Professional Documents
Culture Documents
QUESTION 1
a) Explain why packet switched networks are more efficient in sending data traffic as
(10 marks)
b) Differentiate between OSI and TCP/IP protocol suite. Draw a layered model protocol
(10 marks)
Figure Q1b
QUESTION 2
a) You have been given an IP address block of 10.8.32.0/20. Design a variable length
For each subnet, determine the subnet address, subnet mask and available host
range.
(10 marks)
b) Figure Q2b shows a typical enterprise network that implement OSPF as the routing
protocol. Identity the network address and wildcard mask used in the routing statement
A static routing protocol need to be configured at the ISP based on the route
summarization.
i) Determine the summarized route to be used.
(10 marks)
CONFIDENTIAL
CONFIDENTIAL 3 EE/JUN2015/ECE730
Figure Q2b
QUESTION 3
a) List four best practices in implementing virtual local area networks (VLANs) to improve
(4 marks)
b) Figure Q3b shows a topology which implements end-to-end VLAN. Redesign the
(5 marks)
Figure Q3b
c) The purpose of a spanning-tree protocol (STP) is to create a loop free layer two
network. State three problems that can occur in the network if STP is not enabled. For
CONFIDENTIAL
CONFIDENTIAL 4 EE/JUN2015/ECE730
the circuit of Figure Q3c, determine the root bridge, root ports, designated and non-
(11 marks)
Figure Q3c
QUESTION 4
a) There are six steps required in designing enterprise networks. Briefly state the six steps
involved.
(3 marks)
b) Figure Q4b shows a three layer hierarchical network topology to support a medium size
enterprise network. Explain how the network below can support network DHCP services
(9 marks)
CONFIDENTIAL
CONFIDENTIAL 5 EE/JUN2015/ECE730
Figure Q4b
c) Vlan trunking protocol (VTP) is used to manage VLANs in a switched based network. For
the circuit of Figure Q4c, discuss the role of switch SW2 and SW3. Discuss what will
happen if SW2 is changed to client mode.
(8 marks)
QUESTION 5
a) For the circuit of Figure Q5a, consider the wireless router is allowed to connect to port
fa0/5 switch port when accessing the network. You want to restrict the number of users
connected to the router to 4 only. Identify the type of security that can be implemented to
CONFIDENTIAL
CONFIDENTIAL 6 EE/JUN2015/ECE730
(6 marks)
Figure Q5a
CONFIDENTIAL
CONFIDENTIAL 7 EE/JUN2015/ECE730
b) Figure Q5b shows a topology that enable inter-vlan routing between different VLANs.
Table 1 and Table 2 shows the IP addressing scheme and HSRP requirements for the
topology. Appendix I shows partial configurations to provide the inter-VLAN routing for the
topology. However, no connection can be established between VLANs. Identify 7
(14 marks)
Figure Q5b
Table 1
Table 2
CONFIDENTIAL
CONFIDENTIAL 8 EE/JUN2015/ECE730
END OF QUESTIONS
CONFIDENTIAL
Step 1 10.8.32 0 20
identify major network
120
availabe based on host
of IP
host needed
to support 500host
network broadcast
current NA 10.8.32 O
y 9 bit
magic
3rdoctet
① NA
10 8 32.0 23 ④BA 10 8 33.255 23
②SM
255.235 254 0
⑤ IP
range 10 8 32 I 10.8 33 254
next
NA i lo 8 32 magic O
10 8 34.0
③
steps anocatehost
for
sales office too hosts
it
magic121
4thoctet
① NA i
lo u 8 ④ BA
34 0 25 10 8 34 127
②SM
255.255 255 128
⑤ IP
range 10.8.34 I 10.8.34 126
magic
③next
NA 10.8.34 0 112 10 8 34 128
4th
001,0
magic
61
4thoctet
①
④
NA
10 8 34.128 26 BA 10.8.34 191
② SM
255.255.255 192
⑤ IP range 10.8.34 129
lo 8 34 190
magic
③next
NA 10 8 34 128 6,4 10.8 34.192
4h
free address
c
range
At BRANCH 2
192.168.1 00110000
255.255.255 252
NA 192 168 I 48
wildcard I I 3 4thoctet
255.255255 252
wildcard 2 I 3 4thoctet
SM 255.255 240 0
wildcard 24 I 15 3rdoctet
fummaykoate
Class B
172.16
180.0 01 01 0000
3rd 4
64
Class C
3rd4th 9
ip route
LOCAL VLAN
t tI
a
FEI FEI FEI
HE
AHo l Ho Tao
Ho El Ho Ho
RP
RB DP 19 th P
NDP NDP
DP
1919
Dp
7
RP pp RP pp
DP DP
DP 19 19
19
Xmopy Top
ig Xmpp
T
L L
I
II
4 NDP
X
RB DP la µ pp
NDP Rp
19 X 19
DP Dp
1.9 4
RP pp RP pp
DP DP
DP 19 19
19
Xnopy Top
ig Xmpp
II
T
L
II
6 steps = PPDIO
① Prepare
→ establish org requirements
→ develop network strategy
→ propose high-level conceptual architecture
→ justify financial
② Plan
→ identify requirements
→ characterizing sites
→ assessing existing network
→ milestone / task management
③ Design
→ derived from planning stage
→ comprehensive detailed design
→ availability, reliability, security, scalability, performance
④ Implement
→ building network based on design specs
→ ensuring no disruption of existing network / create vulnerability
⑤ Operate
→ final test of design
-7 maintain network health
→ high availability & reduce expenses
→ fault detection, correction & monitor
⑥ Optimize
→ proactive management
→ identify & resolve issues
→ troubleshoot
→ network redesign if too many problems / errors arise
new applications identified.
23 B
DHCPServer
L2
r
Lz 7h DHCPRELAY 4V
µ
IPHELPER
T
u
DHCP CLIENT