Complete Networking Questions and Answers
1. Factors to Consider When Installing a Network Cable (4 marks)
1. Cable Routing and Safety – Ensure cables do not obstruct walkways or pose trip
hazards.
2. Interference and Performance – Avoid placing cables near high-power electrical
sources to reduce electromagnetic interference.
2. Reasons Organizations Prefer Wireless Networks Over Wired Networks (6
marks)
1. Flexibility and Mobility – Users can connect from anywhere within the coverage area.
2. Cost Savings – Reduces expenses related to cabling and installation.
3. Ease of Expansion – New devices can be added without requiring new physical
connections.
3. Role of Network Devices (6 marks)
1. Repeater – Amplifies weak signals to extend network range.
2. Gateway – Connects different network types (e.g., LAN to WAN).
3. Bridge – Connects and filters traffic between two LAN segments.
4. Types of Data Flow in Communication (4 marks)
1. Simplex – Data flows in one direction only (e.g., TV broadcasting).
2. Duplex – Data flows in both directions, either alternately (half-duplex) or simultaneously
(full-duplex).
5. Challenges of Replacing Network Cables with Fiber Optic Cables (6 marks)
1. High Installation Cost – Requires specialized skills and equipment.
2. Fragility – Fiber optic cables are more delicate than copper cables.
3. Complex Maintenance – Requires expert handling for repairs.
4. Compatibility Issues – Requires new network adapters for existing devices.
6. Hybrid Topology (6 marks)
A hybrid topology combines two or more network topologies (e.g., star-bus topology).
Diagram:
[Client] [Client]
| |
[Switch] --- [Router] --- [Hub]
| |
[Server] [Client]
7. Types of Computer Networks (6 marks)
1. Personal Area Network (PAN) – Small network for personal devices like phones and
smartwatches.
2. Wide Area Network (WAN) – Covers large geographic areas (e.g., the Internet).
3. Campus Area Network (CAN) – Connects multiple buildings within a campus.
8. Security Threats in Wireless Networks (6 marks)
1. Eavesdropping – Attackers intercept wireless signals.
2. Unauthorized Access – Weak security settings allow unauthorized users to connect.
3. Denial of Service (DoS) Attacks – Attackers flood the network, making it unusable.
9. Advantages of VPN (Virtual Private Network) (8 marks)
1. Secure Data Transmission – Encrypts data over public networks.
2. Remote Access – Employees can securely connect from any location.
3. Anonymity – Hides user identity and location.
4. Bypass Restrictions – Access region-locked content.
10. Characteristics of a Point-to-Point Connection (2 marks)
1. Direct Communication – Data transfers between two specific devices.
2. Dedicated Link – The connection is exclusive to the two endpoints.
11. Challenges of a Peer-to-Peer Network Model (4 marks)
1. Security Issues – No centralized security control.
2. Performance Limitations – Heavily dependent on individual devices.
3. Data Management – No centralized backup system.
4. Scalability Issues – Becomes inefficient with many devices.
12. Difference Between a Hub and a Switch (4 marks)
Feature Hub Switch
Sends data only to the intended
Data Handling Broadcasts data to all devices
recipient
Less efficient, causes network
Efficiency More efficient, reduces data collisions
congestion
13. Factors Affecting Bandwidth (4 marks)
1. Network Traffic – More users slow down speed.
2. Hardware Capabilities – Low-performance devices reduce bandwidth.
3. Signal Interference – Affects wireless networks.
4. Cable Quality – Old or damaged cables limit transmission speeds.
14. Fiber Optic Connectors (4 marks)
1. SC (Subscriber Connector) – Push-pull mechanism for quick connections.
2. LC (Lucent Connector) – Smaller size, suitable for high-density connections.
15. Disadvantages of Time-Division Multiplexing (TDM) (4 marks)
1. Latency – Time slots introduce delays in data transmission.
2. Fixed Allocation – Unused slots waste bandwidth.
16. Role of IP in TCP/IP (4 marks)
1. Assigning Addresses – Provides unique IP addresses.
2. Routing Data – Determines the best path for data.
3. Packet Delivery – Ensures correct delivery of packets.
4. Fragmentation and Reassembly – Splits large packets for transmission.
17. Functions of the Physical Layer in the OSI Model (6 marks)
1. Defines Physical Connections – Specifies cables, signals, and hardware interfaces.
2. Transmission of Data Bits – Transfers raw binary data.
3. Modulation – Converts digital signals into suitable transmission formats.
18. Functions of the Presentation Layer in OSI Model (6 marks)
1. Data Formatting – Converts data between formats (e.g., encryption, compression).
2. Encryption/Decryption – Protects data security.
3. Data Compression – Reduces data size for faster transmission.
19. Functions of a Network Interface Card (NIC) (4 marks)
1. Enables Network Connectivity – Provides a physical interface for network connections.
2. Data Packet Transmission – Converts digital data into network signals.
20. Difference Between Network Control and Link Control Protocols in PPP (4
marks)
Feature Network Control Protocol Link Control Protocol
Configures network layer Establishes, configures, and terminates the PPP
Function
protocols link
Examples IP Control Protocol (IPCP) Link Quality Monitoring
21. Data Transmission Methods (4 marks)
1. Synchronous – Data is transmitted in a continuous stream with a common clock signal.
2. Asynchronous – Data is sent in small packets with start and stop bits.
22. Challenges of a Bus Network Topology (4 marks)
1. Single Point of Failure – A broken main cable disrupts the entire network.
2. Performance Degradation – More devices slow down the network.
This document comprehensively covers all your networking questions in a structured format. 🚀