Networking Paper Solutions
Networking Paper Solutions
Q-1
e) Define HUB.
Ans: A hub is a network device that connects multiple computers in a LAN and broadcasts
data to all connected devices.
f) What is encryption?
Ans: Encryption is the process of converting data into a coded form to prevent
unauthorized access during transmission.
i) What is bridge?
Ans: A bridge is a network device that connects and filters traffic between two or more
network segments to reduce traffic and improve performance.
Q-2
In this model, a connection is first established between the sender and receiver before
data is transmitted.
It ensures the reliable delivery of data with error checking, acknowledgment, and flow
control.
Data is delivered in the same sequence in which it was sent.
Suitable for applications where reliability is crucial, such as file transfers, emails, and
web browsing.
Example: TCP (Transmission Control Protocol).
1. Application Layer:
o Provides services directly to user applications.
o Examples: HTTP (web), FTP (file transfer), SMTP (email).
2. Transport Layer:
o Ensures reliable data transmission between devices.
o Uses protocols like TCP (reliable, connection-oriented) and UDP (unreliable,
connectionless).
3. Internet Layer:
o Responsible for addressing, packaging, and routing data.
o IP (Internet Protocol) is used here for assigning logical addresses and selecting
routes for data.
4. Network Access Layer:
o Deals with the hardware aspect of networking such as physical transmission
and data formatting.
o Involves Ethernet, Wi-Fi, etc.
Unguided Media:
Unguided media refers to wireless communication methods where data is transmitted through
the air using electromagnetic waves rather than through physical cables.
1. Radio Waves
2. Microwaves
3. Infrared
Radio waves are a form of electromagnetic radiation with low frequency and long
wavelength.
They can travel long distances and penetrate buildings, making them suitable for
mobile phones, radio broadcasting, and satellite communication.
Radio waves are omni-directional, meaning they spread in all directions from the
source.
They support both analog and digital signals and are suitable for both indoor and
outdoor communication.
Advantages:
Disadvantages:
Susceptible to interference.
Less secure compared to wired transmission.
Ethernet frames are structured packets of data transmitted over Ethernet networks. Each
frame contains several fields:
1. Preamble: 7 bytes used to alert the receiving system and synchronize clocks.
2. Start Frame Delimiter (SFD): 1 byte that indicates the beginning of the frame.
3. Destination MAC Address: 6 bytes identifying the receiver.
4. Source MAC Address: 6 bytes identifying the sender.
5. Type/Length: 2 bytes indicating either the type of protocol (e.g., IPv4) or the length
of the data.
6. Data and Padding: 46–1500 bytes carrying the actual information.
7. Frame Check Sequence (CRC): 4 bytes used for error checking.
The physical layer handles the actual transmission of bits over a physical medium like
copper wires or fiber optics.
It defines the electrical signals, transmission rates, and types of connectors used.
Ethernet typically uses twisted-pair cables and operates at different speeds: 10 Mbps
(Ethernet), 100 Mbps (Fast Ethernet), 1 Gbps (Gigabit Ethernet), and beyond.
It uses encoding techniques like Manchester encoding to synchronize data
transmission.
Functions:
Cryptography:
Cryptography is the technique of protecting information by transforming it into an unreadable
format so that only authorized parties can read it. It ensures data confidentiality, integrity,
authentication, and non-repudiation.
This method uses a single key for both encryption (converting plaintext into
ciphertext) and decryption (converting ciphertext back to plaintext).
The same key must be shared between the sender and receiver before secure
communication can begin.
Working:
The sender encrypts the data using a secret key and sends the encrypted data
(ciphertext) to the receiver.
The receiver uses the same key to decrypt the data and retrieve the original message.
Advantages:
Disadvantages:
Q-3
Here are the **elaborated 4-mark answers** with proper formatting for
each question:
1. **Confidentiality:**
2. **Integrity:**
3. **Authentication:**
4. **Non-repudiation:**
5. **Access Control:**
### **b) Define ISO/OSI Reference Model. Explain Any One Layer in
Detail**
**Definition:**
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
- Ensures complete data transfer using protocols like TCP (reliable) and
UDP (unreliable).
**Key Functions:**
**Definition:**
**Types:**
- Data from any device is first sent to the hub, which then forwards it to
the destination device.
**Advantages:**
- Failure of one node does not affect the rest of the network.
**Disadvantages:**
**Definition:**
1. **Infrared Transmission:**
- Uses infrared light to transmit data over short distances (up to a few
meters).
2. **Microwave Transmission:**
Q-4
Hub
Switch
Router
Bridge
Repeater
Gateway
Modem
Explanation – Switch:
A switch is a network device that connects multiple devices within a local area
network (LAN).
It operates at the Data Link Layer (Layer 2) of the OSI model.
Unlike a hub, which broadcasts data to all devices, a switch sends data only to the
intended recipient using MAC addresses.
It improves network performance by reducing collisions and managing traffic
efficiently.
Key Features:
Communication modes define how data is transmitted between two or more devices over a
communication channel. There are three main modes:
1. Simplex Mode:
o Data flows in only one direction.
o The sender can send data, but the receiver cannot reply.
o Example: TV broadcasting, keyboard to CPU.
o Limitation: No feedback or acknowledgment possible.
2. Half-Duplex Mode:
o Data flows in both directions, but only one at a time.
o Sender and receiver take turns to communicate.
o Example: Walkie-talkies, CB radios.
o Limitation: Cannot send and receive simultaneously.
3. Full-Duplex Mode:
o Data flows in both directions simultaneously.
o Both sender and receiver can send and receive at the same time.
o Example: Telephone, video conferencing.
o Advantage: High efficiency and better speed.
Definition:
Copyright is a legal protection granted to the creators of original works, such as books,
software, music, videos, and artwork. It gives the creator exclusive rights to use, distribute,
and modify their work.
Duration:
Typically lasts for the lifetime of the creator plus several years (e.g., 60 years after death in
many countries).
Applications:
1. Software Protection:
o Copyright protects the source code and compiled code of software from
unauthorized copying or modification.
2. Media and Publishing:
o Protects books, music, movies, and videos from being used or distributed
without permission.
3. Web Content:
o Safeguards website content, including images, text, and graphics.
4. Educational Material:
o Ensures that study materials, lectures, and papers are not copied without
acknowledgment.
Importance:
Definition:
Classful addressing is a method of IP addressing used in early internet architecture where IP
addresses are divided into fixed classes (A to E) based on their leading bits and network-host
division.
Classes in Classful Addressing:
1. Class A:
o Starts with 0 (range: 1.0.0.0 to 126.255.255.255)
o Default subnet mask: 255.0.0.0
o Supports: 128 networks, 16 million hosts per network
o Used by large organizations
2. Class B:
o Starts with 10 (range: 128.0.0.0 to 191.255.255.255)
o Default subnet mask: 255.255.0.0
o Supports: 16,384 networks, 65,534 hosts per network
o Used by medium-sized networks
3. Class C:
o Starts with 110 (range: 192.0.0.0 to 223.255.255.255)
o Default subnet mask: 255.255.255.0
o Supports: 2 million networks, 254 hosts per network
o Used by small networks
4. Class D:
o Starts with 1110 (range: 224.0.0.0 to 239.255.255.255)
o Used for multicasting
5. Class E:
o Starts with 1111 (range: 240.0.0.0 to 255.255.255.255)
o Reserved for experimental purposes
Q-5
a) Propagation Modes
Propagation modes refer to the way electromagnetic signals travel from one point to another
through the atmosphere or other media. These are essential in wireless communication
systems.
Intranet:
Extranet:
A controlled private network that allows limited access to external users like
business partners, suppliers, or clients.
Extends the intranet beyond the company boundaries.
Benefits: Facilitates collaboration, supply chain management, and secure information
sharing with trusted outsiders.
Difference:
Featur
Intranet Extranet
e
Internal employees
Access External partners with permission
only
High (internal
Security High with external firewalls/VPNs
network)
Functions:
Acts as a barrier between a trusted internal network and untrusted external networks
(like the Internet).
Prevents unauthorized access, cyberattacks, and data leaks.
Can filter traffic based on IP addresses, domain names, protocols, ports, and content.
Types of Firewalls:
Importance:
NETWORKING PAPER-2
Q-1
Definition:
Unguided media refers to wireless transmission media where data is transmitted through the
air using electromagnetic waves. It does not require physical cables for signal
transmission.
1. Radio Waves
o Frequency Range: 3 kHz to 1 GHz.
o Characteristics:
Omni-directional.
Can penetrate walls.
Suitable for long-distance communication.
o Applications: AM/FM radio, maritime communication, wireless keyboards.
2. Microwaves
o Frequency Range: 1 GHz to 300 GHz.
o Characteristics:
Requires line-of-sight between transmitter and receiver.
Affected by obstacles and weather (e.g., rain).
o Applications: Mobile phones, satellite communication, microwave links.
3. Infrared Waves
o Frequency Range: 300 GHz to 400 THz.
o Characteristics:
Short-range communication.
Cannot pass through walls.
Requires line-of-sight.
o Applications: Remote controls, wireless mice and keyboards.
Advantages:
Disadvantages:
Definition of Switch:
A switch is a network device that connects multiple devices in a Local Area Network
(LAN) and uses MAC addresses to forward data only to the specific destination device.
Working:
Conclusion:
A switch is more efficient and secure than a hub, making it the preferred device in modern
networking.
Definition:
Copyright is a legal right granted to the creator of original works, giving them exclusive
control over the use, distribution, reproduction, and modification of their work.
Purpose:
Applications of Copyright:
1. Software Protection
o Source code and software programs are protected from duplication and
misuse.
2. Digital Media
o Protects movies, music, games, and videos from illegal downloads and
distribution.
3. Literature and Art
o Secures rights over books, poems, paintings, and photos.
4. Web Content
o Ensures blogs, website layouts, and digital articles are not plagiarized.
5. Educational Content
o Prevents unauthorized sharing or copying of e-learning modules and study
materials.
Importance:
Encourages innovation and creativity.
Grants legal rights and recognition to creators.
Protects content from piracy and misuse.
A communication method
No connection setup before
where a connection is
Definition data transmission. Each packet
established before data is
is sent independently.
sent.
Flow &
Present, ensures accurate and Absent, packets may arrive out
Error
ordered delivery. of order or not at all.
Control
Conclusion:
Connection-oriented services offer reliable and secure communication, while connectionless
services are faster but less reliable, suitable for real-time applications.
Q-2
Definition:
A Backbone Network is the central, high-capacity network that connects various pieces of
a distributed network, including LANs and WANs, providing a path for data to travel across
multiple networks.
Functions:
1. Distributed Backbone
o Each building or floor has its own backbone connected to a central backbone.
o Easy to manage and scale.
o Ideal for large campuses.
2. Collapsed Backbone
o Centralized switch/router connects all network segments.
o Easier to maintain, but single point of failure.
3. Parallel Backbone
o Multiple connections between core devices.
o Provides redundancy and fault tolerance.
4. Serial Backbone
o Devices are connected in series.
o Simple and cheap but not scalable.
Use Case:
Used in university campuses, corporate buildings, and data centers to ensure fast
communication between subnetworks.
Definition:
A Local Area Network (LAN) connects computers and devices within a small geographical
area such as homes, offices, or schools.
Advantages of LAN:
Uses of LAN:
Definition:
Ground wave propagation refers to the transmission of radio signals that travel along the
surface of the Earth.
Characteristics:
Working:
The wave induces currents on the surface and interacts with the Earth, allowing it to
bend and follow the terrain.
Works well over conductive surfaces like seawater.
Applications:
AM radio broadcasting.
Military and maritime communication.
Navigation systems.
Advantages:
Disadvantages:
1. Resource Sharing:
o Allows users to share hardware (e.g., printers, storage devices) and software
(applications, databases) efficiently within the network.
2. Communication:
o Facilitates communication between users through email, instant messaging,
video calls, and collaborative tools.
3. Data Security:
o Ensures the protection of data from unauthorized access or tampering using
firewalls, encryption, and access controls.
4. Cost Efficiency:
o Reduces costs by enabling resource sharing and centralized management of
data, applications, and systems.
5. Scalability:
o Allows the network to grow as required, adding new devices or services
without major disruptions.
6. Reliability:
o Ensures continuous operation of critical systems and provides fault tolerance
through redundancy (e.g., multiple data paths).
Definition of Attack:
An attack refers to any attempt to disrupt, damage, or gain unauthorized access to a
computer network or system. Attacks can be directed at the network infrastructure, devices,
or the data being transmitted.
Types of Attacks:
Definition of Gateway:
A gateway is a network device that acts as a bridge between two different network
architectures or protocols, allowing data to flow between them. It often performs protocol
translation and can be a combination of hardware and software.
Levels of Gateways:
Function:
Gateways enable communication between different networks (e.g., between a corporate LAN
and the internet) by handling protocol conversion, routing, and addressing.
Features of VLAN:
1. Segmentation:
o VLANs segment a large network into smaller, more manageable sections to
reduce congestion and increase security.
2. Broadcast Control:
o Limits the scope of broadcast traffic to a specific VLAN, reducing
unnecessary network traffic and improving efficiency.
3. Security:
o VLANs can isolate sensitive data traffic, ensuring that only authorized users
within the same VLAN can access certain resources.
4. Flexibility:
o Devices in different physical locations can be grouped into the same VLAN,
offering flexibility in network management without needing physical
reconfiguration.
5. Improved Performance:
o By minimizing unnecessary broadcast traffic, VLANs help improve the
overall network performance.
6. Simplified Network Management:
o VLANs simplify network management by grouping similar devices together,
making it easier to apply policies and troubleshoot network issues.
Conclusion:
VLANs help enhance the performance, security, and scalability of a network by logically
separating traffic within a single physical infrastructure.
Q-4
1. Resource Sharing:
o A network allows sharing of resources like printers, files, storage devices,
and internet connections, reducing redundancy and overall cost.
2. Communication:
o Networks facilitate communication through different mediums such as email,
chat systems, voice calls, and video conferencing.
3. Data Security:
o Ensures that information exchanged over the network is protected from
unauthorized access using encryption, firewalls, and access controls.
4. Cost-Effectiveness:
o Centralized resource management lowers the cost of purchasing hardware and
software for each individual machine. It also cuts down on maintenance costs.
5. Scalability:
o As organizations grow, networks can easily scale to accommodate additional
devices or users without major disruptions to existing infrastructure.
6. Reliability:
o Networks provide fault tolerance, ensuring continuous service even if a
component fails. Redundant paths and backup systems ensure high
availability.
Types of Attacks:
Levels of Gateways:
Function of Gateways:
Features of VLAN:
1. Segmentation of Network:
o VLANs divide a large network into smaller, isolated broadcast domains,
reducing unnecessary network traffic and improving performance.
2. Broadcast Control:
o Limits broadcast traffic to the devices within a particular VLAN, ensuring
that broadcasts (e.g., ARP requests) do not affect the entire network.
3. Security:
o By isolating sensitive devices or departments into separate VLANs, security
risks can be minimized. For example, accounting and HR systems can be in
different VLANs to protect sensitive data.
4. Flexibility:
o Devices can be added to a VLAN irrespective of their physical location in the
network. This makes it easier to manage network resources without needing to
physically reconfigure the network.
5. Performance Optimization:
o VLANs help reduce the size of broadcast domains, which improves the
overall network performance by minimizing network congestion.
6. Simplified Network Management:
o Centralized management of VLANs simplifies network configuration and
maintenance. Policies can be applied to groups of devices without the need for
re-cabling.
Conclusion: VLANs are useful in large networks to improve security, performance, and
manageability, and allow network administrators to logically group devices.
Q-5
1. Resource Sharing:
o Allows sharing of physical and software resources across the network,
including printers, storage, applications, and internet access.
2. Communication:
o Facilitates communication among networked devices through emails, chats,
video conferencing, and other tools.
3. Data Security:
o Ensures protection of data by implementing security mechanisms like
encryption, firewalls, and access controls to guard against unauthorized
access.
4. Cost-Effectiveness:
o Reduces costs by centralizing resources and eliminating the need for separate
hardware/software for each user or department.
5. Scalability:
o Networks can be easily expanded as new devices are added, allowing growth
without a significant reconfiguration.
6. Reliability:
o A well-designed network ensures high availability and fault tolerance through
redundancy and backup solutions to keep the system operational at all times.
Definition of Attack: An attack refers to any action that aims to disrupt or gain
unauthorized access to computer systems, networks, or devices. It can lead to data breaches,
service interruptions, or data manipulation.
Types of Attacks:
1. Denial of Service (DoS) Attack:
o Objective: Overwhelm a system or network with traffic, causing it to become
slow or unresponsive.
o Example: Flooding a website with too many requests, causing it to crash.
2. Man-in-the-Middle (MITM) Attack:
o Objective: Intercept and alter communication between two parties without
their knowledge.
o Example: An attacker intercepting and modifying data between a user and a
website, such as changing transaction details.
3. Phishing:
o Objective: Deceive individuals into providing sensitive information like
usernames, passwords, or financial details.
o Example: Fake emails that appear to come from banks, asking users to click
on malicious links.
4. Malware (Malicious Software):
o Objective: Use malicious software such as viruses, worms, or ransomware to
damage or steal information.
o Example: Ransomware encrypting files and demanding payment for
decryption.
5. SQL Injection:
o Objective: Inject malicious SQL queries into a website's database to access or
manipulate its data.
o Example: An attacker submitting malicious SQL code via a form on a website
to retrieve sensitive information from the database.
6. Brute Force Attack:
o Objective: Attempt to crack passwords or encryption keys by trying all
possible combinations until the correct one is found.
o Example: Using software to guess login credentials by systematically trying
different password combinations.
Levels of Gateways:
Features of VLAN:
1. Segmentation:
o VLANs segment a network into smaller, more manageable sections,
minimizing network traffic and improving performance.
2. Broadcast Control:
o Broadcast traffic is limited to devices within the same VLAN, reducing
unnecessary traffic and improving overall network efficiency.
3. Security:
o VLANs enhance security by isolating sensitive or critical devices, ensuring
that they are not easily accessible from other parts of the network.
4. Flexibility:
o Devices in different physical locations can be grouped into the same VLAN,
providing flexibility in network design and management.
5. Improved Performance:
o By limiting broadcast traffic, VLANs reduce network congestion, thus
enhancing performance and response time.
6. Simplified Management:
o VLANs allow for easier management of network policies and troubleshooting
since devices with similar functions or requirements can be grouped together.
Conclusion: VLANs are used in enterprise networks to improve security, performance, and
scalability, allowing for efficient traffic management and reducing the risk of congestion.
NETWORKING PAPER-3
Q-1
A proxy server acts as an intermediary between a client and a destination server. It filters
requests, caches data, and can provide anonymity for the client. It improves security and
performance by managing and controlling the flow of data between the client and the server.
b) What is Bridge?
A bridge is a device that connects two or more network segments to function as a single
network. It operates at the data link layer (Layer 2) of the OSI model and filters traffic
based on MAC addresses, reducing collisions and controlling data flow between segments.
c) What is HTTP?
HTTP (HyperText Transfer Protocol) is a protocol used to request and transfer web pages
over the internet. It defines the rules for requesting resources from a web server and
delivering them to a client, such as a web browser.
d) What is Standard?
A standard is a set of agreed-upon rules or specifications that ensure the compatibility and
interoperability of products, services, or systems. Standards are often established by
organizations like ISO or IEEE.
e) What is NIC?
1. Unshielded Twisted Pair (UTP): Most common, without additional shielding, used
for networking and telecommunication.
2. Shielded Twisted Pair (STP): Includes shielding to reduce interference from
external sources, often used in industrial environments.
Plaintext is the original, unencrypted data that can be read without any special
processing.
Ciphertext is the encrypted form of the data that appears as a random string of
characters, and requires decryption to return to its readable form.
i) What is Piconet?
A Piconet is a small Bluetooth network consisting of one master device and up to seven
active slave devices. It allows short-range communication, usually within a 10-meter radius.
j) What is Addressing?
Q-2
a) What is Networking? Explain Different Types of Network
Focuses more on standardizing and TCP/IP is more practical and used for
clarifying networking processes and real-world internet communication,
their interaction at each layer. heavily used in internet protocols.
Fiber optic cable is a type of network cable used to transmit data in the form of light signals.
It is made up of thin strands of glass or plastic fibers, each designed to carry light signals over
long distances.
Working Principle:
Fiber optic cables use total internal reflection to guide light through the core of the
fiber, allowing signals to travel without significant loss. The signal is transmitted as
light pulses which represent data, making it much faster and more efficient than
traditional copper cables.
High bandwidth and low attenuation lead to faster data transmission over long
distances.
Immunity to electromagnetic interference (EMI), ensuring clearer signals.
Security: Difficult to tap into without detection.
d) What is AP? Explain BSS and ESS in Detail
Access Point (AP) is a networking device that allows wireless devices to connect to a wired
network using Wi-Fi. It acts as an interface between wireless devices (like laptops,
smartphones) and the wired network infrastructure, enabling communication through radio
frequencies.
Key Difference:
BSS is a standalone setup with a single AP, while ESS involves multiple BSSs and is
typically used for larger areas like offices, campuses, or buildings.
Cryptography is the practice and study of techniques for securing communication and data
from adversaries. It involves methods like encryption and decryption to ensure that data is
kept confidential and can only be read by authorized parties.
Objectives of Cryptography:
1. Confidentiality:
o Ensures that only authorized users can read the data. For example, encrypting
sensitive data ensures it remains confidential.
2. Integrity:
o Verifies that the data has not been altered during transmission. Cryptographic
hash functions are used to ensure that the data remains intact.
3. Authentication:
o Verifies the identity of the users or systems involved in the communication.
Public-key cryptography ensures that users are authenticated before
exchanging sensitive information.
4. Non-repudiation:
o Prevents the sender from denying the transmission of data. Digital signatures
are commonly used to guarantee that a message was sent by a particular party.
Conclusion: Cryptography ensures that data is secure from unauthorized access, maintains
data integrity, and verifies the identity of users involved in communication.
Q-3
1. Point-to-Point Backbone:
o A point-to-point backbone connects two locations with a dedicated link. It is
simple and cost-effective for connecting two distant LANs or branches.
o Suitable for small networks where only two sites need to communicate.
2. Collapsed Backbone:
o In a collapsed backbone architecture, all network traffic passes through a
central hub or router that serves as the backbone. It is typically used for
smaller networks where a centralized point can handle all communication.
o A single switch or router typically manages all traffic.
3. Distributed Backbone:
o A distributed backbone uses multiple interconnected backbone devices
(routers, switches) to create a more scalable and redundant architecture. It is
used in larger networks with multiple segments, offering improved
performance and fault tolerance.
o Suitable for larger organizations with multiple data centers or buildings.
4. Dual Backbone:
o A dual backbone involves two separate, redundant backbones to ensure
network availability. Traffic can be routed through either backbone in case of
failure, providing greater reliability and fault tolerance.
b) Difference Between Connection-Oriented and Connectionless
Services
Connection-Oriented
Feature Connectionless Service
Service
Involves establishing a
Definitio No dedicated connection is
dedicated connection before
n established before data transfer.
data transfer.
Hub: A hub is a basic networking device that connects multiple devices in a network,
allowing them to communicate with each other. It operates at the physical layer (Layer 1) of
the OSI model and broadcasts incoming data packets to all connected devices, regardless of
the destination.
Types of Hubs:
1. Active Hub:
o An active hub amplifies the signals and regenerates them before broadcasting
to all connected devices. It is powered and can extend the distance over which
signals can travel. It can also perform basic error-checking and retransmitting
of signals.
2. Passive Hub:
o A passive hub simply acts as a connector without amplifying or regenerating
the signal. It does not require power and relies entirely on the connected
devices to transmit signals. It is less efficient than active hubs and is used in
smaller, less demanding networks.
3. Intelligent Hub:
o An intelligent hub is a more advanced version of an active hub. It can
perform additional tasks such as managing network traffic, monitoring
performance, and handling security features. It has built-in software for
managing the network.
4. USB Hub:
o A USB hub is designed specifically for USB devices. It allows multiple USB
devices to be connected to a single USB port on a computer or other device. It
is widely used in home and office environments to connect multiple
peripherals.
Wireless Transmission: Wireless transmission refers to the transfer of data over a network
without using physical cables. It involves transmitting electromagnetic signals, such as radio
waves or microwaves, through the air. Wireless transmission is used in various types of
communication, such as Wi-Fi, Bluetooth, satellite communication, and mobile networks.
Wi-Fi is a widely used wireless communication technology that allows devices like
laptops, smartphones, and tablets to connect to the internet or a local network without
physical cables.
Frequency Bands: Wi-Fi operates primarily in the 2.4 GHz and 5 GHz frequency
bands, providing different ranges and speeds. The 5 GHz band offers faster speeds but
shorter range compared to the 2.4 GHz band.
Wi-Fi Standards: The most common Wi-Fi standards are 802.11a/b/g/n/ac/ax,
which define the frequency bands, data rates, and modulation techniques used for
wireless communication.
Range and Speed: Wi-Fi typically offers a range of up to 100 meters in open space
and speeds ranging from 54 Mbps (802.11g) to 9.6 Gbps (802.11ax, Wi-Fi 6).
The TCP/IP Model is a simplified version of the OSI model that is used for internet
communication. It consists of 4 layers:
1. Application Layer:
o Provides network services to end-users and defines protocols for
communication between applications. Example protocols: HTTP, FTP,
SMTP.
2. Transport Layer:
o Ensures reliable data transmission between devices. It handles error detection,
correction, and data flow control. Main protocols: TCP (for reliable
communication) and UDP (for faster, less reliable communication).
3. Internet Layer:
o Responsible for logical addressing and routing of data across the network. The
primary protocol is IP (Internet Protocol), which defines addressing schemes
and packet routing.
4. Network Interface Layer:
o Deals with the physical and data link aspects of communication. It defines
how data is transmitted over the physical medium, using protocols like
Ethernet or Wi-Fi. It corresponds to the Data Link and Physical Layer in
the OSI model.
Q-4
Security Services refer to the protections and measures put in place to ensure the
confidentiality, integrity, and availability of data and network resources. These services aim
to secure communication and safeguard the network from unauthorized access, attacks, and
data loss.
Security Mechanisms:
Topology refers to the arrangement or layout of devices, cables, and data transmission paths
in a network. It defines how devices are connected and how data flows through the network.
Bus Topology:
Bus topology is a type of network where all devices are connected to a single central
cable (the bus). Data sent by one device is transmitted to all other devices, but only
the destination device accepts the data.
Advantages: Easy to install, requires less cable.
Disadvantages: If the central cable fails, the entire network goes down. It has limited
scalability.
Star Topology:
Star topology involves a central hub or switch to which all devices are connected.
Data sent from any device is directed to the hub, which then forwards it to the correct
destination device.
Advantages: Easy to install and manage, failure of one device does not affect others.
Disadvantages: If the hub fails, the entire network is disrupted.
Characteris
Bus Topology Star Topology
tic
Cable
Less cable required More cable needed
Usage
Failure Central cable failure affects the Hub failure affects the
Impact entire network network
Ground Wave Propagation refers to the method of radio wave propagation where the waves
travel along the Earth's surface. It is used for medium and long-range communication,
particularly for low-frequency radio signals.
Characteristics of Ground Wave Propagation:
1. Travel Along the Ground: The radio waves travel directly along the Earth's
surface, following the curvature of the Earth. This enables the signal to reach
distances beyond the horizon.
2. Low Frequencies: Typically, lower-frequency signals (like AM radio signals) are
suited for ground wave propagation because they follow the Earth's curvature better.
3. Limited Range: Ground waves generally work well for ranges up to 300 km but are
more effective at shorter distances.
4. Signal Attenuation: As the signal travels, it weakens due to terrain and obstacles.
The earth’s surface acts as a conductor, and the waves may refract or diffract around
obstacles like hills and buildings.
In networking, various addresses are used to identify devices on a network. These include:
The objectives of a Wireless LAN (WLAN) are to provide wireless connectivity between
devices in a local area while ensuring performance, security, and ease of use. The primary
objectives are:
1. Mobility: Allows users to connect to the network from anywhere within the coverage
area, enabling movement without losing network connectivity (e.g., laptops,
smartphones).
2. Flexibility and Scalability: Enables the addition of new devices without the need for
physical cabling. It is easy to expand and reconfigure without major infrastructure
changes.
3. Cost Efficiency: Wireless LANs reduce the cost of wiring and infrastructure
compared to traditional wired networks, especially in buildings where running cables
is expensive or difficult.
4. Convenience: Facilitates easy access to network resources from multiple devices like
laptops, tablets, and smartphones. It supports both high-speed internet access and
resource sharing.
5. Reduced Clutter: Eliminates the need for extensive cabling, making it ideal for areas
with space constraints or where physical wiring is impractical.
6. Integration: Can be easily integrated with other technologies like Bluetooth and Wi-
Fi to extend functionality, enabling diverse connectivity options for devices.
Q-5
a) Repeaters
Repeaters are network devices used to amplify or regenerate signals in order to extend the
range of communication over long distances. They are commonly used in networks where
signal attenuation occurs due to distance, especially in wireless or wired communication
systems.
Function: Repeaters receive a weak or degraded signal, amplify or regenerate it, and
then retransmit it to its destination. This process helps to preserve the integrity and
strength of the signal over long distances.
Usage: They are typically used in long-distance transmission mediums such as fiber
optic cables, coaxial cables, and wireless communication systems.
Example: Used in Wi-Fi networks to extend coverage in larger areas, in
telecommunication systems to enhance signal strength across vast distances.
b) Modes of Communication
Communication modes define the direction of data flow between devices in a network.
There are three primary modes of communication:
1. Unidirectional (Simplex):
o In simplex mode, data flows in one direction only. The sender transmits data,
and the receiver only receives it, without any feedback or communication in
the reverse direction.
o Example: Radio broadcasts, where the station sends data, and listeners only
receive it.
2. Bidirectional (Half-Duplex):
o In half-duplex mode, data can travel in both directions, but not at the same
time. Only one device can transmit at a time, while the other device must wait
for the transmission to finish before sending its data.
o Example: Walkie-talkies, where one person speaks while the other listens
and vice versa.
3. Bidirectional (Full-Duplex):
o In full-duplex mode, data flows in both directions simultaneously. Both
devices can send and receive data at the same time, allowing continuous two-
way communication.
o Example: Telephone calls, where both parties can speak and hear at the same
time.
A coaxial cable (or coax) is a type of electrical cable used for transmitting data, video, and
audio signals. It has a unique design that helps in shielding and protecting the signal from
external interference.
Core: The inner conductor is made of copper or aluminum and is responsible for
carrying the electrical signal. It is typically a solid wire or a braided conductor.
Insulation: Surrounding the core is a layer of insulating material that prevents signal
leakage and reduces interference from outside sources.
Shielding: The insulation is followed by a metal shield (usually a copper or
aluminum foil or braided mesh) that protects the signal from electromagnetic
interference (EMI) and crosstalk from adjacent cables.
Outer Jacket: The outermost layer is made of plastic or PVC which serves to protect
the inner components from physical damage and environmental factors.
Advantages:
High bandwidth: Coaxial cables are capable of transmitting large amounts of data
and are widely used in broadband internet, TV systems, and CCTV networks.
Resistant to interference: Due to the shielding, coaxial cables are resistant to
external electromagnetic interference, making them reliable for high-quality signal
transmission.
NETWORKING PAPER-4
Q-1
a) What is Protocol?
A protocol is a set of rules or standards that define how data is transmitted and received
over a network. It ensures that devices can communicate with each other efficiently, securely,
and correctly. Examples include HTTP, TCP/IP, and FTP.
b) What is Cladding?
Cladding is a protective layer surrounding the core of an optical fiber. It has a lower
refractive index than the core, which causes the light signals to be reflected back into the
core, allowing them to travel along the fiber without escaping.
A proxy server is an intermediary server that sits between a client and the internet. It acts as
a gateway, forwarding requests from clients to external servers and then relaying the
responses back, offering benefits like anonymity and security.
Classless Addressing refers to an IP address scheme where the network address is not
restricted by predefined class boundaries (A, B, C). This is achieved using CIDR (Classless
Inter-Domain Routing), which allows more efficient IP address allocation.
Transmission media are the physical pathways through which data travels in a network.
Common types include twisted pair cables, coaxial cables, and fiber optics for wired
connections, and radio waves and microwaves for wireless communication.
f) What is Internetwork?
Steganography is the technique of hiding data within other non-suspicious data, such as
embedding a secret message inside an image or audio file. Unlike encryption, its goal is to
conceal the existence of the message.
h) What is Hub?
A hub is a simple networking device that connects multiple devices in a network. It works at
the physical layer and broadcasts data received from one device to all other devices
connected to it, without checking the destination.
Standard Ethernet refers to the traditional Ethernet networking protocol used in LANs. It
typically operates at speeds of 10 Mbps, 100 Mbps, or 1 Gbps and uses CSMA/CD for
managing data access in the network.
j) What is Firewall?
A firewall is a network security device that monitors and controls incoming and outgoing
network traffic based on security rules. It acts as a barrier between an internal network and
external sources, such as the internet, to prevent unauthorized access.
Q-2
1. Layer 1: Physical Layer: This layer deals with the transmission of raw bits over a
physical medium like cables or wireless signals. It defines the hardware elements
involved in the transmission and reception of data.
2. Layer 2: Data Link Layer: This layer is responsible for establishing a reliable link
between two directly connected nodes, handling error detection and correction. It uses
MAC addresses for communication between devices in the same network.
3. Layer 3: Network Layer: This layer manages the addressing and routing of data
between devices across different networks. It is responsible for logical addressing
(e.g., IP addresses) and routing packets from source to destination.
4. Layer 4: Transport Layer: This layer ensures reliable data transfer between two
devices. It handles flow control, error correction, and retransmission of lost data. Key
protocols include TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol).
5. Layer 5: Session Layer: The session layer manages sessions between applications,
ensuring proper opening, closing, and managing of communication sessions. It is
responsible for establishing, maintaining, and terminating connections.
6. Layer 6: Presentation Layer: This layer translates data between the application layer
and lower layers. It is responsible for data encoding, encryption, compression, and
translation into a format that can be understood by the receiving application.
7. Layer 7: Application Layer: The top layer interacts directly with the end user and
provides network services to the application. It handles high-level protocols like
HTTP, FTP, and SMTP, enabling communication between applications.
Wireless transmission refers to the transfer of data over a distance without the use of
physical cables. Instead, radio waves, microwaves, and infrared signals are used to transmit
information. Wireless transmission is commonly used in communication systems such as Wi-
Fi, mobile networks, and satellite communications.
Radio Waves: These are electromagnetic waves with wavelengths ranging from 1
millimeter to 100 kilometers. They are widely used in wireless communication
technologies like radio broadcasting, cellular communication, and Wi-Fi networks.
Characteristics: Radio waves can travel long distances and penetrate obstacles like
walls, making them ideal for mobile communication. However, they can be affected
by environmental factors such as interference, signal degradation, and path loss.
Usage: In Wi-Fi networks, radio waves are used to transmit data between routers and
devices. For cellular networks, they enable voice and data services for mobile
phones.
The IEEE 802.11 is a set of standards developed by the Institute of Electrical and Electronics
Engineers (IEEE) for implementing Wireless Local Area Networks (WLANs). These
standards define the specifications for wireless communication in the 2.4 GHz and 5 GHz
frequency bands.
Key Features:
o Data Rates: IEEE 802.11 provides varying data rates, from 1 Mbps (older
versions) to 1 Gbps (in newer standards such as 802.11ac and 802.11ax).
o Compatibility: It supports different modulation techniques (e.g., OFDM
(Orthogonal Frequency Division Multiplexing)) for better performance and
reliability.
o Security: 802.11 standards support encryption mechanisms like WEP (Wired
Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2, ensuring
data privacy and preventing unauthorized access.
o Roaming: The standard allows devices to move freely between access points
(APs) within the same network, maintaining seamless connectivity.
Variants:
o 802.11a: Operates in the 5 GHz band with data rates up to 54 Mbps.
o 802.11b: Operates in the 2.4 GHz band with data rates up to 11 Mbps.
o 802.11g: Also operates in the 2.4 GHz band but with speeds up to 54 Mbps.
o 802.11n: Operates in both 2.4 GHz and 5 GHz bands with speeds up to 600
Mbps.
o 802.11ac: Operates in the 5 GHz band with speeds up to 1.3 Gbps.
1. Denial of Service (DoS): This type of attack is aimed at making a system or network
resource unavailable to its users by overwhelming it with a flood of traffic. A
Distributed Denial of Service (DDoS) attack involves multiple compromised
systems sending traffic to the target, making it difficult to stop.
2. Man-in-the-Middle (MitM): In a MitM attack, the attacker intercepts and possibly
alters the communication between two parties who believe they are directly
communicating with each other. This can be used to steal sensitive information like
passwords.
3. Phishing: This attack involves deceptive emails or websites designed to trick users
into revealing personal information, such as usernames, passwords, and credit card
details. It often involves masquerading as a trustworthy entity, such as a bank or
service provider.
4. SQL Injection: This attack exploits vulnerabilities in web applications that use SQL
databases. Attackers insert malicious SQL code into input fields to gain unauthorized
access to database information or manipulate the database.
5. Ransomware: In a ransomware attack, malicious software encrypts a victim's files
and demands a ransom to unlock them. It can cause significant data loss and financial
damage.
Q-3
A bridge is a network device used to connect and filter traffic between two or more network
segments, operating at the Data Link Layer (Layer 2) of the OSI model. It helps improve
network efficiency by segmenting traffic and reducing network collisions. Bridges can
connect networks with the same or different technologies and protocols.
Types of Bridges:
1. Transparent Bridge:
o This type of bridge automatically learns the MAC addresses of devices on
either side of the bridge. It operates transparently, meaning no changes are
needed in the devices’ configurations.
o Example: It is used in Ethernet networks to divide collision domains.
2. Source-Route Bridge:
o It is used primarily in Token Ring networks. In this type of bridge, the source
device specifies the route that data should take across the network.
o Example: A source-route bridge is used when a Token Ring network needs to
communicate with Ethernet devices.
3. Translation Bridge:
o It is used to connect networks that operate on different protocols or
architectures. For instance, it can connect Ethernet to Token Ring or
different types of Ethernet networks.
o Example: Used to connect networks running different networking protocols or
standards.
1. Unidirectional (Simplex):
o In simplex mode, data flows in only one direction. The sender transmits, and
the receiver only receives without sending any feedback.
o Example: Radio broadcasting where data flows from the station to the
listener.
2. Bidirectional (Half-Duplex):
o In half-duplex mode, data flows in both directions, but not at the same time.
One device sends, and the other device must wait before sending its data.
o Example: Walkie-talkies where one person speaks, and the other listens, and
vice versa.
3. Bidirectional (Full-Duplex):
o In full-duplex mode, data flows simultaneously in both directions. Both
devices can send and receive data at the same time.
o Example: Telephone communication, where both parties can talk and listen
at the same time.
Sketch:
Simplex: → (one-way)
Half-Duplex: ↔ (two-way, but not simultaneous)
Full-Duplex: ↔↔ (two-way, simultaneous)
1. Application Layer: Handles end-user applications and services (HTTP, FTP, etc.).
2. Transport Layer: Ensures reliable data transfer (TCP, UDP).
3. Internet Layer: Handles logical addressing and routing (IP).
4. Link Layer: Deals with physical addressing and transmission media (Ethernet, Wi-
Fi).
Guided media refers to physical transmission mediums that guide the data signals along a
specific path. These include cables and fibers that provide a dedicated route for data to travel,
ensuring the signal does not spread out randomly.
Structure: A fiber optic cable consists of a core made of glass or plastic fibers,
which carry the light signals, and a cladding layer that reflects the light back into the
core, preventing loss of signal. The entire cable is often protected by an outer jacket.
Advantages:
o High bandwidth: Can transmit large amounts of data at high speeds.
o Long-distance transmission: Less signal degradation compared to other
cables.
o Immune to electromagnetic interference (EMI).
Uses: Fiber optics are commonly used in high-speed internet connections, backbone
connections in networks, and telecommunications.
e) What is Fast Ethernet? Explain Categories of Fast Ethernet.
Fast Ethernet refers to Ethernet standards that provide speeds of up to 100 Mbps, as
opposed to the original Ethernet standard, which operated at 10 Mbps. Fast Ethernet uses
IEEE 802.3u to define transmission speeds, formats, and protocols.
1. 100BASE-TX:
o This is the most common type of Fast Ethernet and uses twisted pair cables
for data transmission. It supports 100 Mbps speeds over distances up to 100
meters.
o Uses Cat 5 or higher cables.
2. 100BASE-FX:
o This version of Fast Ethernet uses fiber optic cables for higher bandwidth and
longer distance transmission. It supports distances of up to 2 kilometers for
single-mode fiber.
o Mainly used in backbone networks where high-speed connections are
essential.
3. 100BASE-T4:
o This type of Fast Ethernet operates over four twisted pair cables and supports
speeds of 100 Mbps. It is designed to work on lower-quality cables, such as
Cat 3.
o This category is less common but can be found in some legacy systems.
Q-4
1. Bus Topology:
o In bus topology, all devices are connected to a single central cable, known as
the bus. Data sent from one device travels along the bus and is received by all
devices. However, only the device with the matching address accepts the data.
o Advantages: Easy to install, cost-effective for small networks.
o Disadvantages: Data collisions can occur, and the failure of the central bus
can bring down the entire network.
2. Star Topology:
oIn star topology, all devices are connected to a central device, such as a hub
or switch. The central device acts as a mediator between the devices.
o Advantages: Easy to add new devices, failure of one device doesn’t affect the
others.
o Disadvantages: The failure of the central device causes the entire network to
fail.
3. Ring Topology:
o In ring topology, devices are connected in a closed loop. Data travels in one
direction around the ring until it reaches the destination.
o Advantages: Can offer faster data transmission than bus topology, suitable for
large networks.
o Disadvantages: A failure in one device can disrupt the entire network.
4. Mesh Topology:
o In mesh topology, each device is connected to every other device. This
topology provides multiple paths for data transmission.
o Advantages: Very reliable, if one connection fails, data can take another
route.
o Disadvantages: Expensive to implement and maintain due to a large number
of connections.
5. Tree Topology:
o Tree topology is a hybrid of star and bus topologies. It consists of groups of
star-configured networks connected to a central bus.
o Advantages: Scalability, easier to manage and troubleshoot.
o Disadvantages: More complex and expensive to install.
Types of Addresses:
Propagation in networking refers to the way data signals travel across a medium (such as
cables or air) from one device to another. There are several methods through which signals
propagate, and the type of medium affects how the signal moves.
Propagation Methods:
Copyright is a legal protection granted to the creators of original works such as literary,
musical, artistic, and other intellectual properties. It gives the creator exclusive rights to
reproduce, distribute, and display their work.
Applications of Copyright:
1. Literary Works:
o Copyright protects novels, articles, scripts, and other written works. Authors
have exclusive rights to publish and distribute their work.
2. Music and Sound Recordings:
o Musicians and composers can control how their music is reproduced,
distributed, and performed. Copyright protects song lyrics, musical
compositions, and sound recordings.
3. Software:
o Copyright laws also apply to software programs, allowing developers to retain
the rights to their code and prevent unauthorized use or redistribution.
4. Artistic Works:
o Copyright protects paintings, sculptures, photographs, and other artistic works,
ensuring that the creators can control the use and reproduction of their
artwork.
5. Motion Pictures:
o Filmmakers have copyright over movies, ensuring that they control
distribution, display, and reproduction of the film.
Bluetooth Architecture:
a) Switch
Functions of a Switch:
Frame forwarding: A switch forwards data only to the device that needs it, based on
the MAC address.
Collision domain segmentation: Each port on a switch creates its own collision
domain, preventing data collisions.
Learning: Switches maintain a MAC address table, which they use to learn the
addresses of devices on the network and map them to specific ports.
Full-duplex communication: Allows devices to send and receive data
simultaneously, increasing overall network speed.
Features of VLAN:
Types of VLANs:
c) Types of Network
There are several types of networks that differ in size, purpose, and geographical coverage.
Here are the primary types: