0% found this document useful (0 votes)
23 views19 pages

CAT 2023 Prepared by BEN OG

Uploaded by

mbabaziarmand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views19 pages

CAT 2023 Prepared by BEN OG

Uploaded by

mbabaziarmand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

COMPUTER NETWORKING , CAT 2023

QUESTION ONE
1. Define the computer network
 A computer network is defined as a group of computers
connected to each other and can share the same resources.

2. Fo installing computer network both physical parts as well as the


software are required, give at least four (4) hardware comonents and
software components.
 ▪ Servers −Servers are high-configuration computers that manage
the resources of the network. The network operating system is
typically installed in the server and so they give user accesses to
the network resources. Servers can be of various kinds: file
servers, database servers, print servers etc.
 ▪ Clients − Clients are computers that request and receive service
from the servers to access and use the network resources.

 ▪ Peers − Peers are computers that provide as well as receive


services from other peers in a workgroup network.

 •Transmission Media − Transmission media are the channels


through which data is transferred from one device to another in a
network. Transmission media may be guided media like coaxial
cable, fibre optic cables etc; or maybe unguided media like
microwaves, infra-red waves etc.
 • Connecting Devices − Connecting devices act as middleware
between networks or computers, by binding the network media
together. Some of the common connecting devices are: NIC,
Routers, Bridges, Hubs, Repeaters, Modem, switches
SOFTWARE COMPONENTS.
➢ A special type of software that is used to control and manage
all the resources used in a computer network is called network
software. This kind of software is designed to help set up, manage
and monitor computer networks. It is also called Network
Operating System (NOS).

➢ Novell Netware is the most popular Network Operating


System. The network software is also available in different
operating system software such as Windows, Linux, etc. The
networking software is available to manage and monitor
networks of all sizes, from the smallest home networks to the
largest enterprise networks. Especially NOS(s) are used in the
server computers.

➢ Cisco IOS (Internetwork Operating System) is a proprietary


operating system that runs on Cisco Systems routers and
switches. The core function of Cisco IOS is to enable data
communications between network nodes .

Hardware Components:

1. Network Interface Cards (NICs): These are necessary for devices to


connect to the network. They can be integrated into the motherboard or
added as separate cards.
2. Switches: Switches are used to connect multiple devices on the same
network, enabling them to communicate with each other.
3. Routers: Routers are used to connect different networks together, such as
connecting a local network to the internet.
4. Cables: Various types of cables, such as Ethernet cables, fiber optic cables,
and coaxial cables, are used to connect devices in the network.
Software Components:

1. Operating System (OS): An OS that supports networking is essential for


computers to communicate over the network, such as Windows, macOS, or
Linux.
2. Network Protocols: Protocols like TCP/IP are necessary for devices to
communicate effectively over the network.
3. Network Management Software: Software for monitoring and managing
the network, such as network monitoring tools or configuration software
for network devices.
4. Firewall and Security Software: To protect the network from unauthorized
access and malicious attacks, firewall and security software are essential

3. Transmission media is broadly classified into different categories using a


stretch give it classifications.

A. guided media

There are 3 major types of Guided Media:

✓Twisted Pair Cable


✓Coaxial Cable
✓Optical Fiber Cable

B. un guided media

There are 3 major types of Unguided Media:

✓Radio waves
✓Microwaves
✓ Infrared
Transmission media can be broadly classified into two categories: guided
and unguided media.

1. Guided Media: In guided media, the transmission of data occurs through a


physical medium. Examples include:
 Twisted Pair Cable: This is commonly used in Ethernet networks and
telephone lines.
 Coaxial Cable: Used in cable television networks and some Ethernet
networks.
 Fiber Optic Cable: Utilizes light signals to transmit data and offers
high bandwidth and long-distance transmission capabilities.
2. Unguided Media: Also known as wireless media, unguided media transmit
data without the use of a physical medium. Examples include:
 Wireless Transmission: This includes technologies such as Wi-Fi,
Bluetooth, and infrared.
 Satellite Communication: Uses satellites to transmit signals over
long distances.
 Microwave Communication: Uses high-frequency radio waves for
communication, often used in point-to-point communication links.
These classifications are based on the physical nature of the transmission
medium and how data is transmitted through them

4. The size of a network can be expressed by the geographic area they


occupy and the number of computers that are part of the network,
briefly discusss its types

•Personal area network, or PAN


•Local area network, or LAN
•Metropolitan area network, or MAN
•Wide area network, or WAN

Networks can vary in size based on the geographic area they cover and the
number of computers or devices connected to them. Here are some
common types of networks based on their size:

1. Personal Area Network (PAN): This is the smallest type of network,


typically used for connecting devices within a short range, such as a
computer with a smartphone or a printer.
2. Local Area Network (LAN): LANs are used to connect devices over a
relatively small area, such as a single building or a campus. They are
commonly used in homes, schools, and businesses.
3. Metropolitan Area Network (MAN): MANs cover a larger geographic
area than LANs, typically spanning a city or a metropolitan area. They are
used to connect multiple LANs within a city.
4. Wide Area Network (WAN): WANs cover a large geographic area, such as
a country or even globally. They connect multiple LANs and MANs over
long distances, often using public or private communication links.
5. Global Area Network (GAN): GANs are the largest type of network,
covering an even larger geographic area than WANs. They can span
multiple countries or continents and are often used by multinational
corporations or organizations.
Each type of network has its own characteristics and is designed to meet
specific requirements based on the geographic area and number of devices
that need to be connected.

5. Topology refers to the shape of a network, or the network`s layout.


How different nodes in a network are connected to each other and how
they communicate. Briefly discuss at least 4 types of physical topology

i. Ring Topology
Physical topology refers to the physical layout of devices and cables in a
network. Here are four common types of physical topology:

1. Bus Topology: In a bus topology, all devices are connected to a single


central cable, known as the bus or backbone. Each device has a unique
address, and data is transmitted in both directions along the bus. However,
if the main cable fails, the entire network can be affected.
2. Star Topology: In a star topology, each device is connected directly to a
central hub or switch. All data transmissions are routed through the hub,
which helps in isolating any issues to individual devices without affecting
the rest of the network. However, the failure of the central hub can disrupt
the entire network.
3. Ring Topology: In a ring topology, each device is connected to exactly two
other devices, forming a circular pathway for data. Data travels in one
direction around the ring until it reaches its destination. Ring topologies are
less common today due to their potential for network disruption if one
device fails or the cable is damaged.
4. Mesh Topology: In a mesh topology, every device is connected to every
other device in the network. This provides redundant paths for data
transmission, increasing reliability and fault tolerance. Mesh topologies are
often used in critical networks where reliability is crucial, but they can be
expensive and complex to set up.

These physical topologies can be combined or modified to create hybrid


topologies that suit specific network requirements. Each type has its
advantages and disadvantages, and the choice of topology depends on
factors such as the size of the network, the amount of traffic, and the level
of reliability required.

QUESTIN TWO

1. what are the differents types of shielding for twisted pair cables?

Twisted pair cables can be shielded or unshielded, and there are different
types of shielding for twisted pair cables. The main types of shielding
include:

1. Unshielded Twisted Pair (UTP): UTP cables do not have any additional
shielding. They are the most common type of twisted pair cables and are
used in many Ethernet networks. UTP cables are generally more flexible and
easier to install than shielded cables, but they offer less protection against
electromagnetic interference (EMI) and radio frequency interference (RFI).
2. Shielded Twisted Pair (STP): STP cables have a metal foil or braided
shielding around the twisted pairs to protect against EMI and RFI. The
shielding helps to reduce crosstalk and interference, making STP cables
suitable for environments where there is a lot of electromagnetic noise,
such as near motors or power cables. However, STP cables are more
expensive and less flexible than UTP cables.
3. Screened Twisted Pair (ScTP): ScTP cables are similar to STP cables but
have an additional overall foil or braided shielding around all of the twisted
pairs. This provides even greater protection against EMI and RFI than STP
cables, making ScTP cables suitable for use in high-noise environments.
4. Foiled Twisted Pair (FTP): FTP cables have a foil shielding around each
twisted pair, rather than an overall shielding around all of the pairs. This
provides some protection against EMI and RFI, but not as much as STP or
ScTP cables. FTP cables are less expensive than STP cables but offer better
protection than UTP cables.

The choice of shielding depends on the specific requirements of the


network and the environment in which the cables will be installed.
Is this conversation helpful so far?

2. Which is connectors does STP cables uses?

Shielded Twisted Pair (STP) cables typically use connectors that provide
good shielding and help maintain the integrity of the shielded cable. The
most common connectors used with STP cables include:

1. RJ45 Connectors: These are the most common connectors used for
Ethernet connections. STP cables with RJ45 connectors are used in many
networking applications, especially in environments where shielding is
necessary to reduce electromagnetic interference.
2. Shielded RJ45 Connectors: These connectors have additional shielding
built into the connector itself, providing extra protection against EMI and
RFI. They are specifically designed for use with STP cables.
3. Other Shielded Connectors: In some cases, STP cables may use connectors
with metal shells or other forms of shielding to provide additional
protection against interference. These connectors are less common but may
be used in specific applications where higher levels of shielding are
required.
It's important to use connectors that are compatible with the type of STP
cable being used to ensure proper performance and protection against
interference.

3. Using TIA/EIA 568A straight through wiring standard show how


different colors of STP cables should be arranged while making a
networking cable

The TIA/EIA 568A wiring standard is used for straight-through Ethernet


cables, where both ends of the cable follow the same wiring scheme. The
standard defines the arrangement of the colored wires within the cable's
connectors. Here's how the wires should be arranged for STP cables
according to the TIA/EIA 568A standard:

1. Pin 1 (white/green): White/green wire


2. Pin 2 (green): Green wire
3. Pin 3 (white/orange): White/orange wire
4. Pin 4 (blue): Blue wire
5. Pin 5 (white/blue): White/blue wire
6. Pin 6 (orange): Orange wire
7. Pin 7 (white/brown): White/brown wire
8. Pin 8 (brown): Brown wire
When making an Ethernet cable using STP cables and following the TIA/EIA
568A standard, the wire colors should be arranged in the above order from
left to right when looking at the RJ45 connector with the clip facing down
and the pins facing up.

4. Write in full form of SSID

SSID stands for Service Set Identifier. It is a unique identifier


that a wireless network uses to distinguish itself from other
networks in the vicinity. The SSID is broadcasted by a wireless
access point or router to allow wireless devices to connect to
the network.

5. Classify WLAN types


Wireless Local Area Networks (WLANs) can be classified into several types
based on their coverage area, transmission range, and intended use. Here
are some common classifications of WLAN types:

1. Personal Area Network (PAN): A PAN is the smallest type of WLAN,


typically covering a range of a few meters. It is used for connecting devices
such as smartphones, tablets, and laptops to each other.
2. Local Area Network (LAN): A LAN covers a relatively small area, such as a
single building, campus, or office. It is used for connecting devices within a
limited geographic area, typically using Wi-Fi technology.
3. Metropolitan Area Network (MAN): A MAN covers a larger geographic
area than a LAN, such as a city or metropolitan area. It is used to connect
multiple LANs and other networks within a city.
4. Wide Area Network (WAN): A WAN covers a large geographic area, such
as a country or continent. It is used to connect multiple LANs and MANs
over long distances, often using technologies such as microwave or satellite
communication.
5. Wireless Mesh Network: A wireless mesh network is a type of WLAN
where multiple wireless access points are interconnected to provide
coverage over a large area. Mesh networks are self-configuring and can
dynamically adapt to changes in the network topology.
6. Ad hoc Network: An ad hoc network is a temporary network that is formed
spontaneously, without the need for a centralized infrastructure. Ad hoc
networks are often used for peer-to-peer communication between devices
in a limited area.

These classifications are based on the size of the network, the geographic
area it covers, and the way in which devices are connected to each other.

QUESTION THREE
1. Fill the following table

IP DEFAULT NETW HOS TOTAL VALID TOTAL RANGE(


CLA SUBNET ORK TS HOSTS HOSTS AVAILAB ONLY
SS MASK BITS BITS LE FIRST
NETWO DECIMA
RKS L
NUMBE
RS)
A 255.0.0.0 8 24 224- 224- 28-
2=16,77 2=16,77 2=256
7,216 7,214 1-126
B 255.255. 16 16 216- 216- 16
2 -
0.0 2=65,53 2=65,53 2=65,53
4 2 4 128-191
C 255.255. 24 8 28- 28- 224-
255.0 2=256 2=254 2=16,77
7,214 192-223

Here's the table filled with the default subnet mask, network bits, host bits,
total hosts, valid hosts, total available networks, and the range of IP
addresses for each class:
RANG
(ONLY
DEFAULT TOTAL FIRST
IP SUBNET NETWORK HOSTS TOTAL VALID AVAILABLE DECIMA
CLASS MASK BITS BITS HOSTS HOSTS NETWORKS NUMBER
A 255.0.0.0 8 24 16,777,216 16,777,214 128 1-126
B 255.255.0.0 16 16 65,536 65,534 16,384 128-191
C 255.255.255.0 24 8 256 254 2^21-2 192-223

Note: The "TOTAL HOSTS" column indicates the total number of possible
hosts in the network, including the network address and the broadcast
address. The "VALID HOSTS" column indicates the number of usable hosts
in the network, excluding the network address and the broadcast address.
The "TOTAL AVAILABLE NETWORKS" column indicates the total number of
networks available within each class.

2. Select the correct base network ID for 203.121.45.31 /30

To determine the correct base network ID for the given IP


address and subnet mask (/30), we first need to understand
the subnetting process.
A /30 subnet mask provides 2^2 (4) total IP addresses, with 2
usable addresses for hosts. This means that the subnet mask
is 255.255.255.252 in decimal notation.
To find the base network ID, we need to calculate the
network address. This is done by taking the given IP address
and performing a bitwise AND operation with the subnet
mask.
Given IP address: 203.121.45.31 Subnet mask:
255.255.255.252
Converting the IP address and subnet mask to binary:
203.121.45.31 = 11001011.01111001.00101101.00011111
255.255.255.252 = 11111111.11111111.11111111.11111100
Performing the bitwise AND operation:
11001011.01111001.00101101.00011111 (203.121.45.31)
11111111.11111111.11111111.11111100
(255.255.255.252)
11001011.01111001.00101101.00011100 (203.121.45.28 -
Base network ID)
Therefore, the correct base network ID for the IP address
203.121.45.31 with a /30 subnet mask is 203.121.45.28.

3. A company would like to break its Class C private IP address


192.168.20.0 into as many subnets as possible provided that they
can get at least 70 hosts per subnet. Find ranges of IP addresses
for each subnet and new mask.

To break the Class C private IP address 192.168.20.0 into subnets with at


least 70 hosts per subnet, we need to calculate the number of bits required
for the host portion of the subnet mask to accommodate at least 70 hosts.

Since we need at least 70 hosts per subnet, we need to find the smallest
subnet mask that allows for at least 70 host addresses. The formula to
calculate the number of host bits required is:

2�−2≥702n−2≥70

where �n is the number of host bits.

Solving for �n:

2�≥722n≥72

The smallest value of �n that satisfies this condition is 7, as 27=12827=128.


This means we need 7 host bits to accommodate at least 70 hosts per
subnet.

The subnet mask for this configuration would be 255.255.255.128, which


corresponds to a /25 subnet mask (32 - 25 = 7 host bits).
To find the ranges of IP addresses for each subnet, we can use the
following steps:

1. Determine the number of subnets based on the number of bits borrowed


from the host portion of the IP address. Since we are using a /25 subnet
mask, we are borrowing 7 bits for subnets, which gives us 27=12827=128
subnets.
2. Determine the number of host bits remaining after subnetting. Since we
started with a Class C address (24 network bits), and we borrowed 7 bits for
subnetting, we have 32−24−7=132−24−7=1 host bit remaining.
3. Calculate the subnet ranges. Each subnet will have a range of addresses,
excluding the network and broadcast addresses. The formula to calculate
the subnet range is:

Subnet Range=Subnet ID+1 to Broadcast Address−1Subnet Range=Subnet ID+1 t


o Broadcast Address−1

Calculating the subnet ranges:

 Subnet 1: 192.168.20.0 to 192.168.20.127


 Subnet 2: 192.168.20.128 to 192.168.20.255

The new subnet mask is 255.255.255.128 (/25).

4. You are give the block of 172.16.1.0/24 and we need to split it such that the
following requirements are met:
 A subnet that can accommodate 100 hosts
 A subnet that can accommodate up to 55 hosts
 Two subnet that can accommodate up to 200 hosts each

FROM EACH SUBNET FIND


 Network IP address
 Valid host IP range
 Broadcast address

New subnet mask using prefix length (CIDR Notation)

To meet the given requirements for the block of 172.16.1.0/24, we need to


subnet it further to create subnets that can accommodate the specified
number of hosts. Here's the breakdown:

1. Subnet for 100 hosts:


 Hosts: 100 (2^7 - 2 = 126)
 Subnet mask: 25 bits (24 network bits + 7 host bits)
 CIDR notation: /25
 Subnet range: 172.16.1.0 - 172.16.1.127
 Network IP address: 172.16.1.0
 Valid host IP range: 172.16.1.1 - 172.16.1.126
 Broadcast address: 172.16.1.127
2. Subnet for up to 55 hosts:
 Hosts: 55 (2^6 - 2 = 62)
 Subnet mask: 26 bits (24 network bits + 6 host bits)
 CIDR notation: /26
 Subnet range: 172.16.1.128 - 172.16.1.191
 Network IP address: 172.16.1.128
 Valid host IP range: 172.16.1.129 - 172.16.1.190
 Broadcast address: 172.16.1.191
3. Two subnets for up to 200 hosts each:
 Hosts: 200 (2^8 - 2 = 254)
 Subnet mask: 24 bits (24 network bits + 8 host bits)
 CIDR notation: /24
 Each subnet will have a range of 172.16.2.0 - 172.16.2.255 and
172.16.3.0 - 172.16.3.255 respectively.

New subnet mask for each subnet:


 /25 subnet: 255.255.255.128
 /26 subnet: 255.255.255.192
 /24 subnet: 255.255.255.0

Note: The subnet ranges are based on the assumption that the original
network address is 172.16.1.0/24. If the original network address is
different, the subnet ranges will be adjusted accordingly

You might also like