CNNSIMPQANSAUNIT1234BYPAL
CNNSIMPQANSAUNIT1234BYPAL
UNIT-1
1. What is a network? Explain its components with
examples.
• Multipoint Connection:
1. One sender, multiple receivers.
2. Shared link between multiple devices.
3. Example: Radio broadcast.
4. Example: Wi-Fi network.
5. Less secure than point-to-point.
Main Function:
The main function of the Data Link Layer is to provide
error-free transfer of data frames between two devices on
the same network.
Data Integrity:
The Data Link Layer ensures data integrity through:
1. Framing: Divides data into manageable frames.
2. Error Detection: Uses checksums or CRCs to detect
errors.
3. Error Correction: Corrects errors using
retransmission or forward error correction.
4. Flow Control: Regulates data flow to prevent
congestion.
5. Acknowledgment: Sends acknowledgments to
confirm receipt of frames.
Synchronization
1. Coordinates data transfer: Ensures that data is
transferred in the correct order.
2. Provides checkpoints: Establishes checkpoints to
ensure data integrity.
3. Manages dialog termination: Gracefully terminates the
dialog when finished.
Connection-Oriented Protocols
- Connection establishment before data transfer
- Data sent as a continuous stream
- Guaranteed delivery and order
- Examples:
- TCP (Transmission Control Protocol)
- FTP (File Transfer Protocol)
- SSH (Secure Shell)
OSI Model
1. 7 layers: Physical, Data Link, Network, Transport,
Session, Presentation, Application
2. Theoretical model: Developed by ISO (International
Organization for Standardization)
3. Generic: Not specific to any particular network
architecture
TCP/IP Model
1. 4 layers: Network Access, Internet, Transport,
Application
2. Practical model: Developed by Department of
Defense (DoD)
3. Internet-specific: Designed for the Internet and
other TCP/IP-based networks
21. Explain the process of error detection in data
communication.
Error detection is essential to ensure data integrity during
transmission over networks. Techniques include:
- Parity Bits: Adds an extra bit to data to make the number
of 1s either even (even parity) or odd (odd parity).
- Checksum: The sender adds up data segments, and the
sum (checksum) is sent with the data. The receiver
recalculates the checksum to detect errors.
- Cyclic Redundancy Check (CRC): Uses polynomial
division to detect errors in data blocks. It’s highly reliable
and widely used in networks like Ethernet.
MESH Topology
1. Each device connects to every other device.
2. Multiple paths for data to travel, providing
redundancy.
Types of Switches:
1. Unmanaged Switch: Simple plug-and-play device with
no configuration options.
2. Managed Switch: Can be configured and monitored for
advanced network management.
3. Smart Switch: Combines features of managed and
unmanaged switches with some configuration options.
4. PoE (Power over Ethernet) Switch: Supplies power to
connected devices over Ethernet cables.
5. Stackable Switch: Multiple switches can be stacked
together for increased port density and scalability.
6. Modular Switch: Allows for adding or removing
modules as needed for flexibility and customization.
54. What is the role of the Transport Layer in
the TCP/IP model? Explain its function in
process-to-process communication. The.Role
of the Transport Layer:
1. Provides reliable data transfer
2. Ensures error-free data delivery
3. Guarantees data sequencing
4. Flow control and congestion avoidance
5. Multiplexing and demultiplexing
Function in Process-to-Process
Communication:
Advantages:
- Faster encryption and decryption.
- Requires less computational power.
Disadvantages:
- Key distribution is difficult.
- If the key is compromised, all communication is at risk.
accessible.
4. Authentication – Verifies user and system identities.
5. Non-repudiation – Prevents denial of actions
performed by users.
66) Comparison between symmetric and asymmetric
encryption methods.
Example:
Input: "Hello"
SHA-256 Output:
2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e7
3043362938b9824
authentication.
71) What is key management, and why is it important
in cryptography?
Key Management: The process of generating, storing,
distributing, and retiring cryptographic keys securely.
Importance:
- Ensures confidentiality and integrity of data.
- Prevents unauthorized access to sensitive keys.
- Supports secure communication in cryptographic
systems.
modifications.
- Availability – Ensures that network services remain
accessible.
76) SSL/TLS protocols are what kind of protocol?
Explain their working.
Type: Secure communication protocols that provide
encryption for data transmission over networks.
Working:
1. Handshake Process – Client and server exchange keys
and agree on encryption parameters.
2. Authentication – Server sends its digital certificate to
verify identity.
3. Key Exchange – Secure session key is generated and
shared.
4. Data Encryption – Secure communication starts using
symmetric encryption.
Types:
1. Voluntary Tunneling – Initiated by the client using
software like VPNs.
2. Compulsory Tunneling – Established at the network
level by the ISP or gateway.
Dynamic Firewalls:
- Adapt to changing network conditions and threats.
- Can block suspicious traffic in real time.
- Use deep packet inspection and machine learning for
threat detection.
Static Firewalls:
Examples:
1. SSL/TLS – Secures web traffic using encryption.
2. IPsec – Provides secure IP communication via
encryption and authentication.
3. HTTPS – Secure version of HTTP for safe web browsing.
4. SSH – Securely connects to remote systems.
5. VPN (Virtual Private Network) – Creates encrypted
tunnels for secure remote access.
81) WPA vs. WPA2?
Importance:
- Encrypts internet traffic to ensure privacy.
Uses:
- Secure remote work and corporate networks.
- Accessing geo-restricted content.
- Protecting personal data on public Wi-Fi.
Dynamic Firewalls:
- Adapt in real-time to new threats.
- Use AI/ML for advanced threat detection.
- Automatically update rules to counter attacks.
Static Firewalls:
- Rely on pre-configured rules.
- Need manual updates for new threats.
Working:
- Secures IP communication by encrypting and
authenticating packets.
- Uses two main protocols:
Working:
1. User connects to a VPN server – The device sends
encrypted data to a VPN server.
2. Data Encryption – VPN uses protocols like OpenVPN or
IPsec to secure data.
3. IP Masking – The VPN server assigns a new IP address
to hide the user's real identity.
4. Secure Communication – All data travels through a
secure tunnel, protecting it from hackers and surveillance.
Functioning:
- Filters traffic based on security rules.
- Blocks unauthorized access while allowing legitimate
communication.
Types of Firewalls:
1. Packet Filtering Firewall – Examines data packets and
allows/block based on rules.
2. Stateful Inspection Firewall – Tracks active
connections for better security.
3. Proxy Firewall – Intermediary between users and the
internet for additional security.
4. Next-Generation Firewall (NGFW) – Uses deep packet
inspection and AI for advanced threat protection.
5. Cloud-Based Firewall – Protects cloud environments
from cyber threats.