0% found this document useful (0 votes)
6 views6 pages

Answers Data Communications May 2023

Answers tp past psper

Uploaded by

luballomuyoyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

Answers Data Communications May 2023

Answers tp past psper

Uploaded by

luballomuyoyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

### Question 1

#### (a) Explain two factors that should be considered when selecting an Internet Service Provider (ISP),
other than cost. (4 marks)

1. **Reliability and Uptime**: The ISP should offer high network reliability with minimal downtime, as
frequent outages can disrupt business operations or personal connectivity. This ensures consistent
access to services.

2. **Speed and Bandwidth Options**: Evaluate the available upload/download speeds and bandwidth
scalability to match user needs, such as streaming or large file transfers, to avoid throttling during peak
usage.

#### (b) (i) Outline four limitations of e-learning platforms. (4 marks)

1. **Technical Issues**: Platforms may suffer from connectivity problems, slow loading times, or
software glitches, hindering access in areas with poor internet.

2. **Lack of Interaction**: Limited real-time engagement compared to physical classrooms, reducing


collaborative learning and immediate feedback.

3. **Digital Divide**: Not all learners have access to required devices or stable internet, excluding those
in remote or low-income areas.

4. **Data Privacy Concerns**: Risk of personal information breaches or unauthorized access to


educational content and user data.

(ii) Paul was required to design a computer network for a client. Outline four guidelines that he should
follow during the design stage. (4 marks)

1. **Assess User Requirements**: Gather details on the number of users, types of applications, and data
traffic needs to ensure the design supports scalability.

2. **Choose Appropriate Topology**: Select a topology (e.g., star for reliability) based on cost, ease of
maintenance, and fault tolerance.

3. **Plan for Security**: Incorporate firewalls, encryption, and access controls from the outset to
protect against threats.

4. **Consider Future Expansion**: Design with modular components to allow easy upgrades without
major overhauls.
#### (c) (i) Differentiate between 2.4 GHz and 5.0 GHz Wi-Fi frequency bands. (4 marks)

- **2.4 GHz Band**: Operates on a lower frequency, offering better range and wall penetration but
slower speeds (up to 600 Mbps) and more interference from devices like microwaves and Bluetooth,
making it suitable for larger areas with basic needs.

- **5.0 GHz Band**: Uses higher frequency for faster speeds (up to 1.3 Gbps) and less interference, but
shorter range and poorer obstacle penetration, ideal for high-bandwidth tasks like HD streaming in
smaller spaces.

(ii) Network authentication is used to keep unauthorized users from accessing network resources.
Describe two types of authentications that are commonly used. (4 marks)

1. **Username/Password Authentication**: Users provide credentials (e.g., via login forms) verified
against a database; simple but vulnerable to brute-force attacks if not hashed.

2. **Certificate-Based Authentication**: Involves digital certificates issued by a trusted authority (e.g.,


PKI); more secure as it uses public-key cryptography to verify identity without transmitting passwords.

### Question 2

#### (a) (i) Outline three characteristics of client-server computing. (3 marks)

1. **Centralized Management**: The server handles resources, data storage, and processing, allowing
centralized control and easier updates.

2. **Scalability**: Servers can support multiple clients, with resources added to handle growing
demands without reconfiguring each client.

3. **Resource Sharing**: Clients access shared server resources like files or databases, promoting
efficiency but requiring robust security.

(ii) Distinguish between managed and unmanaged network switches. (4 marks)

- **Managed Switches**: Configurable via software for features like VLANs, QoS, and monitoring;
suitable for complex networks needing security and performance control, but more expensive and
complex to set up.
- **Unmanaged Switches**: Plug-and-play with no configuration options; auto-configure ports for basic
connectivity, ideal for small, simple networks but lack advanced management or troubleshooting
capabilities.

#### (b) (i) Outline three challenges of Bluetooth communication. (3 marks)

1. **Limited Range**: Typically effective only up to 10 meters, restricting use in larger areas without
repeaters.

2. **Interference**: Susceptible to disruptions from other 2.4 GHz devices (e.g., Wi-Fi), causing
connection drops or reduced speed.

3. **Low Bandwidth**: Supports data rates up to 3 Mbps, insufficient for high-definition video or large
file transfers.

(ii) Patrick was required to troubleshoot a network interface card that was not showing physical
connectivity. Outline four possible causes of the problem. (4 marks)

1. **Cable Issues**: Faulty or improperly connected Ethernet cable, such as loose plugs or damaged
wiring.

2. **Driver Problems**: Outdated, corrupted, or incompatible NIC drivers preventing OS recognition.

3. **Hardware Failure**: Defective NIC port or card itself, verifiable by testing in another system.

4. **Power Management Settings**: OS power-saving mode disabling the NIC when idle.

#### (c) During the installation of a computer star topology network, several components should be
considered. Describe three such components. (6 marks)

1. **Central Hub/Switch**: Acts as the core connection point where all nodes link; must support the
required number of ports and speed (e.g., Gigabit Ethernet) to prevent bottlenecks.

2. **Network Interface Cards (NICs)**: Installed in each device for connectivity; should match the cable
type (e.g., RJ-45 for twisted pair) and be compatible with the OS.

3. **Cabling and Connectors**: UTP/STP cables with proper lengths (under 100m for Ethernet) and
terminators like RJ-45 plugs to ensure reliable signal transmission without attenuation.

### Question 3
#### (a) Explain two disadvantages of fibre optic cables. (4 marks)

1. **High Installation Cost**: Requires specialized equipment and skilled labor for splicing and
termination, making initial setup more expensive than copper cables.

2. **Fragility**: The glass core is susceptible to physical damage from bending or crushing, necessitating
careful handling and protective conduits.

#### (b) (i) Outline two problems associated with token ring topology network. (2 marks)

1. **Single Point of Failure**: If the central hub or token fails, the entire network stops, reducing
reliability.

2. **Performance Bottlenecks**: Token passing can cause delays in high-traffic scenarios, limiting
scalability.

(ii) Distinguish between switched virtual circuits (SVC) and permanent virtual circuits (PVC) as used in
Frame Relay configurations. (4 marks)

- **Switched Virtual Circuits (SVC)**: Dynamically established on demand for temporary connections;
more flexible for sporadic traffic but require setup/teardown overhead each time.

- **Permanent Virtual Circuits (PVC)**: Pre-configured, dedicated paths always available; provide
consistent performance for ongoing traffic but less adaptable and potentially underutilized.

#### (c) Open-end Company Ltd. intends to install a data security device that has just emerged in the
market. Explain two strategies that the company would use in order to enable its staff. (4 marks)

1. **Training and Awareness Programs**: Conduct workshops to educate staff on device usage, threat
recognition, and best practices, ensuring adoption and reducing errors.

2. **Pilot Testing and Phased Rollout**: Test the device on a small scale first, gather feedback, then
gradually implement across departments to identify issues early.

#### (d) Explain three circumstances that would necessitate the use of Challenge-Handshake
Authentication Protocol (CHAP) in a WAN connection. (6 marks)
1. **Remote Access Security**: In VPNs or dial-up connections, CHAP's encrypted challenge-response
prevents replay attacks, essential for securing remote users over untrusted networks.

2. **PPPoE Deployments**: For broadband like DSL, CHAP authenticates without sending plaintext
passwords, protecting against eavesdropping in shared WAN links.

3. **High-Security Environments**: In scenarios requiring mutual authentication (e.g., enterprise


WANs), CHAP verifies both ends, mitigating man-in-the-middle threats better than simpler protocols like
PAP.

### Question 4

#### (a) (i) Outline two typical characteristics of a Thin Ethernet standard. (2 marks)

1. **Coaxial Cabling**: Uses thin RG-58 coaxial cable (thinner and more flexible than thick Ethernet),
connecting up to 30 nodes per segment.

2. **Bus Topology**: Devices share a single backbone cable with BNC connectors and terminators,
operating at 10 Mbps.

(ii) Ethernet uses data encapsulation technique for facilitating data transmission from sender to
receiver. Explain two benefits of using this technique. (4 marks)

1. **Error Detection and Correction**: Encapsulation adds headers/trailers with checksums (e.g., CRC),
allowing receivers to detect and discard corrupted frames, improving reliability.

2. **Modularity and Interoperability**: Layers data with protocol info (e.g., MAC addresses), enabling
different network segments to communicate seamlessly via standardized formats.

#### (b) Mercy was required to justify the decision she would install a computer network in her
company. Outline four justifications. (4 marks)

1. **Resource Sharing**: Enables centralized access to files, printers, and applications, reducing
duplication and costs.

2. **Improved Communication**: Supports email, instant messaging, and collaboration tools for faster
internal interactions.

3. **Enhanced Productivity**: Allows real-time data access and remote work, streamlining workflows.
4. **Centralized Management**: Simplifies software updates, backups, and security enforcement across
devices.

#### (c) (i) Explain two advantages of getting software assurance when procuring communication
software. (4 marks)

1. **Ongoing Updates and Patches**: Provides access to the latest security fixes and features, keeping
software current without extra costs.

2. **Technical Support**: Includes priority assistance from vendors, reducing downtime during issues in
communication tools.

(ii) Paul was required to troubleshoot an email server problem within his company's network. Outline six
causes of the problem that he could have identified. (6 marks)

1. **DNS Configuration Errors**: Incorrect MX records preventing domain resolution for email routing.

2. **Firewall Blocking Ports**: Restrictions on SMTP (port 25) or IMAP (port 143) impeding traffic.

3. **Insufficient Disk Space**: Full storage on the server halting incoming/outgoing messages.

4. **Authentication Failures**: Misconfigured user credentials or expired certificates blocking access.

5. **Network Congestion**: High traffic overwhelming the server, causing delays or drops.

6. **Malware Infection**: Viruses scanning or exploiting the server, leading to performance


degradation.

You might also like