0% found this document useful (0 votes)
23 views29 pages

4 Mark Networking

A computer network connects multiple devices for resource sharing, communication, and security. The OSI model outlines seven layers, each with specific functions, while wireless transmission uses electromagnetic waves for data transfer. Various network types include LAN, MAN, and WAN, with security services ensuring data protection through mechanisms like encryption and authentication.

Uploaded by

sushanttandale6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views29 pages

4 Mark Networking

A computer network connects multiple devices for resource sharing, communication, and security. The OSI model outlines seven layers, each with specific functions, while wireless transmission uses electromagnetic waves for data transfer. Various network types include LAN, MAN, and WAN, with security services ensuring data protection through mechanisms like encryption and authentication.

Uploaded by

sushanttandale6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

4marks

a) What is Computer Network? Explain Goals of


computer Network.
Ans. A computer network is a system where multiple
computing devices are connected to share resources, data, and
applications. These networks can be wired (using cables) or
wireless (using radio signals).
Goals of Computer Networks:

1. Resource Sharing – Allows multiple users to share


hardware (printers, storage) and software applications.
2. Reliability – Ensures continuous service through
redundancy and fault tolerance.
3. Scalability – Enables expansion without significant
restructuring.
4. Communication – Supports seamless data exchange via
emails, video calls, etc.
5. Security – Protects data and network infrastructure
against unauthorized access.
6. Cost Efficiency – Reduces costs by centralizing data and
resource management.
b) Explain Function of each layer ISO-OSI reference
model.

Ans. The OSI Model has 7 layers, each with a specific


function:
1. Physical Layer – Deals with hardware transmission of raw
bits over a communication channel (e.g., cables, radio
waves).
2. Data Link Layer – Ensures reliable data transfer by
handling error detection and framing (e.g., MAC address,
Ethernet).
3. Network Layer – Manages routing and addressing of data
packets (e.g., IP addressing, routers).
4. Transport Layer – Ensures end-to-end communication,
error control, and flow control (e.g., TCP, UDP).
5. Session Layer – Manages sessions and synchronization
between applications.
6. Presentation Layer – Handles data translation,
encryption, and compression (e.g., ASCII, JPEG).
7. Application Layer – Provides user interfaces and network
services (e.g., HTTP, FTP, SMTP).
c) What is wireless transmission? Explain any one
media in detail.

Ans. Wireless transmission is the transfer of data using


electromagnetic waves instead of physical cables. It enables
communication over long distances using radio waves,
microwaves, and infrared.
Example: Radio Waves

• Used in Wi-Fi, Bluetooth, AM/FM radio, and cellular


networks.
• Can travel long distances and penetrate obstacles.
• Operates within frequency ranges 3 kHz to 300 GHz.
• Affected by interference from other electronic devices.

d) Explain IEEE standard 802.11 (WLAN) in detail.

Ans. The IEEE 802.11 standard defines Wireless Local Area


Networks (WLANs) and operates on radio frequencies.
Key Features:

1. Frequency Bands:
o 2.4 GHz (longer range, more interference)

o 5 GHz (higher speed, less interference)

2. Wi-Fi Standards:
o 802.11a – 5 GHz, up to 54 Mbps.

o 802.11b – 2.4 GHz, up to 11 Mbps.

o 802.11g – 2.4 GHz, up to 54 Mbps.


o 802.11n – 2.4/5 GHz, up to 600 Mbps (MIMO
technology).
o 802.11ac – 5 GHz, up to 1 Gbps (beamforming).

3. Modes of Operation:
o Infrastructure Mode – Uses an access point (AP) to

connect devices.
o Ad-hoc Mode – Direct peer-to-peer communication.

4. Security Protocols:
o WEP (Weak), WPA, WPA2 (Secure), WPA3 (Latest).

e. What is an attacks? Explain various type of attack.


Ans. A network attack is an attempt to disrupt, steal, or
damage information in a computer network.

Types of Attacks:

1. Passive Attacks (Eavesdropping)

Sniffing – Monitoring network traffic.

Traffic Analysis – Analyzing patterns without modifying data.


2. Active Attacks (Data Modification)

Man-in-the-Middle (MITM) – Intercepting communication.

Denial-of-Service (DoS) – Overloading a system to make it


unavailable.

Phishing – Deceiving users to steal credentials.

a) What is Bridge? Explain types of bridges.


Ans. A bridge is a networking device that connects two
or more network segments, operating at the Data Link
Layer (Layer 2) of the OSI model. It helps in filtering
traffic, reducing collisions, and segmenting networks for
better performance.
Types of Bridges:
1. Transparent Bridge:
Learns MAC addresses automatically and forwards data
based on them.
Used in Ethernet networks.
2. Source Routing Bridge:
Used in Token Ring networks.
Determines the best path for data transmission based
on route information.
3. Translational Bridge:
Converts data between different network types (e.g.,
Ethernet to Token Ring).

4. Remote Bridge:
Connects two remote LANs over a WAN link.
b) Explain different modes of communication with
sketch.
Ans. Modes of communication refer to how data is
transmitted between devices.
1. Simplex Mode
Data flows in one direction only (e.g., TV broadcasting).
No feedback is possible.
2. Half-Duplex Mode
Data flows in both directions, but only one direction at a
time (e.g., Walkie-Talkie).
Each device takes turns to transmit data.
3. Full-Duplex Mode
Data flows in both directions simultaneously (e.g.,
Telephone call).
Increases efficiency compared to half-duplex.

c) Explain TCP/IP protocol in detail.


Ans. The TCP/IP (Transmission Control Protocol/Internet
Protocol) model is a 4-layer architecture that governs
how data is sent across networks.
Layers of TCP/IP Model:
1. Application Layer:
Provides user services like HTTP (Web Browsing), FTP
(File Transfer), SMTP (Email).
2. Transport Layer:
TCP (Reliable, connection-oriented)
UDP (Faster, connectionless, used in video streaming)
3. Internet Layer:
Responsible for addressing and routing (IP addressing,
ICMP for error handling).
4. Network Access Layer:
Deals with physical transmission of data over a network
(Ethernet, Wi-Fi).
d) What is guided media? Explain any one in detail.
Guided media refers to wired transmission mediums
where signals travel through a physical medium.
Types of Guided Media:
1. Twisted-Pair Cable
2. Coaxial Cable
3. Fiber Optic Cable
Example: Fiber Optic Cable
Uses light signals for data transmission.
Composed of a core, cladding, and protective layers.
Advantages: High speed, long-distance transmission,
immune to electromagnetic interference.
Used in: Internet backbone, high-speed LANs,
telecommunication networks.
e) What is Fast Ethernet? Explain categories of Fast
Ethernet.
Fast Ethernet is an improved version of standard
Ethernet that supports 100 Mbps speeds, compared to
the older 10 Mbps Ethernet.
Categories of Fast Ethernet:
1. 100BASE-TX
Uses two twisted-pair cables (Cat5 or higher).
Most commonly used Fast Ethernet standard.
2. 100BASE-FX
Uses fiber optic cables instead of twisted-pair.
Suitable for long-distance transmission.
3. 100BASE-T4
Uses four twisted-pair cables.
Designed for networks that don’t support Cat5 cables.
(a) What is Topology? Explain Types of Topology.
Ans.Topology refers to the physical or logical arrangement of
network devices and how they communicate.
Types of Topology:
Bus Topology – All devices share a single communication line.
Efficient but prone to collisions.
Star Topology – All devices connect to a central hub. Easy to
manage but dependent on the hub.
Ring Topology – Devices are connected in a circular path. Data
moves in one or both directions.
Mesh Topology – Each device connects to multiple others,
ensuring redundancy.
Tree Topology – Hierarchical structure combining bus and star
topologies.
Hybrid Topology – A mix of two or more types of topologies.
(b) What is Addressing? Explain Different Types of Addresses.
Addressing is a method to identify network devices uniquely
for communication.
Types of Addresses:
Physical Address (MAC Address) – Unique address assigned to
NIC (e.g., 48-bit Ethernet address).
Logical Address (IP Address) – Assigned for network
communication (IPv4, IPv6).
Port Address – Used in TCP/IP to identify applications (e.g.,
HTTP: Port 80).
Specific Address (Multicast & Broadcast) – Used for group or
all-device communication.
(c) Explain Propagation Method.
Propagation methods describe how signals travel
through different mediums.
Types of Propagation:
1. Ground Wave Propagation – Signals travel close to
the Earth’s surface (used in AM radio).
2. Sky Wave Propagation – Signals reflect off the
ionosphere (used in shortwave radio).
3. Line-of-Sight Propagation – Signals travel directly
without obstructions (used in satellite and microwave
communication).
(d) What is Copyright? Explain Applications of
Copyright.
Copyright is a legal right that grants creators exclusive
ownership of their work, preventing unauthorized use.
Applications of Copyright:
1. Books and Literature – Protects written works from
plagiarism.
2. Software – Prevents unauthorized duplication of
programs.
3. Music & Videos – Ensures artists get credit and
compensation.
4. Digital Content – Covers images, websites, and online
publications.
e) What is Bluetooth? Explain its architecture.
Ans. What is Bluetooth? Explain its Architecture.
Bluetooth is a wireless communication technology for
short-range data exchange.
Bluetooth Architecture:
1. Radio Layer – Defines frequency bands (2.4 GHz)
2. Baseband Layer – Handles Bluetooth connections and
device addressing.
3. Link Manager – Manages security and power control.
4. L2CAP (Logical Link Control & Adaptation Protocol) –
Provides data flow management.
5. Application Layer – Supports profiles like audio, file
transfer, and hands-free calling.
a. What is networking? Explain different types of
network.
Ans. Networking refers to the practice of connecting
computers and other devices to share resources and
data.
Types of Networks:
1. LAN (Local Area Network) – Covers a small
geographical area (e.g., offices, homes).
2. MAN (Metropolitan Area Network) – Covers a city or
campus.
3. WAN (Wide Area Network) – Covers large distances
(e.g., the internet).
b. Compare ISO/OSI reference model and TCP/IP.
c. Explain Fiber optic sable in detail.
Ans. Fiber optic cables transmit data using light signals,
offering high-speed and long-distance communication.
Types of Fiber Optic Cables:
1. Single-Mode Fiber (SMF) – Used for long-distance
communication, with a small core and single light path.
2. Multi-Mode Fiber (MMF) – Used for short distances,
with a larger core and multiple light paths.
Advantages:
High speed
Immune to electromagnetic iinterferenc
Secure data transmission
d. What is AP? Explain BSS and ESS in detail.
Ans. AP (Access Point) is a device that allows wireless
devices to connect to a wired network.
BSS (Basic Service Set)
A single access point with connected wireless devices.
Works within a limited area.
ESS (Extended Service Set)
Multiple BSS units connected via APs.
Provides seamless roaming in larger networks (e.g.,
university campuses).
e. What is copyright? State objective of cryptography.
Ans. Copyright protects intellectual property from
unauthorized use.
Objective of Cryptography:
1. Confidentiality – Ensures data is accessible only to
authorized users.
2. Integrity – Prevents data alteration during
transmission.
3. Authentication – Confirms the identity of users or
devices.
4. Non-Repudiation – Prevents denial of data
transmission by senders.
a. What is Backbone Network? Explain types of
Backbone network.
b. Differentiate between connection oriented and
connectionless services?
Ans.

c. What is HUB? Explain types of HUB?

Ans. A hub is a basic networking device that connects


multiple computers and forwards data to all devices.
Types of Hubs:

1. Passive Hub – Simply forwards signals without


amplification.
2. Active Hub – Amplifies and regenerates signals before
forwarding.
3. Intelligent Hub – Monitors traffic and manages data
transmission efficiently

(d) What is Wireless Transmission? Explain Any Two Media in


Detail.

Wireless transmission uses electromagnetic waves to send


data without physical cables.
Types of Wireless Media:

1. Radio Waves – Used in Wi-Fi, Bluetooth, and


broadcasting.
o Advantages: Covers large distances, passes through

walls.
o Disadvantages: Susceptible to interference.

2. Infrared Waves – Used in TV remotes and short-range


communication.
o Advantages: Secure as it doesn't penetrate walls.

o Disadvantages: Limited range, requires line-of-sight.

(e) Draw TCP/IP Model and State the Function of Each Layer.
TCP/IP Model Layers and Functions

1. Application Layer – Provides services like web browsing


(HTTP), email (SMTP), and file transfer (FTP).
2. Transport Layer – Manages reliable (TCP) or fast (UDP)
data delivery.
3. Internet Layer – Handles addressing (IP) and routing.
4. Network Access Layer – Manages physical transmission of
data (Ethernet, Wi-Fi).
(A diagram can be provided upon request.)
(a) What is Security Services? Explain Security Mechanisms to
Provide the Service.

Security services are measures designed to protect data,


networks, and communications from unauthorized access,
modification, or attacks.
Types of Security Services:

1. Confidentiality – Ensures that only authorized users can


access information.
2. Integrity – Prevents unauthorized modification of data.
3. Authentication – Confirms the identity of users or
devices.
4. Non-Repudiation – Prevents senders or receivers from
denying their actions.
5. Access Control – Restricts unauthorized access to
systems.

Security Mechanisms:

1. Encryption – Converts data into unreadable format (e.g.,


AES, RSA).
2. Digital Signatures – Ensures message authenticity.
3. Firewalls – Protect networks from unauthorized access.
4. Intrusion Detection Systems (IDS) – Monitors and detects
threats.
5. Authentication Protocols – Ensures secure user
verification (e.g., Kerberos).
(b) Explain Ground Wave Propagation with Diagram.

Ground wave propagation is a method where radio waves


travel close to the Earth's surface. It is commonly used for
AM radio and maritime communication.
Characteristics:

• Works best at lower frequencies (below 2 MHz).


• Used for medium and long-distance communication.
• Affected by terrain and ground conductivity.
(A diagram can be provided upon request.)
(c) What are the Different Types of Addresses?

Addressing is essential for identifying devices in a network.


Types of Addresses:

1. Physical Address (MAC Address) – Unique 48-bit address


assigned to NICs.
2. Logical Address (IP Address) – Identifies devices in a
network (IPv4, IPv6).
3. Port Address – Identifies specific processes in a device
(e.g., HTTP: Port 80).
4. Specific Addresses:
o Unicast – Communication between one sender and

one receiver.
o Multicast – One sender to multiple selected

receivers.
o Broadcast – One sender to all devices in a network.

(d) What are the Objectives of Wireless LAN?

A Wireless LAN (WLAN) allows devices to communicate


without physical cables.
Objectives of WLAN:

1. Mobility – Allows users to access the network from


anywhere within range.
2. Scalability – Easy to expand without additional wiring.
3. Ease of Installation – Reduces the complexity of cabling.
4. Cost Efficiency – Eliminates the need for expensive
cabling infrastructure.
5. Security – Provides encryption (WPA, WPA2) to protect
data.
6. High-Speed Connectivity – Supports fast data
transmission for multimedia applications.
(a) Define Unguided Media. Explain Any One in Detail.

Unguided media refers to wireless transmission methods


where signals travel through air, space, or water without
physical cables.
Types of Unguided Media:

1. Radio Waves – Used in broadcasting, Wi-Fi, and


Bluetooth.
2. Microwaves – Used in satellite and long-distance
communication.
3. Infrared – Used in TV remotes and short-range
communication.

Explanation of Radio Waves:

• Travel in all directions, covering large areas.


• Can penetrate buildings and obstacles.
• Used in AM/FM radio, mobile phones, and Wi-Fi
networks.
• Advantages: Wide coverage, easy setup.
• Disadvantages: Prone to interference and security risks.

(b) Describe the Frame Format and Physical Layer of Ethernet.


Ethernet Frame Format:

Ethernet frames are structured for efficient data


transmission.
Field Size Description

Synchronizes sender and


Preamble 7 bytes
receiver.

Start Frame Delimiter Indicates the start of the


1 byte
(SFD) frame.

Destination MAC
6 bytes Identifies the receiver.
Address

Source MAC Address 6 bytes Identifies the sender.

Specifies protocol type or


EtherType / Length 2 bytes
data length.

46-1500
Payload (Data) Contains the actual data.
bytes

Frame Check
4 bytes Error-checking using CRC.
Sequence (FCS)

(A diagram can be provided upon request.)


Physical Layer of Ethernet:

• Defines how data is transmitted over cables or wireless


links.
• Uses twisted-pair cables, fiber optics, or wireless signals.
• Supports various speeds (10 Mbps, 100 Mbps, 1 Gbps,
etc.).
• Implements CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) to handle data collisions.

a. What is cryptography? Explain symmetric key


cryptography.

Ans. Cryptography is the practice of securing


communication by converting plaintext into an unreadable
format (ciphertext).
Types of Cryptography:

1. Symmetric Key Cryptography – Uses a single key for both


encryption and decryption.
2. Asymmetric Key Cryptography – Uses a pair of public and
private keys.

Explanation of Symmetric Key Cryptography:

• The same secret key is used for encryption and


decryption.
• Faster and efficient but requires secure key sharing.
• Used in AES, DES, and RC4 algorithms.
Example:
If Alice wants to send a secure message to Bob:
1. Alice encrypts the message using a secret key.
2. Bob decrypts the message using the same key.
Advantages:

• Fast and efficient for large data encryption.


• Less computational power required compared to
asymmetric cryptography.

Disadvantages:

• Key distribution must be secure to prevent interception.


• If the key is compromised, all encrypted data is at risk.
Would you like a diagram or example code for encryption?
(a) Explain Types of Security Services.

Security services are measures that protect data, networks,


and systems from unauthorized access, modification, and
attacks.
Types of Security Services:

1. Confidentiality – Ensures that only authorized users can


access sensitive data (e.g., encryption).
2. Integrity – Prevents unauthorized data modification and
ensures correctness (e.g., hashing).
3. Authentication – Confirms the identity of users or devices
(e.g., passwords, biometrics).
4. Non-Repudiation – Prevents denial of data transmission
or reception (e.g., digital signatures).
5. Access Control – Restricts unauthorized users from
accessing data (e.g., firewalls).
6. Availability – Ensures continuous access to data and
services, preventing disruptions (e.g., redundancy, DDoS
protection)

(b) Define ISO/OSI Reference Model. Explain Any Layer in


Detail.

The ISO/OSI reference model is a 7-layer framework that


standardizes network communication.
7 Layers of ISO/OSI Model:

1. Physical Layer – Transmits raw bits over a communication


medium.
2. Data Link Layer – Manages error detection and MAC
addresses.
3. Network Layer – Handles routing and logical addressing
(IP).
4. Transport Layer – Provides reliable or fast data delivery
(TCP/UDP).
5. Session Layer – Manages communication sessions
between applications.
6. Presentation Layer – Converts data formats (e.g.,
encryption, compression).
7. Application Layer – Provides services like email, web
browsing, and file transfer.
Detailed Explanation of Network Layer:

• Responsible for logical addressing (IP) and packet


forwarding.
• Uses routing protocols like RIP, OSPF, and BGP.
• Handles congestion control and error handling in packet
transmission.

(a) What are Network Connectivity Devices? Explain Any One


in Detail.

Network connectivity devices enable communication


between different network components.
Types of Network Connectivity Devices:

1. Hub – Broadcasts data to all connected devices.


2. Switch – Sends data only to the intended device.
3. Router – Directs data between different networks using IP
addresses.
4. Gateway – Converts protocols between different network
architectures.
5. Repeater – Boosts signal strength over long distances.

Detailed Explanation of a Router:

• Connects different networks (LAN, WAN).


• Uses IP addresses for packet forwarding.
• Implements security measures like NAT, firewall, and VPN
support.
• Commonly used in home and enterprise networks.
(b) Explain Communication Mode in Detail.

Communication modes define how data flows between


devices in a network.
Types of Communication Modes:

1. Simplex Mode – Data flows in one direction only (e.g.,


radio, TV).
2. Half-Duplex Mode – Data flows in both directions, but
one at a time (e.g., walkie-talkie).
3. Full-Duplex Mode – Data flows in both directions
simultaneously (e.g., phone call).

Comparison of Modes:
Mode Direction Example Efficiency

Simplex One-way TV, keyboard Low

Half-Duplex Two-way (one at a time) Walkie-talkie Medium

Full-Duplex Two-way (simultaneous) Telephone High


(c) Comparison Between Server-Based LAN and Peer-to-Peer
LAN.
Feature Server-Based LAN Peer-to-Peer LAN

Centralized server
No central control, all
Control manages data and
devices are equal
security

Low, as each device


High, with access control
Security manages its own
and authentication
security

Efficient for large Slower for large


Performance
networks networks

Home and small office


Example Corporate networks
networks

Expensive due to server


Cost Low-cost setup
maintenance

(d) What is Cryptography? Explain Its Application.

Cryptography is the practice of securing information by


transforming it into an unreadable format.
Applications of Cryptography:

1. Data Encryption – Protects sensitive data using AES, RSA.


2. Secure Communication – Used in HTTPS, VPN, and
messaging apps.
3. Authentication – Verifies identity using digital signatures.
4. Blockchain & Cryptocurrency – Ensures secure
transactions in Bitcoin, Ethereum.
5. Email Security – Prevents phishing using PGP encryption.

(e) Explain Classful Addressing in Detail.

Classful addressing is an IP addressing scheme that divides


IP addresses into predefined classes.
Classes of IP Addresses:
Starting Default
Class Range Usage
IP Subnet Mask

Large
1.0.0.0 –
A 1.0.0.0 255.0.0.0 networks
126.255.255.255
(Govt, ISPs)

128.0.0.0 – Medium-sized
B 128.0.0.0 255.255.0.0
191.255.255.255 networks

192.0.0.0 – Small
C 192.0.0.0 255.255.255.0
223.255.255.255 networks

224.0.0.0 –
D 224.0.0.0 N/A Multicasting
239.255.255.255
Starting Default
Class Range Usage
IP Subnet Mask

240.0.0.0 –
E 240.0.0.0 N/A Experimental
255.255.255.255

Limitations of Classful Addressing:

• Wastes IP addresses due to fixed subnet sizes.


• Inefficient for modern large-scale networks.
• Replaced by Classless Inter-Domain Routing (CIDR) for
better address allocation.
Would you like a diagram or example for any of these
topics?

You might also like