Describe the function of a switch in a local area network (LAN).
Directs Traffic: Switches forward data frames between devices based on their Media Access Control (MAC) addresses, ensuring that the data reaches the correct destination.
Reduces Collisions: By providing dedicated bandwidth to each device, switches minimize the risk of data collisions that can occur in a shared communication environment.
Efficient Data Transfer: Unlike hubs, switches only send data to the specific device intended to receive it, reducing unnecessary network traffic.
Bandwidth Management: Switches allow multiple devices to communicate simultaneously by creating separate collision domains, thus improving overall network performance.
Enhances Security: Switches limit the broadcast of data frames to only the relevant port, which reduces the risk of data being intercepted by unintended devices.
Supports Multiple Connections: Switches can handle multiple devices communicating at the same time without significant performance degradation, providing scalability within a LAN.
2.
Explain the difference between a router and a switch.
Function: Routers connect different networks and direct data between them, while switches are used to connect devices within the same network by forwarding data based on MAC addresses.
OSI Layer: Routers operate at Layer 3 (Network Layer) of the OSI model, managing IP addresses, while switches operate at Layer 2 (Data Link Layer), dealing with MAC addresses.
Addressing: Routers use IP addresses to forward data between networks; switches use MAC addresses to forward data within the same network.
Scope: Routers can connect multiple LANs and provide internet connectivity by linking to WANs; switches typically operate within a LAN, managing communication between local devices.
Traffic Management: Routers manage traffic between different networks, while switches manage traffic within a single network by dividing it into smaller collision domains.
Security: Routers often come with built-in security features like firewalls, whereas switches do not have such security features by default and rely on other security mechanisms like VLANs for segmentation.
3.
Compare the advantages and disadvantages of using a hub versus a switch.
Advantages of Hub:
Cost: Hubs are generally cheaper than switches, making them an affordable option for very basic network setups.
Simplicity: Hubs are simple devices that require no configuration, making them easy to set up.
Disadvantages of Hub:
Inefficiency: Hubs broadcast all incoming data to every device connected to the network, causing unnecessary traffic and reducing overall efficiency.
Collision Domains: All devices connected to a hub share the same collision domain, increasing the likelihood of data collisions, which can slow down the network.
Security: Data sent through a hub is visible to all devices on the network, which poses a security risk.
Advantages of Switch:
Efficiency: Switches forward data only to the intended recipient device, reducing unnecessary traffic and improving network efficiency.
Collision Isolation: Each port on a switch creates its own collision domain, preventing data collisions and enhancing performance.
Performance: Switches handle large amounts of traffic without significant network congestion, making them ideal for modern networks with multiple devices.
Scalability: Switches can easily scale to handle more devices, supporting larger networks.
Security: With VLANs (Virtual LANs), switches can segment the network and isolate traffic for security purposes.
Disadvantages of Switch:
Cost: Switches are generally more expensive than hubs due to their advanced features.
Complexity: Switches require more management and configuration, which may involve learning network management protocols such as VLANs or QoS (Quality of Service).
4.
Define what a MAC address is and its role in networking.
Definition: A Media Access Control (MAC) address is a unique hardware identifier assigned to network interface cards (NICs) that allows devices to communicate within a network.
Format: Typically a 48-bit address represented by 12 hexadecimal digits (e.g., 00:1A:2B:3C:4D:5E), with the first six digits representing the manufacturer and the last six uniquely identifying the device.
Uniqueness: MAC addresses are globally unique to each NIC, ensuring that no two devices on the same network have the same MAC address.
Role in Switching: Switches use MAC addresses to forward data to the correct device on a local area network (LAN) by mapping MAC addresses to the appropriate switch ports.
Layer: MAC addresses operate at Layer 2 (Data Link Layer) of the OSI model and are essential for communication within the same network segment.
Permanent: Unlike IP addresses, which can change over time or depending on the network, MAC addresses are hardcoded into the network hardware and do not change.
5.
Illustrate the structure of a star topology and label its main components.
Central Hub/Switch: The main connection point in the network where all devices connect, responsible for managing data transmission between devices.
Nodes/Devices: Devices such as computers, printers, and servers that are connected to the central hub/switch via individual cables.
Cabling: Each node is connected to the central hub or switch using a separate cable (typically Ethernet cables in modern networks).
Traffic Flow: Data sent from one node to another passes through the central hub or switch before reaching its destination.
Fault Tolerance: If one cable fails, only the device connected by that cable is affected, leaving the rest of the network operational.
Diagram: A star topology consists of a central hub/switch with individual devices connected to it by separate cables, resembling a star shape.
6.
Analyze the impact of network latency on data transmission.
Definition: Network latency refers to the delay between the transmission of data from a source to its destination, typically measured in milliseconds (ms).
Measurement: Latency is commonly measured using ping tests, which measure the time it takes for a data packet to travel to a destination and back.
Causes: Factors such as long transmission distances, network congestion, slow routers or switches, and poor-quality cabling can all contribute to increased latency.
Effect on Performance: High latency can result in delays in data transmission, leading to slower load times for websites, delays in online applications, and poor user experience, particularly in real-time applications like online gaming or video conferencing.
Impact on Applications: Real-time applications that require quick response times, such as VoIP, video conferencing, and online gaming, are particularly sensitive to latency.
Mitigation: Reducing latency can be achieved through techniques such as optimizing routing paths, upgrading network hardware, increasing bandwidth, and reducing network congestion through traffic management techniques.
7.
Discuss the importance of using a firewall in a network.
Security: Firewalls are essential for preventing unauthorized access to the network by blocking or permitting traffic based on a set of security rules, helping to protect against cyber threats such as hacking, malware, and data breaches.
Traffic Monitoring: Firewalls monitor incoming and outgoing traffic to detect and block suspicious activities or potential threats, ensuring that only legitimate traffic is allowed through.
Policy Enforcement: Firewalls enforce network security policies by controlling which services and applications can be accessed within the network, as well as what external resources are accessible to network users.
Intrusion Prevention: Firewalls play a critical role in intrusion prevention by detecting and blocking malicious activities, such as attempts to exploit network vulnerabilities or inject malware into the system.
Network Segmentation: Firewalls can be used to segment networks into smaller, isolated sections to prevent the spread of attacks or limit access to sensitive information by unauthorized users.
Logging and Reporting: Firewalls provide detailed logs and reports on network activity, allowing network administrators to track potential security incidents and audit access to the network.
8.
Evaluate the benefits of using fiber optic cables over twisted pair cables in a network.
Speed: Fiber optic cables support much higher data transfer rates compared to twisted pair cables, making them ideal for high-speed internet, large-scale networks, and data centers.
Distance: Fiber optic cables can transmit data over much longer distances without experiencing signal degradation, whereas twisted pair cables are limited to shorter distances (usually up to 100 meters for Ethernet).
Bandwidth: Fiber optic cables provide significantly greater bandwidth, allowing them to accommodate higher data throughput and support applications that require large amounts of data transfer.
Interference: Unlike twisted pair cables, fiber optic cables are immune to electromagnetic interference (EMI) and radio frequency interference (RFI), ensuring more stable and reliable data transmission in environments with electrical noise.
Security: Fiber optic cables are more difficult to tap into without detection, making them a more secure option for transmitting sensitive data over the network.
Durability: Fiber optic cables are more resistant to environmental factors such as moisture, extreme temperatures, and physical wear and tear, making them more durable in harsh conditions.
9.
Outline the key characteristics of a personal area network (PAN).
Range: A PAN typically covers a very small area, usually within a few meters around an individual, making it ideal for connecting personal devices.
Devices: PANs connect personal devices such as smartphones, tablets, laptops, smartwatches, and other wearable devices for short-range communication and data exchange.
Technology: PANs often use wireless technologies like Bluetooth, Infrared, and Near Field Communication (NFC) to establish connections between devices.
Purpose: The primary purpose of a PAN is to facilitate data transfer between personal devices, such as syncing files between a phone and a laptop or connecting wireless accessories like headphones.
Setup: PANs are usually easy to set up with minimal configuration, requiring only basic pairing or connection processes, especially with technologies like Bluetooth.
Privacy: PANs typically operate in a secure manner by using encryption and authentication protocols to ensure private communication between devices, protecting against unauthorized access.
10.
Outline the process of data packet routing in a wide area network (WAN)
Routing Table: Routers use a routing table to determine the best path for data packets. The routing table contains information about possible routes and their associated costs or distances.
IP Address: Data packets are addressed with both source and destination IP addresses, which routers use to determine where to forward the packet.
Routing Protocols: Routing protocols such as OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol) help routers find the optimal path for forwarding data packets across networks.
Forwarding: Once a router determines the next hop, it forwards the packet to the appropriate router or network segment, repeating the process until the packet reaches its final destination.
Network Segments: Packets may traverse multiple network segments (such as LANs, MANs, and other intermediate networks) before reaching the final network in the WAN.
Final Delivery: Upon reaching the destination network, the data packet is delivered to the appropriate device based on its IP address, completing the transmission process.
11.
Justify the need for DNS in a network.
Human-Friendly Names: The Domain Name System (DNS) translates human-readable domain names (e.g., www.example.com) into numeric IP addresses (e.g., 192.168.1.1), making it easier for users to navigate the internet.
Simplifies Navigation: Without DNS, users would need to remember complex IP addresses for every website they want to visit, which is impractical for everyday use.
Load Balancing: DNS can distribute network traffic across multiple servers using techniques like round-robin or geographic load balancing, ensuring that no single server is overwhelmed by too many requests.
Redundancy: DNS provides redundancy through its hierarchical structure and multiple servers, ensuring continuous access to websites even if some DNS servers are unavailable.
Email Routing: DNS plays a crucial role in email routing by resolving domain names in email addresses to the correct mail server IPs (via MX records).
Security: DNS supports security features like DNSSEC (DNS Security Extensions), which provide cryptographic authentication of DNS data, helping protect against DNS spoofing or cache poisoning attacks.
12.
Distinguish between a local area network (LAN) and a metropolitan area network (MAN).
Geographical Area: A LAN typically covers a small geographical area, such as a single building, office, or campus, while a MAN covers a larger area, such as a city or metropolitan region.
Ownership: LANs are usually owned and operated by a single organization or entity, whereas MANs may be managed by multiple organizations or telecom companies.
Speed: LANs often provide higher data transfer rates, commonly ranging from 100 Mbps to 10 Gbps, while MANs may have lower speeds due to the larger distances involved.
Use Case: LANs are commonly used to connect devices in offices, schools, or homes, while MANs are designed to connect multiple LANs across a city or large urban area, often providing connectivity for public services, businesses, or campuses.
Infrastructure: LANs primarily use Ethernet and switches to connect devices, while MANs may utilize fiber optic cables, wireless microwave technologies, or other high-speed infrastructure.
Scalability: MANs are generally designed to support larger numbers of users and devices over a broader area, whereas LANs are more localized in their scalability and application.
13.
Assess the role of ports in network communication.
Physical Ports: These are hardware interfaces (like Ethernet ports or USB ports) that allow network cables or other devices to connect to a network, enabling physical connectivity.
Virtual Ports: Logical endpoints used by network protocols to manage communication between different software applications. For example, HTTP uses port 80, and HTTPS uses port 443.
Traffic Direction: Ports direct incoming and outgoing traffic to the appropriate application or service based on the port number, ensuring data reaches the correct destination within a device.
Security: By managing and filtering specific ports, network administrators can block or allow traffic to certain applications or services, reducing the risk of unauthorized access. For instance, blocking unused ports can enhance security.
Services: Ports enable multiple services to operate on a single device simultaneously, as different services (like email and web browsing) are assigned unique port numbers.
Troubleshooting: Monitoring and managing ports can help identify and resolve network issues. If a service isn't working, checking the port for that service can reveal problems like misconfigurations or firewalls blocking traffic.
14.
Identify the main components of a hybrid network topology.
Combination of Topologies: A hybrid topology integrates elements from different topologies such as star, ring, bus, or mesh to create a network structure tailored to specific needs.
Centralized Hub: In a hybrid topology, a central hub or switch is often used for primary connections, particularly in segments based on star topology.
Redundant Links: Hybrid topologies can include mesh components that provide redundant links, ensuring that if one connection fails, data can still be transmitted through an alternate path.
Subnetworks: The network may consist of multiple subnetworks, each with a different topology (e.g., one subnetwork might be a star, while another might be a bus), all interconnected within the hybrid structure.
Flexible Design: Hybrid networks offer flexibility, allowing network designers to choose the best aspects of different topologies based on the needs of the specific environment.
Scalability: Hybrid networks can be easily scaled to accommodate more users, devices, or nodes by adding new topologies or expanding existing ones.
15.
Illustrate how data is transmitted in a ring topology.
Continuous Path: In a ring topology, each device (or node) is connected to exactly two other devices, forming a circular or ring-like structure for data transmission.
Token Passing: Data transmission in a ring topology often uses a token-passing protocol, where a control token circulates around the ring. Devices can only send data when they possess the token, which prevents data collisions.
Unidirectional/Bidirectional: The data can travel in one direction (unidirectional) or in both directions (bidirectional), depending on the specific implementation of the topology.
Sequential Transmission: Data travels through each node sequentially along the ring until it reaches the intended destination.
Fault Detection: A failure at one node or link can disrupt communication for the entire network. However, in some implementations, such as dual-ring networks, data can be rerouted in the opposite direction to maintain communication.
Diagram: A diagram of a ring topology typically shows a circular arrangement of nodes with arrows indicating the direction of data flow.
16.
Explain the purpose of using a virtual private network (VPN).
Secure Communication: VPNs encrypt data transmissions between a user and a remote network, ensuring secure communication over public networks like the internet, protecting sensitive information from eavesdropping.
Remote Access: VPNs allow users to securely access a private network, such as a corporate network, from a remote location, facilitating work from home or while traveling.
Privacy: By masking a user’s IP address and encrypting their traffic, VPNs help protect the user’s identity and privacy online, reducing the risk of third-party tracking.
Bypass Restrictions: VPNs enable users to bypass geographical or governmental restrictions by connecting to servers in different locations, allowing access to content that may be blocked in their region.
Corporate Use: Many organizations use VPNs to provide secure access to internal resources (such as file servers, databases, and applications) for employees working remotely.
Security Features: VPNs typically support features like tunneling protocols (e.g., L2TP, OpenVPN), multi-factor authentication, and data integrity checks to ensure the confidentiality and security of transmitted data.
17.
Describe how a point-to-point network topology operates.
Direct Connection: In a point-to-point topology, two nodes are directly connected by a single dedicated communication link, allowing direct communication between the two without interference from other devices.
Dedicated Channel: This dedicated link means that the two devices do not share the channel with any other devices, resulting in faster and more secure communication.
High Speed: Point-to-point networks offer high-speed data transfer since the entire bandwidth of the communication link is dedicated to the two connected devices.
Simple Design: The simplicity of the point-to-point topology makes it easy to set up and configure, as there is only one communication link to manage.
Limited Scalability: This topology is not suitable for larger networks, as each new connection requires a new point-to-point link, which can quickly become impractical in large-scale implementations.
Applications: Point-to-point topologies are commonly used for direct communication between two locations, such as linking two buildings or creating a direct connection between two network devices.
18.
Analyze the effect of bandwidth on network performance.
Data Transfer Rate: Higher bandwidth increases the rate at which data can be transferred between devices, allowing for faster downloads, uploads, and communication.
Network Capacity: With more bandwidth, a network can handle more simultaneous connections and data transfers, reducing the likelihood of congestion and improving performance during peak usage times.
Latency: While bandwidth does not directly affect latency, sufficient bandwidth ensures that data can be transmitted without delays caused by congestion, reducing response times and improving the overall user experience.
Quality of Service (QoS): Adequate bandwidth ensures that bandwidth-intensive applications, such as video streaming, voice-over-IP (VoIP), and online gaming, can operate smoothly without interruptions.
Congestion: Insufficient bandwidth can lead to network congestion, causing slower data transmission speeds and degraded performance, especially when multiple devices or users are active on the network.
Scalability: Higher bandwidth allows networks to scale more easily, supporting additional users, devices, and services without compromising network performance.
19.
Discuss the security implications of using wireless media in networks.
Interception: Wireless signals can be intercepted by unauthorized users, as they propagate through the air and can be accessed by anyone within range of the signal.
Encryption: Strong encryption protocols such as WPA3 are essential for protecting wireless communications and ensuring that data remains confidential and cannot be intercepted or tampered with.
Access Control: Implementing strong authentication methods, such as password protection, multi-factor authentication, and network access control (NAC), helps prevent unauthorized devices from connecting to the network.
Signal Range: Wireless signals can extend beyond the intended boundaries of a network, which increases the risk of unauthorized users gaining access if security measures are not in place.
Interference: Wireless networks are susceptible to interference from other wireless devices, such as Bluetooth devices, microwave ovens, or other Wi-Fi networks, which can degrade performance and compromise security.
Physical Security: Wireless access points and routers must be physically secured to prevent unauthorized tampering, which could lead to network breaches or configuration changes.
20.
Discuss what an IP address is and explain its significance in networking.
Definition: An IP (Internet Protocol) address is a unique identifier assigned to each device connected to a network, enabling it to communicate with other devices over the internet or a local network.
Format: IP addresses come in two formats—IPv4 (32-bit addresses, such as 192.168.0.1) and IPv6 (128-bit addresses, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334), which allow devices to be identified on a network.
Routing: Routers use IP addresses to forward data packets to the correct destination by determining the best path for the packet to travel.
Network Identification: An IP address identifies a device within a network, allowing other devices to locate and communicate with it. Each device on a network must have a unique IP address.
Subnets: IP addresses can be divided into smaller subnets, allowing large networks to be organized into more manageable sections with distinct routing rules.
Communication: IP addresses are essential for devices to communicate over the internet or a LAN, as they provide the means by which data is sent and received between devices.
21.
Compare the use of twisted pair cables and coaxial cables in networking
Twisted Pair Cables:
Common Use: Widely used in Local Area Networks (LANs) for connecting computers and other network devices, particularly with Ethernet standards (e.g., Cat5e, Cat6).
Flexible and Easy to Install: Twisted pair cables are light, thin, and flexible, making them easy to install in tight spaces or within buildings.
Short to Medium Distances: Suitable for transmitting data over short to medium distances, usually up to 100 meters, before experiencing signal degradation.
Susceptible to EMI: Twisted pair cables are more vulnerable to electromagnetic interference (EMI), although shielding can be added to reduce interference (in the case of shielded twisted pair (STP)).
Lower Cost: Typically more affordable than coaxial cables, making them a cost-effective solution for most LAN applications.
Supports High Data Rates: Newer twisted pair standards (like Cat6a) support high data rates of up to 10 Gbps over short distances.
Coaxial Cables:
Used for Cable Internet and TV: Commonly used in cable internet connections, cable television systems, and some older networking setups.
Resistant to EMI: Coaxial cables are more resistant to electromagnetic interference due to their thicker shielding, making them suitable for environments with high interference.
Longer Distances: Coaxial cables can transmit data over longer distances without experiencing significant signal loss, often making them suitable for long-range connections.
More Durable: Coaxial cables are generally more robust and durable than twisted pair cables, able to withstand harsh environmental conditions.
Higher Cost: Coaxial cables tend to be more expensive due to their construction and durability.
Lower Data Rates: Coaxial cables support lower data transfer rates compared to modern twisted pair cables, making them less suitable for high-speed LANs.
22.
Explain the role of a network interface card (NIC) in a computer.
Connectivity: A Network Interface Card (NIC) enables a computer or device to physically connect to a network, allowing it to communicate with other devices on the same network.
Data Transmission: NICs convert data from the computer into electrical, optical, or wireless signals that can be transmitted over the network to other devices.
Addressing: Each NIC is assigned a unique MAC address, which is used for communication at the Data Link Layer (Layer 2) of the OSI model. This allows devices to identify one another on the network.
Interface Types: NICs come in different types, such as wired (Ethernet) and wireless (Wi-Fi). A wired NIC connects via Ethernet cables, while a wireless NIC uses radio signals to connect to Wi-Fi networks.
Speed: The NIC determines the maximum data transfer rate that a device can achieve over the network. Modern NICs support speeds ranging from 1 Gbps to 10 Gbps or higher.
Driver Software: NICs require appropriate drivers to function correctly with the operating system. The driver enables communication between the operating system and the network hardware.
23.
Describe how a mesh topology ensures data redundancy.
Multiple Paths: In a mesh topology, each node is connected to multiple other nodes, providing multiple paths for data to travel. This ensures that if one path is unavailable, data can still be transmitted through an alternate path.
Fault Tolerance: Mesh topologies are highly fault-tolerant. If one node or connection fails, the network can reroute traffic through other nodes, preventing network downtime.
High Reliability: The presence of multiple communication paths ensures a high level of network reliability, as data transmission can continue even when parts of the network experience issues.
Load Balancing: Mesh networks distribute traffic evenly across multiple paths, which helps to prevent bottlenecks and ensure smoother data flow. This is especially useful in high-traffic networks.
Self-Healing: Mesh topologies can automatically detect failures and reroute data, enabling the network to "self-heal" without human intervention, maintaining network availability.
Network Segments: Each segment of the mesh topology is interconnected with multiple nodes, ensuring that even if one segment fails, the rest of the network remains functional.
24.
Evaluate the effectiveness of using a router in a home network setup.
Internet Connectivity: A router provides a home network with access to the internet by connecting to the Internet Service Provider (ISP) and distributing the internet connection to devices within the home.
Network Segmentation: Routers can segment home networks into different zones, such as a guest network, a private network for personal devices, or even smart home devices, enhancing security and organization.
Security: Most modern home routers come with built-in firewalls, encryption (e.g., WPA3), and other security features that help protect the home network from unauthorized access and cyberattacks.
Wi-Fi Support: Many routers include wireless (Wi-Fi) functionality, allowing multiple devices to connect to the network without the need for physical cables. This is especially useful for smartphones, tablets, and laptops.
Port Forwarding: Routers enable port forwarding, which allows specific devices or services (e.g., a gaming console or security camera) to be accessed from outside the home network, providing additional functionality.
Ease of Use: Home routers are typically designed to be user-friendly, with simple web-based or app-based interfaces for setup and management. Users can easily configure settings like Wi-Fi passwords, parental controls, and network monitoring.
25.
Illustrate the configuration of a local area network (LAN) using a diagram.
Central Switch: The switch acts as the central hub that connects all devices within the LAN, facilitating communication between them.
Connected Devices: Devices such as computers, printers, servers, and other network-enabled devices are connected to the switch through Ethernet cables or wirelessly via an access point.
Cabling: Ethernet cables (Cat5e, Cat6) connect devices to the switch, enabling high-speed, reliable communication within the LAN.
Router: The router is connected to the switch, providing the entire LAN with access to the internet by routing data between the LAN and external networks.
Wireless Access Point: A wireless access point (WAP) connects to the switch, providing Wi-Fi connectivity to devices that do not have Ethernet ports, such as smartphones and tablets.
Diagram: A visual representation of the LAN setup, showing devices connected to the central switch via cables, the router providing internet access, and a wireless access point offering Wi-Fi connectivity.
26.
Which device is used to connect multiple devices on a local network and forward data only to the intended recipient?
A. Hub
B. Switch
C. Router
D. Firewall
B. Switch
27.
What is the primary function of a router?
A. To connect computers within a LAN
B. To broadcast data to all devices
C. To forward data packets between networks
D. To amplify network signals
C. To forward data packets between networks
28.
Which type of network topology involves each node being connected to every other node?
A. Star
B. Ring
C. Mesh
D. Hybrid
C. Mesh
29.
In which network type are computers and devices connected within a limited geographical area?
A. WAN
B. LAN
C. MAN
D. PAN
B. LAN
30.
What does a MAC address uniquely identify?
A. A network port
B. A network protocol
C. A network interface card
D. A network router
C. A network interface card
31.
Which network type covers a broad area such as a city?
A. LAN
B. WAN
C. PAN
D. MAN
D. MAN
32.
Which device operates at the network layer (Layer 3) of the OSI model?
A. Hub
B. Switch
C. Router
D. Firewall
C. Router
33.
What is the primary purpose of using a VPN?
A. To increase bandwidth
B. To create a secure connection over the internet
C. To connect multiple LANs
D. To monitor network traffic
B. To create a secure connection over the internet
34.
Which type of cable is known for high-speed data transmission using light signals?
A. Twisted Pair Cable
B. Coaxial Cable
C. Fiber Optic Cable
D. Ethernet Cable
C. Fiber Optic Cable
35.
What does DNS stand for in networking?
A. Data Network Service
B. Domain Name System
C. Digital Network Solution
D. Domain Network Service
B. Domain Name System
36.
What is the primary advantage of using a star topology?
A. Reduced cable usage
B. Easy fault isolation
C. High data redundancy
D. Simple configuration
B. Easy fault isolation
37.
In a ring topology, what happens if a single node fails?
A. The entire network goes down
B. Data is rerouted through another path
C. Only the failed node is affected
D. The central hub handles the failure
A. The entire network goes down
38.
Which type of network is most suitable for personal devices within a few meters range?
A. LAN
B. WAN
C. PAN
D. MAN
C. PAN (Personal Area Network)
39.
What is the main role of a firewall in a computer network?
A. To boost internet speed
B. To assign IP addresses
C. To block unauthorized access
D. To store backup data
C. To block unauthorized access
40.
Which protocol is commonly used to transfer web pages over the internet?
A. FTP
B. HTTP
C. DHCP
D. SNMP
B. HTTP
41.
Define the function of a network switch in a local area network
oA switch connects multiple devices within a LAN.
oIt uses packet switching to forward data to the destination.
oOperates at the data link layer (Layer 2) of the OSI model.
oReduces network traffic by sending data only to the intended device.
oProvides better performance and security compared to hubs.
oCan support VLANs and other advanced features in managed switches.
42.
Which device forwards data packets between computer networks?
A. Switch
B. Hub
C. Router
D. Modem
C. Router
43.
Which cable type is known for its high speed and resistance to electromagnetic interference?
A. Coaxial Cable
B. Twisted Pair Cable
C. Fiber Optic Cable
D. USB Cable
C. Fiber Optic Cable
44.
Which of the following operates at the data link layer of the OSI model?
A. Router
B. Switch
C. Modem
D. Gateway
B. Switch
45.
What is the main function of a firewall in a network?
A. Connecting devices
B. Forwarding data packets
C. Filtering incoming and outgoing traffic
D. Assigning IP addresses
C. Filtering incoming and outgoing traffic
46.
Which frequency band is commonly used for Wi-Fi networks?
A. 1.2 GHz
B. 2.4 GHz
C. 3.6 GHz
D. 4.8 GHz
B. 2.4 GHz
47.
What type of network uses light to transmit data?
A. Ethernet
B. Bluetooth
C. Fiber Optic
D. Coaxial
C. Fiber Optic
48.
A device that connects multiple Ethernet devices and broadcasts data to all connected devices is a:
A. Switch
B. Hub
C. Router
D. Repeater
B. Hub
49.
Which protocol is used for assigning IP addresses dynamically?
A. FTP
B. HTTP
C. DHCP
D. SMTP
C. DHCP
50.
What is the primary purpose of using VLANs in a network?
A. Increasing bandwidth
B. Segmenting network traffic
C. Extending network range
D. Enhancing security
B. Segmenting network traffic
51.
Which type of cable is typically used for cable television and internet?
A. Twisted Pair
B. Fiber Optic
C. Coaxial
D. USB
C. Coaxial
52.
Which device is necessary for connecting to the internet over a telephone line?
A. Switch
B. Router
C. Modem
D. Firewall
C. Modem
53.
What does QoS stand for in networking?
A. Quality of Service
B. Quantity of Service
C. Quick Online Support
D. Quota of Speed
A. Quality of Service
54.
Which network device is used to create a wireless local area network?
A. Router
B. Access Point
C. Switch
D. Modem
B. Access Point
55.
Which type of interference is reduced by twisting the wires in a twisted pair cable?
A. Radio Frequency Interference
B. Electromagnetic Interference
C. Optical Interference
D. Acoustic Interference
B. Electromagnetic Interference
56.
What is the primary function of a gateway in a network?
A. Filtering traffic
B. Assigning IP addresses
C. Connecting different networks
D. Storing data
C. Connecting different networks
57.
Define the term network architecture.
oNetwork architecture refers to the design and layout of a computer network.
oIt includes the hardware, software, connectivity, communication protocols, and transmission modes.
oIt determines how data is transmitted and processed across the network.
oNetwork architecture can be divided into various types such as client-server, peer-to-peer, and hybrid.
oIt includes the physical topology (e.g., star, bus, ring) and logical topology (e.g., the path data takes within the network).
oThe architecture ensures efficient and secure communication between networked devices.
58.
Predict the impact of enabling QoS on a network's performance
oTraffic Prioritization: Ensures critical applications receive higher priority and bandwidth.
oReduced Latency: Improves performance for real-time applications (e.g., VoIP, video conferencing).
oEnhanced User Experience: Provides consistent and reliable performance for key applications.
oControlled Congestion: Prevents network congestion by managing traffic effectively.
oImproved Resource Allocation: Allocates resources based on application importance.
oPotential Trade-offs: May result in lower priority applications experiencing slower speeds.
59.
Formulate a plan for monitoring and maintaining network performance
oRegular Monitoring: Use network monitoring tools (e.g., SNMP, NetFlow) to track performance.
oBaseline Performance: Establish a baseline for normal network performance.
oAlert Systems: Set up alerts for performance anomalies or potential issues.
oPerformance Metrics: Monitor key metrics such as bandwidth usage, latency, and packet loss.
oRegular Updates: Keep network devices and software updated to ensure security and performance.
oProactive Maintenance: Schedule regular maintenance checks to prevent issues.
60.
Demonstrate how to set up a VLAN on a managed switch
oAccess the switch's management interface (web or CLI).
oLog in with administrative credentials.
oNavigate to the VLAN configuration section.
oCreate a new VLAN by specifying the VLAN ID and name.
oAssign ports to the VLAN by selecting the desired ports.
oConfigure the ports as either access or trunk ports.
oSave the configuration and apply the changes.
oVerify the VLAN setup by checking the VLAN membership and connectivity.
61.
Interpret the results of a network speed test
oDownload Speed: Indicates the rate at which data is received from the internet.
oUpload Speed: Indicates the rate at which data is sent to the internet.
oPing: Measures the round-trip time for data packets to travel to the server and back, indicating latency.
oJitter: Measures the variability in ping times, affecting the stability of the connection.
oPacket Loss: Indicates the percentage of data packets lost during transmission, affecting reliability.
oComparison: Compare the results with the advertised speeds from the ISP to evaluate performance.
62.
Predict the potential issues when using infrared technology for communication
oRequires direct line-of-sight between devices.
oLimited range, typically a few meters.
oAffected by obstacles and ambient light.
oLower data transfer speeds compared to other wireless technologies.
oSusceptible to interference from other infrared sources.
oPrimarily used for short-range, low-data-rate applications.
63.
Explain the role of a router in a network
Packet Forwarding: Routers examine incoming data packets and forward them to the appropriate network based on their destination IP address.
Path Selection: They use routing tables and algorithms to choose the most efficient path for data transmission.
Network Interconnection: Routers connect different networks (e.g., a home network to the internet), allowing communication between them.
Traffic Management: Routers help manage network traffic by prioritizing data and preventing congestion.
Security: Most modern routers include firewall features to protect the network from unauthorized access.
64.
Compare the characteristics of twisted pair cables and fiber optic cables
Twisted Pair Cables
Made of copper wires twisted together in pairs.
Transmit data using electrical signals.
Have lower bandwidth and speed (up to 10 Gbps for advanced types like Cat 6a).
Suitable for short distances (up to 100 meters in Ethernet networks).
Prone to electromagnetic interference (EMI).
Cheaper and easier to install and maintain.
Less durable over long distances due to signal attenuation.
Commonly used in LANs, telephone lines, and home networking.
Fiber Optic Cables
Made of glass or plastic fibers.
Transmit data using light signals.
Support very high bandwidth and speed (up to 100 Gbps or more).
Ideal for long-distance communication (up to several kilometers without signal loss).
Immune to electromagnetic interference.
More expensive and require specialized installation.
Highly durable and reliable for long-distance and high-performance applications.
Commonly used in internet backbones, data centers, and telecommunications.
65.
Describe how a hub operates within a network
oConnects multiple Ethernet devices in a LAN.
oOperates at the physical layer (Layer 1) of the OSI model.
oBroadcasts incoming data packets to all connected devices.
oDoes not filter data or use any intelligence to determine the destination.
oCan lead to network inefficiencies and data collisions.
oGenerally considered obsolete and replaced by switches.
66.
Illustrate the process of connecting a computer to a Wi-Fi network
1. Turn on the Computer and Wi-Fi Adapter
Ensure the computer is powered on.
If the computer has a physical Wi-Fi switch or function key (e.g., Fn + F2), turn it on.
2. Access the Network Settings
On Windows: Click the Wi-Fi icon on the taskbar (bottom right corner).
On macOS: Click the Wi-Fi icon in the menu bar (top right corner).
3. View Available Networks
A list of available Wi-Fi networks will appear.
These are the wireless networks in range of the computer.
4. Select the Desired Network
Click on the name (SSID) of the network you want to connect to.
5. Enter the Wi-Fi Password
If the network is secured, a prompt will ask for the Wi-Fi password.
Type in the correct password and click Connect or Join.
6. Obtain an IP Address Automatically
The computer communicates with the router using DHCP (Dynamic Host Configuration Protocol) to get an IP address.
7. Connection Established
Once connected, a confirmation message appears.
The Wi-Fi icon changes to show signal strength.
You can now access the internet and local network resources.
67.
Analyze the impact of electromagnetic interference on network performance
oCan cause data transmission errors and packet loss.
oReduces overall network reliability and performance.
oAffects the speed and quality of network connections.
oMore significant in environments with high electrical noise.
oShielded cables (e.g., STP) can help reduce interference.
oProper network design and installation practices are essential.
68.
Discuss the advantages and disadvantages of using wireless connections over wired connections
oAdvantages:
§Provides mobility and flexibility for users.
§Easier and quicker to install, no need for physical cables.
§Ideal for devices that move frequently, like laptops and smartphones.
§Supports network expansion without additional cabling.
§Can connect to hard-to-reach locations.
§Facilitates the creation of ad-hoc networks.
oDisadvantages:
§Susceptible to interference from other devices and physical obstructions.
§Generally lower speeds compared to wired connections.
§Security concerns due to the broadcast nature of wireless signals.
§Limited range, may require additional access points for larger areas.
§Potential for network congestion in high-density environments.
Dependent on battery life for portable devices
69.
Evaluate the effectiveness of using firewalls in securing a network
oMonitors and controls incoming and outgoing network traffic.
oBlocks unauthorized access and potential threats.
oCan filter traffic based on predetermined security rules.
oProvides a barrier between a trusted internal network and untrusted external networks.
oEssential for protecting sensitive data and network resources.
oCan be configured to allow or block specific applications or services.
70.
Identify the main differences between managed and unmanaged switches
oManaged Switches:
§Offer advanced features such as VLAN support and QoS.
§Can be configured and managed remotely.
§Provide SNMP for network monitoring and management.
§More expensive than unmanaged switches.
§Suitable for larger and more complex networks.
§Can enhance network performance and security.
oUnmanaged Switches:
§Plug-and-play, no configuration required.
§Lower cost and simpler to use.
§Limited features, suitable for small or home networks.
§Cannot be managed remotely.
§No support for VLANs or advanced settings.
§Provide basic connectivity without customization.
71.
Outline the steps involved in configuring a router for internet access
oConnect the router to the modem using an Ethernet cable.
oPower on the router and modem.
oConnect a computer to the router using an Ethernet cable or Wi-Fi.
oOpen a web browser and enter the router's default IP address.
oLog in to the router's web interface using the default credentials.
oConfigure the WAN settings based on the ISP's requirements (e.g., DHCP, PPPoE).
oSet up the Wi-Fi network (SSID, security type, password).
oSave the settings and restart the router if necessary.
Verify the internet connection by browsing the web or performing a speed test
72.
Summarize the key features of Bluetooth technology
Wireless Communication: Bluetooth enables short-range wireless communication between electronic devices without the need for cables.
Short Range: Typically operates within 10 meters (33 feet), though some versions can reach up to 100 meters.
Low Power Consumption: Designed for low energy usage, making it ideal for mobile devices and battery-powered gadgets.
Device Pairing: Devices must be paired using a simple process for secure communication.
Frequency Band: Operates in the 2.4 GHz ISM band, which is unlicensed and globally available.
Data Transfer: Supports both data and voice transmission, suitable for file sharing, audio streaming, and peripheral connections.
Multiple Device Support: Can connect multiple devices simultaneously (e.g., keyboard, mouse, and headset).
Security Features: Offers encryption and authentication to protect data during transmission.
Widely Used: Common in smartphones, laptops, wireless headphones, smartwatches, and IoT devices.
73.
Assess the benefits of using fiber optic cables for long-distance communication:
oSupports very high speeds, up to several Tbps.
oCan transmit data over long distances, up to 40 kilometers or more.
oImmune to electromagnetic interference and radio frequency interference.
oProvides a secure communication medium, difficult to tap.
oSuitable for high-bandwidth applications like video streaming and large data transfers.
oOffers low latency and high reliability for critical network infrastructure.
74.
Justify the use of QoS (Quality of Service) in network management:
§Provides mobility and convenience without cables.
§Subject to interference from other devices and physical obstructions.
§Generally has lower speeds and higher latency compared to Ethernet.
§Used in homes, offices, and public places for wireless access.
88.
Discuss the importance of VLANs in network configuration.
oSegmentation: VLANs segment a network into smaller, isolated sub-networks, improving organization.
oSecurity: Enhances security by isolating sensitive data and devices from the rest of the network.
oPerformance: Reduces broadcast traffic and improves overall network performance.
oFlexibility: Allows for logical grouping of devices regardless of physical location.
oSimplified Management: Makes managing and configuring network policies easier.
oScalability: Facilitates network expansion without significant reconfiguration.
89.
Illustrate the process of data encapsulation in the TCP/IP model.
oApplication Layer: Data is generated and formatted for the application (e.g., HTTP request).
oTransport Layer: Data is segmented and encapsulated into TCP segments or UDP datagrams, including headers for source and destination ports.
oInternet Layer: Segments are encapsulated into IP packets with headers containing source and destination IP addresses.
oNetwork Access Layer: IP packets are further encapsulated into frames with MAC addresses for physical transmission.
oTransmission: Frames are sent over the physical medium (e.g., Ethernet cable, wireless signal).
oDecapsulation: At the receiving end, each layer removes its respective header and processes the data up the stack.
90.
Analyze the role of the DNS in network communication.
oDomain Name Resolution: Translates human-readable domain names into IP addresses.
oHierarchy: Organized hierarchically into domains and subdomains for efficient management.
oCaching: Stores previous queries to speed up subsequent resolutions and reduce load on servers.
oLoad Distribution: Distributes network traffic across multiple servers using techniques like round-robin DNS.
oRedundancy: Provides redundancy through multiple DNS servers to ensure availability.
oSecurity: Implements security measures such as DNSSEC to prevent spoofing and ensure data integrity.
91.
Evaluate the security features provided by a typical Network Operating System.
oAuthentication: Verifies user identities before granting access.
oAuthorization: Determines user permissions and access levels.
oEncryption: Protects data in transit and at rest through encryption technologies.
oFirewall: Controls incoming and outgoing network traffic based on security rules.
oIntrusion Detection/Prevention: Monitors network activity for suspicious behavior and takes preventive actions.
oPatch Management: Regular updates and patches to fix vulnerabilities and improve security.
92.
List the steps involved in connecting and configuring a router
oPhysical Connection: Connect the router to the modem via the WAN port and to devices via LAN ports.
oPower On: Plug in and turn on the router.
oAccess Management Interface: Connect a computer to the router and access the management interface via a web browser using the default IP address.
oLogin: Use default credentials to log in and immediately change the default password.
oConfigure WAN Settings: Set up the internet connection type (e.g., DHCP, static IP, PPPoE) as provided by the ISP.
oConfigure LAN Settings: Set the router's LAN IP address, subnet mask, and enable the DHCP server to assign IP addresses to devices.
93.
Outline the process of configuring an access point for a wireless network.
oPhysical Connection: Connect the access point to the network via Ethernet.
oPower On: Plug in and turn on the access point.
oAccess Management Interface: Connect a computer to the access point and access the management interface via a web browser using the default IP address.
oLogin: Use default credentials to log in and change the default password.
oSSID Configuration: Set the SSID (network name) for the wireless network.