Introduction To Computer Networks (Bbit 241) (Cisy 131) 1St Trimester 2014 Question Paper
Introduction To Computer Networks (Bbit 241) (Cisy 131) 1St Trimester 2014
Course:Bachelor Of Business Information Technology
Institution: Kenya Methodist University question papers
Exam Year:2014
INTRODUCTION TO COMPUTER NETWORKS (BBIT 241) (CISY 131) 1ST TRIMESTER 2014
KENYA METHODIST UNIVERSITY
END OF 1'ST 'TRIMESTER 2014 (EVENING) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 241/CISY 131/DBIT223/DCIS 121
UNIT TITLE : INTRODUCTION TO COMPUTER NETWORKS
TIME : 2 HOURS
Instructions:
PART A
Question One
Define the following terms in relation to computer network security. (5mks)
Data integrity
System vulnerability
Firewalls
Data confidentiality
Data system availability
What are two reasons for using layered protocols?
(2mks)
What is the difference between connectionless communication and connection oriented communication?
(2mks)
What does "negotiate" mean when discussing network protocols? Please illustrate with an example.
(2mks)
Which of the OSI layers handles each of the following.
(4mks)
Dividing the transmitted bit stream into frames?
Determining which route through the brief to use?
When comparing the OSI reference model and the TCP/IP reference model
List two ways in which the models are the same.
(2mks)
List two ways in which the models are different.
(2mks)
What is the difference between a TCP and UDP protocols? (2mks)
An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the images uncompressed. How long does it take to transmit it over a 100 mbps Ethernet home connection?
(5mks)
List two advantages and two disadvantages of having international standards for networks protocols?
(4mks)
PART B
Question Two
Explain the following briefly by giving the full name s of the acronyms, which layer they are included in and what they do. (20mks)
CSMA/CD
CSMA/CA
MAC address
Sliding window (TCP)
Icmp
ARP
OSPF
BGP
CRC
Routing
Question Three
Briefly discuss each of the wireless transmission given below. For each, please give an example of application in networking. (20mks)
Radio transmission
Microwave transmission
Infrared transmission
Satellite transmission
Question Four
Mach the following functions to one or more layer of TCP/IP protocol stack. (20mks)
End-to-end error detection and correction layer(s)
Flow control layer(s)
Transmission of signal (s)
Process-to-process message delivery layer(s)
Framing layer(s)
Routing layer(s)
Forwarding layer(s)
Congestion control layer(s)
Hop-by-hop error detection and correction layer(s)
Name to ip address resolution layer(s)
More Question Papers
Exams With Marking Schemes
Popular Exams
Mid Term Exams
End Term 1 Exams
End Term 3 Exams
Opener Exams
Full Set Exams
Return to Question Papers