CCAN
CCAN
3 marks
6. What is IP Routing?
IP routing is the process used by routers to forward data packets between networks based on
their IP addresses. Routers use routing tables and algorithms to determine the best path for the
data to travel. This ensures that data from one network is sent to the correct destination, even if
it has to pass through several intermediate networks. IP routing is essential for the internet to
function, as it enables devices to communicate over large distances.
7. What is SMTP?
SMTP stands for Simple Mail Transfer Protocol. It is used to send and receive emails over the
internet. It defines how email messages are transmitted between email servers.
8. What is VLAN?
A VLAN (Virtual Local Area Network) is a group of devices that are logically grouped together on
a network, even if they are on different physical locations. It helps organize and secure network
traffic.
4 marks
A LAN is a network that connects devices within a small geographical area like a home, office, or
building. Devices on a LAN can share resources like printers, files, and internet access. It
typically uses Ethernet cables or Wi-Fi for communication. LANs are fast, cost-effective, and easy
to set up.
Wide Area Network (WAN):
A WAN connects devices over a large geographical area, often spanning cities, countries, or
even continents. The internet is an example of a WAN. WANs use leased lines, fiber optics, or
satellite communication to transmit data. They are used by businesses to connect different
offices or for communication over long distances.
Deals with the physical connection between devices. It involves cables, switches, and the
electrical signals that travel across them.
Responsible for error detection, frame synchronization, and flow control. It ensures that data is
properly formatted for transmission.
Manages logical addressing and routing of data. This layer is responsible for finding the best
path for data to travel through the network.
Ensures reliable data transmission between devices. It handles error correction and flow
control, making sure the data arrives intact.
Handles data translation, encryption, and compression. It ensures that data is in a format that
can be understood by the application layer.
Wired transmission media involves physical cables to carry data between devices. Examples
include:
Fiber Optic Cables: Made of glass or plastic and used for high-speed, long-distance
communication due to their ability to transmit data using light signals.
Wireless transmission media uses radio waves, microwaves, or infrared signals to transmit data.
Examples include:
Wi-Fi: Wireless networking technology that connects devices within a short range.
Bluetooth: Used for short-range communication between devices like phones, headphones, or
computers.
Although simple and easy to implement, this method only detects single-bit errors and cannot
correct them.
How it Works:
CRC involves dividing the data by a pre-determined binary divisor (called a polynomial) using
binary division. The remainder from the division is the CRC value, which is sent along with the
data.
The receiver performs the same division process on the received data (including the CRC). If the
remainder is zero, the data is considered correct; if not, it means there was an error.
CRC is commonly used in protocols like Ethernet and in data storage devices.
Email Services: Email systems use protocols like SMTP to send and receive messages.
Network Applications:
These are software programs that use network services to perform tasks. Examples include:
Web Browsing: Browsers like Google Chrome use HTTP to view websites.
VoIP (Voice over IP): Used for voice communication over the internet, such as Skype.
7) What is DNS? Write in Detail.
DNS (Domain Name System) is a system that translates human-readable domain names (like
www.example.com) into IP addresses (like 192.168.1.1) that computers use to identify each
other on the internet.
When you type a domain name into your browser, a DNS query is made to find the
corresponding IP address. The DNS server responds with the IP address, and your browser can
then connect to the correct web server.
Authoritative DNS Server: Holds the actual DNS records for domain names.
Root DNS Server: The top-level server that directs requests to the appropriate DNS servers.
DNS makes the internet easier to navigate by allowing us to use simple names instead of
remembering complex IP addresses.
Types of Firewalls:
Packet Filtering Firewall: Inspects each packet of data and allows or blocks it based on rules.
Stateful Inspection Firewall: Tracks the state of active connections and makes decisions based
on the context of traffic.
Proxy Firewall: Acts as an intermediary between the internal network and the external network,
filtering traffic before it reaches its destination.
7 marks:
Bus Topology:
In bus topology, all devices are connected to a single central cable called the "bus." Data sent by
one device travels along the bus and can be received by all devices. It is simple and cost-
effective but prone to data collisions and performance issues as the network grows.
Star Topology:
In star topology, all devices are connected to a central device, like a hub or switch. Each device
has a dedicated connection to the central device, making it easy to manage and isolate
problems. However, if the central device fails, the entire network goes down.
Ring Topology:
In ring topology, each device is connected to two other devices, forming a ring. Data travels in
one direction, passing through each device until it reaches the destination. While it provides a
simple structure, the failure of one device can disrupt the entire network.
Mesh Topology:
Mesh topology provides high redundancy by connecting each device to every other device in
the network. It is reliable, as there are multiple paths for data to travel, but it is complex and
expensive to implement.
Hybrid Topology:
A hybrid topology combines two or more different topologies, like star and bus, to meet specific
needs. For example, a large organization may use a star topology for individual departments and
connect them using a bus topology.
The Link Layer is responsible for the physical transmission of data over a network. It includes the
hardware technologies like Ethernet and Wi-Fi. This layer ensures that data is sent to the correct
device on a local network.
The Internet Layer handles the logical addressing and routing of data. It uses IP (Internet
Protocol) to ensure that data is sent from the source to the destination across different
networks. The Internet Layer is also responsible for fragmentation, which breaks down large
data packets into smaller pieces for transmission.
The Transport Layer ensures that data is delivered reliably between devices. It uses protocols
like TCP (Transmission Control Protocol) for reliable communication and UDP (User Datagram
Protocol) for faster, less reliable communication. This layer ensures data is in the correct order
and checks for errors.
The Application Layer provides protocols for end-user applications like web browsing, email, and
file transfer. It uses protocols such as HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail
Transfer Protocol), and FTP (File Transfer Protocol) to enable applications to communicate over
the network.
Checksums are commonly used in protocols like TCP/IP to ensure that data is not altered or
corrupted during transmission. While simple and efficient, checksums are not foolproof and
may not catch all errors.
Types of Multiplexing:
TDM divides the available channel time into time slots and assigns each data stream a specific
time slot for transmission. Each signal takes turns using the channel, one at a time.
FDM divides the channel's frequency spectrum into multiple subchannels, each used to transmit
a different signal simultaneously. Each signal occupies a different frequency band within the
channel.
WDM is similar to FDM but is used in fiber-optic communication. It transmits multiple data
streams using different wavelengths (or colors) of light.
In CDM, different data streams are assigned unique codes. Multiple signals can be transmitted
simultaneously on the same frequency band, but each one is decoded using its unique code.
RIP is one of the oldest routing protocols. It uses hop count as a metric to determine the best
route. RIP is simple and works well in smaller networks but has limitations like a maximum of 15
hops, making it unsuitable for larger networks.
OSPF is a more sophisticated routing protocol that uses a link-state algorithm. It provides better
scalability and faster convergence compared to RIP. OSPF calculates the shortest path using
Dijkstra’s algorithm and is used in larger, more complex networks.
Control Channel (Port 21): This channel is used for sending commands between the client and
server, such as login credentials and file operations.
Data Channel (Port 20): This channel is used for transferring the actual data (files).
Active Mode: The client opens a random port and sends it to the server. The server connects to
the client's port to transfer data.
Passive Mode: The server opens a random port and sends it to the client. The client then
connects to the server's port for data transfer. Passive mode is often used when the client is
behind a firewall.
Types of Cryptography:
Symmetric-Key Cryptography:
In symmetric-key cryptography, both the sender and receiver share the same secret key. The
sender encrypts the data using the key, and the receiver decrypts it with the same key.
Examples include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).
Asymmetric-Key Cryptography:
Asymmetric cryptography uses a pair of keys: a public key (known to everyone) and a private
key (known only to the receiver). The sender encrypts data with the receiver’s public key, and
the receiver decrypts it with their private key. RSA is a well-known asymmetric encryption
algorithm.
Hashing:
Hashing is used to create a unique fixed-size value (hash) from data of any size. It is used to
verify data integrity, such as checking if a file has been altered. Common hashing algorithms
include SHA-256 and MD5
SSL/TLS are cryptographic protocols that provide secure communication over the internet. They
encrypt the data sent between a client (like a web browser) and a server, ensuring that no third
party can intercept or alter the information. SSL is the older version, while TLS is the more
secure and widely used version today. They are most commonly used in HTTPS (secure
websites) to protect online transactions.