0% found this document useful (0 votes)
3 views

Networking_Exam_Answers_Final

The document contains final answers for a networking internal examination, covering topics such as network topology, types of addresses, coaxial cables, switches versus hubs, and cryptography. It also includes notes on LAN, MAN, TCP, UDP, unguided media, propagation methods, repeaters, and active attacks. Each section provides concise definitions and explanations of key networking concepts and technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Networking_Exam_Answers_Final

The document contains final answers for a networking internal examination, covering topics such as network topology, types of addresses, coaxial cables, switches versus hubs, and cryptography. It also includes notes on LAN, MAN, TCP, UDP, unguided media, propagation methods, repeaters, and active attacks. Each section provides concise definitions and explanations of key networking concepts and technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Networking Internal Examination - Final Answers

Question 1: Solve the following (Any Five) (5×4=20)

Q: Define topology and explain any one type.


A: Topology refers to the structure of a network, defining how different devices are connected.
Example: Star Topology - All devices connect to a central hub/switch, making management easier.

Q: Explain different types of addresses.


A: 1. MAC Address: Unique physical address for devices.
2. IP Address: Logical address for network communication.
3. Port Address: Identifies specific processes.
4. Logical Address: Used for packet routing.

Q: Explain coaxial cable with a diagram.


A: A coaxial cable has an inner conductor, insulating layer, metal shielding, and an outer covering.
Used for TV networks and broadband connections.

Q: What does a switch do? How does it differ from a HUB?


A: A switch forwards data to the intended recipient, while a hub broadcasts to all devices.
Switches are faster, more secure, and reduce network congestion.

Q: Explain cryptography with its types.


A: 1. Symmetric Key: Same key used for encryption and decryption (e.g., AES, DES).
2. Asymmetric Key: Uses public and private keys (e.g., RSA, ECC).
3. Hashing: Converts data into a fixed-length hash (e.g., SHA-256, MD5).

Q: Explain ISO-OSI reference model.


A: A 7-layer model standardizing network communication:
1. Physical - Transmits raw data.
2. Data Link - Manages MAC addresses.
3. Network - Handles routing.
4. Transport - Ensures reliable delivery.
5. Session - Manages sessions.
6. Presentation - Data formatting.
7. Application - Provides network services.

Q: Explain firmware, software, and physical layer of Ethernet.


A: Firmware: Embedded software in network devices.
Software: Network protocols managing communication.
Physical Layer: Cables, network cards, and switches.

Question 2: Write notes on (Any Five) (5×2=10)

Q: LAN and MAN


A: LAN (Local Area Network):
- Covers a small geographical area (e.g., office, school, home network).
- Uses Ethernet cables, Wi-Fi.
- Example: A network connecting computers in a college lab.

MAN (Metropolitan Area Network):


- Covers a city or large area.
- Can be wireless or fiber-optic-based.
- Example: City-wide Wi-Fi networks, Cable TV networks.

Q: Computer Network
A: A computer network connects multiple devices to share data and resources.
Types of networks:
1. Wired Networks: Use physical cables (Ethernet, fiber optics).
2. Wireless Networks: Use radio signals (Wi-Fi, Bluetooth, cellular networks).
Example: The Internet is the largest computer network.

Q: TCP and UDP


A: TCP (Transmission Control Protocol):
- Connection-oriented, reliable.
- Ensures data arrives in order.
- Used for web browsing, email, file transfers.

UDP (User Datagram Protocol):


- Connectionless, faster but less reliable.
- Used for real-time applications (video streaming, gaming).

Q: Unguided Media
A: Unguided media refers to wireless communication methods that do not use physical cables.
Types:
1. Radio Waves: Used in FM radio, mobile communication, Wi-Fi.
2. Microwaves: Used in satellite communication, cellular networks.
3. Infrared: Used in TV remotes, short-range communication.

Q: Propagation Methods
A: Describes how signals travel in wireless networks:
1. Ground Wave: Signals travel along Earth's surface.
2. Skywave: Signals bounce off the ionosphere, used for long-distance radio.
3. Line-of-Sight: Direct communication, used in satellite links, microwave communication.

Q: Repeater
A: A repeater is a network device that amplifies and retransmits weak signals to extend network
coverage.
- Used in long-distance communication.
- Example: Wi-Fi repeaters improve wireless network range.

Q: Active Attack
A: An active attack is a cyberattack where an attacker modifies or steals data during transmission.
Examples:
1. Man-in-the-Middle (MITM) Attack: The attacker intercepts and alters communication.
2. Denial-of-Service (DoS) Attack: Overloads a network, making it unavailable.
3. Malware Injection: Injecting harmful software into a system to steal information.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy