CAT 2023 Prepared by BEN OG
CAT 2023 Prepared by BEN OG
QUESTION ONE
1. Define the computer network
A computer network is defined as a group of computers
connected to each other and can share the same resources.
Hardware Components:
A. guided media
B. un guided media
✓Radio waves
✓Microwaves
✓ Infrared
Transmission media can be broadly classified into two categories: guided
and unguided media.
Networks can vary in size based on the geographic area they cover and the
number of computers or devices connected to them. Here are some
common types of networks based on their size:
i. Ring Topology
Physical topology refers to the physical layout of devices and cables in a
network. Here are four common types of physical topology:
QUESTIN TWO
1. what are the differents types of shielding for twisted pair cables?
Twisted pair cables can be shielded or unshielded, and there are different
types of shielding for twisted pair cables. The main types of shielding
include:
1. Unshielded Twisted Pair (UTP): UTP cables do not have any additional
shielding. They are the most common type of twisted pair cables and are
used in many Ethernet networks. UTP cables are generally more flexible and
easier to install than shielded cables, but they offer less protection against
electromagnetic interference (EMI) and radio frequency interference (RFI).
2. Shielded Twisted Pair (STP): STP cables have a metal foil or braided
shielding around the twisted pairs to protect against EMI and RFI. The
shielding helps to reduce crosstalk and interference, making STP cables
suitable for environments where there is a lot of electromagnetic noise,
such as near motors or power cables. However, STP cables are more
expensive and less flexible than UTP cables.
3. Screened Twisted Pair (ScTP): ScTP cables are similar to STP cables but
have an additional overall foil or braided shielding around all of the twisted
pairs. This provides even greater protection against EMI and RFI than STP
cables, making ScTP cables suitable for use in high-noise environments.
4. Foiled Twisted Pair (FTP): FTP cables have a foil shielding around each
twisted pair, rather than an overall shielding around all of the pairs. This
provides some protection against EMI and RFI, but not as much as STP or
ScTP cables. FTP cables are less expensive than STP cables but offer better
protection than UTP cables.
Shielded Twisted Pair (STP) cables typically use connectors that provide
good shielding and help maintain the integrity of the shielded cable. The
most common connectors used with STP cables include:
1. RJ45 Connectors: These are the most common connectors used for
Ethernet connections. STP cables with RJ45 connectors are used in many
networking applications, especially in environments where shielding is
necessary to reduce electromagnetic interference.
2. Shielded RJ45 Connectors: These connectors have additional shielding
built into the connector itself, providing extra protection against EMI and
RFI. They are specifically designed for use with STP cables.
3. Other Shielded Connectors: In some cases, STP cables may use connectors
with metal shells or other forms of shielding to provide additional
protection against interference. These connectors are less common but may
be used in specific applications where higher levels of shielding are
required.
It's important to use connectors that are compatible with the type of STP
cable being used to ensure proper performance and protection against
interference.
These classifications are based on the size of the network, the geographic
area it covers, and the way in which devices are connected to each other.
QUESTION THREE
1. Fill the following table
Here's the table filled with the default subnet mask, network bits, host bits,
total hosts, valid hosts, total available networks, and the range of IP
addresses for each class:
RANG
(ONLY
DEFAULT TOTAL FIRST
IP SUBNET NETWORK HOSTS TOTAL VALID AVAILABLE DECIMA
CLASS MASK BITS BITS HOSTS HOSTS NETWORKS NUMBER
A 255.0.0.0 8 24 16,777,216 16,777,214 128 1-126
B 255.255.0.0 16 16 65,536 65,534 16,384 128-191
C 255.255.255.0 24 8 256 254 2^21-2 192-223
Note: The "TOTAL HOSTS" column indicates the total number of possible
hosts in the network, including the network address and the broadcast
address. The "VALID HOSTS" column indicates the number of usable hosts
in the network, excluding the network address and the broadcast address.
The "TOTAL AVAILABLE NETWORKS" column indicates the total number of
networks available within each class.
Since we need at least 70 hosts per subnet, we need to find the smallest
subnet mask that allows for at least 70 host addresses. The formula to
calculate the number of host bits required is:
2�−2≥702n−2≥70
2�≥722n≥72
4. You are give the block of 172.16.1.0/24 and we need to split it such that the
following requirements are met:
A subnet that can accommodate 100 hosts
A subnet that can accommodate up to 55 hosts
Two subnet that can accommodate up to 200 hosts each
Note: The subnet ranges are based on the assumption that the original
network address is 172.16.1.0/24. If the original network address is
different, the subnet ranges will be adjusted accordingly