0% found this document useful (0 votes)
15 views10 pages

ENDSEMNW

Unguided media refers to wireless communication using radio waves, microwaves, and infrared for signal transmission without physical mediums. TCP/IP protocol consists of various layers, each with specific functions like data transmission, routing, and user services. The document also covers concepts like switches, copyright, network topologies, and security mechanisms in networking.

Uploaded by

isnehanagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views10 pages

ENDSEMNW

Unguided media refers to wireless communication using radio waves, microwaves, and infrared for signal transmission without physical mediums. TCP/IP protocol consists of various layers, each with specific functions like data transmission, routing, and user services. The document also covers concepts like switches, copyright, network topologies, and security mechanisms in networking.

Uploaded by

isnehanagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

a) What is unguided media?

Explain types of b) Explain TCP/IP protocol in details in table


unguided media. format.
Unguided media refers to wireless communication Layer Protocols Functions
where signals are transmitted through the air. It
HTTP, FTP, User services like
does not use any physical medium. The types Application
SMTP browsing and email
include radio waves, microwaves, and infrared,
each with different frequencies and transmission Ensures
ranges. Transport TCP, UDP reliable/unreliable data
b) What is a switch? How does it differ from a transmission
hub? Internet IP, ICMP Routing and addressing
A switch is a network device that connects devices Network Ethernet, Physical data
and filters traffic based on MAC addresses. Unlike a Access ARP transmission
hub, which broadcasts data to all ports, a switch
c) What is guided media? Explain types of guided
sends data only to the intended recipient,
media.
improving efficiency and reducing collisions.
Guided media uses physical paths like cables for
c) What is copyright? Explain applications of
data transmission. Types include twisted pair cable
copyright.
(used in LAN), coaxial cable (used in TV networks),
Copyright is a legal right that protects original
and fiber optic cable (for high-speed internet and
works of authorship like books, music, and
long-distance communication).
software. Its applications include protecting
d) Explain Active and Passive Hub.
intellectual property, ensuring creators get
An active hub amplifies the incoming signal before
recognition, and controlling reproduction and
forwarding it, helping in long-distance transmission.
distribution of their work.
A passive hub simply splits the signal to multiple
d) Differentiate between connection-oriented and
devices without any amplification or signal
connectionless services in table format.
regeneration.
Connection- a) Define Network Topology. Explain different
Feature Connectionless
Oriented types of topologies.
Requires Network topology is the arrangement of different
Setup No setup required
connection setup elements (links, nodes) in a computer network.
Reliable, ensures Unreliable, no Star Topology:All devices are connected to a
Reliability central hub or switch. It's easy to manage, but if the
data delivery guarantee of delivery
central device fails, the whole network goes down.
Slower due to Faster but less
Speed Ring Topology:Each device connects to two
overhead reliable
others, forming a circular data path. Data travels in
Example TCP UDP one direction, and a failure in one device can affect
the whole network.
a) What is networking? Explain different types of Mesh Topology:Every device connects directly to
network. every other device. It offers high redundancy and
Networking is the process of connecting computers reliability but is expensive and complex to set up.
and devices to share resources and information. Tree Topology:Combines characteristics of star
Types include LAN (Local Area Network), MAN and bus topologies. It has a root node and branches
(Metropolitan Area Network), and WAN (Wide in a hierarchy, making it scalable but dependent on
Area Network), each varying in size and coverage the main backbone.
area. Hybrid Topology
Mixes two or more topologies (e.g., star + ring). It’s
flexible and efficient but can be complex and costly
to implement.
b) Explain function of each layer of ISO-OSI h) What is Hub?
reference Model. A hub is a basic networking device that connects
Physical – Transmits raw bits over a medium. multiple computers and broadcasts data to all
Data Link – Handles error detection and framing. connected devices.
Network – Manages addressing and routing. i) What is Standard Ethernet?
Transport – Ensures reliable data delivery. Standard Ethernet is a widely used LAN technology
Session – Manages sessions between applications. defined by IEEE 802.3, typically using speeds like
10/100/1000 Mbps.
Presentation – Translates and encrypts data.
j) What is Firewall?
Application – Provides network services to users.
A firewall is a security system that monitors and
c) What is wireless transmission? Explain any two controls incoming and outgoing network traffic
media in detail. based on rules.
Wireless transmission uses electromagnetic waves
to send data without cables. a) Proxy Server
Radiowaves: Widely used in broadcasting and Wi- A proxy server acts as an intermediary between a
Fi. user and the internet. It helps in content filtering,
Microwaves: Used in satellite and mobile. improving performance through caching, and
d) Define the bridge. Explain the types of bridge. hiding user IPs for privacy.
A bridge is a device used to connect two LANs and b) Fiber Optic Cable
filter traffic based on MAC addresses. Fiber optic cables transmit data using light signals
Types include:Transparent Bridge: Learns through glass or plastic fibers. They offer high-
addresses automatically. speed data transfer, long-distance coverage, and
Translational Bridge: Converts one network format resistance to electromagnetic interference.
to another. c) IP Addressing
a) What is protocol? IP addressing is a system that assigns unique
A protocol is a set of rules that define how data is identifiers to devices on a network. It helps in
transmitted and received across a network.
locating and communicating between devices using
b) What is cladding?
IPv4 or IPv6 formats.
Cladding is the outer optical layer of a fiber optic
cable that reflects light back into the core for signal b) Switch
transmission. A switch is a networking device that connects
c) What is proxy server? multiple devices and forwards data only to the
A proxy server acts as an intermediary between a device for which the data is intended, based on
user and the internet, providing security, control, MAC addresses.
and caching. c) ISO-OSI Reference Model
d) What is meant by class test addressing? The OSI model has 7 layers: Physical, Data Link,
Classful addressing divides IP addresses into five Network, Transport, Session, Presentation, and
classes (A to E) to define network and host portions Application. Each layer handles specific network
for routing. functions to ensure smooth communication.
e) What is transmission media? d) Line-of-Sight
Transmission media is the physical or wireless Line-of-sight refers to a clear, unobstructed path
pathway through which data travels from sender to between transmitter and receiver. It is essential for
receiver. wireless communication methods like infrared and
f) What is internetwork?
microwave.
An internetwork is a group of interconnected
b) Virtual LAN (VLAN)
networks that function as a single large network
using routers. A VLAN is a logical grouping of devices on different
g) Define steganography. physical networks. It improves security and traffic
Steganography is the technique of hiding management by isolating broadcast domains within
information within other non-secret data, such as a switch.
images or text.
c) Types of Network in Table Format connects different LANs and sub-networks. It
Example carries the majority of traffic.
Type Full Form Coverage Area Types include:
Use
Distributed Backbone – Connects multiple LANs via
Local Area Small Connecting
LAN routers or switches.
Network (office/home) PCs in a lab
Collapsed Backbone – Uses a central device (like a
Cable TV or router).
Metropolitan
MAN City-wide city-wide Parallel Backbone – Uses redundant connections
Area Network
Wi-Fi for reliability.
Wide Area Large The Serial Backbone – Simple daisy-chain connection,
WAN
Network (country/world) Internet not scalable.
c) State advantages and disadvantages of LAN,
a) Modes of Communication with uses.
There are three modes: Simplex (one-way), Half- Advantages: High speed, cost-effective, easy
Duplex (both ways but one at a time), and Full- sharing of files/resources, and centralized data.
Duplex (both ways simultaneously), depending on Disadvantages: Limited range, security concerns,
data flow direction. and difficult troubleshooting in large LANs.
b) Bluetooth Architecture Uses: Offices, schools, labs, and buildings where
Bluetooth uses a master-slave architecture, where devices are close together.
a master device can control up to seven slave d) Explain Ground wave propagation with
devices in a piconet. It’s used for short-range diagram.
wireless communication. Ground wave propagation is a radio wave
c) MAC Sublayer with its Frame Format transmission method where waves travel along the
The MAC sublayer (part of Data Link Layer) controls Earth’s surface.
how data is placed on the network. The frame It is effective for low-frequency signals (below 2
format includes fields like Preamble, Destination MHz).
MAC, Source MAC, Type, Data, and FCS. It is used for AM radio and maritime
d) Copyright communications.
Copyright protects original works like music, books, It works well over short distances, especially during
or software from unauthorized use. It gives creators the daytime.
exclusive rights to reproduce, distribute, or modify (Diagram would show wave hugging the Earth’s
their work. curvature – can be drawn manually or I can create
a) Explain functions of each layer of the ISO-OSI one for you.)
reference model?
The OSI model has 7 layers:
Physical – Transmits raw bits over the medium.
Data Link – Ensures error-free data transfer
between nodes.
Network – Handles routing and addressing of data.
Transport – Provides reliable or unreliable delivery.
Session – Manages sessions between devices.
Presentation – Handles translation, encryption, and
compression.
Application – Provides network services to end-
users.
b) What is Backbone Network? Explain types of
Backbone network.
A Backbone Network is a central infrastructure that
a) What are repeaters? Explain different types of a) What is Computer Network? Explain Goals of
repeaters. computer Network.
A repeater is a device that regenerates and A computer network is a group of interconnected
amplifies signals to extend the distance of computers that share resources and communicate.
transmission. Goals include:
Types: Resource Sharing (files, printers)
Analog Repeater – Amplifies analog signals. Communication (email, messaging)
Digital Repeater – Regenerates digital signals to Reliability (backup systems)
avoid distortion. Scalability (easy to expand)
Wireless Repeater – Boosts Wi-Fi signals in a Cost Efficiency (shared software/hardware)
wireless network. b) Explain function of each layer of ISO-OSI
Optical Repeater – Used in fiber optics to reference model.
regenerate light signals. (Already explained in Set 1-a above.)
b) What are different modes of communication? c) What is wireless transmission? Explain any one
Explain with sketch. media in detail.
Simplex – One-way communication (e.g., keyboard Wireless transmission sends data through air using
to computer). electromagnetic waves.
Half-Duplex – Both ways, but one at a time (e.g., Example – Infrared:
walkie-talkie). Used in remote controls and short-range
Full-Duplex – Both ways simultaneously (e.g., communication.
phone calls). It needs line-of-sight and has limited range but is
(Sketch: three diagrams showing arrows for interference-free.
direction of communication.) d) Explain IEEE standard 802.11 (WLAN) in detail.
c) What is security services? Explain security IEEE 802.11 defines standards for wireless LANs
mechanisms to provide the services. (Wi-Fi).
Security services protect data from unauthorized It includes variants like 802.11a/b/g/n/ac/ax, each
access, alteration, and disruption. offering different speeds and frequencies.
Examples: Confidentiality, Integrity, It uses CSMA/CA for access control.
Authentication, Non-repudiation. 802.11 enables wireless networking in homes,
Mechanisms: cafes, offices, and public areas.
Encryption – Protects data in transit. e) What is attack? Explain various types of attacks.
Digital Signatures – Ensures authenticity. An attack is an unauthorized attempt to access,
Firewalls – Filter incoming/outgoing traffic. steal, or damage data.
Access Control – Grants permissions based on Types include:
identity. Passive Attack – Eavesdropping without altering
d) Explain Bluetooth in detail. data.
Bluetooth is a wireless technology used for short- Active Attack – Altering or destroying data.
range communication between devices. Phishing – Tricking users to reveal personal data.
It uses the 2.4 GHz frequency and forms a piconet DoS Attack – Flooding systems to make them
with one master and up to seven slaves. unavailable.
It supports both data and voice transmission.
Bluetooth is used in wireless headphones,
smartwatches, and IoT devices.
It offers low power consumption and reasonable
data rates (~1–3 Mbps).
a) What is Computer Network? Explain Goals of Cost savings
computer Network. High reliability and scalability
A computer network is a group of interconnected b) What is attack? Explain various types of attack.
computers that share resources and communicate. An attack is an attempt to harm or gain
Goals include: unauthorized access to a network or data.
Resource Sharing (files, printers) Types include:
Communication (email, messaging) Passive Attack – Eavesdropping on communication
Reliability (backup systems) Active Attack – Modifying or disrupting data
Scalability (easy to expand) Phishing – Tricking users to reveal sensitive info
Cost Efficiency (shared software/hardware) DoS (Denial of Service) – Overloading a system to
b) Explain function of each layer of ISO-OSI make it unavailable
reference model. c) What is gateway? Explain various levels of
(Already explained in Set 1-a above.) gateways.
c) What is wireless transmission? Explain any one A gateway is a network device that connects
media in detail. different network protocols and architectures.
Wireless transmission sends data through air using It works at all layers of the OSI model.
electromagnetic waves. Levels of gateways:
Example – Infrared: Application-level – Converts data formats (e.g.,
Used in remote controls and short-range email gateways)
communication. Transport-level – Handles different transport
It needs line-of-sight and has limited range but is protocols
interference-free. Network-level – Interconnects networks with
d) Explain IEEE standard 802.11 (WLAN) in detail. different addressing systems
IEEE 802.11 defines standards for wireless LANs d) What is NLAN? What are the features of VLAN?
(Wi-Fi). NLAN isn't a standard term—likely a typo for LAN
It includes variants like 802.11a/b/g/n/ac/ax, each or VLAN.
offering different speeds and frequencies. VLAN (Virtual LAN) groups devices logically rather
It uses CSMA/CA for access control. than physically.
802.11 enables wireless networking in homes, Features:
cafes, offices, and public areas. Reduces broadcast traffic
e) What is attack? Explain various types of attacks. Improves security by isolating groups
An attack is an unauthorized attempt to access, Easier network management
steal, or damage data. Flexibility in configuration
Types include: Each VLAN acts like a separate LAN
Passive Attack – Eavesdropping without altering a) What is Bridge? Explain types of bridges.
data. A bridge connects two similar LANs to make them
Active Attack – Altering or destroying data. act as one.
Phishing – Tricking users to reveal personal data. It works at the Data Link layer and filters traffic
DoS Attack – Flooding systems to make them using MAC addresses.
unavailable. Types:
a) Define computer network? Explain goals of Transparent Bridge – Learns MAC addresses and
computer network. forwards accordingly
A computer network is a group of interconnected Source Routing Bridge – Uses source-determined
computers and devices that share data and routes
resources. Translational Bridge – Connects networks using
Goals include: different protocols
Sharing hardware and software resources
Faster and efficient communication
Centralized data management
b) Explain different modes of communication with b) Compare connection-oriented and
sketch. connectionless services.
Modes: Feature Connection-Oriented Connectionless
Simplex – One-way only (e.g., TV broadcast)
Setup
Half-Duplex – Both ways, but one at a time (e.g., Yes No
Required
walkie-talkie)
Full-Duplex – Both ways at the same time (e.g., High (uses
Reliability Less reliable
phone call) acknowledgments)
(Sketch shows arrows: one-way for simplex, two- Protocol
TCP UDP
way alternating for half-duplex, and two-way Example
simultaneous for full-duplex.) Suitable Streaming,
c) Explain TCP/IP protocol in detail. File transfer, emails
For VoIP
TCP/IP is a 4-layer model used for network
d) What is Ethernet? What are its types? Explain
communication.
any one in detail.
Application Layer – Handles services like HTTP, FTP,
Ethernet is a widely used LAN technology using
DNS
CSMA/CD for access control.
Transport Layer – TCP ensures reliable delivery,
Types:
UDP for fast delivery
Standard (10 Mbps),
Internet Layer – Handles addressing and routing (IP
Fast (100 Mbps),
protocol)
Gigabit (1 Gbps),
Network Access Layer – Manages physical
10-Gigabit
transmission and framing
Fast Ethernet (100BASE-TX) uses Cat5 cables and
d) What is guided media? Explain any one in
operates at 100 Mbps. It’s widely used in office
detail.
LANs.
Guided media refers to transmission through a
e) Differentiate between fiber optic and twisted
physical medium like cables.
pair cable.
Example – Twisted Pair Cable:
Made of twisted wire pairs to reduce interference. Feature Fiber Optic Twisted Pair
Used in telephone lines and LANs. Light through Electrical signals
Medium
It’s cheap and easy to install, but prone to signal glass/plastic through copper
loss over long distances. Speed Very high Moderate
a) Draw TCP/IP model and state the function of
Cost Expensive Cheaper
each layer.
The TCP/IP model has four layers: Distance
Long distances Short distances
Application – Provides network services to users Support
Transport – Ensures reliable communication (TCP) Prone to
or fast transmission (UDP) Interference Immune
interference
Internet – Handles addressing and routing of
packets (IP)
Network Access – Deals with hardware and media
transmission
(Diagram: Stack with Application at top, Network
Access at bottom)
a) What is standard? What is their need? Explain Active Hub – Regenerates and strengthens the
the two types of standard. signal before sending.
A standard is an agreed-upon set of rules for Intelligent Hub – Has management features like
hardware or software operation. monitoring and configuration.
Need: Ensures compatibility, interoperability, and c) Explain Bluetooth architecture in detail
uniform communication. Bluetooth uses a master-slave architecture where
Types: one device acts as a master and others as slaves.
De facto – Widely used but not officially approved The basic unit is a piconet, which can include up to
(e.g., HTML) 7 active devices.
De jure – Officially approved by recognized Multiple piconets form a scatternet.
organizations (e.g., IEEE, ISO) It operates in the 2.4 GHz ISM band.
b) What is Fast Ethernet? Explain categories of Protocols include L2CAP, RFCOMM, and SDP for
Fast Ethernet. data exchange and service discovery.
Fast Ethernet supports speeds up to 100 Mbps. d) Explain different modes of communication
It’s a significant improvement over traditional 10 Communication modes refer to the direction of
Mbps Ethernet. signal flow between two devices:
Categories: Simplex – Data flows in one direction only (e.g.,
100BASE-TX (uses two pairs of Cat5 UTP cables) keyboard to CPU).
100BASE-FX (uses fiber optics) Half-Duplex – Data flows both ways, but only one
100BASE-T4 (uses four pairs of Cat3 UTP, now direction at a time (e.g., walkie-talkies).
outdated) Full-Duplex – Data flows simultaneously in both
c) Explain server-based and peer-to-peer LANs. directions (e.g., telephone).
In a server-based LAN, one or more servers a) What is attack? Explain various types of attacks
manage resources and clients request access. An attack is any attempt to access, modify, or
It provides centralized control and better security. destroy information without authorization.
In a peer-to-peer LAN, all devices act as both Types of attacks:
clients and servers. Passive Attack – Eavesdropping or monitoring data
It’s simple and cost-effective, but less secure and (e.g., traffic analysis).
harder to manage for large networks. Active Attack – Modifying data or disrupting
services (e.g., DoS attacks).
a) Explain TCP/IP protocol in detail Phishing – Tricking users into revealing personal
The TCP/IP protocol suite is a four-layer model information.
used for communication over the internet. Man-in-the-Middle (MITM) – Intercepting
Application Layer provides user services like email, communication between two parties.
HTTP, FTP. b) Explain wireless transmission. Explain any one
Transport Layer ensures reliable delivery using TCP media in detail
or faster delivery using UDP. Wireless transmission uses electromagnetic waves
Internet Layer manages addressing and routing to send data through the air.
with IP. It includes radio waves, microwaves, and infrared.
Network Access Layer handles data transmission Example – Radio Waves:
through hardware. Used for long-distance communication like radio,
b) What is HUB? Explain types of HUB TV, and mobile phones.
A hub is a networking device that connects multiple They can pass through walls and are
computers in a LAN. It broadcasts data to all omnidirectional.
connected devices.
Types of Hubs:
Passive Hub – Simply connects wires without signal
amplification.
c) What is addressing? Explain different types of Feature OSI Model TCP/IP Model
addresses
Layers 7 4
Addressing identifies devices in a network for
communication. Developed
ISO DARPA
Types: By
MAC Address – Hardware-based, unique to each Approach Theoretical Practical
device. Layer Session, Combined in
IP Address – Logical address for routing (IPv4/IPv6). Example Presentation Application
Port Address – Identifies specific processes or
Real-world
services. Usage Reference
implementation
URL – Identifies resources on the web.
d) Explain IEEE standard 802.11 (WLAN) in details
IEEE 802.11 defines standards for wireless local c) What is cryptography? Explain encryption and
area networks (Wi-Fi). decryption process
It operates in 2.4 GHz and 5 GHz bands. Cryptography is the practice of secure
Popular versions include: communication by converting data into unreadable
802.11a – 5 GHz, up to 54 Mbps formats.
802.11b/g/n/ac/ax – Improvements in speed and Encryption is the process of converting plain text
frequency usage into cipher text using a key.
Uses CSMA/CA for access control and supports Decryption is the reverse—turning cipher text back
roaming and encryption. into readable data.
a) What is topology? Explain types of topology It ensures confidentiality, data integrity, and
Topology refers to the layout of devices in a authentication.
network. d) Explain Fiber optic cable in detail
Types: Fiber optic cable uses light signals to transmit data
Bus Topology – Single backbone cable, easy but through thin glass or plastic fibers.
prone to failure It offers high bandwidth, low signal loss, and is
Star Topology – All devices connected to a central immune to electromagnetic interference.
hub, easy to manage Used in internet backbones, long-distance
Ring Topology – Devices connected in a loop, data communication, and high-speed networks.
flows in one direction There are two types: single-mode (long distance)
Mesh Topology – Every device connects to every and multi-mode (shorter distances).
other, very reliable c) Explain propagation method
Tree Topology – Hybrid of star and bus, used in Propagation refers to how signals travel from
large networks sender to receiver in wireless communication.
Types:
a) Explain IEEE standard 802.11 in detail Ground Wave – Travels along Earth’s surface, used
The IEEE 802.11 standard defines wireless LAN for AM radio
protocols. Sky Wave – Reflected by the ionosphere, used for
It allows wireless devices to communicate and long-range HF radio
access the internet. Line-of-Sight – Direct path, used in microwave and
Variants include: satellite communication
802.11b (11 Mbps), g (54 Mbps), n (up to 600
Mbps),
ac (Gigabit), and ax (Wi-Fi 6, improved capacity and
speed).
Uses encryption like WPA2/WPA3 for security.
b) Compare ISO-OSI reference model and TCP/IP
model
d) What is copyright? Explain applications of 3. What is Standard? What is their need? Explain
copyright two types of standards.
Copyright is a legal protection given to creators of A standard is an agreed-upon specification used to
original works like books, software, and music. ensure compatibility and uniformity.
It prevents others from copying or distributing the They are needed for interoperability, safety, and
work without permission. reliability across devices and networks.
Applications: Types:
Protecting software code De facto Standard – Accepted by usage (e.g.,
Ensuring royalties for musicians and authors HTML)
Safeguarding digital content like videos, graphics, De jure Standard – Officially approved by
and articles organizations (e.g., IEEE 802.3 for Ethernet)
e) What is Bluetooth? Explain its architecture
Bluetooth is a short-range wireless communication 4. What is Fast Ethernet? Explain categories of Fast
technology. Ethernet.
It uses a master-slave architecture, where one Fast Ethernet is a version of Ethernet that supports
device controls the rest in a piconet. data speeds of 100 Mbps.
Multiple piconets form a scatternet. It uses Cat5 cables and follows the IEEE 802.3u
It includes layers like L2CAP, Baseband, and HCI for standard.
managing data flow. Categories:
It operates in the 2.4 GHz ISM band with frequency 100BASE-TX – Most common, uses twisted pair
hopping to reduce interference. 100BASE-FX – Uses fiber optic cables
1. What is Gateway? Explain various levels of 100BASE-T4 – Uses four pairs of Category 3 UTP
gateways.
A gateway is a network device that connects two 5. Server-based and Peer-to-Peer LANs
different networks using different protocols. It Server-based LAN has a central server that
operates at various layers of the OSI model. manages resources and security. It's suitable for
Levels of gateways: large networks.
Application-level Gateway – Works at the Peer-to-Peer LAN has no central authority; all
application layer (e.g., email gateway). computers share resources equally.
Network-level Gateway – Translates IP packets Comparison:
between networks. Server-based offers better control and security
Protocol-converting Gateway – Converts between Peer-to-peer is cheaper and easier to set up
different communication protocols. Server-based is scalable; peer-to-peer is limited to
small setups
2. What is NLAN? What are the features of VLAN?
NLAN usually refers to a Normal Local Area 6. What is Bridge? Explain types of bridges.
Network – a traditional LAN setup. A bridge connects and filters traffic between two
A VLAN (Virtual LAN) logically groups devices from LAN segments at the data link layer.
different physical LANs. It reduces network traffic and collisions.
Features of VLAN: Types:
Improves network efficiency by reducing broadcast Transparent Bridge – Learns MAC addresses and
traffic forwards frames
Enhances security by segmenting networks Source Routing Bridge – Uses routing info in the
Offers better management and scalability frame
Allows flexible device grouping regardless of Translational Bridge – Connects different network
location types (e.g., Ethernet to Token Ring)
7. Draw TCP/IP model and state the function of
each layer.
TCP/IP Model Layers:
Application Layer – Supports services like HTTP,
FTP, DNS
Transport Layer – Manages reliable or fast delivery
(TCP/UDP)
Internet Layer – Handles addressing and routing
using IP
Network Access Layer – Deals with physical
transmission of data
(You can draw a 4-layer stacked diagram labeled as
above)

8. What is Router? Explain its components.


A router is a network device that forwards data
packets between networks using IP addresses.
Components:
CPU – Controls routing logic
RAM/ROM – Stores running configurations and OS
Routing Table – Keeps paths to various networks
Interfaces (Ports) – Connects to LAN/WAN
Routers operate at the network layer and use
protocols like RIP, OSPF.

You might also like