Get premium membership and access revision papers, questions with answers as well as video lessons.

Cisy 332:Network Hardware And Configuration Question Paper

Cisy 332:Network Hardware And Configuration 

Course:Computer Science

Institution: Kenya Methodist University question papers

Exam Year:2013



KENYA METHODIST UNIVERSITY

END OF 3''RD ''TRIMESTER 2013 EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS INFORMATION
UNIT CODE : CISY 332/BBIT 446/DCIS 220
UNIT TITLE : NETWORK HARDWARE AND CONFIGURATION
TIME : 2 HOURS




INSTRUSTIONS: Answer question one and any other two

Question One

A client wishes you to design a networking device that will interoperate with other devices, is portable and the system in which it should work should be transparent. Explain how the layering approach adapted in the open system interconnection reference model will assist you in this function.

(6mks)

Explain three uses of computer networks for business applications.

(3mks)

Given the networks address 172.20.0.0 and mask 265.255.128.0 determine the following

Identify the network address class?

(1mk)

What is the number of subnets for this network?

(1mk)

How many hosts are there per subnet?

(1mk)

What are the valid subnets?

(1mk)

What are the broadcast addresses for each subnet.

(1mk)

What are the valid hosts

(1mk)

Convert the mask into the slash notation

(1mk)

Explain the three types of IPV6 addresses.

(6mks)

A switch can replace a hub to break up collision domains in a network. Explain four causes of LAN traffic congestion.

(8mks)

Question Two

With reference to the ISO-OSI model answer the following:

Which layer chooses and determines the availability of communicating partners along with resources necessary to make the connection, co-ordinates partnering application and forms a consensus on procedures for controlling data integrity and recovery?

(1mk)

Which layer ensures the trust worthy transmission of data across a physical link and is primarily concerned with physical addressing line discipline, network topology and flow control.

(1mk)

Which layer is responsible for keeping the data from different applications separate on the network?

(1mk)

Which layer provides logical addressing that routers will use for path determination?

(1mk)

Which layer specifies voltage, wire speed and pinout cables and moves bits between devices.

(1mk)

A computer network is created when two or more computer are wired together to share information and resources. Briefly explain five other motivations for computer networks.

(5mks)

A signal picks up unwanted random energy. Explain three such transmission impairments.

(3mks)

List two protocols that accomplish communication in the networklayer of the OSI model.

(2mks)

Question Three

Describe what role a network adapter card plays as a connectivity device in network communications.

(5mks)

List the applications of fiber optic cables.

(5mks)

Explain five factors used in the comparison of network architecture.

(5mks)

Question Four

Describe the important basic network hardware and the internetworking hardware.

(5mks)

Why is it important to provide built-in fault tolerance in networks? (2mks)

Explain any four security threats to network hardware.

(8mks)






More Question Papers


Popular Exams



Return to Question Papers