Vous êtes sur la page 1sur 4

MAKERERE UNIVERSITY BUSINESS SCHOOL

FINAL EXAMINATION FOR THE DEGREE OF


BACHELOR OF BUSINESS COMPUTING AND BACHELOR OF OFFICE AND INFORMATION MANAGEMENT OF MAKERERE UNIVERSITY ACADEMIC YEAR ACADEMIC YEAR 2011/2012 COURSE NAME YEAR OF STUDY COURSE CODE SEMESTER : : : : ONE ENTERPRISE NETWOK ADMINISTRATION AND MGT III DATE TIME INSTRUCTIONS: 1. Section A is compulsory and attempt only THREE questions in section B 2. Each number should be started on a new page 3. Use of practical examples will earn you more marks 4. Start each question on a new page. 5. Look out for more instructions on the answer booklet SECTION A Compulsory Question (40 marks) Question One Busitema University is the fifth public University in Uganda, established by Statutory Instrument No. 22, 2007 with four campuses as Busitema, Nagongera, Arapai and Namasagali. The university would like to implement an integrated inter-campus network, to enable efficient communication and sharing of resources between the main campus and the 3 semi independent campuses located in different parts of the country. The main campus has about 1000 students and 250 staff where as each of the other campuses has an average of 120 students. The current facilities include 12 computer labs with 30 computers each on an independent network segment, 4 internet centers, several user departments including the faculties and 15 administrative departments. The current setup is quite inefficient and does not provide for full integration of resources and sharing among the different campuses. : : 05/12/2011 2-5PM

Page 1 of 4

As a student of ENAM, you have been contracted as a consultant to design an efficient intercampus network proposal that enables full integration of resources and sharing. Required, Describe the intercampus network layout as a solution to the network problem through definition of network requirements as below; a. Network hardware requirements b. Network software requirements (different servers and their roles in the network and client software) c. Selection of network connectivity and internetwork devices, d. Physical topology e. Selection of transmission media (guided and unguided) f. IP address scheme. g. Intranet and extranet implementation h. Network security

Section B (Answer any three questions in this section)


Question Two The Internet is a network of networks made up of thousands of networks of national and state government agencies, non-profit organizations and for-profit companies. It exists only to the extent that these networks agree to use Internet protocols and to exchange data packets among one another. All networks on the Internet must conform to the TCP/IP standards. The role of providing internet connectivity is done by Internet Service Providers. a. Using examples in a Ugandan case discuss any five methods of connecting to the internet, providing one benefit and shortcoming of each method (10Marks) b. Taking one Ugandan ISP as an example, discuss the different services and protocols that support those services it provides to internet users in Uganda. (10marks) Question Three One of the first things a network administrator needs to do is define the requirements for the network. The logical place to start from is to consider how many hosts there should be on the network. Using the maximum number of hosts on one Ethernet segment is generally not good practice because it could create performance problems due to network congestion. Even though a Class C address can support up to 254 hosts, in my experience, 30-32 hosts is a good number for most LANs using office automation tools. I've seen overloaded Ethernet segments with over 100 hosts at client sites. My recommendation is that they segment their LAN in half or even further subnets. Remarked Mr. Kiggundu a network administrator of MUBS while taking BOIM and BBC students in the MUBS Server Room. Given an IP address 192.168.10.0 and the subnet mask of 255.255.255.224 following the advice from the network administrator provide a solution below as required.
Page 2 of 4

a. ii. iii. iv. v. vi.

Required Determine the number of subnets that can be created from this address Determine the number of hosts per subnet What are the valid subnets for this network? Determine the broadcast address for each subnet Determine the valid hosts per subnet (Hint; you can as well put your answers in a table form)

(12marks)

b. Differentiate between classful and classless IP addressing. Assuming an organization is given a classless address block of 133.27.162.0/23. (8marks) i. ii. iii. Determine the hosts that can be got from this block. IF two separate /25 blocks of the above address are assigned to different departments, determine the hosts assigned. State the block that is still available (not yet allocated)

Question Four A LAN Access method describes how the devices access the network and share the transmission facilities. a. Using illustrations where possible differentiate between CSMA/CD and CSMA/CA and highlight where each is applicable. (10marks) b. Under what circumstances under which you would you use wireless LANs over the physical LANs? (10marks) Question Five The computer networking world cannot do away with the OSI and TCP/IP reference model. These models form the architectural framework of computer network to the extent that both hardware and software networking companies adhere to these standards. Besides, the OSI model has become an international standard for networking while TCP/IP model forms the foundation upon which internet was developed. a) In light of the above statement discuss the different layers of the TCP/IP model clearly showing the functions and protocols of each layer. (8marks)

Page 3 of 4

b) Explain why understanding the OSI reference model is important in network architecture (4marks) c) Using illustrations clearly describe any four similarities and differences between the OSI and TCP/IP reference model (8marks)

Question Six a) Rwatamagufa is setting up a small network in his home to study for the ENAM exams and has asked for your advice on making sure it is secure. He has internet access from his network and wants to make sure that he is not vulnerable. Suggest some of the possible solutions that could secure his proposed Network. (8 marks) b) Steve is planning a WAN that connects his office in Kampala with an office in Entebbe. Previous connections were not reliable, and his company found that it could not depend on data being delivered reliably. As a result Steve is planning to use a more reliable transmission medium. Which reliable transmission media would you suggest to Steve? What are the other possible alternative media in their order of reliability? (12 marks)

*************Merry Christmas n happy New Year***********

Page 4 of 4