Get premium membership and access revision papers, questions with answers as well as video lessons.

Introduction To Computer Networks (Bbit 241) (Cisy 131) 1St Trimester 2014 Question Paper

Introduction To Computer Networks (Bbit 241) (Cisy 131) 1St Trimester 2014 

Course:Bachelor Of Business Information Technology

Institution: Kenya Methodist University question papers

Exam Year:2014



INTRODUCTION TO COMPUTER NETWORKS (BBIT 241) (CISY 131) 1ST TRIMESTER 2014
KENYA METHODIST UNIVERSITY

END OF 1'ST 'TRIMESTER 2014 (EVENING) EXAMINATION

FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 241/CISY 131/DBIT223/DCIS 121
UNIT TITLE : INTRODUCTION TO COMPUTER NETWORKS
TIME : 2 HOURS


Instructions:

PART A

Question One

Define the following terms in relation to computer network security. (5mks)
Data integrity
System vulnerability
Firewalls
Data confidentiality
Data system availability
What are two reasons for using layered protocols?
(2mks)
What is the difference between connectionless communication and connection oriented communication?
(2mks)
What does "negotiate" mean when discussing network protocols? Please illustrate with an example.
(2mks)
Which of the OSI layers handles each of the following.
(4mks)
Dividing the transmitted bit stream into frames?
Determining which route through the brief to use?
When comparing the OSI reference model and the TCP/IP reference model
List two ways in which the models are the same.
(2mks)
List two ways in which the models are different.
(2mks)
What is the difference between a TCP and UDP protocols? (2mks)
An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the images uncompressed. How long does it take to transmit it over a 100 mbps Ethernet home connection?
(5mks)
List two advantages and two disadvantages of having international standards for networks protocols?
(4mks)
PART B

Question Two

Explain the following briefly by giving the full name s of the acronyms, which layer they are included in and what they do. (20mks)
CSMA/CD
CSMA/CA
MAC address
Sliding window (TCP)
Icmp
ARP
OSPF
BGP
CRC
Routing


Question Three

Briefly discuss each of the wireless transmission given below. For each, please give an example of application in networking. (20mks)
Radio transmission
Microwave transmission
Infrared transmission
Satellite transmission


Question Four

Mach the following functions to one or more layer of TCP/IP protocol stack. (20mks)
End-to-end error detection and correction layer(s)
Flow control layer(s)
Transmission of signal (s)
Process-to-process message delivery layer(s)
Framing layer(s)
Routing layer(s)
Forwarding layer(s)
Congestion control layer(s)
Hop-by-hop error detection and correction layer(s)
Name to ip address resolution layer(s)






More Question Papers


Popular Exams



Return to Question Papers