CCN QB Unit1
CCN QB Unit1
2 marks:
1. Define Computer Network
The term computer network is defined as a group of two or more
computers connected together by means of network media and network devices
in order to share data, resources such as printers, storage devices, exchange files
and allow electronic communication among them.
2. What are the different uses of computer network?
i. Business Application
ii. Home Application
iii. Mobile users
iv. Social issues
1- II BCA/CCN/Unit1-QP
9. Expand HTTP & TELNET.
HTTP : Hyper Text Transfer Protocol.
TELNET : Teletype Network.
10. Expand FTP, DNS.
FTP: File Transfer protocol
DNS: Domain Name system
11. Expand TCP and UDP.
TCP - Transmission Control Protocol.
UDP - User Datagram Protocol.
12. Expand DSL and SONE-T
DSL: Digital Subscriber Line
SONET: Synchronous Optical Networking
13. Expand LAN,WAN,MAN
LAN-Land Area Network
WAN-Wide Area Network
MAN-Metropolitan Area Network
14. What is peer-to-peer model?
A peer-to-peer model is a decentralized network architecture where
participants in the network, called "peers," communicate and share resources
directly with each other, without relying on a central server. Each peer can act as
both a client and a server.
For example, families sharing photos movies and teenagers playing multi-person
online games.
15. What is client server model?
The client-server model is a system where data is stored on servers,
accessed remotely by clients, and connected through a network.
It's used for various applications, including the web, allowing clients to request
data from servers, which respond by providing the requested information.
2- II BCA/CCN/Unit1-QP
16. list the different forms of e commerce?
B2C (Business-to-consumer)
B2B (Business-to-business)
G2C (Government-to-consumer)
C2C (Consumer-to-consumer)
P2P(Peer-to-Peer)
17. What is Profiling and Phishing?
Profiling is defined as the investigation, analysis, assessment and
reconstruction of data from a behavioural /psychological perspective extracted
from computer systems, networks and the humans committing the crimes.
Phishing is when attackers send malicious emails designed to trick people into
falling for a scam.
Or
Profiling refers to the process of collecting and analyzing information about
individuals or groups to create a detailed and often predictive profile of their
characteristics, behaviors, and preferences. It can be used for various purposes,
including marketing, law enforcement, and cybersecurity.
Phishing, on the other hand, is a type of cyberattack where malicious actors
impersonate trusted entities or individuals to trick people into revealing sensitive
information such as passwords, credit card numbers, or personal data. Typically,
phishing is done through deceptive emails, websites, or messages.
18. what are the two types of transmission technology?
Broadcast links: Simultaneous transmission of the same message to
multiple recipients
point-to-point links: Connect individual pairs of machines
19. what is unicasting and broadcasting?
Broadcast systems generally also allow the possibility of addressing a
packet to all destinations by using a special code in the address field. When a
packet with this code is transmitted, it is received and processed by every
machine on the network. This mode of operation is called broadcasting.
Broadcasting, whereas larger networks usually are point-to-point. Point-to-point
transmission with one sender and one receiver is sometimes called unicasting.
3- II BCA/CCN/Unit1-QP
20. What are static and dynamic allocation methods.
Static: A typical static allocation would be to divide time into discrete
intervals and use a round-robin algorithm, allowing each machine to broadcast
only when its time slot comes up.
Dynamic :Dynamic allocation methods for a common channel are either
centralized or decentralized.
Centralized: In the centralized channel allocation method, there is a single
entity.
Decentralized: In the decentralized channel allocation method, there is no
central entity; each machine must decide for itself whether to transmit.
4- II BCA/CCN/Unit1-QP
6. Broadcast address: The broadcast address is a special address used to send
data to all devices on the subnet. It is used for broadcast traffic, such as ARP
and DHCP requests.
7. CIDR ( Classless Inter-Domain Routing) notation : it is a way to represent IP
address and subnet mask in a shortened form, it uses the number of bits used
for the subnet mask rather than the actual subnet mask.
5- II BCA/CCN/Unit1-QP
25. Differentiate connection oriented and connectionless service.
connection oriented connectionless service
Connection-oriented service is Connection-less service is related to the postal
related to the telephone system. system.
It includes connection It does not include any connection
establishment and connection establishment and connection termination.
termination.
In a connection-oriented service, Connection-less Service does not give a
the Handshake method is used to guarantee of reliability. In this, Packets do not
establish the connection between follow the same path to reach their destination.
sender and receiver.
6- II BCA/CCN/Unit1-QP
29. Differentiate OSI and TCP/IP reference model
Difference is in the area of connectionless versus connection-oriented
communication. The OSI model supports both connectionless and connection
oriented communication in the network layer, but only connection-oriented
communication in the transport layer, where it counts (because the transport
service is visible to the users). The TCP/IP model supports only one mode in the
network layer (connectionless) but both in the transport layer, giving the users a
choice. This choice is especially important for simple request-response protocols.
3 or more marks:
i) Business Applications:
Business applications encompass a wide range of uses for computer
networks within a company's operations Some of the most popular uses of the
computer network for business application are as follows:
Resource Sharing:
- Resource sharing in business applications involves making programs,
equipment, and data available to anyone on the network, regardless of their
physical location.
- An example of resource sharing is the sharing of a common printer among
office workers to reduce costs and maintenance.
7- II BCA/CCN/Unit1-QP
VPN (Virtual Private Networks):
- VPNs are used in larger companies to connect individual networks at different
sites into one extended network.
- VPNs allow users to access data as if they were local, overcoming
geographical barriers
Client-Server Model:
- It involves powerful servers where data is stored and simpler client machines
on employees' desks.
- Clients access remote data from servers over a network.
- This model forms the basis of various network usages, including web
applications and remote access scenarios.
8- II BCA/CCN/Unit1-QP
E-commerce:
-Many companies engage in electronic commerce (e-commerce) to interact with
customers and suppliers online.
-This includes online catalogs, order processing, and electronic transactions,
enhancing convenience and efficiency.
Peer-to-Peer Communication:
9- II BCA/CCN/Unit1-QP
E-commerce:
- E-commerce has transformed how people shop and manage finances from
their homes.
- Home shopping allows browsing catalogs and personalizing product
configurations.
- Users can handle financial transactions, pay bills, and manage investments
online.
- Online auctions have become a significant part of e-commerce, enabling both
buying and selling by consumers.
10- II BCA/CCN/Unit1-QP
Companies that provide Web-based services may maintain large amounts
of personal information about their users that allows them to study user
activities directly. For example, Google can read your email and show your
advertisements based on your interests if you use its email services, Gmail.
The growth of peer-to-peer networks raises concerns about copyrighted
material being shared without permission, leading to legal actions and the
issuance of DMCA takedown notices.
Profiling: Companies use cookies and personal information to track user
activities, potentially compromising privacy.
The internet is flooded with ill-considered or false information, and spam
emails are a persistent annoyance.
Phishing: it is when attackers send malicious emails designed to trick
people into falling for a scam.
The interaction of computer networks with existing laws, such as in the
case of online gambling, leads to legal ambiguities when different
countries have conflicting regulations.
4. Write a note on the following:
i. LAN
ii. MAN
i. LAN
11- II BCA/CCN/Unit1-QP
ii. MAN
12- II BCA/CCN/Unit1-QP
6. Write a note on LAN
13- II BCA/CCN/Unit1-QP
Figure: Layers, protocols, and interfaces
8. Explain design issues for the layers.
Some of the key design issues that occur in computer networks will come
up in layer after layer.
Reliability: It is the design issue of making a network that operates
correctly even when its components are unreliable. Error detection and
correction mechanisms, such as error-detecting codes, are used to identify
and fix errors that may occur during data transmission
Routing: In large networks with multiple paths between source and
destination, finding a working path becomes important. Routing
mechanisms help the network automatically determine the best path to send
data packets.
Addressing or Naming: Each layer of the network needs a mechanism for
identifying senders and receivers. This is achieved through addressing or
naming, depending on the layer.
Evolution of the Network: Networks constantly grow and change. Protocol
layering is one way to handle these changes by dividing the problem into
layers and abstracting implementation details. Various strategies are used
to support network evolution
Internetworking: Different network technologies may have various
limitations, such as message order preservation and message size
restrictions. Internetworking mechanisms are designed to handle these
differences.
Scalability: As networks expand, scalability becomes crucial. Network
designs must continue to work effectively as the network grows larger.
14- II BCA/CCN/Unit1-QP
Resource Allocation: Networks allocate resources like transmission
capacity to different hosts. Techniques like statistical multiplexing are used
to dynamically share resources based on demand.
Flow Control: Ensuring that fast senders do not overwhelm slow receivers
is achieved through flow control mechanisms, often involving feedback
from the receiver to the sender.
Congestion: When too many computers want to send too much data,
congestion can occur. Strategies like reducing demand during congestion
help manage this issue.
Quality of Service (QoS): Networks must cater to applications with varying
demands, from real-time delivery to high throughput. Quality of service
mechanisms reconciles these competing demands.
Security: Protecting the network from threats is crucial. This involves
mechanisms for confidentiality (preventing eavesdropping), authentication
(verifying identities), and integrity (ensuring data remains unchanged).
Cryptography is often used to implement these security features.
15- II BCA/CCN/Unit1-QP
• Transmission Control Protocoln • User Datagram Protocol (UDP),
(TCP) is a example of a Internet
connection-oriented service. Protocol (IP), and Internet Control
Message Protocol (ICMP) are
examples of connectionless
service.
• Connection-oriented requires • Connection-less Service does not
authentication. require authentication.
16- II BCA/CCN/Unit1-QP
Figure: Six service primitives that provide a simple connection-oriented service
1. LISTEN: This primitive is used to block and wait for an incoming
connection request. It's typically used by a server to indicate its readiness
to accept incoming connections.
2. CONNECT: This operation establishes a connection with a waiting peer.
Clients often use this primitive to initiate a connection to a server,
specifying the server's address.
3. ACCEPT: The ACCEPT operation is used by a server to accept an
incoming connection request from a peer. It acknowledges the connection
request and allows the server process to establish the connection.
4. RECEIVE: This primitive is used to block and wait for incoming data or
messages. It is often used by a server to prepare for receiving client
requests.
5. SEND: The SEND operation is used to transmit data or messages to a peer.
It is typically used by clients to send requests to a server and by servers to
send responses to clients.
6. DISCONNECT: This operation is used to terminate an established
connection between peers. It can be initiated by either the client or the
server, and it involves a graceful disconnection process.
17- II BCA/CCN/Unit1-QP
receiving data, and terminating connections, allowing for orderly communication
between processes is illustrated in below diagram.
1. Physical Layer It is the bottom-most or the first layer of the OSI Model It
comprises the raw data which is further transmitted to the higher layers of the
structure This layer converts the digital bits into electrical, radio, or optical
signals
18- II BCA/CCN/Unit1-QP
2. Data Link Layer Access to get the data is achieved at this layer It breaks the
input data into frames which makes analysing the data easier Ensures that the
data received is free of any errors It controls the flow of data in the stipulated
time duration and along with a set speed of transmission
3. Network Layer It acts as a network controller Transferring of variable data
from one node to another, connected in a network, takes place at this layer Each
node has a specific address and the network layer ensures that the data is sent
to its destination address
4. Transport Layer The delivery of data packets is managed by the transport
layer It manages the flow of data, segmentation and desegmentation and error
control There are five classes of the transport protocol, starting from 0 and
continuing till 4 (TP0 to TP4)
5. Session Layer The connection between the computers connected in a network
is managed at this layer Establishment, management and termination between
the remote and local application takes place here Authentication and
authorization happen at this layer
6. Presentation Layer The data is converted into the syntax or semantics which
an application understands Before passing on the data any further, the data is
formatted at this stage Functions including compression, encryption,
compatible character code set, etc. are also done at this layer of the model
7. Application Layer The interaction with the user or the user application takes
place at this stage When identifying communication partners, the application
layer determines the identity and availability of communication partners for an
application with data to transmit
19- II BCA/CCN/Unit1-QP
The Link Layer:
The Link Layer is the lowest layer in the network model.
It's responsible for managing communication between hosts and
transmission links.
It plays a crucial role in packet-switching networks.
It operates in a connectionless manner across different networks.
This layer is essential for serial lines and classic Ethernet to work
effectively.
The Internet Layer:
Its main role is to allow hosts to send packets across different networks to
reach their destination.
The Internet Layer's concept is similar to sending international letters
through mail systems.
It defines the IP (Internet Protocol) and ICMP (Internet Control Message
Protocol) to facilitate packet delivery.
Routing and congestion management are significant challenges for the
Internet Layer, although IP is not highly effective at preventing congestion.
The Transport Layer:-
The Transport Layer is the layer above the Internet Layer in the TCP/IP
model.
Its main purpose is to enable communication between peer entities on
source and destination hosts.
Two end-to-end transport protocols exist in this layer: TCP and UDP.
20- II BCA/CCN/Unit1-QP
TCP (Transmission Control Protocol) is a reliable, connection-oriented
protocol that ensures error-free delivery of a byte stream from one machine
to another.
UDP (User Datagram Protocol) is an unreliable, connectionless protocol
used when applications don't require TCP's sequencing or flow control. It's
suitable for one-shot, client-server queries and applications prioritizing
prompt delivery over accuracy.
The Application Layer:-
The topmost layer in the TCP/IP model houses higher-level protocols used
by applications.
Applications in TCP/IP include their required session and presentation
functions.
Some well-known examples include TELNET for virtual terminals, FTP
for file transfer, SMTP for electronic mail, DNS for host name mapping,
HTTP for fetching web pages, and RTP for real-time media delivery like
voice and video.
OSI model has seven layers. TCP/IP model has four layers
And has (inter) network, And has (inter) network,
transport, and application transport, and application layers,
layers, but the other layers are but the other layers are different.
different.
21- II BCA/CCN/Unit1-QP
The TCP/IP model supports only
The OSI model supports both one mode in the network layer
connectionless and connection- (connectionless) but both in the
oriented communication in the transport layer, giving the users a
network layer, but only choice.
connection-oriented
communication in the transport
layer, where it counts (because
the transport service is visible to
the users).
It follows horizontal approach
It follows vertical approach.
It did not distinguish between
Based on the three concepts: service, interface and protocol.
service, interface andprotocol.
22- II BCA/CCN/Unit1-QP