Marking Scheme of LAN Level 4 Networking
Marking Scheme of LAN Level 4 Networking
SECTOR: ICT
TRADE: NETWORKING
DURATION: 3 hours
INSTRUCTION TO CANDIDATES:
Page 1 of 17
SECTION A: Attempt all question in section A /55 MARKS
1. Define an ISP and give three ISP operating in Rwanda(L.O: 1.1)/ 4marks
Marking scheme:
An Internet service provider (ISP) is a company that provides
Internet access.
(1mark)
ISP operating in Rwanda:
MTN
TIGO and NEW ARTEL
LTE RWANDA
2. Explain four phases of how DHCP client get ip address from DHCP Server
(L.O: 1.1)/ 4marks
Marking scheme:
(a) Discovery (0.5marks)
The client computer broadcasts out to the network in order to find
a DHCP server. (0.5marks)
(b) Offering (0.5marks)
The DHCP server sends out a unicast “offering” of an IP address to
the client computer. (0.5marks)
(c) Request(0.5marks)
The client broadcasts to all servers that it has accepted the offer.
(0.5marks)
(d) Acknowledge(0.5marks)
The DHCP server sends a final unicast to the client that includes
the IP information the client will use. (0.5marks)
Page 2 of 17
Learning unit 1: Apply basics of Computer networking and set up a LAN
The presence of a link light indicates transmit and receive pairs are
properly aligned and the connected devices are communicating.
(2marks)
Absence of the light indicates a possiblecabling or hardware problem.
(2marks)
Reference: learning unit 3: Configure and troubleshoot a LAN
5. Given the network address 192.168.10.0 using the subnet mask
255.255.255.192. (L.O: 3.2)/ 5marks
Page 3 of 17
I. How many subnets?
II. How many hosts per subnet?
III. What are the valid subnets?
IV. What’s the broadcast address for each subnet?
V. What are the valid hosts for each subnet?
Marking scheme:
Given data.
192.168.10.0 = Network address
Page 4 of 17
6. State and explain three ways to access devices in Router
configuration(L.O:3. 1)/ 3marks
Marking scheme:
Marking scheme:
i. Ping
Ping is Packet Internet Groper, a program that uses ICMP echo requests and
replies. Ping sends a packet to a remote host, and if that host responds, you
know that the host is alive. (1mark)
ii. Tracert
Traceroute (the traceroute command, or tracert for short) shows the path a
packet takes to get to a remote device. The tracert command that can be used
from either user mode or privileged mode allows you to figure out which router
in the path to an unreachable network host should be examined more closely
for the cause of the network’s failure. (1mark)
iii. Ipconfig
Page 5 of 17
iv. Nslookup
The nslookup utility can be used to lookup the specific IP address (es)
associated with a domain name(1mark)
v. Ipconfig/all
Shows you all PC network configuration. If you find a problem then you can
fixing an IP address con-figuration error. (1mark)
Reference: learning unit 2: Conduct site survey
8. What are all the available characters that you can use in hexadecimal
addressing(L.O:3.2)/ 3marks
Marking scheme:
Page 6 of 17
(Each scheme has 0.5 marks equal 1.5 marks)
Bus topology
A network that uses a bus topology usually consists of a single cable to which
computers attach†. Any computer attached to a bus can send a signal down the
cable, and all computers receive the signal. Because all computers attach directly
to the cable, any computer can send data to any other computer.0.5 marks
Ring topology
A network that uses a ring topology arranges for computers to be connected in a
closed loop — a cable connects the first computer to a second computer, another
cable connects the second computer to a third, and so on, until a cable connects
the final computer back to the first. Some technologies that use a ring topology
require a computer to connect to a small device that forms the ring. The
advantage of using a separate device lies in the ability of the ring to continue
operation even if some of the computers are disconnected. 0.5 marks
Star Topology
A network uses a star topology when all computers attach to a central point.
Because a star-shaped network resembles the spokes of a wheel, the center of
a star network is often called a hub. A typical hub consists of an electronic
device that accepts data from a sending computer and delivers it to the
appropriate destination. 0.5 marks
A mesh topology
A network that uses a mesh topology provides a direct connection between each
pair of computers. The important point is that the number of connections needed
Page 7 of 17
for a mesh network grows faster than the number of computers. Because
connections are expensive, few LANs employ a mesh topology.(0.5 marks)
Reference: Learning unit 1: Apply basics of Computer networking and set
up a LAN
Marking scheme:
Page 8 of 17
Compressed data don’t consume a huge memory
(1mark)
c) What is data encryption?
This is a way of encoding sent data so that only intended
received can read it (1mark)
d) Give the role of data encryption?
It insures security of data (1mark)
Reference: Learning unit 1: Apply basics of Computer networking and set
up a LAN
12. Explain the following protocols: (L.O:2.3)/ 5marks
(a) http, (b) SMTP, (c) ftp, (d) UDP, (e) ARP
Marking scheme:
Page 9 of 17
Marking scheme:
1) Internet (1mark)
2) Modem(1mark)
3) Router(0.5marks)
4) Switch(0.5marks)
5) Computer(desktop) (0.5marks)
6) Computer(laptop) (0.5marks)
7) Wireless router(1mark)
Network
Broadcast
Page 10 of 17
First usable host
address
Marking scheme:
Type of Enter last octet in Enter last Enter the full address in
address binary octet in decimal
decimal
host
address
host
address
Page 11 of 17
i. It is an IP address(1mark)
ii. It is logical address(1mark)
iii. It is class B IP address(1mark)
15. What are the functions of the network hardware components and
indicate at which osi reference model they refer to? (L.O:1.3)
a) Hub
b) Gateway
c) Switch
d) Bridge
e) Router
Marking scheme:
16.
a) Provide steps to Authorizing a DHCP Server in an active directory
(L.O: 3.2)
Page 12 of 17
Marking scheme:
Marking scheme:
17. What the most Common categories and speed of UTP cabling(L.O:1.4)
Page 13 of 17
Marking scheme:
Page 14 of 17
(0.5marks)
Marking scheme:
Page 15 of 17
Masks the differences of data formats between
dissimilar systems (0.5marks)
Specifies architecture-independent data transfer
format (0.5marks)
Encodes and decodes data, encrypts and decrypts
data; compresses and decompresses data
Layer 5: Session layer (0.5marks)
Manages user sessions and dialogues (0.5marks)
Reports uppers layer error (0.5marks)
Controls establishment and termination of logic
links between users
Layer 4: Transport layer (0.5marks)
Manages end to end message delivery in network
(0.5marks)
Provides reliable and sequential packet delivery
through error recovery and flow control mechanisms
(0.5marks)
Provides connectionless oriented packets delivery
Layer 3: Network layer (0.5marks)
Determines how data are transferred between
network devices (0.5marks)
Routes packets according to unique network device
addresses (0.5marks)
Provides flow and congestion control to prevent
network resource depletion(reduction)
Layer 2: Data link layer (0.5marks)
Defines procedures for operating the communication
links
Frames packets (0.5marks)
Detects and corrects packets transmit errors
(0.5marks)
Layer 1: Physical layer (0.5marks)
Defines physical means of sending data over
network devices(0.5marks)
Interfaces between network medium and devices
(0.5marks)
Defines optical, electrical and mechanical
characteristics
(2marks)
Page 16 of 17
(1mark)
(0.5marks)
(1mark)
Page 17 of 17