0% found this document useful (0 votes)
4 views

Computer Networks

Uploaded by

harryramgarhia72
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Networks

Uploaded by

harryramgarhia72
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Computer Networks

Q. What is Computer Network ? What are its topologies ?

What is a Computer Network?

A computer network is a system of interconnected devices (like computers, servers,


printers, etc.) that can communicate with each other and share resources such as
data, software, and hardware. These devices are linked through communication
channels like cables, radio waves, or fiber optics.

The main purposes of a computer network are:

1. Resource Sharing: Sharing files, printers, and internet connections between devices.
2. Communication: Enabling communication via emails, chat, and voice/video calls.
3. Data Access and Transfer: Facilitating the transfer of data between computers or
devices.
4. Centralized Management: In a network, data can be managed, controlled, and stored
centrally (e.g., on a server).

Types of Computer Network Topologies

Network topology refers to the physical or logical arrangement of devices in a


network. Here are the main types of network topologies:

1. Bus Topology
 Description: All devices (computers, printers, etc.) are connected to a single central
cable, known as the "bus." Signals are sent along this cable to all devices.
 Advantages: Simple, easy to set up, requires less cable.
 Disadvantages: If the central cable fails, the whole network goes down. Performance
decreases as more devices are added.
2. Star Topology
 Description: All devices are connected to a central device, usually a hub or switch.
Each device communicates with others through the central device.
 Advantages: Easy to set up and manage. If one device fails, the others are
unaffected.
 Disadvantages: The central device is a single point of failure. If it fails, the entire
network goes down.
3. Ring Topology
 Description: Devices are connected in a closed loop or circle. Each device has two
neighbors, and data travels in one direction around the ring.
 Advantages: Data travels at a consistent speed, and it's easy to troubleshoot.
 Disadvantages: If one device or connection fails, the entire network can be disrupted
(unless it's a dual ring network).
4. Mesh Topology
 Description: Every device is directly connected to every other device. This means
there are multiple paths for data to travel.
 Advantages: Highly reliable, as data can take multiple routes. If one path fails, data
can still reach its destination.
 Disadvantages: Expensive and complex to set up because of the large number of
connections.
5. Hybrid Topology
 Description: This is a combination of two or more topologies. For example, a network
may use a star topology for the main network and a bus topology for sub-networks.
 Advantages: Flexible, can be designed for specific needs.
 Disadvantages: More complex to set up and maintain.
6. Tree Topology
 Description: A combination of star and bus topologies. Groups of star-configured
devices are connected to a central bus.
 Advantages: Scalable, easy to expand.
 Disadvantages: If the central bus fails, the whole network can be affected.

Quick Summary of Key Points:

 Bus: One central cable, all devices connected to it.


 Star: Devices connected to a central hub/switch.
 Ring: Devices form a circular connection.
 Mesh: Every device is connected to every other device.
 Hybrid: Combination of multiple topologies.
Tree: Combination of bus and star, organized in a hierarchical structure.
Q. Explain TCP/IP reference model and its layers with the help of neat
diagram.

TCP/IP Reference Model

The TCP/IP model (Transmission Control Protocol/Internet Protocol model) is a


conceptual framework used to understand how data is transmitted over a network.
It's the basis for the internet and most modern networking systems. The TCP/IP
model has 4 layers, each responsible for different aspects of the communication
process.

The layers of the TCP/IP model are:

1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Access Layer

Diagram

+---------------------------+
| Application Layer | <-- (Layer 4)
| - User applications (e.g. |
| web browsers, email) |
+---------------------------+
|
+---------------------------+
| Transport Layer | <-- (Layer 3)
| - Protocols: TCP, UDP |
| - End-to-end communication|
+---------------------------+
|
+---------------------------+
| Internet Layer | <-- (Layer 2)
| - Protocol: IP |
| - Routing, addressing |
+---------------------------+
|
+---------------------------+
| Network Access Layer | <-- (Layer 1)
| - Physical & Data Link |
| - Hardware (NIC, cables) |
+---------------------------+

Explanation of TCP/IP Layers

1. Application Layer (Layer 4)

This is the topmost layer where users interact with network services. It provides
the interface and protocols used by applications to communicate over the network.

 Functions:
 Provides services like email (SMTP, POP3), web browsing (HTTP, HTTPS), file transfer
(FTP), and more.
 Translates application data into a form that can be transmitted over the network.
 Handles user input/output and formatting of data.
 Protocols:
 HTTP (HyperText Transfer Protocol)
 FTP (File Transfer Protocol)
 SMTP (Simple Mail Transfer Protocol)
 POP3 (Post Office Protocol)

2. Transport Layer (Layer 3)

This layer ensures end-to-end communication and provides reliable data transfer. It
manages the flow of data between devices and ensures that data is delivered
correctly and in sequence.
 Functions:
 Breaks data into segments and controls the flow of data.
 Provides error handling, retransmission of lost data, and data integrity.
 Handles flow control (managing the rate of data transmission).
 Protocols:
 TCP (Transmission Control Protocol): Connection-oriented, reliable, ensures data is
correctly received.
 UDP (User Datagram Protocol): Connectionless, faster but less reliable (used for real-
time applications like video streaming, VoIP).

3. Internet Layer (Layer 2)

The Internet layer is responsible for logical addressing, routing, and packet
forwarding across networks. It defines how devices are addressed and located on the
network, ensuring data can travel between different networks.

 Functions:
 Handles IP addressing, routing, and packet forwarding.
 Determines the best path for data to travel across networks.
 Responsible for fragmentation and reassembly of packets.
 Protocols:
 IP (Internet Protocol): Provides logical addressing (IP addresses) and routing of
packets.
 ICMP (Internet Control Message Protocol): Used for network diagnostics (e.g., ping).
 ARP (Address Resolution Protocol): Resolves IP addresses to MAC addresses.
4. Network Access Layer (Layer 1)

The Network Access layer is responsible for how data is physically transmitted over a
network. This includes hardware devices, media, and protocols that define how data
moves between devices within the same network or across different networks.

 Functions:
 Transmits data over the physical medium (e.g., Ethernet cables, Wi-Fi).
 Handles MAC addressing (hardware addresses) and how devices on the same
network communicate.
 Ensures the correct framing of data and error detection at the data link level.
 Protocols:
 Ethernet: Most common protocol used for wired LANs.
 Wi-Fi: Protocol for wireless LANs.
 PPP (Point-to-Point Protocol): Used for direct connections between two devices.

Q. What is a PCM ? Discuss modern types.

What is PCM (Pulse Code Modulation)?

Pulse Code Modulation (PCM) is a method used to digitally represent analog


signals (such as sound). It is widely used in audio and video systems, including
telecommunication, audio CDs, and digital audio processing. PCM works by sampling
the amplitude of an analog signal at regular intervals and then quantizing the
samples into a digital form, often binary.

In simple terms: PCM takes continuous analog signals (like voice or music) and
converts them into a sequence of digital pulses (binary numbers) that can be
transmitted or stored by digital devices.

How PCM Works?


1. Sampling: The analog signal is sampled at regular intervals. The rate at which the
signal is sampled is known as the sampling rate or sampling frequency.
 For example, audio CDs use a sampling rate of 44.1 kHz, meaning the signal is
sampled 44,100 times per second.
2. Quantization: After sampling, each sample's amplitude is mapped to the nearest
value from a finite set of discrete values. This process is called quantization. The
number of bits used to represent each sample is called bit depth.
 For instance, in 16-bit PCM, each sample is represented by 16 bits, allowing for
65,536 different values.
3. Encoding: The quantized samples are then encoded into a binary format (i.e., 0s and
1s), creating a digital representation of the original analog signal.

Modern Types of PCM

While PCM is a traditional method of digital signal processing, modern variants and
techniques are often used to improve the quality and efficiency of transmission or
storage. The key types of PCM and their modern variants include:

1. Standard PCM (Linear PCM or LPCM)


 Description: This is the basic form of PCM where the samples are uniformly spaced in
time and the quantization is done in a linear fashion.
 Usage: It is commonly used in audio CDs, DVDs, and other digital audio devices.
 Key Features:
 Fixed Sampling Rate: Often 44.1 kHz for audio.
 Fixed Bit Depth: Typically 16 bits per sample.
 Lossless: No compression is applied; it retains the full quality of the original analog
signal.
2. Delta Modulation (DM) / Adaptive Delta Modulation (ADM)
 Description: This is a form of PCM where only the difference (delta) between
successive samples is encoded, rather than the absolute sample values.
 Delta Modulation (DM) encodes the difference as a single bit (whether the signal has
increased or decreased).
 Adaptive Delta Modulation (ADM) adjusts the step size to better match the signal's
amplitude, improving the quality.
 Usage: It is used in speech transmission (e.g., in some telephone systems) where
bandwidth efficiency is more important than the perfect reproduction of sound
quality.
 Key Features:
 Lower Bitrate: More bandwidth-efficient than standard PCM.
 Simpler Encoding: The difference between successive samples is recorded, reducing
the amount of data.

3. Differential PCM (DPCM)


 Description: A variant of PCM that encodes the difference between consecutive
samples, rather than encoding the actual sample value. However, it uses more than
one bit for the difference, which gives more accuracy than Delta Modulation.
 Usage: Used in voice transmission and in digital telephony systems.
 Key Features:
 Lower Data Rate than standard PCM, but higher than Delta Modulation.
 Efficient for signals that do not have large variations between consecutive samples.

4. Adaptive PCM (APCM)


 Description: An enhancement to the Differential PCM (DPCM) method where
the quantization step size is dynamically adjusted based on the signal's
characteristics. The adaptive process helps in efficiently encoding the data, especially
for non-stationary signals like speech.
 Usage: Often used in telecommunication systems and speech encoding.
 Key Features:
 Adaptive Quantization: The step size for quantization is changed dynamically.
 More Efficient than DPCM, especially for voice signals.

5. A-law and μ-law PCM


 Description: These are companding techniques used to improve the dynamic range
of PCM signals. Instead of uniformly quantizing the signal, a non-linear method is
applied to reduce the impact of noise and distortion at lower amplitudes.
 A-law is primarily used in European countries and international communication.
 μ-law is mainly used in North America and Japan.
 Usage: Common in telecommunication systems (especially in digital telephone
networks).
 Key Features:
 Non-linear Quantization: Enhances signal quality by giving more precision to lower
amplitude signals.
 Efficient Bandwidth Utilization: Especially useful for voice signals.

6. PCM with Compression (e.g., MP3, AAC)


 Description: While standard PCM offers high-quality digital audio, it requires a lot of
storage space or bandwidth. Modern audio formats like MP3 or AAC use lossy
compression techniques to reduce the file size while maintaining acceptable quality.
 Usage: Used in audio streaming, digital music storage, and online broadcasting.
 Key Features:
 Compression: Reduces file size by removing audio data that is less perceptible to the
human ear.
 Lossy: Some quality is sacrificed for smaller file sizes and easier transmission.

Q. Describe packet switching.

What is Packet Switching?


Packet switching is a method of data transmission in which data is broken down into
small, manageable units called packets. These packets are sent individually through
the network, potentially taking different routes to reach their destination. Once the
packets arrive at their destination, they are reassembled in the correct order to
reconstruct the original data.

This is the fundamental technique used in modern computer networks, including


the Internet, where the efficient and reliable transmission of data is crucial.

How Packet Switching Works

Here's a step-by-step breakdown of how packet switching operates:

1. Data Divided into Packets:


The data from a message or file is divided into small chunks, or packets. Each packet
typically contains:
 Data Payload: The actual data being transmitted (e.g., part of an email, a file chunk).
 Header Information: Metadata that includes information like the source and
destination addresses, sequence number, error-checking data, and more.
 Checksum: A value used for error detection to ensure data integrity.
2. Routing:
Each packet is sent independently through the network. The path each packet takes
depends on the available routes in the network and the routing algorithms of
routers. In packet-switched networks, packets can take different routes based on
current network traffic, congestion, or failure of a path.
3. Packet Switching at Routers:
As packets traverse the network, they pass through routers, which are devices that
forward the packets to their next destination. Each router looks at the packet's
header, specifically the destination address, and determines the best path based on
network conditions.
4. Reassembly:
When all the packets arrive at the destination, they are reassembled into their
original form. The sequence number in the packet's header ensures the packets are
arranged in the correct order, even if they arrived out of sequence.
5. Error Checking and Retransmission:
If a packet is lost or corrupted during transmission, it will be retransmitted. TCP
(Transmission Control Protocol) is often used to provide reliable delivery by ensuring
that packets are correctly received, checking for errors, and requesting
retransmissions if necessary.
Key Characteristics of Packet Switching

1. Efficiency:
Since packets are routed independently and can take different paths, the network
can dynamically adjust to congestion and failures. This leads to better utilization of
available network resources.
2. Scalability:
Packet-switched networks can easily handle large volumes of data and scale to
accommodate millions of devices, as each device can send and receive data packets
independently without establishing a dedicated connection.
3. Fault Tolerance:
Because packets can take multiple paths, the network is fault-tolerant. Even if one
route fails, packets can be rerouted via alternative paths.
4. Flexible and Robust:
Packet switching is suitable for a variety of applications, from small messages to large
data transfers. It is robust because if part of the network is congested or fails, other
paths can be used to continue transmitting data.
5. Connectionless:
Packet switching does not require a dedicated end-to-end connection. Each packet is
independently routed, making it ideal for applications that need to transmit data
intermittently (e.g., web browsing, email).

Types of Packet Switching

1. Datagram Packet Switching (Connectionless):


In this method, each packet is treated independently, with no need to establish a
connection between the source and destination before transmission. Routers simply
forward each packet based on the information in its header.
 Example: IP (Internet Protocol) is connectionless, meaning each packet may follow a
different route.
2. Virtual Circuit Packet Switching (Connection-oriented):
In this method, a logical connection (or virtual circuit) is established between the
source and destination before any data transmission occurs. All packets are sent
along the same path. This method ensures packets are delivered in order, but still
maintains the advantages of packet switching (such as fault tolerance).
 Example: X.25 and ATM (Asynchronous Transfer Mode) use virtual circuit packet
switching.
Advantages of Packet Switching

1. Efficiency and Resource Utilization:


Packets are routed independently, allowing the network to dynamically allocate
bandwidth and adapt to varying traffic conditions. This makes packet switching much
more efficient than circuit-switched networks, where a dedicated path is used for the
entire duration of the communication.
2. Scalability:
Packet-switched networks can scale to handle millions of devices and a wide variety
of data types, including text, audio, and video, without the need for large, dedicated
communication lines.
3. Reliability:
The use of error-checking (through protocols like TCP) ensures reliable delivery of
data, even in the presence of network failures or congestion. Lost or corrupted
packets can be retransmitted.
4. Flexibility:
Different types of data (e.g., text, images, video) can be transmitted using the same
network. The packets are routed according to available bandwidth, ensuring efficient
delivery even during times of high traffic.

Disadvantages of Packet Switching

1. Overhead:
Since each packet contains header information (such as source, destination, and
sequence number), there is additional overhead compared to circuit-switched
communication, where the connection is maintained for the entire session.
2. Variable Latency:
Packets may take different paths and arrive at the destination out of order, which
can lead to variable delays. This can be problematic for real-time applications (e.g.,
voice or video calls) that require consistent timing.
3. Congestion:
If too many packets are sent through the same network path, congestion can occur,
causing delays or packet loss. Quality of Service (QoS) mechanisms are sometimes
used to manage congestion in such cases.

Applications of Packet Switching

 The Internet: The fundamental technology behind the Internet is packet switching.
Websites, emails, and streaming services all rely on packet-switched networks for
data transmission.
 Voice over IP (VoIP): VoIP services (like Skype or Zoom) use packet switching for
transmitting voice and video data over the internet.
 File Transfer: Protocols like FTP and HTTP use packet switching to break large files
into smaller packets for efficient transmission.

Comparison with Circuit Switching

Feature Packet Switching Circuit Switching

Connection
Type Connectionless (no dedicated path) Connection-oriented (dedicated path)

Efficiency Highly efficient, especially with bursty data Less efficient, fixed bandwidth usage

Not very scalable, requires dedicated


Scalability Highly scalable, supports many users circuits

Reliable, but may experience delays due to


Reliability routing Reliable, no delay or packet loss

Example Internet, VoIP, Email Traditional telephone networks (PSTN)


Q. Explain the concept of token bus, token ring and FDDI with the help of
diagram.

Token Bus, Token Ring, and FDDI: Concepts and Diagrams

Token-based networks are a class of network topologies in which a special data


packet, called a token, is passed around the network. The device that holds the token
is allowed to transmit data. These methods help prevent collisions and ensure that
only one device transmits at a time. Below is an explanation of three common token-
based topologies: Token Bus, Token Ring, and FDDI (Fiber Distributed Data
Interface).

1. Token Bus

Token Bus is a network topology in which the devices are connected to a single bus
(central cable), and a token circulates along the bus. Only the device that holds the
token can send data, while others must wait for the token to be passed to them.

How Token Bus Works:


 Bus Topology: The network uses a single bus (a common cable) to which all devices
are connected.
 The token is a special data frame that moves from one device to another along the
bus.
 A device must capture the token to send data. Once it has finished transmitting, it
releases the token back onto the bus, where it will continue to move until another
device captures it.
 If the token is lost or damaged, the network may require some method to regenerate
the token.
Diagram of Token Bus:

[Device 1] --- [Device 2] --- [Device 3] --- [Device 4]


| | |
Token Pass Token Pass Token Pass
Advantages:
 Simple and cost-effective for small networks.
 Efficient at preventing data collisions.
Disadvantages:
 Performance degrades with the addition of more devices.
 Failure of the bus or cable can disrupt the entire network.

2. Token Ring

Token Ring is a network topology where devices are connected in a physical


ring (closed loop), and a token circulates around the ring. Only the device that holds
the token can transmit data.

How Token Ring Works:


 Ring Topology: All devices are connected in a circular fashion.
 The token circulates in a specific direction around the ring.
 When a device wants to send data, it must wait until it captures the token. Once it
captures the token, the device can send its data to the next device in the ring.
 After sending the data, the device passes the token along to the next device.
 If the token is lost or the network is broken, a recovery process is required to
regenerate or reintroduce the token.
Diagram of Token Ring:

[Device 1] ---- [Device 2]


| |
| |
[Device 8] ---- [Device 3]
| |
| |
[Device 7] ---- [Device 4]
| |
| |
[Device 6] ---- [Device 5]
Advantages:
 Predictable network behavior, with a fixed token path.
 Easier to detect collisions (though rare) due to the predictable circulation of the
token.
Disadvantages:
 If one device or cable fails, the entire network can be disrupted unless a special
failover mechanism is in place.
 Typically slower than Ethernet networks (used in legacy systems).

3. FDDI (Fiber Distributed Data Interface)

FDDI is a high-speed network standard that uses fiber optics to form a dual-ring
network topology. It is designed for local and wide-area networks, providing high-
speed data transmission, redundancy, and fault tolerance.

How FDDI Works:


 Dual Ring Topology: FDDI uses two rings (primary and secondary) for communication.
Data travels in one direction around the primary ring, and the secondary ring acts as
a backup, ensuring redundancy.
 Like Token Ring, a token circulates around the ring, and a device can only transmit
when it holds the token.
 If there is a break in the primary ring, the data can be rerouted via the secondary
ring, ensuring continuous communication.
Diagram of FDDI:

[Device 1] --- [Device 2] --- [Device 3] --- [Device 4]


| | |
| | |
[Device 8] --- [Device 7] --- [Device 6] --- [Device 5]
| | |
|-----> Secondary Ring <----|
 Primary Ring: Data circulates in one direction around this ring.
 Secondary Ring: Provides backup communication; data circulates in the opposite
direction.
Advantages:
 High-Speed: FDDI supports speeds up to 100 Mbps (or more, depending on the
version).
 Redundancy: The dual ring provides fault tolerance. If the primary ring fails, the
secondary ring can continue to carry the data.
 Large Scale: Suitable for both LAN and MAN (Metropolitan Area Networks).
Disadvantages:
 Expensive, especially when compared to copper-based Ethernet.
 Requires specialized hardware for fiber optic connectivity.

Q. Write a note on error detection and correction.

Error Detection and Correction in Networking

In any communication system, errors can occur during data transmission due to
noise, signal degradation, or interference. Error detection and correction techniques
are crucial to ensure data integrity and reliable communication, especially in
networks where data is transferred over long distances or through unreliable
channels.

Error Detection

Error detection refers to the process of identifying whether an error has occurred in
the transmitted data. The primary goal is to detect if the data sent by the sender has
been altered during transmission. Common error detection methods include parity
bits, checksums, and cyclic redundancy checks (CRC).

Common Error Detection Techniques


1. Parity Bits:
 A parity bit is a binary bit added to data to make the total number of 1s
either even (even parity) or odd (odd parity).
 The sender adds a parity bit to each data unit (byte, for example), and the receiver
checks if the total number of 1s (including the parity bit) is correct.
 Example:
 Data: 1001001 (7 bits)
 Even parity: Add a 1 → 10010011 (8 bits, total number of 1s = 4, which is even)
 If the receiver calculates an odd number of 1s, it knows an error has occurred.
2. Checksums:
 A checksum is a value derived from a set of data values using a mathematical
algorithm. The sender computes the checksum of the data and appends it to the
transmitted data.
 The receiver performs the same checksum calculation on the received data and
compares it with the received checksum. If they match, the data is assumed to be
correct; otherwise, an error is detected.
 Example:
 Sender calculates the checksum (sum of data values modulo 256) and sends it along
with the data.
 Receiver performs the same calculation and compares the results.
3. Cyclic Redundancy Check (CRC):
 CRC is a more advanced form of error detection and is widely used in Ethernet, disks,
and other protocols. It uses polynomial division to generate a remainder (CRC code),
which is appended to the transmitted data.
 The receiver uses the same polynomial to divide the received data and checks if the
remainder is zero. A non-zero remainder indicates an error.
 Example:
 CRC involves bitwise operations and is more complex than simple checksums or
parity bits, offering stronger error detection.

Error Correction

While error detection allows the receiver to identify errors, error correction goes a
step further by enabling the receiver to fix the errors without the need for
retransmission. There are two types of error correction techniques: Forward Error
Correction (FEC) and Automatic Repeat Request (ARQ).

Forward Error Correction (FEC)

In FEC, additional data is added to the transmission, allowing the receiver to correct
errors without needing to ask the sender to retransmit the data. This is particularly
useful in real-time communications or situations where retransmission is costly or
impractical (e.g., satellite communications, streaming).

 Techniques:
1. Hamming Code: A well-known error-correcting code that can correct single-bit errors
and detect two-bit errors. It adds redundancy bits to the original data, enabling the
receiver to both detect and correct errors.
 Example: In a 7-bit Hamming code, 4 bits are data, and 3 bits are redundancy. The
receiver checks the redundancy bits and can identify and correct errors in the 4 data
bits.
2. Reed-Solomon Codes: Used in applications such as CDs, DVDs, and QR codes, Reed-
Solomon codes can correct multiple errors within a block of data.
3. Turbo Codes and LDPC Codes: These are more advanced error-correction schemes
used in modern communication systems, including 4G and 5G cellular networks,
providing high efficiency in error correction.
Automatic Repeat Request (ARQ)

In ARQ, the receiver detects errors and requests the sender to retransmit the
affected data. ARQ protocols rely on error detection techniques (like checksums or
CRC) and acknowledgment messages to ensure data integrity.

 Types of ARQ:
1. Stop-and-Wait ARQ: The sender sends one data packet at a time and waits for an
acknowledgment (ACK) before sending the next packet. If no acknowledgment is
received or if an error is detected, the sender retransmits the packet.
 Disadvantages: It is inefficient because it requires waiting for an acknowledgment
after every packet.
2. Go-Back-N ARQ: The sender can send multiple packets without waiting for
acknowledgments but must retransmit all packets from the erroneous one if an error
is detected.
 Disadvantages: Retransmitting multiple packets can cause inefficiency in the case of
errors.
3. Selective Repeat ARQ: The sender can send multiple packets and retransmit only the
erroneous packets (rather than all packets from the point of error). This is more
efficient than Go-Back-N ARQ.
 Advantages: More efficient than Go-Back-N because only the problematic packets
are retransmitted.

Comparison of Error Detection and Correction Techniques

Feature Error Detection Error Correction

Purpose Detect errors in received data Correct errors in received data

Common Hamming Code, Reed-Solomon, Turbo


Methods Parity Bit, Checksums, CRC Codes, ARQ

Efficiency Relatively simple and fast More complex, but reduces retransmissions

Used when data can be Used when retransmission is costly or


Use Case retransmitted impractical

Detects errors but does not correct


Error Handling them Can correct errors without retransmission

Q. What are the security issues of computer networks?

Security Issues in Computer Networks

In today’s interconnected world, computer networks are vulnerable to a wide range


of security threats that can lead to loss of data, unauthorized access, disruption of
services, and financial loss. The security issues in computer networks involve various
aspects such as data integrity, confidentiality, availability, authentication, and more.
Below is an overview of the key security issues in computer networks.
1. Unauthorized Access

Unauthorized access occurs when individuals or systems gain access to a network or


data without permission. This is one of the most critical security issues and can lead
to data theft, espionage, and malicious activity.

 Example: A hacker gaining access to a corporate network to steal sensitive data.

Mitigation:

 Strong authentication mechanisms (e.g., multi-factor authentication).


 Implementing proper access control lists (ACLs) and user permissions.

2. Data Breach and Data Theft

Data breaches occur when sensitive or confidential information is accessed,


disclosed, or stolen by unauthorized individuals. This can include personal
information (e.g., credit card details), intellectual property, or confidential business
data.

 Example: A cybercriminal breaking into a server and stealing customer data or


financial records.

Mitigation:

 Encryption of sensitive data during transmission and storage.


 Regular audits of data access and usage.
 Proper user training on data handling and awareness.

3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks


DoS and DDoS attacks aim to overwhelm a network or server with traffic to make it
unavailable to legitimate users.

 DoS: A single device floods the target with traffic, exhausting resources and causing a
service outage.
 DDoS: A large number of compromised devices (often a botnet) work together to
flood the target system, making it even harder to defend.

Mitigation:

 Firewalls and Intrusion Detection Systems (IDS) to detect abnormal traffic.


 Rate limiting and traffic filtering to block malicious traffic.
 Distributed load balancing to spread the load and mitigate the impact.

4. Man-in-the-Middle (MITM) Attacks

In a Man-in-the-Middle (MITM) attack, an attacker intercepts and potentially alters


the communication between two parties (e.g., between a user and a website).

 Example: A hacker intercepting communication between a user and a bank's website


to steal login credentials or inject malicious code.

Mitigation:

 Use encryption protocols like SSL/TLS to secure communication channels (e.g.,


HTTPS).
 Ensure strong authentication for both ends of the communication.
 Implement Public Key Infrastructure (PKI) for secure exchanges.

5. Malware and Ransomware


Malware (short for malicious software) refers to any software intentionally designed
to cause harm or exploit a computer network. This
includes viruses, worms, trojans, ransomware, and more.

 Ransomware is a type of malware that encrypts a victim’s data and demands


payment (usually cryptocurrency) to unlock it.
 Worms and viruses replicate themselves and spread across the network, causing
damage or stealing data.

Mitigation:

 Anti-virus and anti-malware software to detect and remove harmful software.


 Regular software patching and updates to fix vulnerabilities.
 Backup critical data regularly and store it offline or on a secure cloud platform.

6. Phishing and Social Engineering Attacks

Phishing is a type of attack where attackers impersonate legitimate organizations or


individuals to trick users into revealing sensitive information like passwords, credit
card details, or personal identification numbers (PINs).

 Social engineering attacks involve manipulating or deceiving people into giving up


confidential information, often through phone calls or emails.

Mitigation:

 Regular employee training to recognize phishing attempts.


 Implementing spam filters and email verification techniques.
 Educating users about strong passwords and multi-factor authentication (MFA).

7. Insufficient Authentication and Authorization


Weak authentication methods, such as passwords alone, can be easily bypassed by
attackers. This allows unauthorized users to access sensitive data or perform
malicious activities.

 Example: An attacker using a brute force attack to guess a weak password and gain
access to an account.

Mitigation:

 Use multi-factor authentication (MFA) to require multiple forms of verification.


 Implement role-based access control (RBAC) to limit user permissions based on their
role.

8. Insider Threats

An insider threat refers to a security threat that originates from within the
organization. This could be a disgruntled employee, a contractor, or even a trusted
partner who intentionally or unintentionally causes harm.

 Example: An employee intentionally leaking sensitive customer data or an


employee's compromised credentials being used for unauthorized access.

Mitigation:

 User activity monitoring and auditing to detect suspicious behavior.


 Least privilege principle: only give users the minimum access they need to perform
their job.
 Strong exit procedures for employees leaving the organization.

9. Lack of Encryption
Encryption is essential for protecting sensitive data during transmission and storage.
Without proper encryption, data is vulnerable to interception, eavesdropping, and
tampering.

 Example: Sending sensitive data over the internet without encryption exposes it to
potential hackers.

Mitigation:

 Use strong encryption algorithms (e.g., AES, RSA) to secure data at rest and in transit.
 Ensure that communication channels (e.g., web traffic) use SSL/TLS protocols.
 Implement end-to-end encryption in messaging services and applications.

10. Vulnerabilities in Software and Hardware

Security vulnerabilities in software or hardware can be exploited by attackers to gain


unauthorized access or disrupt network services. These vulnerabilities can arise from
poor design, coding errors, or flaws in hardware components.

 Example: A vulnerability in a router firmware that allows attackers to bypass security


settings or launch attacks.

Mitigation:

 Regular software updates and patch management to fix known vulnerabilities.


 Perform vulnerability assessments and penetration testing to identify weaknesses.
 Use network segmentation to limit access to sensitive parts of the network.

11. Lack of Network Monitoring and Logging


Without proper network monitoring and logging, it becomes difficult to detect
security incidents and investigate breaches. Effective monitoring can help identify
unusual activities, such as unauthorized access or malware infections.

 Example: A hacker accessing a network and exfiltrating data over several days
without being detected.

Mitigation:

 Implement Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
 Set up network monitoring tools to track traffic, devices, and activities.
 Enable comprehensive logging to capture system and network activities for later
analysis.

12. Supply Chain Attacks

In a supply chain attack, attackers target the vendors or third-party service providers
that are connected to the organization’s network. These attacks can compromise the
organization by exploiting vulnerabilities in software or hardware provided by
external vendors.

 Example: An attacker compromising a third-party software update mechanism to


install malware on customer systems.

Mitigation:

 Conduct thorough security assessments of third-party vendors and suppliers.


 Use trusted vendors and verify the integrity of updates or software packages.
 Maintain strong security practices for third-party access to sensitive data or systems.

Q. Write notes on :—
(a) email
(b) remote login
(c) Access Control
(d) Network Security
(e) Cryptography
(f) Privacy

(a) Email

Email (Electronic Mail) is one of the most commonly used communication methods
over the Internet. It allows users to send, receive, and store messages electronically.
Email is a critical tool for personal, business, and educational communication.

Components of Email:
1. Email Client: Software or application used by the user to send and receive emails
(e.g., Outlook, Gmail, Thunderbird).
2. Email Server: A computer system that stores emails and delivers them to the
recipient’s client. Common types include:
 SMTP (Simple Mail Transfer Protocol): Used for sending emails.
 POP3 (Post Office Protocol): Used for retrieving emails from the server.
 IMAP (Internet Message Access Protocol): Allows synchronization of emails across
multiple devices.
3. Email Address: A unique identifier for each user on the email network
(e.g., [email protected]).
4. Attachments: Files that can be attached to an email for sharing (e.g., documents,
images).
Email Security Issues:
 Phishing: Fraudulent attempts to acquire sensitive information (e.g., login
credentials).
 Spam: Unsolicited emails, often used for advertising or spreading malware.
 Email Spoofing: Impersonating someone’s email address to deceive the recipient.
Security Measures:
 Encryption: Secure email encryption (e.g., PGP, S/MIME) to protect the content.
 Anti-Spam and Anti-Phishing Filters: To detect and block malicious emails.
 Two-Factor Authentication (2FA): Adds an additional layer of security when accessing
email accounts.
(b) Remote Login

Remote Login allows a user to access a computer system or network from a distant
location over the internet or a private network. It enables remote administration and
usage of resources without being physically present.

Common Remote Login Protocols:


1. SSH (Secure Shell):
 A cryptographic network protocol that provides a secure way to access remote
computers.
 It encrypts the communication to prevent unauthorized interception.
 Commonly used for remote system administration in UNIX/Linux environments.
2. Telnet:
 A protocol for accessing remote systems over the internet. Unlike SSH, Telnet does
not encrypt its communication, making it less secure.
3. RDP (Remote Desktop Protocol):
 Developed by Microsoft, RDP allows remote access to a computer’s graphical user
interface.
 Commonly used for accessing Windows servers or desktops remotely.
4. VNC (Virtual Network Computing):
 Allows remote control of another computer over a network, typically used for
graphical interfaces.
Security Issues in Remote Login:
 Brute Force Attacks: Attackers may attempt to guess passwords to gain unauthorized
access.
 Man-in-the-Middle (MITM) Attacks: Intercepting and tampering with communication
between the client and server.
Security Measures:
 Use SSH instead of Telnet for encrypted communication.
 Enable two-factor authentication (2FA).
 Regularly update software to patch security vulnerabilities.
(c) Access Control

Access Control refers to the process of managing and restricting access to network
resources, systems, or information. The goal is to ensure that only authorized users
or devices can access certain resources.

Types of Access Control:


1. Discretionary Access Control (DAC):
 The owner of a resource determines who has access to it.
 Often used in home or small business networks.
2. Mandatory Access Control (MAC):
 Access decisions are made based on a set of rules defined by the system
administrator, regardless of the user's desires.
 Often used in government or military systems.
3. Role-Based Access Control (RBAC):
 Access is granted based on a user’s role within an organization (e.g., admin, user,
guest).
 More scalable than DAC or MAC for large organizations.
Key Concepts in Access Control:
 Authentication: Verifying the identity of a user or device (e.g., using passwords,
biometrics, or digital certificates).
 Authorization: Granting access based on authenticated identity (e.g., file
permissions).
 Audit and Monitoring: Tracking user activity to detect unauthorized access.

(d) Network Security

Network Security involves measures to protect the integrity, confidentiality, and


availability of computer networks and data. It includes the protection of both
hardware and software from attacks, intrusions, or disruptions.

Key Aspects of Network Security:


1. Firewalls:
 Hardware or software that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
2. Intrusion Detection Systems (IDS):
 Systems that monitor network traffic for suspicious activity and potential threats.
3. Virtual Private Network (VPN):
 A secure connection between two or more devices over the internet, often used to
protect sensitive data on public networks.
4. Network Segmentation:
 Dividing a network into smaller, isolated sections to limit exposure to attacks.
5. Encryption:
 Protects the data transmitted over the network by encoding it so that it cannot be
easily intercepted or understood by unauthorized users.
Network Security Attacks:
 DDoS (Distributed Denial of Service): Overloading a network service with traffic to
make it unavailable.
 Man-in-the-Middle (MITM): An attacker intercepts and potentially alters
communication between two parties.
Security Measures:
 Regular updates and patches to prevent vulnerabilities.
 Use of encryption, firewalls, and IDS/IPS systems.
 Strong access control policies and multi-factor authentication (MFA).

(e) Cryptography

Cryptography is the practice of protecting information by transforming it into an


unreadable format, which can only be reverted to its original form by those who
have the appropriate decryption key. It plays a crucial role in securing
communications and data.

Key Concepts in Cryptography:


1. Encryption:
 Symmetric Encryption: The same key is used for both encryption and decryption
(e.g., AES).
 Asymmetric Encryption: Different keys are used for encryption and decryption (e.g.,
RSA, ECC).
2. Hash Functions:
 A cryptographic hash function takes input data and produces a fixed-size string,
which serves as a unique identifier for the input (e.g., MD5, SHA-256).
 Used for data integrity checks and digital signatures.
3. Digital Signatures:
 A cryptographic mechanism for verifying the authenticity and integrity of digital
messages or documents.
4. Public Key Infrastructure (PKI):
 A framework that uses asymmetric cryptography to manage digital keys and
certificates for secure communication.
Applications of Cryptography:
 Secure Communication: Secures emails, web browsing (HTTPS), and online
transactions.
 Data Protection: Protects stored data (e.g., file encryption) and sensitive information.

(f) Privacy

Privacy refers to the right of individuals to control their personal information and to
keep it from being exposed, collected, or misused without their consent. In the
digital world, privacy concerns often relate to how personal data is collected, stored,
and used.

Types of Privacy:
1. Data Privacy:
 Protecting personal data from unauthorized access, use, or disclosure.
 Regulations like GDPR (General Data Protection Regulation) emphasize the right to
privacy and data protection.
2. Communication Privacy:
 Ensuring that communications (e.g., emails, phone calls) are kept confidential and
not intercepted or monitored by unauthorized parties.
3. Online Privacy:
 Protecting personal information (e.g., browsing habits, location data) when using
online services.
 Techniques like anonymous browsing, use of VPNs, and privacy-focused search
engines help protect online privacy.
Privacy Risks:
 Surveillance: Governments or third parties tracking personal data or online activity.
 Data Breaches: Unauthorized access to databases storing personal information.
Privacy Protection Measures:
 Encryption: Protects sensitive data from being accessed by unauthorized individuals.
 Anonymous Browsing Tools: Tools like Tor or VPNs help protect online activity from
being tracked.
 Consent: Obtaining explicit permission from users before collecting or processing
personal data.

Q. (a) Explain the concept of hybrid switching.


(b) Explain the concept of ISDN.

(a) Concept of Hybrid Switching

Hybrid Switching refers to a combination of Circuit Switching and Packet


Switching technologies, which are used in communication networks. It aims to take
advantage of the strengths of both these switching methods to provide more
efficient communication services.

 Circuit Switching is a traditional method where a dedicated communication path is


established between the sender and receiver for the duration of the communication.
This path remains reserved and cannot be used by any other communication during
that time.
 Packet Switching divides data into small packets and sends them independently
through the network. Each packet can take a different route to reach the destination,
where they are reassembled into the original message. It is more efficient for
handling bursty or intermittent data transmission.
Hybrid Switching integrates the best features of both circuit switching and packet
switching to offer flexibility, efficiency, and quality of service (QoS) in modern
networks. It is commonly used in multimedia communications (voice, video, and
data), where both real-time data (like voice calls) and non-real-time data (like emails
or file transfers) need to be handled together.

Key Features of Hybrid Switching:


1. Dynamic Allocation of Resources: Hybrid switching can dynamically allocate network
resources based on the type of traffic. For instance, for a voice call (real-time),
circuit-switched resources may be used, while for data transfer (non-real-time),
packet switching can be utilized.
2. Better Quality of Service (QoS): Real-time services (like voice) can benefit from
circuit-switched paths, ensuring low latency and guaranteed bandwidth. Non-real-
time services (like web browsing) can benefit from the more efficient, flexible packet-
switched paths.
3. Scalability: Hybrid switching is scalable as it combines the strengths of both
technologies. For example, a network can efficiently handle varying levels of data
traffic while ensuring performance and cost-effectiveness.
4. Improved Network Efficiency: By using packet switching for bursty data and circuit
switching for real-time communication, hybrid switching maximizes the efficient use
of network resources.
Example of Hybrid Switching:
 ISDN (Integrated Services Digital Network): ISDN uses a combination of circuit-
switched and packet-switched networks to provide services like voice, video, and
data. It uses circuit switching for voice calls and packet switching for data
transmission, enabling the efficient use of available resources.
Advantages of Hybrid Switching:
 Better Utilization of Bandwidth: Hybrid switching can allocate bandwidth dynamically
based on demand.
 Optimized for Different Traffic Types: It offers dedicated paths for real-time
communication and efficient handling of data traffic.
 Improved Reliability: Combining circuit and packet switching can improve fault
tolerance and reliability, as packets can be rerouted in case of failure.
Challenges:
 Complexity in Implementation: Designing and maintaining a hybrid switching system
is complex and requires sophisticated management of both circuit-switched and
packet-switched resources.
 Cost: It may be more expensive to implement and maintain compared to systems
based on a single switching technology.
(b) Concept of ISDN (Integrated Services Digital Network)

ISDN (Integrated Services Digital Network) is a set of communication standards that


allow simultaneous transmission of voice, data, and video over digital
communication lines. It was developed to provide better quality and more reliable
communication than traditional analog telephone systems.

ISDN aims to integrate both voice and data services into a single network, offering
faster and more efficient communication compared to earlier technologies. It uses
digital transmission to provide higher quality and greater reliability.

Key Features of ISDN:


1. Digital Transmission: ISDN replaces the analog phone lines with digital lines,
providing clearer signals and reducing noise and interference.
2. Integrated Services: It allows for the simultaneous transmission of voice, video, and
data over the same network, making it versatile for various applications such as voice
calls, video conferencing, and internet access.
3. Standardized Protocols: ISDN uses standardized protocols, which means it can work
seamlessly across different devices and service providers.
ISDN Architecture:

ISDN divides the communication process into two major parts: the B-Channel and
the D-Channel.

1. B-Channel (Bearer Channel):


 This channel carries the actual data or voice transmission.
 Each B-channel has a bandwidth of 64 kbps, and multiple B-channels can be used
simultaneously.
 Multiple B-channels can be combined to provide higher bandwidth for demanding
applications like video conferencing or high-speed internet.
2. D-Channel (Delta Channel):
 The D-channel is used for control and signaling purposes.
 It handles call setup, maintenance, and teardown for the B-channels.
 The D-channel typically operates at 16 kbps or 64 kbps depending on the ISDN
configuration.
Types of ISDN:

There are two primary types of ISDN:

1. Basic Rate Interface (BRI):


 BRI is designed for small businesses or home use and provides a lower-cost solution.
 It uses two B-channels (64 kbps each) and one D-channel (16 kbps), giving a total
of 128 kbps for voice and data.
 Commonly used for services like telephone lines, internet access, and video
conferencing.
2. Primary Rate Interface (PRI):
 PRI is used for larger organizations and businesses that require more bandwidth.
 PRI typically provides 23 B-channels (each 64 kbps) and one D-channel (64 kbps) in
the North American standard (T1), or 30 B-channels and one D-channel (64 kbps) in
the European standard (E1).
 PRI supports higher capacity and is suitable for systems with large numbers of voice
calls or data transfers, like large offices or call centers.
Applications of ISDN:
 Voice Communication: ISDN enables high-quality voice calls, free from the
interference and static of analog systems.
 Data Transfer: ISDN provides faster data transfer speeds compared to traditional
dial-up modems (up to 128 kbps in BRI).
 Video Conferencing: ISDN supports video communication, making it ideal for
business meetings and video conferencing.
 Internet Access: ISDN offers faster internet access than standard dial-up connections.
Advantages of ISDN:
1. Higher Quality: Digital transmission ensures higher call quality, clearer voice, and
faster data transfer speeds compared to analog systems.
2. Simultaneous Services: Multiple services (voice, video, data) can be transmitted
simultaneously over the same line.
3. Faster Call Setup: ISDN provides faster call connection times compared to traditional
analog systems.
4. More Reliable: Digital signals are less susceptible to interference and noise, resulting
in more reliable communication.
Disadvantages of ISDN:
1. Cost: ISDN lines tend to be more expensive to install and maintain compared to
traditional analog lines.
2. Availability: ISDN service may not be available in all regions, especially in rural areas.
3. Limited Bandwidth: The bandwidth of individual B-channels (64 kbps) is limited
compared to modern broadband technologies (e.g., DSL or fiber optic connections),
making ISDN less suitable for high-demand applications like streaming large videos.
ISDN vs. Modern Technologies:
 With the advent of broadband internet (DSL, cable, fiber optics) and VoIP (Voice over
IP) technologies, ISDN has become less popular. These modern technologies offer
higher bandwidth, greater scalability, and cost-effectiveness.
 VoIP is a major competitor to ISDN for voice services, providing lower-cost
alternatives over the internet.

You might also like