0% found this document useful (0 votes)
8 views

NETWORKING (2)

The document discusses various concepts in networking, including types of unguided media, the functions of switches and hubs, copyright applications, and the OSI model layers. It also covers backbone networks, LAN advantages and disadvantages, types of network attacks, gateways, TCP/IP protocols, Bluetooth architecture, and IP addressing. Additionally, it explains network topologies and different types of addresses used in networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

NETWORKING (2)

The document discusses various concepts in networking, including types of unguided media, the functions of switches and hubs, copyright applications, and the OSI model layers. It also covers backbone networks, LAN advantages and disadvantages, types of network attacks, gateways, TCP/IP protocols, Bluetooth architecture, and IP addressing. Additionally, it explains network topologies and different types of addresses used in networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Q1 4.

Satellite Communication

a) What is Unguided Media? Explain types o A type of microwave


of Unguided Media. communication where
[5 Marks] signals are transmitted to
and from satellites.
Unguide media refers to wireless
transmission media that does not use o Used for GPS, TV
physical conductors (like wires or cables). broadcasting, and
Instead, data is transmitted through the air international
or vacuum using electromagnetic waves. communication.

Types of Unguided Media:

1. Radio Waves b) What is a Switch? How does it differ


from a Hub?
o Used in FM radio, TV
[5 Marks]
broadcasts, cordless phones,
and wireless LANs. A Switch is a networking device that
connects devices in a LAN and forwards
o Can travel long distances and
data only to the specific device it is
penetrate buildings.
intended for, based on MAC addresses.
o Omni-directional.
Difference between Switch and Hub:
2. Microwaves
Feature Switch Hub
o Used in satellite
communication and cellular Broadcasts
Forwards data
phones. Function data to all
intelligently
ports
o Need line-of-sight between
transmitter and receiver. Faster (due to
Speed Slower
direct delivery)
Typically used for long-distance
point-to-point communication. MAC
Maintains MAC
Address No MAC table
3. Infrared (IR) table
Table
o Used in TV remotes, short-
Reduces
range communication. Collision More collisions
collisions
o Cannot penetrate walls.
Efficiency High Low
o Safe and secure for short
distances.
c) What is Copyright? Explain Applications Connection- Connectionles
Feature
of Copyright. Oriented Service s Service
[5 Marks]
Datagram
Control Protocol)
Copyright is a legal right granted to the Protocol)
creator of original works (like books, music,
software) to control how their work is used, More overhead
distributed, and reproduced. Overhead (due to Less overhead
handshaking)
Applications of Copyright:
Ordering
1. Books and Literature – Protects Guaranteed No guarantee
of Data
authors from unauthorized
reproduction. Q2

2. Music and Audio – Prevents illegal a) Explain functions of each layer of ISO-
downloads and sharing. OSI Reference Model

3. Software Programs – Ensures [5 Marks]


developers’ rights over their code. The OSI Model (Open Systems
4. Movies and Videos – Prevents Interconnection) has 7 layers, each with a
piracy. specific function in the data communication
process:
5. Art and Photography – Protects
original visual content from misuse. 1. Application Layer

o Interface for user


applications (e.g., browsers,
d) Differentiate between Connection- email).
Oriented and Connectionless Services
[5 Marks] o Provides services like file
transfer, email, etc.
Connection- Connectionles
Feature 2. Presentation Layer
Oriented Service s Service

Requires setup o Translates data formats (e.g.,


No setup encryption, compression,
Setup before data
needed encoding).
transfer
o Ensures data is readable for
Reliable
the receiving system.
Reliability (acknowledgment Less reliable
s used) 3. Session Layer

Examples TCP (Transmission UDP (User


o Manages sessions or b) What is Backbone Network? Explain
connections between types of Backbone Network.
applications.
[5 Marks]
o Handles opening, closing,
A Backbone Network is a central network
and managing
that connects different parts of a computer
communication sessions.
network and provides a path for data to
4. Transport Layer travel across multiple networks.

o Ensures reliable data transfer Types of Backbone Networks:


(e.g., TCP).
1. Distributed Backbone
o Handles segmentation, error
o Multiple routers/switches are
control, and flow control.
connected in a hierarchy.
5. Network Layer
o Flexible and scalable.
o Handles logical addressing
2. Collapsed Backbone
and routing (e.g., IP
addresses). o All connections come to a
single central device (like a
o Determines the best path for
switch/router).
data delivery.
o Easier to manage but a single
6. Data Link Layer
point of failure.
o Manages physical addressing
3. Parallel Backbone
(MAC) and error detection.
o Redundant backbone
o Converts packets into frames
connections between
for the Physical layer.
devices.
7. Physical Layer
o Increases reliability and
o Transmits raw bits over performance.
physical medium (cables,
4. Serial Backbone
radio waves).
o Devices are connected in a
o Includes hardware like
linear series.
cables, switches, and
connectors. o Simple, but less scalable and
slower.
c) State advantages and disadvantages of d) Explain Ground Wave Propagation with
LAN, with uses. Diagram

[5 Marks] [5 Marks]

A LAN (Local Area Network) is a network Ground Wave Propagation refers to radio
limited to a small geographic area like a waves that travel along the surface of the
home, office, or school. earth.

Advantages:  It is used for low-frequency signals


(below 2 MHz) like AM radio.
 High Speed – Fast data transfer.
 The wave follows the curvature of
 Resource Sharing – Share printers,
the Earth.
files, and internet.
 Works well for short to medium
 Cost-Effective – Lower networking
distances.
costs.
Diagram:
 Security Control – Centralized data
security and access. plaintext

Disadvantages: Copy code

 Limited Range – Only covers a small Transmitter Receiver


area.
| |
 Maintenance Required – Needs
| |
skilled staff to maintain.
|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
 Setup Cost – Initial wiring and
devices can be costly. | Ground Wave |

Uses: |______________________________|
Earth Surface
 In schools, offices, cyber cafés for
file sharing. Key Points:

 Internet access and centralized data  Affected by the terrain and


storage. conductivity of the Earth.

 Multiplayer gaming or collaborative  Best used during the day and for
workspaces. rural communications.

 Limited by signal attenuation over


long distances.
Q3 An attack is any unauthorized attempt to
access, damage, or steal data from a
a) Define Computer Network? Explain
computer system or network.
Goals of Computer Network.
Types of Attacks:
[5 Marks]
1. Passive Attack:
Definition:
o Eavesdropping – Hackers
A Computer Network is a system where
listen to network
multiple computers and devices are
communication.
connected to share resources, data, and
services using wired or wireless o Traffic Analysis – Monitors
communication channels. data flow without altering it.

Goals of Computer Networks: 2. Active Attack:

1. Resource Sharing – Enables users to o Man-in-the-Middle (MITM)


share files, printers, and internet – Attacker intercepts and
connections. alters communication.

2. Reliability – Ensures data is available o Denial of Service (DoS) –


even if one part of the network fails. Overloads a system, making
it inaccessible.
3. Communication – Allows emails,
video calls, and messaging over the 3. Malware Attacks:
network.
o Virus – Attaches to files and
4. Scalability – Networks can expand as spreads.
the number of users increases.
o Worms – Self-replicating
5. Security – Protects data through programs.
encryption and access control
o Trojan Horse – Disguises as a
mechanisms.
legitimate program.

4. Phishing and Social Engineering:


b) What is an Attack? Explain Various Types
o Fake emails and messages
of Attacks.
trick users into revealing
[5 Marks] personal data.

Definition: 5. SQL Injection:


o Attacker manipulates o Converts MAC addresses for
database queries to gain communication between
unauthorized access. different data link
technologies (e.g., Ethernet
to Wi-Fi).
c) What is a Gateway? Explain Various
Levels of Gateways.
d) What is NLAN? What are the Features of
[5 Marks]
VLAN?
Definition:
[5 Marks]
A Gateway is a network device that acts as
What is NLAN?
a bridge between two different networks,
enabling communication between systems NLAN (National Local Area Network) is a
using different protocols. specialized, large-scale LAN designed for
nationwide communication and networking
Levels of Gateways:
within a specific organization or
1. Network Level Gateway: government body.

o Operates at the Network


Layer of the OSI model.
Features of VLAN (Virtual LAN):
o Used for IP translation and
A VLAN is a logical segmentation of a
firewalls.
physical network to improve security and
2. Transport Level Gateway: efficiency.

o Works at the Transport 1. Network Segmentation:


Layer.
o Divides a single network into
o Helps in protocol conversion multiple isolated networks.
between networks.
2. Improved Security:
3. Application Level Gateway (ALG):
o Prevents unauthorized access
o Operates at the Application by isolating users.
Layer.
3. Better Performance:
o Used for security (e.g., proxy
o Reduces congestion by
servers, email gateways).
limiting unnecessary traffic.
4. Data Link Level Gateway:
4. Flexibility:
o Devices can be grouped 4. Network Access Layer:
logically instead of physically.
o Handles the physical
5. Easier Management: transmission of data.

o Centralized control over o Deals with hardware-level


network policies and access. protocols like Ethernet, Wi-
Fi.
Q4
Key Features:
a) Explain TCP/IP Protocol in Detail
 Scalability
[5 Marks]
 Interoperability
The TCP/IP (Transmission Control
Protocol/Internet Protocol) is a suite of  Reliability
communication protocols used to
 Packet Switching
interconnect network devices on the
internet.  Error Checking (especially in TCP)

Layers of TCP/IP Model:

1. Application Layer: b) What is HUB? Explain Types of HUB

o Deals with high-level [5 Marks]


protocols like HTTP, FTP,
A Hub is a basic networking device that
SMTP, DNS.
connects multiple devices in a LAN and
o Provides services to the user. broadcasts data to all ports.

2. Transport Layer: Types of Hubs:

o Provides end-to-end 1. Passive Hub:


communication.
o Simply connects devices and
o TCP – Reliable, connection- passes electrical signals.
oriented.
o No signal amplification or
o UDP – Fast, connectionless. processing.

3. Internet Layer: 2. Active Hub:

o Responsible for logical o Boosts and amplifies the


addressing and routing. signal before sending it to
other ports.
o Uses IP (IPv4/IPv6), ICMP,
ARP. o Requires power supply.
3. Intelligent Hub (Smart Hub):  Radio Layer: Physical wireless
transmission.
o Includes management
features like traffic  Baseband Layer: Handles device
monitoring and error discovery and connection setup.
detection.
 L2CAP (Logical Link Control and
o Often used in larger Adaptation Protocol): Manages data
networks. multiplexing.

Drawback:  RFCOMM: Emulates serial ports.

 Broadcasts to all devices → causes  SDP (Service Discovery Protocol):


collisions and lowers efficiency. Locates available services.

 Application Layer: User interfaces


and applications like file transfer,
c) Explain Bluetooth Architecture in Detail
audio streaming.
[5 Marks]
Use Cases:
Bluetooth is a short-range wireless
 Wireless headsets, keyboards, file
communication technology designed for
transfer, IoT devices.
low power and low-cost connectivity
between devices.

Bluetooth Architecture: d) Explain Different Modes of


Communication
1. Piconet:
[5 Marks]
o A small network formed by 1
master and up to 7 active Communication modes refer to the
slave devices. direction of data flow between sender and
receiver.
o The master controls
communication. 1. Simplex Mode:

2. Scatternet:  One-way communication only.

o Multiple piconets connected  Example: Keyboard to CPU.


via a device that is part of
 No feedback or response.
more than one piconet.
2. Half-Duplex Mode:
o Enables wider coverage.
 Communication in both directions,
Protocol Stack:
but one at a time.
 Example: Walkie-talkies.  Immune to electromagnetic
interference.
 Devices take turns to send/receive.
 More expensive than copper cables,
Q5
but highly reliable.
a) Proxy Server
Uses:
A Proxy Server is a system or router that
 Internet backbone, ISPs, long-
acts as an intermediary between a client
distance communication, cable TV.
and the internet. It processes requests from
clients, forwards them to the target server,
then returns the response back to the
c) IP Addressing
client.
An IP Address (Internet Protocol Address)
Functions:
is a unique identifier for a device on a
 Security – Hides the client’s IP network.
address.
Types:
 Caching – Saves previously visited
1. IPv4 – 32-bit address (e.g.,
web pages for faster loading.
192.168.0.1)
 Content Filtering – Blocks access to
2. IPv6 – 128-bit address (e.g.,
specific websites.
2001:0db8:85a3::8a2e:0370:7334)
 Anonymity – Helps in private
Classes (IPv4):
browsing.
 Class A: 1.0.0.0 – 126.255.255.255

 Class B: 128.0.0.0 – 191.255.255.255


b) Fiber Optic Cable
 Class C: 192.0.0.0 – 223.255.255.255
Fiber Optic Cable is a high-speed data
transmission medium that uses light signals Types of IP:
to transmit data through glass or plastic
 Static IP – Manually assigned, fixed.
fibers.
 Dynamic IP – Assigned by DHCP
Features:
server, changes over time.
 High bandwidth – Supports very fast
internet.
d) Topology
 Long-distance communication –
Minimal signal loss.
Topology refers to the physical or logical f) Explain Different Types of
arrangement of computers and devices in a Addresses
network.
There are several types of addresses
Types of Network Topologies: in networking:

1. Bus Topology 1. MAC Address (Physical Address):

o Single central cable; all o Unique hardware address of


devices connected to it. a device.

o Easy to implement, but o Used at Data Link Layer.


difficult to troubleshoot.
o Example: 00:1A:2B:3C:4D:5E
2. Star Topology
2. IP Address (Logical Address):
o All devices connect to a
o Unique address assigned to a
central hub or switch.
device on a network.
o Easy to manage; if hub fails,
o Used at Network Layer.
the whole network goes
down. o Example: 192.168.1.1

3. Ring Topology 3. Port Address:

o Devices connected in a o Identifies specific


circular path. applications or services on a
device.
o Data travels in one direction;
break affects entire network. o Used at Transport Layer.

4. Mesh Topology o Example: Port 80 for HTTP.

o Every device is connected to 4. URL (Uniform Resource Locator):


every other device.
o Human-readable address of a
o Very reliable; expensive and web resource.
complex.
o Example: www.google.com
5. Hybrid Topology

o Combination of two or more


g) What are the Objectives of
topologies.
Wireless LAN?
o Flexible and scalable
Wireless LAN (WLAN) aims to
provide:
1. Mobility: Allows users to move Modes of communication define
freely while connected to the how data flows between two
network. devices:

2. Ease of Installation: No cables are 1. Simplex:


needed, making setup easier.
o Data flows in one direction
3. Scalability: Easy to add or remove only.
devices.
o Example: Keyboard to CPU,
4. Cost Reduction: Saves money on Radio.
wiring and physical infrastructure.
2. Half-Duplex:
Flexibility: Supports a wide range of devices
o Data flows in both
and applications
directions, but one at a time.
a) Repeaters
o Example: Walkie-talkie.
A Repeater is a network device used
3. Full-Duplex:
to regenerate and amplify signals in
a network to extend the o Data flows in both directions
transmission distance. simultaneously.

Key Points: o Example: Telephone, Chat


applications.
 Works at the Physical Layer (Layer 1)
of the OSI model.

 Used when signal weakens over long k) Coaxial Cable Structure


distances.
Coaxial Cable is a type of copper
 Common in both wired and wireless cable with multiple layers for
communication. insulation and shielding, used for
data and TV signal transmission.
 Does not filter or direct traffic, just
boosts it. Structure:

Example: Used in long Ethernet markdown


cables or Wi-Fi range extenders.
Copy code

----------------------------
j) Modes of Communication
| Outer Plastic Jacket | ← Protects
cable
| Metallic Shield (Mesh) | ←
Prevents interference

| Insulating Layer | ← Insulates


core

| Inner Conductor (Copper) | ←


Carries the signal

----------------------------

Features:

 Used in cable TV, internet, CCTV


systems.

 Better shielding than twisted pair


cables.

 Supports higher frequency signals.

You might also like