configuration.
(10mks).






More Question Papers


Popular Exams



Return to Question Papers