Unguided media refers to wireless communication using radio waves, microwaves, and infrared for signal transmission without physical mediums. TCP/IP protocol consists of various layers, each with specific functions like data transmission, routing, and user services. The document also covers concepts like switches, copyright, network topologies, and security mechanisms in networking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
15 views10 pages
ENDSEMNW
Unguided media refers to wireless communication using radio waves, microwaves, and infrared for signal transmission without physical mediums. TCP/IP protocol consists of various layers, each with specific functions like data transmission, routing, and user services. The document also covers concepts like switches, copyright, network topologies, and security mechanisms in networking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
a) What is unguided media?
Explain types of b) Explain TCP/IP protocol in details in table
unguided media. format. Unguided media refers to wireless communication Layer Protocols Functions where signals are transmitted through the air. It HTTP, FTP, User services like does not use any physical medium. The types Application SMTP browsing and email include radio waves, microwaves, and infrared, each with different frequencies and transmission Ensures ranges. Transport TCP, UDP reliable/unreliable data b) What is a switch? How does it differ from a transmission hub? Internet IP, ICMP Routing and addressing A switch is a network device that connects devices Network Ethernet, Physical data and filters traffic based on MAC addresses. Unlike a Access ARP transmission hub, which broadcasts data to all ports, a switch c) What is guided media? Explain types of guided sends data only to the intended recipient, media. improving efficiency and reducing collisions. Guided media uses physical paths like cables for c) What is copyright? Explain applications of data transmission. Types include twisted pair cable copyright. (used in LAN), coaxial cable (used in TV networks), Copyright is a legal right that protects original and fiber optic cable (for high-speed internet and works of authorship like books, music, and long-distance communication). software. Its applications include protecting d) Explain Active and Passive Hub. intellectual property, ensuring creators get An active hub amplifies the incoming signal before recognition, and controlling reproduction and forwarding it, helping in long-distance transmission. distribution of their work. A passive hub simply splits the signal to multiple d) Differentiate between connection-oriented and devices without any amplification or signal connectionless services in table format. regeneration. Connection- a) Define Network Topology. Explain different Feature Connectionless Oriented types of topologies. Requires Network topology is the arrangement of different Setup No setup required connection setup elements (links, nodes) in a computer network. Reliable, ensures Unreliable, no Star Topology:All devices are connected to a Reliability central hub or switch. It's easy to manage, but if the data delivery guarantee of delivery central device fails, the whole network goes down. Slower due to Faster but less Speed Ring Topology:Each device connects to two overhead reliable others, forming a circular data path. Data travels in Example TCP UDP one direction, and a failure in one device can affect the whole network. a) What is networking? Explain different types of Mesh Topology:Every device connects directly to network. every other device. It offers high redundancy and Networking is the process of connecting computers reliability but is expensive and complex to set up. and devices to share resources and information. Tree Topology:Combines characteristics of star Types include LAN (Local Area Network), MAN and bus topologies. It has a root node and branches (Metropolitan Area Network), and WAN (Wide in a hierarchy, making it scalable but dependent on Area Network), each varying in size and coverage the main backbone. area. Hybrid Topology Mixes two or more topologies (e.g., star + ring). It’s flexible and efficient but can be complex and costly to implement. b) Explain function of each layer of ISO-OSI h) What is Hub? reference Model. A hub is a basic networking device that connects Physical – Transmits raw bits over a medium. multiple computers and broadcasts data to all Data Link – Handles error detection and framing. connected devices. Network – Manages addressing and routing. i) What is Standard Ethernet? Transport – Ensures reliable data delivery. Standard Ethernet is a widely used LAN technology Session – Manages sessions between applications. defined by IEEE 802.3, typically using speeds like 10/100/1000 Mbps. Presentation – Translates and encrypts data. j) What is Firewall? Application – Provides network services to users. A firewall is a security system that monitors and c) What is wireless transmission? Explain any two controls incoming and outgoing network traffic media in detail. based on rules. Wireless transmission uses electromagnetic waves to send data without cables. a) Proxy Server Radiowaves: Widely used in broadcasting and Wi- A proxy server acts as an intermediary between a Fi. user and the internet. It helps in content filtering, Microwaves: Used in satellite and mobile. improving performance through caching, and d) Define the bridge. Explain the types of bridge. hiding user IPs for privacy. A bridge is a device used to connect two LANs and b) Fiber Optic Cable filter traffic based on MAC addresses. Fiber optic cables transmit data using light signals Types include:Transparent Bridge: Learns through glass or plastic fibers. They offer high- addresses automatically. speed data transfer, long-distance coverage, and Translational Bridge: Converts one network format resistance to electromagnetic interference. to another. c) IP Addressing a) What is protocol? IP addressing is a system that assigns unique A protocol is a set of rules that define how data is identifiers to devices on a network. It helps in transmitted and received across a network. locating and communicating between devices using b) What is cladding? IPv4 or IPv6 formats. Cladding is the outer optical layer of a fiber optic cable that reflects light back into the core for signal b) Switch transmission. A switch is a networking device that connects c) What is proxy server? multiple devices and forwards data only to the A proxy server acts as an intermediary between a device for which the data is intended, based on user and the internet, providing security, control, MAC addresses. and caching. c) ISO-OSI Reference Model d) What is meant by class test addressing? The OSI model has 7 layers: Physical, Data Link, Classful addressing divides IP addresses into five Network, Transport, Session, Presentation, and classes (A to E) to define network and host portions Application. Each layer handles specific network for routing. functions to ensure smooth communication. e) What is transmission media? d) Line-of-Sight Transmission media is the physical or wireless Line-of-sight refers to a clear, unobstructed path pathway through which data travels from sender to between transmitter and receiver. It is essential for receiver. wireless communication methods like infrared and f) What is internetwork? microwave. An internetwork is a group of interconnected b) Virtual LAN (VLAN) networks that function as a single large network using routers. A VLAN is a logical grouping of devices on different g) Define steganography. physical networks. It improves security and traffic Steganography is the technique of hiding management by isolating broadcast domains within information within other non-secret data, such as a switch. images or text. c) Types of Network in Table Format connects different LANs and sub-networks. It Example carries the majority of traffic. Type Full Form Coverage Area Types include: Use Distributed Backbone – Connects multiple LANs via Local Area Small Connecting LAN routers or switches. Network (office/home) PCs in a lab Collapsed Backbone – Uses a central device (like a Cable TV or router). Metropolitan MAN City-wide city-wide Parallel Backbone – Uses redundant connections Area Network Wi-Fi for reliability. Wide Area Large The Serial Backbone – Simple daisy-chain connection, WAN Network (country/world) Internet not scalable. c) State advantages and disadvantages of LAN, a) Modes of Communication with uses. There are three modes: Simplex (one-way), Half- Advantages: High speed, cost-effective, easy Duplex (both ways but one at a time), and Full- sharing of files/resources, and centralized data. Duplex (both ways simultaneously), depending on Disadvantages: Limited range, security concerns, data flow direction. and difficult troubleshooting in large LANs. b) Bluetooth Architecture Uses: Offices, schools, labs, and buildings where Bluetooth uses a master-slave architecture, where devices are close together. a master device can control up to seven slave d) Explain Ground wave propagation with devices in a piconet. It’s used for short-range diagram. wireless communication. Ground wave propagation is a radio wave c) MAC Sublayer with its Frame Format transmission method where waves travel along the The MAC sublayer (part of Data Link Layer) controls Earth’s surface. how data is placed on the network. The frame It is effective for low-frequency signals (below 2 format includes fields like Preamble, Destination MHz). MAC, Source MAC, Type, Data, and FCS. It is used for AM radio and maritime d) Copyright communications. Copyright protects original works like music, books, It works well over short distances, especially during or software from unauthorized use. It gives creators the daytime. exclusive rights to reproduce, distribute, or modify (Diagram would show wave hugging the Earth’s their work. curvature – can be drawn manually or I can create a) Explain functions of each layer of the ISO-OSI one for you.) reference model? The OSI model has 7 layers: Physical – Transmits raw bits over the medium. Data Link – Ensures error-free data transfer between nodes. Network – Handles routing and addressing of data. Transport – Provides reliable or unreliable delivery. Session – Manages sessions between devices. Presentation – Handles translation, encryption, and compression. Application – Provides network services to end- users. b) What is Backbone Network? Explain types of Backbone network. A Backbone Network is a central infrastructure that a) What are repeaters? Explain different types of a) What is Computer Network? Explain Goals of repeaters. computer Network. A repeater is a device that regenerates and A computer network is a group of interconnected amplifies signals to extend the distance of computers that share resources and communicate. transmission. Goals include: Types: Resource Sharing (files, printers) Analog Repeater – Amplifies analog signals. Communication (email, messaging) Digital Repeater – Regenerates digital signals to Reliability (backup systems) avoid distortion. Scalability (easy to expand) Wireless Repeater – Boosts Wi-Fi signals in a Cost Efficiency (shared software/hardware) wireless network. b) Explain function of each layer of ISO-OSI Optical Repeater – Used in fiber optics to reference model. regenerate light signals. (Already explained in Set 1-a above.) b) What are different modes of communication? c) What is wireless transmission? Explain any one Explain with sketch. media in detail. Simplex – One-way communication (e.g., keyboard Wireless transmission sends data through air using to computer). electromagnetic waves. Half-Duplex – Both ways, but one at a time (e.g., Example – Infrared: walkie-talkie). Used in remote controls and short-range Full-Duplex – Both ways simultaneously (e.g., communication. phone calls). It needs line-of-sight and has limited range but is (Sketch: three diagrams showing arrows for interference-free. direction of communication.) d) Explain IEEE standard 802.11 (WLAN) in detail. c) What is security services? Explain security IEEE 802.11 defines standards for wireless LANs mechanisms to provide the services. (Wi-Fi). Security services protect data from unauthorized It includes variants like 802.11a/b/g/n/ac/ax, each access, alteration, and disruption. offering different speeds and frequencies. Examples: Confidentiality, Integrity, It uses CSMA/CA for access control. Authentication, Non-repudiation. 802.11 enables wireless networking in homes, Mechanisms: cafes, offices, and public areas. Encryption – Protects data in transit. e) What is attack? Explain various types of attacks. Digital Signatures – Ensures authenticity. An attack is an unauthorized attempt to access, Firewalls – Filter incoming/outgoing traffic. steal, or damage data. Access Control – Grants permissions based on Types include: identity. Passive Attack – Eavesdropping without altering d) Explain Bluetooth in detail. data. Bluetooth is a wireless technology used for short- Active Attack – Altering or destroying data. range communication between devices. Phishing – Tricking users to reveal personal data. It uses the 2.4 GHz frequency and forms a piconet DoS Attack – Flooding systems to make them with one master and up to seven slaves. unavailable. It supports both data and voice transmission. Bluetooth is used in wireless headphones, smartwatches, and IoT devices. It offers low power consumption and reasonable data rates (~1–3 Mbps). a) What is Computer Network? Explain Goals of Cost savings computer Network. High reliability and scalability A computer network is a group of interconnected b) What is attack? Explain various types of attack. computers that share resources and communicate. An attack is an attempt to harm or gain Goals include: unauthorized access to a network or data. Resource Sharing (files, printers) Types include: Communication (email, messaging) Passive Attack – Eavesdropping on communication Reliability (backup systems) Active Attack – Modifying or disrupting data Scalability (easy to expand) Phishing – Tricking users to reveal sensitive info Cost Efficiency (shared software/hardware) DoS (Denial of Service) – Overloading a system to b) Explain function of each layer of ISO-OSI make it unavailable reference model. c) What is gateway? Explain various levels of (Already explained in Set 1-a above.) gateways. c) What is wireless transmission? Explain any one A gateway is a network device that connects media in detail. different network protocols and architectures. Wireless transmission sends data through air using It works at all layers of the OSI model. electromagnetic waves. Levels of gateways: Example – Infrared: Application-level – Converts data formats (e.g., Used in remote controls and short-range email gateways) communication. Transport-level – Handles different transport It needs line-of-sight and has limited range but is protocols interference-free. Network-level – Interconnects networks with d) Explain IEEE standard 802.11 (WLAN) in detail. different addressing systems IEEE 802.11 defines standards for wireless LANs d) What is NLAN? What are the features of VLAN? (Wi-Fi). NLAN isn't a standard term—likely a typo for LAN It includes variants like 802.11a/b/g/n/ac/ax, each or VLAN. offering different speeds and frequencies. VLAN (Virtual LAN) groups devices logically rather It uses CSMA/CA for access control. than physically. 802.11 enables wireless networking in homes, Features: cafes, offices, and public areas. Reduces broadcast traffic e) What is attack? Explain various types of attacks. Improves security by isolating groups An attack is an unauthorized attempt to access, Easier network management steal, or damage data. Flexibility in configuration Types include: Each VLAN acts like a separate LAN Passive Attack – Eavesdropping without altering a) What is Bridge? Explain types of bridges. data. A bridge connects two similar LANs to make them Active Attack – Altering or destroying data. act as one. Phishing – Tricking users to reveal personal data. It works at the Data Link layer and filters traffic DoS Attack – Flooding systems to make them using MAC addresses. unavailable. Types: a) Define computer network? Explain goals of Transparent Bridge – Learns MAC addresses and computer network. forwards accordingly A computer network is a group of interconnected Source Routing Bridge – Uses source-determined computers and devices that share data and routes resources. Translational Bridge – Connects networks using Goals include: different protocols Sharing hardware and software resources Faster and efficient communication Centralized data management b) Explain different modes of communication with b) Compare connection-oriented and sketch. connectionless services. Modes: Feature Connection-Oriented Connectionless Simplex – One-way only (e.g., TV broadcast) Setup Half-Duplex – Both ways, but one at a time (e.g., Yes No Required walkie-talkie) Full-Duplex – Both ways at the same time (e.g., High (uses Reliability Less reliable phone call) acknowledgments) (Sketch shows arrows: one-way for simplex, two- Protocol TCP UDP way alternating for half-duplex, and two-way Example simultaneous for full-duplex.) Suitable Streaming, c) Explain TCP/IP protocol in detail. File transfer, emails For VoIP TCP/IP is a 4-layer model used for network d) What is Ethernet? What are its types? Explain communication. any one in detail. Application Layer – Handles services like HTTP, FTP, Ethernet is a widely used LAN technology using DNS CSMA/CD for access control. Transport Layer – TCP ensures reliable delivery, Types: UDP for fast delivery Standard (10 Mbps), Internet Layer – Handles addressing and routing (IP Fast (100 Mbps), protocol) Gigabit (1 Gbps), Network Access Layer – Manages physical 10-Gigabit transmission and framing Fast Ethernet (100BASE-TX) uses Cat5 cables and d) What is guided media? Explain any one in operates at 100 Mbps. It’s widely used in office detail. LANs. Guided media refers to transmission through a e) Differentiate between fiber optic and twisted physical medium like cables. pair cable. Example – Twisted Pair Cable: Made of twisted wire pairs to reduce interference. Feature Fiber Optic Twisted Pair Used in telephone lines and LANs. Light through Electrical signals Medium It’s cheap and easy to install, but prone to signal glass/plastic through copper loss over long distances. Speed Very high Moderate a) Draw TCP/IP model and state the function of Cost Expensive Cheaper each layer. The TCP/IP model has four layers: Distance Long distances Short distances Application – Provides network services to users Support Transport – Ensures reliable communication (TCP) Prone to or fast transmission (UDP) Interference Immune interference Internet – Handles addressing and routing of packets (IP) Network Access – Deals with hardware and media transmission (Diagram: Stack with Application at top, Network Access at bottom) a) What is standard? What is their need? Explain Active Hub – Regenerates and strengthens the the two types of standard. signal before sending. A standard is an agreed-upon set of rules for Intelligent Hub – Has management features like hardware or software operation. monitoring and configuration. Need: Ensures compatibility, interoperability, and c) Explain Bluetooth architecture in detail uniform communication. Bluetooth uses a master-slave architecture where Types: one device acts as a master and others as slaves. De facto – Widely used but not officially approved The basic unit is a piconet, which can include up to (e.g., HTML) 7 active devices. De jure – Officially approved by recognized Multiple piconets form a scatternet. organizations (e.g., IEEE, ISO) It operates in the 2.4 GHz ISM band. b) What is Fast Ethernet? Explain categories of Protocols include L2CAP, RFCOMM, and SDP for Fast Ethernet. data exchange and service discovery. Fast Ethernet supports speeds up to 100 Mbps. d) Explain different modes of communication It’s a significant improvement over traditional 10 Communication modes refer to the direction of Mbps Ethernet. signal flow between two devices: Categories: Simplex – Data flows in one direction only (e.g., 100BASE-TX (uses two pairs of Cat5 UTP cables) keyboard to CPU). 100BASE-FX (uses fiber optics) Half-Duplex – Data flows both ways, but only one 100BASE-T4 (uses four pairs of Cat3 UTP, now direction at a time (e.g., walkie-talkies). outdated) Full-Duplex – Data flows simultaneously in both c) Explain server-based and peer-to-peer LANs. directions (e.g., telephone). In a server-based LAN, one or more servers a) What is attack? Explain various types of attacks manage resources and clients request access. An attack is any attempt to access, modify, or It provides centralized control and better security. destroy information without authorization. In a peer-to-peer LAN, all devices act as both Types of attacks: clients and servers. Passive Attack – Eavesdropping or monitoring data It’s simple and cost-effective, but less secure and (e.g., traffic analysis). harder to manage for large networks. Active Attack – Modifying data or disrupting services (e.g., DoS attacks). a) Explain TCP/IP protocol in detail Phishing – Tricking users into revealing personal The TCP/IP protocol suite is a four-layer model information. used for communication over the internet. Man-in-the-Middle (MITM) – Intercepting Application Layer provides user services like email, communication between two parties. HTTP, FTP. b) Explain wireless transmission. Explain any one Transport Layer ensures reliable delivery using TCP media in detail or faster delivery using UDP. Wireless transmission uses electromagnetic waves Internet Layer manages addressing and routing to send data through the air. with IP. It includes radio waves, microwaves, and infrared. Network Access Layer handles data transmission Example – Radio Waves: through hardware. Used for long-distance communication like radio, b) What is HUB? Explain types of HUB TV, and mobile phones. A hub is a networking device that connects multiple They can pass through walls and are computers in a LAN. It broadcasts data to all omnidirectional. connected devices. Types of Hubs: Passive Hub – Simply connects wires without signal amplification. c) What is addressing? Explain different types of Feature OSI Model TCP/IP Model addresses Layers 7 4 Addressing identifies devices in a network for communication. Developed ISO DARPA Types: By MAC Address – Hardware-based, unique to each Approach Theoretical Practical device. Layer Session, Combined in IP Address – Logical address for routing (IPv4/IPv6). Example Presentation Application Port Address – Identifies specific processes or Real-world services. Usage Reference implementation URL – Identifies resources on the web. d) Explain IEEE standard 802.11 (WLAN) in details IEEE 802.11 defines standards for wireless local c) What is cryptography? Explain encryption and area networks (Wi-Fi). decryption process It operates in 2.4 GHz and 5 GHz bands. Cryptography is the practice of secure Popular versions include: communication by converting data into unreadable 802.11a – 5 GHz, up to 54 Mbps formats. 802.11b/g/n/ac/ax – Improvements in speed and Encryption is the process of converting plain text frequency usage into cipher text using a key. Uses CSMA/CA for access control and supports Decryption is the reverse—turning cipher text back roaming and encryption. into readable data. a) What is topology? Explain types of topology It ensures confidentiality, data integrity, and Topology refers to the layout of devices in a authentication. network. d) Explain Fiber optic cable in detail Types: Fiber optic cable uses light signals to transmit data Bus Topology – Single backbone cable, easy but through thin glass or plastic fibers. prone to failure It offers high bandwidth, low signal loss, and is Star Topology – All devices connected to a central immune to electromagnetic interference. hub, easy to manage Used in internet backbones, long-distance Ring Topology – Devices connected in a loop, data communication, and high-speed networks. flows in one direction There are two types: single-mode (long distance) Mesh Topology – Every device connects to every and multi-mode (shorter distances). other, very reliable c) Explain propagation method Tree Topology – Hybrid of star and bus, used in Propagation refers to how signals travel from large networks sender to receiver in wireless communication. Types: a) Explain IEEE standard 802.11 in detail Ground Wave – Travels along Earth’s surface, used The IEEE 802.11 standard defines wireless LAN for AM radio protocols. Sky Wave – Reflected by the ionosphere, used for It allows wireless devices to communicate and long-range HF radio access the internet. Line-of-Sight – Direct path, used in microwave and Variants include: satellite communication 802.11b (11 Mbps), g (54 Mbps), n (up to 600 Mbps), ac (Gigabit), and ax (Wi-Fi 6, improved capacity and speed). Uses encryption like WPA2/WPA3 for security. b) Compare ISO-OSI reference model and TCP/IP model d) What is copyright? Explain applications of 3. What is Standard? What is their need? Explain copyright two types of standards. Copyright is a legal protection given to creators of A standard is an agreed-upon specification used to original works like books, software, and music. ensure compatibility and uniformity. It prevents others from copying or distributing the They are needed for interoperability, safety, and work without permission. reliability across devices and networks. Applications: Types: Protecting software code De facto Standard – Accepted by usage (e.g., Ensuring royalties for musicians and authors HTML) Safeguarding digital content like videos, graphics, De jure Standard – Officially approved by and articles organizations (e.g., IEEE 802.3 for Ethernet) e) What is Bluetooth? Explain its architecture Bluetooth is a short-range wireless communication 4. What is Fast Ethernet? Explain categories of Fast technology. Ethernet. It uses a master-slave architecture, where one Fast Ethernet is a version of Ethernet that supports device controls the rest in a piconet. data speeds of 100 Mbps. Multiple piconets form a scatternet. It uses Cat5 cables and follows the IEEE 802.3u It includes layers like L2CAP, Baseband, and HCI for standard. managing data flow. Categories: It operates in the 2.4 GHz ISM band with frequency 100BASE-TX – Most common, uses twisted pair hopping to reduce interference. 100BASE-FX – Uses fiber optic cables 1. What is Gateway? Explain various levels of 100BASE-T4 – Uses four pairs of Category 3 UTP gateways. A gateway is a network device that connects two 5. Server-based and Peer-to-Peer LANs different networks using different protocols. It Server-based LAN has a central server that operates at various layers of the OSI model. manages resources and security. It's suitable for Levels of gateways: large networks. Application-level Gateway – Works at the Peer-to-Peer LAN has no central authority; all application layer (e.g., email gateway). computers share resources equally. Network-level Gateway – Translates IP packets Comparison: between networks. Server-based offers better control and security Protocol-converting Gateway – Converts between Peer-to-peer is cheaper and easier to set up different communication protocols. Server-based is scalable; peer-to-peer is limited to small setups 2. What is NLAN? What are the features of VLAN? NLAN usually refers to a Normal Local Area 6. What is Bridge? Explain types of bridges. Network – a traditional LAN setup. A bridge connects and filters traffic between two A VLAN (Virtual LAN) logically groups devices from LAN segments at the data link layer. different physical LANs. It reduces network traffic and collisions. Features of VLAN: Types: Improves network efficiency by reducing broadcast Transparent Bridge – Learns MAC addresses and traffic forwards frames Enhances security by segmenting networks Source Routing Bridge – Uses routing info in the Offers better management and scalability frame Allows flexible device grouping regardless of Translational Bridge – Connects different network location types (e.g., Ethernet to Token Ring) 7. Draw TCP/IP model and state the function of each layer. TCP/IP Model Layers: Application Layer – Supports services like HTTP, FTP, DNS Transport Layer – Manages reliable or fast delivery (TCP/UDP) Internet Layer – Handles addressing and routing using IP Network Access Layer – Deals with physical transmission of data (You can draw a 4-layer stacked diagram labeled as above)
8. What is Router? Explain its components.
A router is a network device that forwards data packets between networks using IP addresses. Components: CPU – Controls routing logic RAM/ROM – Stores running configurations and OS Routing Table – Keeps paths to various networks Interfaces (Ports) – Connects to LAN/WAN Routers operate at the network layer and use protocols like RIP, OSPF.