Sunday, December 11, 2011

LAN SWITCHING AND WIRELESS (ET0716) TEST

SAMPLE MID-SEMESTER TEST
Diploma in Computer Engineering
2nd Year FT

LAN SWITCHING AND WIRELESS

Section A: Multiple Choice Question [2 marks each]

Please tick your answer onto the MCQ answer sheet on the answer booklet.
Choose only one answer for each question. Answer every question.

A1. Which one of the following describes the term "Link aggreation"?

(a) Capability to use multiple switch ports concurrently for higher throughput data communication
(b) Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second
(c) Number of ports available on a single switch
(d) Data rate that each port on the switch is capable of attaining

A2. Which is the device that can separate broadcast domain?

(a) Hub
(b) Bridge
(c) Switch without VLAN configured
(d) Router

A3. Which of the following is NOT a switching method used by a switch?

(a) Store and forward
(b) Cut through - Fast forward
(c) Cut through - Fragment free
(d) Store and fragment free

A4. What is the characteristic of VLAN1 in a brand new switch configuration?
(a) VLAN1 is the management VLAN.
(b) Not all switch ports are members of VLAN 1
(c) Any ports can be a VLAN trunk port for connecting to another switch
(d) Not necessary that VLAN1 is the default VLAN

A5. Which of the following is NOT a type of VLAN?
(a) Voice
(b) Management
(c) Native
(d) Static

A6. Which statement is true about the interface fa0/0.10 command?
(a) The command applies VLAN 10 to router interface fa0/0
(b) The command is used in configuration of router Ethernet port as a sub-interface.
(c) The command configures interface fa0/0 as a trunk link
(d) The command indicates that there are altogether 10 sub-interfaces.

A7. What mechanism is used to achieve the separation between different VLAN frames as they cross a trunk link?
(a) IP address of the frame
(b) VLAN number associated with the trunk port
(c) Tagging using 802.1Q protocol
(d) All frames are classified as native VLAN when they are in trunk, there is no need to separate them.

A8. A switch is configured for VLAN 10, VLAN 20 and VLAN 30. When a computer connected to VLAN 10 broadcast an ARP request, how far can this broadcast propagate?
(a) The switch stops the broadcast
(b) To all computer connected to the switch
(c) To all computers connected to VLAN 10 only
(d) To all VLANs if a router connected to the switch and configured for inter-VLANs routhing

A9. What is the purpose of having Virtual Trunking Protocol (VTP) configured on a switched network that incorporates VLANs?
(a) VTP allows multiple VLANs to use a single trunk link.
(b) VTP constantly updates VLAN changes to all switches in the same VTP domain.
(c) VTP creates domain so that all device connected to switches in the same VTP domain can communicate  with each other.
(d) VTP assigns switch ports to different VLANs.

A10. How does a switch in a VTP domain know whether the VLAN information that it has is the lastest?
(a) Examine the VTP dates
(b) Examine the version number
(c) Examine the revision number
(d) Examine the configuration register value

A11. Spanning Tree Protocol (STP) sllows which of the following functions?
(a) Having redundant network paths without suffering the effects of loops in the network
(b) Expansion of network without increasing the latency time.
(c) Extending the cable length to a computer far away from the switch without degrading the signals.
(d) Allow a switch to know how many devices are connected in a network.

A12. Which of the following is NOT an advantage of wireless network when compared with wired network?
(a) Reduces the cost of cables required for installation
(b) Can be installed faster than a wired network
(c) It can be easily deployed when there is a need to extend a network
(d) It is inherently more secure than a wired network

A13. Why an access point is considered a portal?
(a) An access point always connects users to the Internet
(b) An access point connects clients to one another
(d) An access point is a gateway to another collision domain
(d) An access point allows client connectivity from an IEEE 802.11 network to IEEE

A14. What is the main purpose of varying the output power set at the wireless access point?
(a) To adjust the wire coverage area of the network
(b) To reduce the wireless interference to other  device
(c) Maximum power setting can have bad effect on human
(d) To save battery power

A15. To secure a wireless network, an administrator decided to use MAC-Address filtering.
Which is the device that can implement this filter?
(a) Computer
(b) Router
(c) Switch
(d) Wireless Access Point

A16. A computer has hired you to recommend Wireless LAN equipment that will allow the Administrator to place limits on the bandwidth used by each of their wireless users.
Which of the following devices would you recommend?
(a) Access point
(b) Enterprise wireless gateway
(c) Wireless residential gateway
(d) Wireless workgroup bridge

A17. As a consultant, you have taken a job to create a wireless LAN for an office complex that will connect 3 buildings in close proximity together. Given only this information, which one of the following  wireless LAN implementations would be most appropriate for this scenario?
(a) Last mile data service from a Wireless ISP
(b) Point-to-point wired links between all buildings
(c) Point-to-multipoint wireless bridge link from a central building to all remote buildings
(d) One access point with external antenna at the main building only

A18. An access point, connected to a wired Ethernet LAN , is located at the roof top of a building where an AC power outlet is not available. Which of the following can be used to power the device?
(a) Battery
(b) Power adaptor
(c) Power over Ethernet
(d) Ethernet to Power converter

A19. Which one of the follwoing IEEE standards defines Inter-access-point-point protocol which supports roaming?
(a) 802.11i
(b) 802.11f
(c) 802.11e
(d) 802.1x

A20. What is the full name for acronym "ISM"?
(a) Industry, system and mechanism
(b) Industry, system and machine
(c) Industrial, scientific and medical
(d) Industrial, science and medicine

Section B: Short Question (10 marks each)

B1. (a) Name the three layers of the hierarchical design model in the network design. (3 marks)

Ans: core, distribution , access

(b) Which are the layers that you can implement redundancy in the hierarchical design model? (2 marks)

Ans: core & distribution


(c) With respect to network design, what does the term "convergence" mean? (3 marks)

Ans: Having voice, data and video over the same network

(d) At which OSI layer does a network switch operates? What information does a switch need from a frame in order to forward the frame? (2 marks)

Ans: Layer 2 Mac Address


B2. (a) Write the instruction that will configure a switch with the IP address 172.1.254.1 (4 marks)

Ans:
S1(config)#int vlan 1
S1(config)#ip address 172.1.254.1 255.255.255.0
S1(config)#no shutdown
S1(config)#exit


(b) When a switch receives a frame from its switch port 1 and the destination MAC address is not found in the switching table, how will the switch forward this incoming frame? (3 marks)

Ans: Forward to all port except port 1

(c) When a switch receives a frame from its switch port 2 and the source MAC address is not found in the switching table, how will the switch do to this MAC address? (3 marks)

Ans: Assign port 2 with the source MAC address in the Mac address Table

B3. (a) Describe the effects of enter the following commands to a switch. (6 marks)

SW1(config)#int range fa0/1-10
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 10
SW1(config)#int range fa0/11-20
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 20
SW1(config-if)#exit
SW1(config)#int fa0/24
SW1(config-if)#switchport mode trunk
SW1(config-if)#end

Ans: port 1 to 10 for vlan 10
       port 11 to port 20 for vlan 20
       port 24 is the trunk port

B3. (b) A router is connected to a trunk port of a switch that has VLAN settings. Describe the purpose of configuring the router with the following commands.

R1(config-subif)#interface f0/0
R1(config-if)#no shutdown
R1(config)#interface f0/0.10
R1(config-subif)#encapsulation dot1q 10
R1(config-subif)#ip address 172.1.10.1 255.255.255.0
R1(config)#interface f0/0.20
R1(config-subif)#encapsulation dot1q 20
R1(config-subif)#ip address 172.1.20.1 255.255.255.0

Ans: Create sub-interface for vlan 10 and vlan 20 with gateway address


B4. (a) Name the three modes that can be configured in switches in a Virtual Trunking Protocol (VTP) domain.

Ans: Server, Client , Tranparent

(b) Spanning Tree Protocol (STP) involves electing a root bridge. Which are the two criteria that STP uses to elect a root bridge? The winner is the switch having a lower value or a higher value of these criteria?

Ans: lower, bridge priority and MAC address

(c) Name the three types of switch port that have to be decide during the STP process before blocking a switch port

Ans: root port, designated and non-designated port

B5. (a) What is the purpose of using a wireless workgroup bridge? draw a diagram to show how a wireless workgroup bridge can be implemented in a network.

Ans: To connect two or more wired segments wireless to an AP

 
(b) Which are three network device functions that are built into a residential gateway?

Ans: AP, router and switch

(c) A wireless access point is operating with half-duplex mode. What does half-duplex mean?


B6 (a) What does the "Wi-Fi" seal of approval indicate?

Ans: inter Operable from different vendor

(b) Which are the two main areas regulated by Faderal Communications commission (FCC) that are related to wireless transmission?

Ans: power and frequency

(c) List the frequency band and maximum transmission rate use by IEEE 802.11a, 802.11b and 802.11g standards.

Ans:
802.11a - 54Mbps 5GHz
802.11b - 11Mbps 2.4GHz

802.11g - 54Mbps 2.4GHz


***** End of Paper*****

2011/2012 SEMESTER ONE MID-SEMESTER TEST

Diploma in computer Engineering
2nd Year FT
3rd Year FT

ET0716 LAN SWITCHING AND WIRELESS
ET0019 WIRELESS NETWORKING

Section A: Multiple Choice Question [ 2 marks each]

A1. What is likely impact of moving from a conventional company architecture to a completely converged network?

(a) A shared infrastructure is created resulting in a single network to manage.
(b) Increase network availability
(c) The Ethernet VLAN structure is less complex.
(d) There is less bandwidth competition between voice and video stream.

A2. Which hierarchical design characteristic would be recommended at both the core and distribution layers to protect the network in the case of a route failure?

(a) Link aggregation
(b) Redundant links
(c) Scalability
(d) Qos

A3. Which layer of hierarchical design model provide a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?

(a) Core
(b) Distribution
(c) Access
(d) Application

A4. A switch is connected to a workstation and both are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?

(a) Only one of the devices can transmit at a time
(b) The switch will have priority for transmitting data
(c) The devices will default back to half duplex if excessive collisions occur
(d) No collisions will occur on this link

A5. Which statement about Ethernet switches is ture?

(a) Ethernet switches forward frame based on routing table information
(b) Ethernet switches decrease the number of broadcast domains.
(c) Ethernet switches route traffic between different network
(d) Ethernet switches can send traffic based on the destination MAC address

A6. Which one of the following is correct Media Access Control method used in Ethernet network?

(a) CSMA/CA
(b) CSMA/CD
(c) Clear Channel Assessment
(d) RTS/CTS

A7. In order for three switches to participate in the VLAN Trunking Protocol (VTP) process, the switches must be configured with the same __________.

(a) IP address
(b) VLAN number
(c) revision number
(d) VTP domain name

A8. Which statement below describe VTP transparent mode operation?

(a) Transparent mode switches pass any VLAN management information that they receive to other switches.
(b) Transparent mode switches can adopt VLAN management changes that are received from other switches.
(c) Transparent mode switches can create VLAN management information.
(d) Transparent mode switches cannot add VLANs of local significance only.

A9. Which statement correctly describes the spanning - tree path cost?

(a) It is calculated based on the total number of switches connected in a loop
(b) It is calculated based on the utilization of all switches along a given path
(c) It is calculated based on the bridge priority of the switches along a given path
(d) It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path.

A10. What is the first step in the process of convergence in a spanning tree topology?
(a) Blocking of the non-designated ports
(b) Selection of the designated trunk port
(c) Selection of the root bridge
(d) Determination of the designated port for each segment.

A11. Which one of the statements is correct about configuring a router interface for VLAN trunking?

(a) One physical interface for each subinterface
(b) One subinterface per VLAN
(c) One trunked link per VLAN
(d) One management domian for each subinterface

A12. Which statement below describes one of the benefits of VLANs?

(a) VLANs improve network performance by regulating flow control rate
(b) VLANs enable switches to route packets to remote networks via VLAN ID filtering
(c) VLANs improve network security by isolating users that have access to sensitive data and application
(d) VLAN reduce network cost by reducing the number of physical ports required on switches

A13. An access point, connected to a wired Ethernet LAN, is located at the roof top of a building where an AC power outlet os not available. Which of the following can be used to power the device

(a) RF amplifier
(b) Power over Ethernet
(c) Power from antenna
(d) Ethernet to Power converter

A14. Which parameter is used to uniquely identify one wireless network from another?

(a) SSID
(b) Channel
(c) IEEE802.11a or IEEE802.11g standard
(d) Data rate

A15. Which device will a Wireless Workgroup Bridge link up with?

(a) Wireless access point
(b) Wireless bridge
(c) Wireless client such as a notebook computer
(d) Wireless repeater

A16. A large company has hired you to recommend Wireless LAN equipment that will allow them to apply security measures to protect the servers from their wireless users. Which one of the following devices would you best recommend?

(a) Wireless LAN controller
(b) Wireless workgroup bridge
(c) Enterprise wireless gateway
(d) Wireless residential gateway

A17. What is the frequency used by the IEEE 802.11g wireless transmission standard?

(a) 900 MHz
(b) 2.4 GHz
(c) 5 GHz
(d) Switching between 2.4 GHz and 5 GHz

A18. What device operates at Layer 2 of the OSI model, is only half-duplex and provides wireless connectivity between two different wired LAN segments?

(a) Wireless access point
(b) Wireless bridge
(c) Wireless workgroup bridge
(d) Wireless switch

A19. What is the full name for acronym "ISM"?

(a) Internet, system and machinery
(b) Industry, system and machine
(c) Internet, scientific and medical
(d) Industrial, scientific and medical

A20. Which of the following is one of the benefits of using IEEE 802.11n standard over the IEEE 802.11a and 802.11g standards?

(a) It requires less equipment
(b) It has a single-input and a single-output radio
(c) It provides improved data rate
(d) It operates at different frequencies.

Section B: Short Questions (10 marks each)


B1. (a) List three benefits of a hierarchical network model over a flat network design. (3 marks)

(b) PC_A is connected to port 1 and PC_B is connected to port 2 of a switch. What actions does the switch take when it received a frame sent from PC_A to delivered to PC_B but its MAC address table is empty? (4 marks)

(c) A switch is connected to 10 PCs to form a LAN. How many broadcast domain(s) and collision domain(s) are depicted in this network? (3 marks)




B2. (a) Describe a way that a network administrator can implement to prevent someone from connecting unauthorized PC to a switch port.(4 marks)

(b) Draw a diagram to show how three switches can participate in a VTP domain. Indicate in the diagram the type of links used and the VTP mode set for each of the switch.(6 marks)



B3. A network administrator wants to separate PCs in the company into two VLANs numbered 30 and 50. The company has a 24-port switch and 20 PCs. 10PCs are to be in VLAN 30 and another 10 PCs in VLAN 50.

The company uses the network address 172.1.0.0

(a) Draw a diagram showing the switch connected to the PCs. Indicate the VLANs and ports used.(2 marks)

(b) Based on your network in (a), write the commands for the switch that will create the VLANs and assign ports to respective VLANs.(5 marks)

(c) Recommend the IP address to be assigned to PCs in VLAN 30 and VLAN 50. Indicate the subnet mask used.(3 marks)



B4. A company has two switches and a router. Each switch has been configured with two VLAN settings:

VLAN10 - Sales network: Host range 192.168.1.1 to 192.168.1.127
VLAN20 - Finance network: Host range 192.168.1.128 to 192.168.1.254

Subnet mask for both VLANs : 255.255.255.128

(a) Draw a diagram to show how the router and two switches can be connected using trunk ports. The router allows Sales network to communicate with the Finance network. (3 marks)

(b) Based on the address allocated for each VLAN given above, write down the default gateways that you will assign for PCs in each VLANs. (2 marks)

(c) Write the commands that will configure router fa0/0 port as sub-interface for VLAN10 and VLAN 20. (5 marks)



B5. (a) How can a network administrator influence which Spanning Tree Protocol (STP) switch will become the root bridge? (3 marks)

(b) Figure B5 shows three switches and their respective Bridge ID (BID) in a LAN. To solve the problem of broadcast storm, the LAN implemented Spanning tree Protocol (STP). All links are having the same cost. Indicate on the diagram the assignment of the following roles to the switch and ports by STP:

i. Root Bridge (RB)
ii. Root Port (RP)
iii. Designated Port (DP)
iv. Non-designated Port (N-DP)

(7 marks)



B6. (a) What is the maximum data rate that a IEEE 802.11 g access point can link up with the wireless clients? (2 marks)

(b) A company has offices in two buildings next to each other. Draw a diagram to show two wired networks in these buildings can link up wirelessly. Name the devices used. (5 marks)

(c) List three areas of application where wireless networking has advantages over wired network. (3 marks)

***** End of Paper*****

2011/2012 SEMESTER ONE EXAMINATION
Diploma in computer Engineering
2nd Year FT
3rd Year FT

LAN SWITCHING AND WIRELESS
WIRELESS NETWORKING

Section A: Multiple Choice Question [ 2 marks each]

A1. What will a wireless client transmit to discover the available WLAN networks?
(a) password
(b) beacon
(c) probe request
(d) association request

A2. In a WLAN network, why should wireless access points be implemented with each access point using a different channel?
(a) to keep users segregated on separate subnets
(b) to control the amount of bandwidth that is utilized
(c) to keep traffic secure
(d) to minimize signals from interfering with each other

A3. Which parameter is used to uniquely identify one wireless network from another?
(a) SSID
(b) DSSS
(c) Channel
(d) IP Address

A4. Which wireless technology standard provides the most compatibility with older wireless 802.11 standards, but has greater performance?
(a) 802.11a
(b) 802.11g
(c) 802.11i
(d) 802.11n

A5. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?
(a) CSMA/CD
(b) CSMA/CA
(c) Polling
(d) Token passing

A6. Which statement is true about open authentication enable in an access point?
(a) Requires a mutually agreed WEP key
(b) Requires the use of an authentication server
(c) Uses a 64-bit encryption algorithm
(d) Uses SSID of the wireless client for authentication

A7. Which is the term used to describe bending of a radio wave as it passes through a medium of different density?
(a) Reflection
(b) Refraction
(c) Polarization
(d) Diffraction

A8. Independent Basic Service Set is known as ___________.
(a) Ad-hoc network
(b) Infra-structure network
(c) Mesh network
(d) Repeater network

A9. Which of the following is an advantage of using point coordination function (PCF) mode over distributed coordination mode (DCF)?
(a) PCF has lower overhead than using DCF
(b) PCF can be used in an Ad-hoc network while DCF cannot
(c) PCF uses CSMA/CA while DCF does not
(d) PCF provide a given level of Qos

A10. Which of the following is a function of the beacon frame?
(a) Load balancing all client across multiple access points.
(b) Broadcasting the SSID so that the clients can connect to the access point.
(c) To blink the LEDs on the access point for clients to locate the access point
(d) Allowing client authentication when using Shared key authentication method

A11. One main advantage of DSSS over FHSS is ____________.
(a) Better security
(b) Better noise immunity
(c) Better co-location scalability
(d) Better throughout

A12. What is the difference in frequency between two adjacent channels on direct sequence spread systems for 802.11g equipment?
(a) 5MHz
(b) 11MHz
(c) 20MHz
(d) 22MHz

A13. Which network design process identifies where to place access points?
(a) Business requirement
(b) Site survey
(c) Risk assessment
(d) Scalability design

A14. Which of the following will provide a more complete picture of the RF coverage of an antenna?
(a) Horizontal beamwidth
(b) Vertical beamwidth
(c) Azimuth and Elevation chart
(d) Side view and plan view

A15. A lighting arrestor is used to __________.
(a) Attract lighting away from the wireless access point.
(b) Protect the antenna when lightning strike at it.
(c) Shunt transient current into the ground that is caused by lightning
(d) Light up the antenna so that the other antenna can better align to it for building to building bridge connection

A16. Which of the following defines "Free-space Path Loss"?
(a) Interference from the environment on the RF signal
(b) Loss of wireless connection due to shortage of channel
(c) Power loss as the cable extended too far away
(d) Loss incurred by an RF signal due to signal dispersion because of broadening of the wave front

A17. Why is security so important in wireless network?
(a) Wireless networks are typically slower than wired networks
(b) Blue tooth and other devices can interfere with wireless signals
(c) Wireless networks broadcast data over a medium that allows easy access
(d) Environmental factors such as thunderstorms can affect wireless networks

A18. Which one of the following statements characterizes wireless network security?
(a) A rogue access point represents a security risk for local network
(b) An attacker needs physical access to at least one network device to launch an attack
(c) Wireless networks offer the same security features as wired networks.
(d) With SSID broadcast disabled, there is no way an attacker can connect to the wireless network

A19. Which algorithm is used by the Wired Equivalent Privacy (WEP) encryption process?
(a) RC4
(b) RC5
(c) Rijndale
(d) 802.1x/EAP

A20. Name the protocol that can be used to maintain consistency in VLAN configuration across all switches in a network,
(a) ARP
(b) STP
(c) VT
(d) 802.1q

Section B [10 marks each]

B1. (a) Define the term wavelength used in RF transmission.(2 marks)

(b) Describe Fresnel Zone and suggest 2 ways that can improve Fresnel effect(3 marks)

(c) An access point with a power output of 100 mW is connected to a 20 dBi directional antenna through a 20-foot length of coaxial cable with a loss of 0.5 dB/foot. Connector losses at the access point and the antenna amount to 2 dB.

What is the Equivalent Isotropic Radiated Power (EIRP) in dBm? (4 marks)

What is the intentional Radiator (IR) in dBm? (1 marks)



B2. (a) Draw a diagram showing the RF coverage area of a yagi antenna.(2 marks)

(b) Briefly describe the Multi-path problem that could happen to a wireless network.
Suggest a way to compensate for the negative effects of multi-path. (4 marks)

(c) State the purpose of co-locating multiple access point and suggest how it can be implemented. State the channel that should be used. (4 marks)


B3. Briefly describe the mechanisms that CSMA/CA protocol use to detect an idle medium in a wireless metwork? (4 marks)

(b) The access method specified in the 802.11 standard that allows all stations to contend for access on the shared transmission medium is called (i) ________ while the method that enable contention-free transfer on the medium based on polling mechanism is called (ii) ________. (4 marks)

(c) Which type of inter-frame spacing is used when a wireless device is transmitting an acknowledgement frame. (2 marks)

B4. (a) A system administrator has decide to use VLAN 99 as the Management VLAN.
Write the instructions that will configure a switch such that:
i. switch IP address is 192.168.100.100
ii. Port fa0/24 is assigned to VLAN 99 (6 marks)

(b) Name the different roles that are assigned to switches and ports involved in the Spanning Tree Protocols (STP) process. (4 marks)



Section C [20 marks]

C1. (a) A company LAN is made up of wired and wireless networks. As a security measure, the administrator decide to separate wired and wireless networks using VLANs, however, inter-VLANs communication is allowed.

Given that the company has the following devices for the LAN:
- 5PCs
- One 24-port fast Ethernet Switch
- One Router
- Two Access Points
Draw a network diagram to show how all devices can be connected . Indicate the VLAN assignment of the switch ports. (6 marks)

(b) A malicious hacker can seek to disable or attempt to gain access to a wireless network. Describe four possible threats that can be posed by the hacker. (4 marks)

(c) To limit access from the wireless network, name three types of filtering that can be performed at the access point. (3 marks)

(d) To enhance security , TKIP encryption is used on the wireless link.
Name three technical features that are implemented on TKIP. (3 marks)

(e) Diagram Fig. C1 illustrates the flow of the WEP encryption. Fill in the four blanks in the diagram. Write your answer in the answer booklet. (4 marks)

***** End of Paper*****

1 comment: