0% found this document useful (0 votes)
532 views17 pages

Marking Scheme of LAN Level 4 Networking

The document discusses a national comprehensive assessment for networking trades. It outlines the sections, questions, and marking schemes for the assessment. It covers topics like ISPs, DHCP, ping commands, IP addressing, and network topologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
532 views17 pages

Marking Scheme of LAN Level 4 Networking

The document discusses a national comprehensive assessment for networking trades. It outlines the sections, questions, and marking schemes for the assessment. It covers topics like ISPs, DHCP, ping commands, IP addressing, and network topologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

TVET NATIONAL COMPREHENSIVE ASSESSMENT

SCHOOL YEAR 2020-2021


Marking Guide

SECTOR: ICT

TRADE: NETWORKING

RTQF LEVEL: LEVEL IV

MODULE CODE AND TITLE: LAN (NEWSL401)

DURATION: 3 hours

INSTRUCTION TO CANDIDATES:

- This exam has three sections: A ,B and C


- Section A: Attempt all question in section A/55marks
- Section B: Attempt all question in section B/30marks
- Section C: Choose one (1) question in section C/15 marks

Page 1 of 17
SECTION A: Attempt all question in section A /55 MARKS

1. Define an ISP and give three ISP operating in Rwanda(L.O: 1.1)/ 4marks
Marking scheme:
An Internet service provider (ISP) is a company that provides
Internet access.
(1mark)
ISP operating in Rwanda:
 MTN
 TIGO and NEW ARTEL
 LTE RWANDA

(Each point has 1mark)

Reference: Learning unit 1: Apply basics of Computer networking and set


up a LAN

2. Explain four phases of how DHCP client get ip address from DHCP Server
(L.O: 1.1)/ 4marks
Marking scheme:
(a) Discovery (0.5marks)
 The client computer broadcasts out to the network in order to find
a DHCP server. (0.5marks)
(b) Offering (0.5marks)
 The DHCP server sends out a unicast “offering” of an IP address to
the client computer. (0.5marks)
(c) Request(0.5marks)
 The client broadcasts to all servers that it has accepted the offer.
(0.5marks)
(d) Acknowledge(0.5marks)
 The DHCP server sends a final unicast to the client that includes
the IP information the client will use. (0.5marks)

Page 2 of 17
Learning unit 1: Apply basics of Computer networking and set up a LAN

3. The ping command is configurable from normal executive and privileged


EXEC mode, state and explains 5 ping returns responses? (L.O:3.2 )/
5marks
Marking scheme:

 Normal response (0.5marks)


—The normal response (host name is alive) occurs in 1 to 10seconds,
depending on network traffic. (0.5marks)
 Destination does not respond (0.5marks)
—If the host does not respond, a No Answer message is returned.
(0.5marks)
 Unknown host (0.5marks)
—if the host does not exist, an Unknown Host message is returned.
(0.5marks)
 Destination unreachable (0.5marks)
—If the default gateway cannot reach the specified network, a
Destination Unreachable message is returned. (0.5marks)
 Network or host unreachable (0.5marks)
—If there is no entry in the route table for the host or network, a
Network or Host Unreachable message is returned. (0.5marks)

Reference: learning unit 3: Configure and troubleshoot a LAN

4. What do the link lights on Router represent? (L.O:3.3 )/ 4marks


Marking scheme:

 The presence of a link light indicates transmit and receive pairs are
properly aligned and the connected devices are communicating.
(2marks)
 Absence of the light indicates a possiblecabling or hardware problem.
(2marks)
Reference: learning unit 3: Configure and troubleshoot a LAN
5. Given the network address 192.168.10.0 using the subnet mask
255.255.255.192. (L.O: 3.2)/ 5marks

Page 3 of 17
I. How many subnets?
II. How many hosts per subnet?
III. What are the valid subnets?
IV. What’s the broadcast address for each subnet?
V. What are the valid hosts for each subnet?
Marking scheme:
Given data.
192.168.10.0 = Network address

255.255.255.192 = Subnet mask


Now, let’s answer the big five:
a) How many subnets?
 Since 192 is 2 bits on(11000000)the answer would be 22 =
4 subnets.(0.5marks)
b) How many hosts per subnet?
 We have 6 host bits off(11000000), so the equation would
be 26 – 2 = 62 hosts. (0.5marks)
c) What are the valid subnets?
 256 – 192 = 64. (0.5marks)
 Remember, we start at zero and count in our block size, so
our subnets are 0, 64, 128, and 192. (0.5marks)
d) What’s the broadcast address for each subnet?
 The number right before the value of the next subnet is all
host bits turned on and equals the broadcast address.
subnet 0 64 128 192
broadcast 63 127 191 255
(For each two broadcast has0.5marks equal 1mark)
e) What are the valid hosts?
These are the numbers between the subnet and broadcast
address.
Subnet 0 64 128 192
0ur first host 1 65 129 193
Our last host 62 126 190 254
(0.5marks) (0.5marks) (0.5marks) (0.5marks)

Reference: learning unit 3: Configure and troubleshoot a LAN

Page 4 of 17
6. State and explain three ways to access devices in Router
configuration(L.O:3. 1)/ 3marks
Marking scheme:

 Console Access (0.5marks)

- Directly Connect with Console Cable(0.5marks)

 Telnet Access (0.5marks)

- You need to Configure Telnet setup in the router using


line vty (0.5marks)

 SSH Access (0.5marks)

- You need to Configure SSH setup in the router using


generate crypto key rsa and then (0.5marks)

Reference: learning unit 3: Configure and troubleshoot a LAN


7. What is the use of the following commands used in networking:
(L.O:2.2)/5marks

Marking scheme:

i. Ping

Ping is Packet Internet Groper, a program that uses ICMP echo requests and
replies. Ping sends a packet to a remote host, and if that host responds, you
know that the host is alive. (1mark)

ii. Tracert

Traceroute (the traceroute command, or tracert for short) shows the path a
packet takes to get to a remote device. The tracert command that can be used
from either user mode or privileged mode allows you to figure out which router
in the path to an unreachable network host should be examined more closely
for the cause of the network’s failure. (1mark)
iii. Ipconfig

Shows you the PC network configuration (1mark)

Page 5 of 17
iv. Nslookup

The nslookup utility can be used to lookup the specific IP address (es)
associated with a domain name(1mark)
v. Ipconfig/all

Shows you all PC network configuration. If you find a problem then you can
fixing an IP address con-figuration error. (1mark)
Reference: learning unit 2: Conduct site survey

8. What are all the available characters that you can use in hexadecimal
addressing(L.O:3.2)/ 3marks
Marking scheme:

 0–9 and A, B, C, D, E, and F


(1mark) (2mark)
Reference: learning unit 3: Configure and troubleshoot a LAN
9. A physical topology defines the way in computers, printers and hosts are
connected to a network. A logical topology describes how the hosts access
the medium and communication on the network. Explain and draw schema
for 3physical topologies on your choice ( L.O: 1.2 )/ 3marks
Marking scheme:

Page 6 of 17
(Each scheme has 0.5 marks equal 1.5 marks)
 Bus topology

A network that uses a bus topology usually consists of a single cable to which
computers attach†. Any computer attached to a bus can send a signal down the
cable, and all computers receive the signal. Because all computers attach directly
to the cable, any computer can send data to any other computer.0.5 marks
 Ring topology
A network that uses a ring topology arranges for computers to be connected in a
closed loop — a cable connects the first computer to a second computer, another
cable connects the second computer to a third, and so on, until a cable connects
the final computer back to the first. Some technologies that use a ring topology
require a computer to connect to a small device that forms the ring. The
advantage of using a separate device lies in the ability of the ring to continue
operation even if some of the computers are disconnected. 0.5 marks

 Star Topology
A network uses a star topology when all computers attach to a central point.
Because a star-shaped network resembles the spokes of a wheel, the center of
a star network is often called a hub. A typical hub consists of an electronic
device that accepts data from a sending computer and delivers it to the
appropriate destination. 0.5 marks
 A mesh topology
A network that uses a mesh topology provides a direct connection between each
pair of computers. The important point is that the number of connections needed

Page 7 of 17
for a mesh network grows faster than the number of computers. Because
connections are expensive, few LANs employ a mesh topology.(0.5 marks)
Reference: Learning unit 1: Apply basics of Computer networking and set
up a LAN

10. What is firewall? Howdoes it work? Differentiate between trusted IP


address and blacklisted/blocked IP address? (L.O:2.2) / 4marks

Marking scheme:

a. A firewall is an important aspect of a network with respect to


security. It typically rejects access requests from unsafe sources
while allowing actions from recognized ones.
(1mark)
b. How does a firewall work?

When your computer has firewall protection, everything that goes


in and out of it is monitored.  The firewall monitors all this
information traffic to allow ‘good data’ in, but block ‘bad data’ from
entering your computer. Firewalls use one or a combination of the
following three methods to control traffic flowing in and out of the
network:
 
 Packet filtering 
 Proxy service
 Stateful inspection
(1mark)
c. IP blacklist is a list of IP addresses that for some reason have been
defined as problematic, for example, used to throw attacks, send
SPAM and etc (1mark)
d. IP trusted IP is a list of IP address that is defined as trusted
(1mark)

Reference: learning unit 2: Conduct site survey


11.
a) What is data compression
 This is reduction of data size (1mark)
b) What are the purposes of data compression?
 Compressed data are transferred faster over
network(1mark)

Page 8 of 17
 Compressed data don’t consume a huge memory
(1mark)
c) What is data encryption?
 This is a way of encoding sent data so that only intended
received can read it (1mark)
d) Give the role of data encryption?
 It insures security of data (1mark)
Reference: Learning unit 1: Apply basics of Computer networking and set
up a LAN
12. Explain the following protocols: (L.O:2.3)/ 5marks
(a) http, (b) SMTP, (c) ftp, (d) UDP, (e) ARP
Marking scheme:

b) HTTP (Hypertext Transfer Protocol): transfer data in the form of plain


text, audio, video and so on. (1mark)
c) SMTP(Simple mail transfer Protocol): transfers messages from senders
‘mail server to the recipients ‘mail server using TCP connections(1mark)
d) FTP(File Transfer Protocol) : is standard mechanism provided by TCP/IP
for copying a file from one host to another(1mark)
e) UDP (User Datagram Protocol): used for establishing low latency and
loss tolerating connections btn application on the network(1mark)
f) ARP (Reverse Address Resolution): for mapping an internet protocol
address to physical machine that is recognized in local network. (1mark)
Reference: learning unit 2: Conduct site survey
13. Name the parts of the network below accordingly: (L.O:1.3) / 5marks

Page 9 of 17
Marking scheme:

1) Internet (1mark)
2) Modem(1mark)
3) Router(0.5marks)
4) Switch(0.5marks)
5) Computer(desktop) (0.5marks)
6) Computer(laptop) (0.5marks)
7) Wireless router(1mark)

Reference: Learning unit 1: Apply basics of Computer networking and set


up a LAN

SECTION B: Attempt all question in section B /30marks


14.
a) Given the IP address 172.74.34.168/29 for each row in table below,
enter the values of that type of address(L.O:3.2)
Type of address Enter last octet Enter last octet Enter the full
in binary in decimal address in
decimal

Network

Broadcast

Page 10 of 17
First usable host
address

last usable host


address

Marking scheme:

Type of Enter last octet in Enter last Enter the full address in
address binary octet in decimal
decimal

Network 10110000(0.5mark 176(0.5mark 172.74.34.176/29(0.5mar


s) s) ks)

Broadcas 10110111(0.5mark 183(1mark) 172.74.34.183/29(0.5mar


t s) ks)

First 10110001(0.5mark 177(0.5mark 172.74.34.177/29(1mark)


usable s) s)

host
address

last 10110110(0.5mark 182(0.5mark 172.74.34.182/29(0.5mar


usable s) s) ks)

host
address

Reference: learning unit 3: Configure and troubleshoot a LAN

b) What is the meant by 134.47.118.68? (L.O:3.2)


Marking scheme:

Page 11 of 17
i. It is an IP address(1mark)
ii. It is logical address(1mark)
iii. It is class B IP address(1mark)

Reference: learning unit 3: Configure and troubleshoot a LAN

15. What are the functions of the network hardware components and
indicate at which osi reference model they refer to? (L.O:1.3)
a) Hub
b) Gateway
c) Switch
d) Bridge
e) Router

Marking scheme:

i. Hub: is a device that provides a backbone to multiple devices on the


Ethernet. (1mark) Its OSI is Physical layer(1mark)
ii. Repeater: electrically amplifies the signal it receives and
rebroadcasts it. (1mark) Its OSI is Physical layer(1mark)
iii. Bridges: is used to connect two networks, but running the same
basic protocol, maybe with slight differences. (1mark) Its OSI is
Data link layer(1mark)
iv. Switch: -is a mechanism that allows us to interconnect links to form
a larger network. (0.5marks)-A switch is a multi-input, multi-output
device, which transfers packets from an input to one or more
outputs. (0.5marks)- Its OSI is Data link layer(1mark)
v. Router: is a device which is used to route the packets on the
internet. (1mark)-Its OSI is Network layer(1mark)

Reference: learning unit 3: Configure and troubleshoot a LAN

16.
a) Provide steps to Authorizing a DHCP Server in an active directory
(L.O: 3.2)

Page 12 of 17
Marking scheme:

i. Select start>Administrative tools>DHCP to open the DHCP


snap-in.
ii. Right-click the server you want to authorize and choose
the authorize command.
iii. Wait a short time to allow the authorization to take place.
iv. Right-click the server again. Verify that the unauthorized
command appears in the pop-up menu, this indicates that
the server is now authorized.
v. Leave the window open for the next lab.
(Each point has 1mark)

Reference: learning unit 3: Configure and troubleshoot a LAN

b) State three modes in router configuration and give an example for


each?( L.O: 3.1 )

Marking scheme:

User Ex mode or real time Mode(1mark) router >(1mark)


Privilege mode (1mark)router #(1mark)
Global configuration mode (0.5marks)router( config)#(0.5marks)

Reference: learning unit 3: Configure and troubleshoot a LAN

SECTION C: Choose one (1) question in section C

17. What the most Common categories and speed of UTP cabling(L.O:1.4)

UTP category Data rate Max. length Cable type application

Page 13 of 17
Marking scheme:

UTP Data rate Max. Cable type Application


category length

CAT1 Up to 1mbps - Twisted Old telephone


(0.5marks (0.5marks) pair cable
) (0.5marks) (0.5marks)

CAT2 Up to - Twisted Token ring


4mbps(0.5marks) pair network
(0.5marks (0.5marks) (0.5marks)
)

CAT3 Up to 100m Twisted Token ring and


(0.5marks 10mbps(0.5marks) (0.5marks) pair 10Base-T
) (0.5marks) Ethernet
(0.5marks)

CAT4 Up to 16mbps 100m Twisted Token ring


(0.5marks (0.5marks) (0.5marks) pair networks
) (0.5marks) (0.5marks)

CAT5 Up to 100mbps 100m Twisted Ethernet,


(0.5marks (0.5marks) pair Gigabit
) (0.5marks) Ethernet

Page 14 of 17
(0.5marks)

CAT5e Up to 1Gbps 100m Twisted Ethernet,


(0.5marks (0.5marks) (0.5marks) pair Gigabit
) (0.5marks) Ethernet
(0.5marks)

CAT6 Up to 10Gbps 100m Twisted Gigabit


(0.5marks (0.5marks) (0.5marks) pair Ethernet, 10G
) Ethernet
(0.5marks)

CAT6a Up to 10Gbps 100m Twisted Gigabit


(0.5marks (0.5marks) pair Ethernet, 10G
) (0.5marks) Ethernet
(0.5marks)

CAT7 Up to 10Gbps 100m Twisted Gigabit


(0.5marks (0.5marks) (0.5marks) pair Ethernet, 100G
) (0.5marks) Ethernet
(0.5marks)

Reference: learning unit 3: Configure and troubleshoot a LAN


18. NESA is hiring you as a technician in networking trade. You have been
finished a LAN module. As a technician in networking, how would you
describe the OSI model seven layers and Match them with the four layers
in TCP/IP model? ( (L.O:1.2)

Marking scheme:

 Layer 7: Application layer (0.5marks)


Defines interface to user processes for
communications and data transfer in
network(0.5marks)
Provides standardized services such virtual
terminal , file and job (0.5marks)

 Layer 6: Presentation layer (0.5marks)

Page 15 of 17
Masks the differences of data formats between
dissimilar systems (0.5marks)
Specifies architecture-independent data transfer
format (0.5marks)
Encodes and decodes data, encrypts and decrypts
data; compresses and decompresses data
 Layer 5: Session layer (0.5marks)
Manages user sessions and dialogues (0.5marks)
Reports uppers layer error (0.5marks)
Controls establishment and termination of logic
links between users
 Layer 4: Transport layer (0.5marks)
Manages end to end message delivery in network
(0.5marks)
Provides reliable and sequential packet delivery
through error recovery and flow control mechanisms
(0.5marks)
Provides connectionless oriented packets delivery
 Layer 3: Network layer (0.5marks)
Determines how data are transferred between
network devices (0.5marks)
Routes packets according to unique network device
addresses (0.5marks)
Provides flow and congestion control to prevent
network resource depletion(reduction)
 Layer 2: Data link layer (0.5marks)
Defines procedures for operating the communication
links
Frames packets (0.5marks)
Detects and corrects packets transmit errors
(0.5marks)
 Layer 1: Physical layer (0.5marks)
Defines physical means of sending data over
network devices(0.5marks)
Interfaces between network medium and devices
(0.5marks)
Defines optical, electrical and mechanical
characteristics

(2marks)

Page 16 of 17
(1mark)

(0.5marks)

(1mark)

Reference: Learning unit 1: Apply basics of Computer networking and set


up a LAN

Page 17 of 17

You might also like