computer networks (1)
computer networks (1)
PREREQUISTE
QUESTIONS
V Nandini KANDAN
SUBMITTED TO:Dr.K.B.MANI
Mam
1. Introduction to Networks
a) What is a computer network?
b) Can you explain the difference between a LAN (Local Area Network) and
a WAN (Wide Area Network)?
c) What are the primary goals of networking?
7 Due to short distance short circuit In this network, short circuit errors,
error or other noise error are noise errors are higher than any
minimum. other network.
8 For e.g.: A computer lab in a For e.g.: pager
college.
c) Primary goals of networking: The primary goals of networking can be
summarized as follows:
2. Network Topologies
a) What are network topologies?
b) Name and describe at least three different types of network topologies.
c) What are the advantages and disadvantages of a star topology?
1. Bus Topology:
o Advantages:
Simple and inexpensive to implement.
Well-suited for small networks with a limited number of devices.
o Disadvantages:
Can suffer from collisions (when two devices
transmit simultaneously) leading to data loss.
This network topology is very slow as compared to other
topologies.
A failure in the main cable can disable the entire network.
2. Star Topology:
In a star topology, each device connects directly to a central hub or switch. All
communication between devices goes through the central hub.
o Advantages:
o It is high-performing as no data collisions can occur.
o No disruptions to the network when connecting or removing devices.
o Disadvantages:
o Requires more cable than a linear bus.
o If the connecting network device (network switch) fails, the nodes
attached are disabled and can’t participate in network communication.
3. Ring Topology:
o In a ring topology, devices are connected in a circular manner, where
each device is connected to exactly two other devices, forming a closed
loop.
o Data travels in one direction around the ring.
o Advantages:
Simple and easy to install.
Equal access to the network resources since each device has the
same opportunity to transmit data.
o Disadvantages:
Failure of one device or cable segment can disrupt the entire
network.
Expansion or reconfiguration of the network can be difficult.
Typically, slower than other topologies like star and bus due to
the sequential passing of data.
Advantages:
Disadvantages:
Dependency on central hub: If the central hub fails, the entire network becomes
inoperable.
Cost: Setting up a star topology can be more expensive initially due to the
need for a central device.
Limited by hub capacity: The performance of the network can be limited by
the capacity of the central hub, especially under heavy traffic conditions.
3. Network Models
a) What is the OSI model, and why is it important in networking?
b) List and describe the seven layers of the OSI model.
c) What is the difference between the OSI model and the TCP/IP model?
1. Physical Layer:
o The lowest layer of the OSI model.
o Concerned with transmitting raw data bits over a physical medium
(e.g., cables, wireless signals).
o Defines electrical, mechanical, and procedural standards for transmitting
data.
2. Data Link Layer:
o Responsible for node-to-node communication within the same network
segment.
o Translates data from the physical layer into frames.
o Manages access to the physical medium, error detection, and correction.
3. Network Layer:
o Handles routing of data packets across different networks.
o Determines the optimal path for data transfer from source to destination.
o Provides logical addressing (IP addresses) and manages traffic
congestion.
4. Transport Layer:
o Ensures reliable data transfer between end devices.
o Provides error-checking, flow control, and data segmentation.
o Examples include TCP (Transmission Control Protocol) and UDP
(User Datagram Protocol).
5. Session Layer:
o Manages sessions (connections) between applications on different
devices.
o Establishes, maintains, and terminates communication sessions.
o Handles synchronization, check pointing, and recovery of data exchange.
6. Presentation Layer:
o Translates data from the application layer into a format suitable
for transmission over the network.
o Handles data encryption, compression, and formatting (e.g., ASCII,
JPEG).
7. Application Layer:
o Provides network services directly to end-user applications.
o Supports communication and data exchange for specific applications
(e.g., email, web browsing).
o Implements protocols like HTTP, FTP, SMTP.
Number of Layers:
o OSI model: Consists of seven layers, each with a specific function and
purpose.
o TCP/IP model: Combines some functions of the OSI model's layers,
resulting in a four-layer model.
Layer Names and Functions:
o OSI model: Each layer has a distinct name and clear separation
of functions (e.g., physical, data link, network).
o TCP/IP model: Layers are named differently and sometimes combine
functions of multiple OSI layers (e.g., Network Interface Layer
combines aspects of OSI's physical and data link layers).
Development and Use:
o OSI model: Developed by the International Organization for
Standardization (ISO) as a theoretical model for standardizing network
communication.
o TCP/IP model: Developed by the U.S. Department of Defense and
widely used in the design and implementation of the Internet.
Focus:
o OSI model: Emphasizes defining and standardizing the functions
and interactions of each layer in a communication system.
o TCP/IP model: Focuses on the practical implementation of networking
protocols used in the Internet and related systems.
4. Networking Hardware
a) What is a router, and how does it function in a network?
b) Can you explain the role of a switch in a network?
c) What is the difference between a hub and a switch?
A router is a networking device that connects different networks together. Its primary
function is to forward data packets between computer networks. Routers operate at the
network layer (Layer 3) of the OSI model and use routing tables to determine the best
path for forwarding data packets. Here’s how a router functions:
A switch is a networking device that operates at the data link layer (Layer 2) of the
OSI model. Its primary function is to connect multiple devices within a local area
network (LAN) and forward data frames between them. Here’s how a switch
functions:
Packet Routing: Determines the best path for data packets to travel from
the source to the destination across interconnected networks.
Error Handling: Detects errors in data transmission and ensures reliable
delivery through mechanisms like acknowledgment and retransmission.
Addressing: Uses IP addresses to uniquely identify devices on a network
and allows devices to communicate with each other.
Protocols: Includes various protocols such as TCP (Transmission Control
Protocol) for reliable data delivery and UDP (User Datagram Protocol)
for faster but unreliable data transmission.
Interoperability: Facilitates interoperability across different types of
networks, enabling devices running on different hardware and software
platforms to
b)What is the purpose of the HTTP protocol?
The HTTP (Hypertext Transfer Protocol) protocol is used for transmitting and
receiving web pages, files, images, videos, and other resources on the World
Wide Web. Its primary purpose is to define how web browsers and web servers
communicate with each other. Here’s what HTTP enables:
HTTP is fundamental to the functionality of the World Wide Web, enabling users to
access websites, interact with web applications, and retrieve information from servers
worldwide. It is often supplemented by HTTPS (HTTP Secure), which adds
encryption and authentication layers to enhance security during data transmission.
6. IP Addressing
a) What is an IP address, and why is it important?
b) Explain the difference between IPv4 and IPv6.
c) How does subnetting work?
IP addresses are essential for accessing websites, sending emails, streaming videos,
and virtually every activity that involves network communication on the Internet.
Without IP addresses, devices would not be able to identify each other or
communicate effectively.
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address It supports Auto and renumbering
configuration address configuration
In IPv4 end to end, connection integrity In IPv6 end-to-end, connection integrity
is Unachievable is Achievable
It can generate 4.29×109 address space The address space of IPv6 is quite large
it can produce 3.4×1038 address space
Address representation of IPv4 is in Address representation of IPv6 is in
decimal hexadecimal
Sub netting is the process of dividing a large network into smaller sub-networks,
called subnets. It allows efficient use of IP addresses and improves network
performance and security. Here’s how sub netting works:
Subnet Mask: A subnet mask is a 32-bit number that separates the network
portion of an IP address from the host portion. It helps devices determine
whether an IP address is on the local subnet or a remote network.
Network Address: The network address is obtained by applying the subnet
mask to the IP address. It defines the beginning of the subnet range.
Host Address: The host address represents individual devices within the
subnet and is used to differentiate between devices on the same subnet.
Benefits of sub netting:
o Efficient Use of IP Addresses: sub netting allows organizations to
divide a large pool of IP addresses into smaller, manageable segments.
o Improved Performance: Smaller subnets reduce broadcast traffic and
improve network performance by limiting the scope of broadcasts.
o Enhanced Security: Subnets provide a level of isolation between
different parts of a network, which can enhance security by
controlling access and containing network issues.
7. Network Configuration
a) What is DHCP, and how does it help in network management?
b) Explain the purpose of DNS in a network.
c) How would you configure a basic home network?
1. Internet Connection:
o Subscribe to an Internet Service Provider (ISP) and obtain a broadband
connection (e.g., DSL, cable, fiber).
2. Network Devices:
o Acquire necessary networking hardware such as a modem (provided by
ISP), router, and possibly a switch (if needed for additional wired
connections).
3. Router Configuration:
o Connect the modem to the router's WAN (Wide Area Network)
port using an Ethernet cable.
o Access the router's web-based configuration interface (usually through a
web browser) using the default IP address (often 192.168.1.1 or
192.168.0.1) and configure basic settings:
Set up a secure admin password.
Configure wireless network settings (SSID, encryption type,
passphrase).
Optionally, configure LAN IP settings (DHCP settings, subnet
mask).
4. Wi-Fi Configuration:
o Enable Wi-Fi on the router.
o Set up a Wi-Fi network name (SSID) and a strong password to
secure your wireless network.
5. Connect Devices:
o Connect devices (computers, smartphones, tablets, smart TVs) to the Wi-
Fi network using the SSID and password configured on the router.
o For devices requiring wired connections, connect them to the
router's LAN ports or use a switch for additional wired connections.
6. Optional Settings:
o Configure additional network features such as port forwarding (if
hosting servers or using specific applications that require external
access), parental controls, and guest networks.
7. Test Connectivity:
o Verify that all connected devices can access the Internet and
communicate with each other on the local network.
The ping command is used to check the connectivity between two networked devices
by sending ICMP (Internet Control Message Protocol) echo request packets to a
specific IP address or hostname. The primary purposes of the ping command are:
For example, to use ping, you would open a command prompt or terminal and type
ping <hostname or IP address>. It continuously sends ICMP echo requests until
stopped manually, providing feedback on the status and responsiveness of the remote
host.
b) How do you use the ‘tracert’ (or ‘traceroute’) command to diagnose network
issues?
Active Connections: Lists all current network connections (both incoming and
outgoing) including TCP, UDP, and RAW protocols.
Listening Ports: Displays all open ports on your system and the
associated listening services.
Routing Table: Shows the routing table entries, indicating how data
packets are forwarded to their destinations.
Interface Statistics: Provides statistics for network interfaces such as packets
transmitted and received, errors, collisions, etc.
Network Protocol Statistics: Includes statistics for various network protocols
like TCP, UDP, ICMP, and others.
To use netstat, open a command prompt or terminal and type netstat. Depending on
the operating system and specific options used (netstat -a for all connections and
listening ports, netstat -r for routing table, etc.), it provides valuable information for
diagnosing network issues, monitoring network activity, and managing network
configurations.
Network security refers to the policies, practices, and technologies designed to protect
the integrity, confidentiality, and availability of computer networks and the data they
transmit and store. It is crucial for several reasons:
Firewall:
o A firewall is a network security device or software that monitors and
controls incoming and outgoing network traffic based on predetermined
security rules.
o Function: It acts as a barrier between a trusted internal network and
untrusted external networks (like the Internet), filtering traffic to
block malicious packets and unauthorized access attempts.
o Types: Firewalls can be hardware-based (physical devices) or software-
based (installed on servers or endpoints).
Antivirus Program:
o An antivirus program is a software application designed to detect,
prevent, and remove malicious software (malware) such as viruses,
worms, trojans, and spyware from computer systems.
o Function: It scans files and programs for known patterns of
malicious code (virus signatures) and suspicious behavior to protect
against infections and data breaches.
o Types: Antivirus software is typically installed on individual
devices (endpoints) and operates at the operating system level.
Key Difference:
Symmetric Encryption:
o Uses a single key (symmetric key) for both encryption and decryption.
o Process: The sender encrypts plaintext using the symmetric key before
transmission. The recipient uses the same symmetric key to decrypt
the ciphertext and retrieve the original plaintext.
o Advantages: Faster processing speed compared to asymmetric
encryption.
o Example Algorithms: AES (Advanced Encryption Standard), DES
(Data Encryption Standard).
Asymmetric Encryption:
o Uses a pair of keys (public key and private key) for encryption
and decryption.
o Process: Each user has a public key (known to everyone) and a private
key (kept secret). The sender encrypts plaintext using the recipient's
public key. The recipient decrypts the ciphertext using their private
key.
o Advantages: Provides enhanced security due to the separation of keys;
private keys never leave the recipient's possession.
o Example Algorithms: RSA (Rivest-Shamir-Adleman), ECC (Elliptic
Curve Cryptography).
SSL/TLS plays a critical role in securing sensitive information exchanged over the
Internet, such as login credentials, financial transactions, and personal data. It ensures
that data remains confidential and tamper-proof, protecting both users and
organizations from potential cyber threats.