0% found this document useful (0 votes)
22 views11 pages

CCAN

The document covers key concepts in computer communication and networking, including definitions of protocols like TCP, UDP, and HTTP, and explains the structure of computer networks, types of network topologies, and the OSI and TCP/IP models. It also discusses error detection methods, network services, and security protocols such as SSL/TLS and IPSec. Additionally, it provides insights into multiplexing, routing protocols, and FTP, emphasizing the importance of these elements in facilitating efficient and secure data communication.

Uploaded by

tanviladva01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views11 pages

CCAN

The document covers key concepts in computer communication and networking, including definitions of protocols like TCP, UDP, and HTTP, and explains the structure of computer networks, types of network topologies, and the OSI and TCP/IP models. It also discusses error detection methods, network services, and security protocols such as SSL/TLS and IPSec. Additionally, it provides insights into multiplexing, routing protocols, and FTP, emphasizing the importance of these elements in facilitating efficient and secure data communication.

Uploaded by

tanviladva01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SUBJECT: Computer Communication & Network (CCAN)

3 marks

1. Write full form of TCP, UDP and HTTP.


TCP: Transmission Control Protocol

UDP: User Datagram Protocol

HTTP: Hypertext Transfer Protocol

2. What is a Computer Network?


A computer network is a collection of computers and devices connected together to share
information and resources like files, printers, or internet access. Examples include Wi-Fi
networks and Ethernet networks.

3. What are Network Protocols?


Network protocols are a set of rules that determine how data is exchanged between devices
over a network. These protocols ensure that data is transmitted correctly, securely, and in an
organized manner. Examples of network protocols include TCP, which ensures reliable
transmission of data, and HTTP, which is used for transferring web pages.

4. What is Single-bit Error to error detection and correction?


A single-bit error occurs when one bit of data (0 or 1) is changed or corrupted during
transmission. Error detection and correction techniques like parity bits or checksums help
identify and fix these errors.

5. What is Data Link Control?


Data Link Control (DLC) is responsible for managing how data is transmitted over a physical
communication link between two devices. It handles tasks like framing, addressing, and error
detection. DLC ensures that the data is correctly packaged into frames and manages the flow of
data, preventing issues like data collisions or data loss. It is a key part of the Data Link Layer in
the OSI model.

6. What is IP Routing?
IP routing is the process used by routers to forward data packets between networks based on
their IP addresses. Routers use routing tables and algorithms to determine the best path for the
data to travel. This ensures that data from one network is sent to the correct destination, even if
it has to pass through several intermediate networks. IP routing is essential for the internet to
function, as it enables devices to communicate over large distances.

7. What is SMTP?
SMTP stands for Simple Mail Transfer Protocol. It is used to send and receive emails over the
internet. It defines how email messages are transmitted between email servers.

8. What is VLAN?
A VLAN (Virtual Local Area Network) is a group of devices that are logically grouped together on
a network, even if they are on different physical locations. It helps organize and secure network
traffic.

4 marks

1) Types of Computer Network (Any 2)


Local Area Network (LAN):

A LAN is a network that connects devices within a small geographical area like a home, office, or
building. Devices on a LAN can share resources like printers, files, and internet access. It
typically uses Ethernet cables or Wi-Fi for communication. LANs are fast, cost-effective, and easy
to set up.
Wide Area Network (WAN):

A WAN connects devices over a large geographical area, often spanning cities, countries, or
even continents. The internet is an example of a WAN. WANs use leased lines, fiber optics, or
satellite communication to transmit data. They are used by businesses to connect different
offices or for communication over long distances.

2) What is the OSI Model? Explain it in Detail.


The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes the
functions of a network into seven distinct layers, helping devices communicate with each other.

Layer 1: Physical Layer:

Deals with the physical connection between devices. It involves cables, switches, and the
electrical signals that travel across them.

Layer 2: Data Link Layer:

Responsible for error detection, frame synchronization, and flow control. It ensures that data is
properly formatted for transmission.

Layer 3: Network Layer:

Manages logical addressing and routing of data. This layer is responsible for finding the best
path for data to travel through the network.

Layer 4: Transport Layer:

Ensures reliable data transmission between devices. It handles error correction and flow
control, making sure the data arrives intact.

Layer 5: Session Layer:

Manages sessions or connections between applications. It controls the start, communication,


and termination of sessions between devices.

Layer 6: Presentation Layer:

Handles data translation, encryption, and compression. It ensures that data is in a format that
can be understood by the application layer.

Layer 7: Application Layer:


This is the layer where end-user applications interact. It supports services like email, file
transfer, and web browsing.

3) Transmission Media: Wired and Wireless


Wired Transmission Media:

Wired transmission media involves physical cables to carry data between devices. Examples
include:

Twisted Pair Cables: Common in telephone lines and local networks.

Coaxial Cables: Used for TV connections and broadband internet.

Fiber Optic Cables: Made of glass or plastic and used for high-speed, long-distance
communication due to their ability to transmit data using light signals.

Wireless Transmission Media:

Wireless transmission media uses radio waves, microwaves, or infrared signals to transmit data.
Examples include:

Wi-Fi: Wireless networking technology that connects devices within a short range.

Bluetooth: Used for short-range communication between devices like phones, headphones, or
computers.

Satellite Communication: Used for long-distance communication and broadcasting.

4) Short Note on "Simple Parity Check"


A Simple Parity Check is an error detection technique used to verify the integrity of data during
transmission. It adds an extra bit (parity bit) to a data unit to make the number of 1's either
even or odd. If the total number of 1's in the data (including the parity bit) is incorrect upon
arrival, it indicates an error in the transmission.

Even Parity: Ensures the number of 1's is even.

Odd Parity: Ensures the number of 1's is odd.

Although simple and easy to implement, this method only detects single-bit errors and cannot
correct them.

5) Explain "Cyclic Redundancy Check (CRC)" in Detail


Cyclic Redundancy Check (CRC) is an error detection method used to check the integrity of data
transmitted over networks or stored in devices. It is more powerful than a simple parity check.

How it Works:

CRC involves dividing the data by a pre-determined binary divisor (called a polynomial) using
binary division. The remainder from the division is the CRC value, which is sent along with the
data.

At the Receiver’s End:

The receiver performs the same division process on the received data (including the CRC). If the
remainder is zero, the data is considered correct; if not, it means there was an error.

CRC is commonly used in protocols like Ethernet and in data storage devices.

6) Write About Network Services and Applications


Network Services:

Network services are functions or operations provided by a network to support communication


and data sharing between devices. Common network services include:

File Sharing: Allowing devices to share files across the network.

Email Services: Email systems use protocols like SMTP to send and receive messages.

DNS (Domain Name System): Resolves domain names to IP addresses.

Network Applications:

These are software programs that use network services to perform tasks. Examples include:

Web Browsing: Browsers like Google Chrome use HTTP to view websites.

Online Gaming: Multiplayer games require network services to connect players.

VoIP (Voice over IP): Used for voice communication over the internet, such as Skype.
7) What is DNS? Write in Detail.
DNS (Domain Name System) is a system that translates human-readable domain names (like
www.example.com) into IP addresses (like 192.168.1.1) that computers use to identify each
other on the internet.

How DNS Works:

When you type a domain name into your browser, a DNS query is made to find the
corresponding IP address. The DNS server responds with the IP address, and your browser can
then connect to the correct web server.

Types of DNS Servers:

DNS Resolver: Requests the IP address for the domain name.

Authoritative DNS Server: Holds the actual DNS records for domain names.

Root DNS Server: The top-level server that directs requests to the appropriate DNS servers.

DNS makes the internet easier to navigate by allowing us to use simple names instead of
remembering complex IP addresses.

8) Short Note on "Firewall"


A Firewall is a network security system designed to monitor and control incoming and outgoing
network traffic based on predefined security rules. It acts as a barrier between a trusted
internal network and untrusted external networks (like the internet).

Types of Firewalls:

Packet Filtering Firewall: Inspects each packet of data and allows or blocks it based on rules.

Stateful Inspection Firewall: Tracks the state of active connections and makes decisions based
on the context of traffic.

Proxy Firewall: Acts as an intermediary between the internal network and the external network,
filtering traffic before it reaches its destination.
7 marks:

1) Write about Network Topologies in detail.


Network Topology refers to the physical or logical arrangement of devices and cables in a
network. It defines how different devices, such as computers, printers, and servers, are
connected and how data flows between them. Common network topologies include:

Bus Topology:

In bus topology, all devices are connected to a single central cable called the "bus." Data sent by
one device travels along the bus and can be received by all devices. It is simple and cost-
effective but prone to data collisions and performance issues as the network grows.

Star Topology:

In star topology, all devices are connected to a central device, like a hub or switch. Each device
has a dedicated connection to the central device, making it easy to manage and isolate
problems. However, if the central device fails, the entire network goes down.

Ring Topology:

In ring topology, each device is connected to two other devices, forming a ring. Data travels in
one direction, passing through each device until it reaches the destination. While it provides a
simple structure, the failure of one device can disrupt the entire network.

Mesh Topology:

Mesh topology provides high redundancy by connecting each device to every other device in
the network. It is reliable, as there are multiple paths for data to travel, but it is complex and
expensive to implement.

Hybrid Topology:

A hybrid topology combines two or more different topologies, like star and bus, to meet specific
needs. For example, a large organization may use a star topology for individual departments and
connect them using a bus topology.

2) Explain the TCP/IP Model in Detail


The TCP/IP Model is a set of protocols used to enable communication over the internet. It is a
more simplified and practical model compared to the OSI model and consists of four layers:
Layer 1: Link Layer

The Link Layer is responsible for the physical transmission of data over a network. It includes the
hardware technologies like Ethernet and Wi-Fi. This layer ensures that data is sent to the correct
device on a local network.

Layer 2: Internet Layer

The Internet Layer handles the logical addressing and routing of data. It uses IP (Internet
Protocol) to ensure that data is sent from the source to the destination across different
networks. The Internet Layer is also responsible for fragmentation, which breaks down large
data packets into smaller pieces for transmission.

Layer 3: Transport Layer

The Transport Layer ensures that data is delivered reliably between devices. It uses protocols
like TCP (Transmission Control Protocol) for reliable communication and UDP (User Datagram
Protocol) for faster, less reliable communication. This layer ensures data is in the correct order
and checks for errors.

Layer 4: Application Layer

The Application Layer provides protocols for end-user applications like web browsing, email, and
file transfer. It uses protocols such as HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail
Transfer Protocol), and FTP (File Transfer Protocol) to enable applications to communicate over
the network.

3) Short Note on "Checksum"


A Checksum is an error-detection method used to verify the integrity of data. It involves adding
up the bits of data and sending the sum along with the data. When the data is received, the
checksum value is recalculated. If the checksum matches the sent value, the data is assumed to
be correct. If not, it indicates that the data has been corrupted during transmission.

Checksums are commonly used in protocols like TCP/IP to ensure that data is not altered or
corrupted during transmission. While simple and efficient, checksums are not foolproof and
may not catch all errors.

4) What is Multiplexing? Explain it in Detail


Multiplexing is a technique used to send multiple signals or data streams over a single
communication channel, thereby making efficient use of the available bandwidth. It is
particularly important in telecommunications, where it allows multiple users to share a single
channel without interfering with each other.

Types of Multiplexing:

Time Division Multiplexing (TDM):

TDM divides the available channel time into time slots and assigns each data stream a specific
time slot for transmission. Each signal takes turns using the channel, one at a time.

Frequency Division Multiplexing (FDM):

FDM divides the channel's frequency spectrum into multiple subchannels, each used to transmit
a different signal simultaneously. Each signal occupies a different frequency band within the
channel.

Wavelength Division Multiplexing (WDM):

WDM is similar to FDM but is used in fiber-optic communication. It transmits multiple data
streams using different wavelengths (or colors) of light.

Code Division Multiplexing (CDM):

In CDM, different data streams are assigned unique codes. Multiple signals can be transmitted
simultaneously on the same frequency band, but each one is decoded using its unique code.

5) Short Note on "Common Routing Protocols – RIP, OSPF, BGP"


RIP (Routing Information Protocol):

RIP is one of the oldest routing protocols. It uses hop count as a metric to determine the best
route. RIP is simple and works well in smaller networks but has limitations like a maximum of 15
hops, making it unsuitable for larger networks.

OSPF (Open Shortest Path First):

OSPF is a more sophisticated routing protocol that uses a link-state algorithm. It provides better
scalability and faster convergence compared to RIP. OSPF calculates the shortest path using
Dijkstra’s algorithm and is used in larger, more complex networks.

BGP (Border Gateway Protocol):


BGP is the protocol used to route data between different autonomous systems (AS) on the
internet. It is a path-vector protocol and uses policies, rather than just metrics, to make routing
decisions. BGP is crucial for the functioning of the global internet.

6) Explain FTP in Detail


FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a client
and a server over a TCP/IP-based network, such as the internet. FTP enables users to upload,
download, and manage files on remote servers.

How FTP Works:

FTP operates over two channels:

Control Channel (Port 21): This channel is used for sending commands between the client and
server, such as login credentials and file operations.

Data Channel (Port 20): This channel is used for transferring the actual data (files).

=> FTP Modes:

Active Mode: The client opens a random port and sends it to the server. The server connects to
the client's port to transfer data.

Passive Mode: The server opens a random port and sends it to the client. The client then
connects to the server's port for data transfer. Passive mode is often used when the client is
behind a firewall.

7) Explain Cryptography in Detail


Cryptography is the practice of securing communication and data through the use of
mathematical techniques. It ensures that only authorized parties can read or alter sensitive
information. Cryptography is used to protect data confidentiality, integrity, authentication, and
non-repudiation.

Types of Cryptography:

Symmetric-Key Cryptography:

In symmetric-key cryptography, both the sender and receiver share the same secret key. The
sender encrypts the data using the key, and the receiver decrypts it with the same key.
Examples include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).

Asymmetric-Key Cryptography:

Asymmetric cryptography uses a pair of keys: a public key (known to everyone) and a private
key (known only to the receiver). The sender encrypts data with the receiver’s public key, and
the receiver decrypts it with their private key. RSA is a well-known asymmetric encryption
algorithm.

Hashing:

Hashing is used to create a unique fixed-size value (hash) from data of any size. It is used to
verify data integrity, such as checking if a file has been altered. Common hashing algorithms
include SHA-256 and MD5

8) Explain Security Protocols – SSL/TLS, IPSec


SSL/TLS (Secure Sockets Layer / Transport Layer Security):

SSL/TLS are cryptographic protocols that provide secure communication over the internet. They
encrypt the data sent between a client (like a web browser) and a server, ensuring that no third
party can intercept or alter the information. SSL is the older version, while TLS is the more
secure and widely used version today. They are most commonly used in HTTPS (secure
websites) to protect online transactions.

IPSec (Internet Protocol Security):

IPSec is a suite of protocols used to secure IP communications by encrypting and authenticating


IP packets. It operates at the network layer and can protect both IPv4 and IPv6 traffic. IPSec is
used for creating Virtual Private Networks (VPNs) and ensuring secure communication over
untrusted networks, like the internet.

You might also like