0% found this document useful (0 votes)
2 views

LOGIC

The document outlines a structured network design for Wi-Fi distribution at the University for Development Studies, Navrongo Campus, utilizing fiber optic cables for reliable internet access. It details the process from the ISP connection to the deployment of Wi-Fi access points, including the conversion of optical signals to Ethernet and user authentication methods. Challenges such as power fluctuations and high user density are also noted, emphasizing the need for effective load balancing and redundancy measures.

Uploaded by

iadam21.stu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

LOGIC

The document outlines a structured network design for Wi-Fi distribution at the University for Development Studies, Navrongo Campus, utilizing fiber optic cables for reliable internet access. It details the process from the ISP connection to the deployment of Wi-Fi access points, including the conversion of optical signals to Ethernet and user authentication methods. Challenges such as power fluctuations and high user density are also noted, emphasizing the need for effective load balancing and redundancy measures.

Uploaded by

iadam21.stu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

1. Which of the following is NOT a guided transmission medium?

A) Twisted Pair Cable

B) Fiber Optic Cable

C) Coaxial Cable

D) Infrared

Correct Answer: D

2. In the OSI model, which layer is responsible for error detection and correction?

A) Physical Layer

B) Data Link Layer

C) Network Layer

D) Transport Layer

Correct Answer: B

3. What is the primary function of a router in a network?

A) To connect devices within a LAN

B) To filter MAC addresses

C) To forward packets between different networks

D) To amplify signals

Correct Answer: C

4. Which protocol is used for secure communication over a computer network?

A) HTTP
B) FTP

C) HTTPS

D) SMTP

Correct Answer: C

5. What does the acronym 'DNS' stand for?

A) Data Naming System

B) Domain Name System

C) Dynamic Network Service

D) Digital Naming Service

Correct Answer: B

6. Which of the following is a private IP address?

A) 192.168.1.1

B) 8.8.8.8

C) 172.32.1.1

D) 203.0.113.1

Correct Answer: A

7. What is the purpose of ARP (Address Resolution Protocol)?

A) To map an IP address to a MAC address

B) To encrypt data packets

C) To route packets between networks

D) To assign IP addresses dynamically

Correct Answer: A
8. Which topology requires a central hub or switch?

A) Bus

B) Ring

C) Star

D) Mesh

Correct Answer: C

9. What is the maximum data rate of a standard Ethernet (10BASE T) network?

A) 1 Mbps

B) 10 Mbps

C) 100 Mbps

D) 1000 Mbps

Correct Answer: B

10. Which device operates at the Network Layer (Layer 3) of the OSI model?

A) Hub

B) Switch

C) Router

D) Repeater

Correct Answer: C

11. What is the default port number for HTTP?


A) 21

B) 25

C) 80

D) 443

Correct Answer: C

12. Which multiplexing technique divides the channel into time slots?

A) FDM (Frequency Division Multiplexing)

B) TDM (Time Division Multiplexing)

C) WDM (Wavelength Division Multiplexing)

D) CDM (Code Division Multiplexing)

Correct Answer: B

13. Which protocol is connection oriented?

A) UDP

B) IP

C) TCP

D) ICMP

Correct Answer: C

14. What is the main advantage of fiber optic cables over copper cables?

A) Lower cost

B) Higher bandwidth and immunity to EMI

C) Easier to install

D) Higher latency
Correct Answer: B

15. Which IEEE standard defines Wi Fi (Wireless LAN)?

A) IEEE 802.3

B) IEEE 802.5

C) IEEE 802.11

D) IEEE 802.15

Correct Answer: C

16. Which network device regenerates signals to extend the range of a network?

A) Router

B) Switch

C) Repeater

D) Gateway

Correct Answer: C

17. What does 'Ping' use to test network connectivity?

A) TCP

B) UDP

C) ICMP

D) ARP

Correct Answer: C
18. Which layer of the OSI model handles encryption and decryption?

A) Application Layer

B) Presentation Layer

C) Session Layer

D) Transport Layer

Correct Answer: B

19. What is the purpose of NAT (Network Address Translation)?

A) To convert private IPs to public IPs

B) To assign dynamic IPs

C) To encrypt network traffic

D) To resolve domain names

Correct Answer: A

20. Which of the following is NOT a type of cyber attack?

A) Phishing

B) Spoofing

C) Sniffing

D) Multiplexing

Correct Answer: D

21. What is the subnet mask for a Class C IP address?

A) 255.0.0.0

B) 255.255.0.0

C) 255.255.255.0
D) 255.255.255.255

Correct Answer: C

22. Which protocol is used for sending emails?

A) FTP

B) SMTP

C) HTTP

D) SNMP

Correct Answer: B

23. What is the primary function of a firewall?

A) To block unauthorized access

B) To assign IP addresses

C) To boost network speed

D) To connect multiple LANs

Correct Answer: A

24. Which wireless security protocol is the most secure?

A) WEP

B) WPA

C) WPA2

D) WPA3

Correct Answer: D
25. What is the full form of 'VPN'?

A) Virtual Private Network

B) Virtual Public Network

C) Verified Private Network

D) Visual Private Network

Correct Answer: A

26. Which protocol dynamically assigns IP addresses?

A) DNS

B) DHCP

C) ARP

D) ICMP

Correct Answer: B

27. What is the main purpose of the Transport Layer?

A) Routing packets

B) Error free end to end communication

C) Data encryption

D) MAC addressing

Correct Answer: B

28. Which network topology has the highest fault tolerance?

A) Bus

B) Star
C) Ring

D) Mesh

Correct Answer: D

29. What is the role of a gateway in networking?

A) Connects two similar networks

B) Connects dissimilar networks (e.g., LAN to WAN)

C) Filters traffic based on MAC addresses

D) Amplifies signals

Correct Answer: B

30. Which of the following is a loopback IP address?

A) 127.0.0.1

B) 192.168.1.1

C) 10.0.0.1

D) 172.16.0.1

Correct Answer: A

31. Which protocol is stateless?

A) TCP

B) UDP

C) FTP

D) HTTP

Correct Answer: B
32. What is the purpose of CSMA/CD in Ethernet?

A) Error correction

B) Collision detection

C) Encryption

D) Packet routing

Correct Answer: B

33. Which device operates at Layer 2 (Data Link Layer)?

A) Router

B) Switch

C) Hub

D) Repeater

Correct Answer: B

34. What does 'TTL' stand for in networking?

A) Time to Live

B) Time to Leave

C) Total Transmission Length

D) Transmission Time Limit

Correct Answer: A

35. Which of the following is NOT a cloud computing service model?

A) IaaS

B) PaaS
C) SaaS

D) NaaS

Correct Answer: D

36. Which protocol is used for file transfer?

A) HTTP

B) FTP

C) SMTP

D) SNMP

Correct Answer: B

37. What is the default port for SSH?

A) 21

B) 22

C) 23

D) 80

Correct Answer: B

38. Which of the following is an example of a WAN?

A) Home Wi Fi

B) Office LAN

C) The Internet

D) Bluetooth PAN

Correct Answer: C

39. What is the purpose of QoS in networking?

A) To prioritize certain types of traffic


B) To assign IP addresses

C) To encrypt data

D) To block malware

Correct Answer: A

40. Which IEEE standard defines Ethernet?

A) 802.3

B) 802.5

C) 802.11

D) 802.15

Correct Answer: A

41. What is the main disadvantage of a bus topology?

A) High cost

B) Single point of failure

C) Difficult to troubleshoot

D) Requires a central hub

Correct Answer: B

42. Which protocol is used for network management?

A) FTP

B) SMTP

C) SNMP

D) HTTP

Correct Answer: C

43. What is the main function of ICMP?

A) File transfer
B) Error reporting and diagnostics

C) Email delivery

D) Web browsing

Correct Answer: B

44. Which of the following is a connectionless protocol?

A) TCP

B) UDP

C) FTP

D) HTTP

Correct Answer: B

45. What is the maximum range of IPv4 addresses?

A) 2^32

B) 2^64

C) 2^128

D) 2^256

Correct Answer: A

46. Which device is used to connect two different network segments?

A) Hub

B) Bridge

C) Repeater

D) Switch

Correct Answer: B

47. What is the purpose of a proxy server?


A) To assign IP addresses

B) To act as an intermediary for requests

C) To amplify signals

D) To encrypt data

Correct Answer: B

48. Which of the following is NOT a type of malware?

A) Virus

B) Worm

C) Firewall

D) Trojan

Correct Answer: C

49. What is the full form of 'MAC' in networking?

A) Media Access Control

B) Memory Access Control

C) Multiplexed Access Channel

D) Managed Access Code

Correct Answer: A

50. Which layer of the OSI model is responsible for logical addressing?

A) Physical Layer

B) Data Link Layer

C) Network Layer

D) Transport Layer

Correct Answer: C
THEORY

At the University for Development Studies (UDS), Navrongo Campus , the Wi Fi distribution via fiber
optic cables typically follows a structured network design to ensure high speed and reliable internet
access. Here’s how it generally works:

Fiber Optic Backbone Connection


The campus likely has a main fiber optic link from an Internet Service Provider (ISP) (e.g., Ghanaian
telecom providers like Glo, MTN, or Vodafone ).

This fiber enters the campus through a Primary Data Center or Main Distribution Frame (MDF) .

Core Network Distribution


The fiber connects to a core router/switch (e.g., Cisco, Huawei, or MikroTik) at the main server
room .

From here, the connection is distributed via fiber optic cables to multiple buildings (lecture halls,
library, admin blocks, hostels, etc.).

Fiber to Ethernet Conversion (If Needed)


Media Converters or Fiber Switches convert the optical signal to Ethernet (copper cables, e.g.,
Cat6) for local distribution.

Optical Network Terminals (ONTs) may be used if the ISP provides a GPON (Gigabit Passive Optical
Network) setup.

Wi Fi Access Points (APs) Deployment


Ethernet cables from switches connect to Wi Fi Access Points (APs) installed in key locations
(classrooms, offices, libraries).

Enterprise grade APs (e.g., Ubiquiti, Ruckus, or Aruba) ensure wide coverage and handle multiple
users.
Authentication & User Management
captive portal (login page) for authentication (students/staff enter credentials).

A RADIUS server or network management system (e.g., MikroTik Hotspot, Cisco ISE) controls
access.

Possible Challenges in Navrongo Campus


Power fluctuations may affect network uptime (UPS/inverters are used).

Limited fiber redundancy could cause outages if the main link fails.

High user density in hostels/lecture halls may slow speeds (load balancing helps).

Conclusion

UDS Navrongo’s Wi Fi is likely distributed via:

ISP Fiber → Core Router → Fiber Distribution → Switches → Wi Fi APs → Users

You might also like