Professional Documents
Culture Documents
NF QP PDF
NF QP PDF
Answer :-
BASIS FOR
GUIDED MEDIA UNGUIDED MEDIA
COMPARISON
transmission. water.
communication or communication or
media. media.
IPV4 IPV6
IPv4 has 32-bit address length IPv6 has 128-bit address length
IPV4 IPV6
It Supports Manual and DHCP address configuration It supports Auto and renumbering address configuration
In IPv4 end to end connection integrity is Unachievable In IPv6 end to end connection integrity is Achievable
Security feature is dependent on application IPSEC is inbuilt security feature in the IPv6 protocol
In IPv4 Packet flow identification is not available flow label field in the header
In IPv4 Encryption and Authentication facility not In IPv6 Encryption and Authentication are provided
provided
Q3. Write the difference between TCP and UDP. What are application of UDP ?
Answer:-
should close the connection after UDP is efficient for broadcast and
mechanisms. It is because it provides flow UDP has only the basic error checking
this means that packets arrive in-order at ordering is required, it has to be managed
Applications of UDP:
Used for simple request response communication when size of data is less and hence
there is lesser concern about flow and error control.
It is suitable protocol for multicasting as UDP supports packet switching.
UDP is used for some routing update protocols like RIP(Routing Information Protocol).
Normally used for real time applications which can not tolerate uneven delays between
sections of a received message.
Answer:-
Objectives of FTP
Answer:-
Internet Protocol hierarchy contains several classes of IP Addresses to be used
efficiently in various situations as per the requirement of hosts per network. Broadly,
the IPv4 Addressing system is divided into five classes of IP Addresses. All the five
classes are identified by the first octet of IP Address.
Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses.
The first octet referred here is the left most of all. The octets numbered as follows
depicting dotted decimal notation of IP Address −
The number of networks and the number of hosts per class can be derived by this
formula −
Q2.2) {B} Explain OSI reference model. How communication is done using OSI reference model.?
Answer :-
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues,
and they are implemented only in the software. The application layer is closest to
the end user. Both the end user and the application layer interact with the
software applications. An upper layer refers to the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data
link layer and the physical layer are implemented in hardware and software. The
physical layer is the lowest layer of the OSI model and is closest to the physical
medium. The physical layer is mainly responsible for placing the information on
the physical medium.
Answer:-
In Layer 2 of a network, the Media Access Control (MAC) sublayer provides addressing and channel
access control mechanisms that enable several terminals or network nodes to communicate in a
network.
The MAC sublayer acts as an interface between the logical link control (LLC) Ethernet sublayer and
Layer 1 (the physical layer). The MAC sublayer emulates a full-duplex logical communication channel
in a multipoint network. This channel may provide unicast, multicast, or broadcast communication
service. The MAC sublayer uses MAC protocols to prevent collisions.
In Layer 2, multiple devices on the same physical link can uniquely identify one another at the data
link layer, by using the MAC addresses that are assigned to all ports on a switch. A MAC algorithm
accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a
MAC address.
A MAC address is a 12-digit hexadecimal number (48 bits in long). MAC addresses are usually written
in one of these formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are
regulated by an Internet standards body. The second half of a MAC address represents the serial
number assigned to the adapter by the manufacturer.
Contrast MAC addressing, which works at Layer 2, with IP addressing, which runs at Layer 3
(networking and routing). One way to remember the difference is that the MAC addresses apply to a
physical or virtual node, whereas IP addresses apply to the software implementation of that node.
MAC addresses are typically fixed on a per-node basis, whereas IP addresses change when the node
moves from one part of the network to another.
IP networks maintain a mapping between the IP and MAC addresses of a node using the Address
Resolution Protocol (ARP) table. DHCP also typically uses MAC addresses when assigning IP
addresses to nodes.
Q3.3 {B} Explain 3-way handshake for connection establishment in TCP/IP model.?
Answer:-
TCP traffic begins with a three-way handshake. In this TCP handshake process, a client needs to
initiate the conversation by requesting a communication session with the Server:
Step 1: In the first step, the client establishes a connection with a server. It sends a
segment with SYN and informs the server about the client should start communication,
and with what should be its sequence number.
Step 2: In this step server responds to the client request with SYN-ACK signal set. ACK
helps you to signify the response of segment that is received and SYN signifies what
sequence number it should able to start with the segments.
Step 3: In this final step, the client acknowledges the response of the Server, and they
both create a stable connection will begin the actual data transfer process.
Summary
1) HTTP/HTTPS :-
HTTP : Full form of HTTP is Hypertext Transfer Protocol. HTTP offers set of rules and
standards which govern how any information can be transmitted on the World Wide
Web. HTTP provides standard rules for web browsers & servers to communicate.
HTTP is an application layer network protocol which is built on top of TCP. HTTP uses
Hypertext structured text which establishes the logical link between nodes containing
text. It is also known as "stateless protocol" as each command is executed separately,
without using reference of previous run command.
Advantages of HTTP:
HTTP can be implemented with other protocol on the Internet, or on other networks
HTTP pages are stored on computer and internet caches, so it is quickly accessible
Platform independent which allows cross-platform porting
Does not need any Runtime support
Usable over Firewalls! Global applications are possible
Not Connection Oriented; so no network overhead to create and maintain session state and
information.
Limitations of HTTP
There is no privacy as anyone can see content
Data integrity is a big issue as someone can alter the content. That's why HTTP protocol is an
insecure method as no encryption methods are used.
Not clear who you are talking about. Anyone who intercepts the request can get the username
and password.
HTTPS : HTTPS stands for Hyper Text Transfer Protocol Secure. It is highly advanced
and secure version of HTTP. It uses the port no. 443 for Data Communication. It allows
the secure transactions by encrypting the entire communication with SSL. It is a
combination of SSL/TLS protocol and HTTP. It provides encrypted and secure
identification of a network server.
HTTP also allows you to create a secure encrypted connection between the server and
the browser. It offers the bi-directional security of Data. This helps you to protect
potentially sensitive information from being stolen.
In HTTPS protocol SSL transactions are negotiated with the help of key-based
encryption algorithm. This key is generally either 40 or 128 bits in strength.
Advantages of HTTPS
In most cases, sites running over HTTPS will have a redirect in place. Therefore,
even if you type in HTTP:// it will redirect to an https over a secured connection
It allows users to perform secure e-commerce transaction, such as online
banking.
SSL technology protects any users and builds trust
An independent authority verifies the identity of the certificate owner. So each
SSL Certificate contains unique, authenticated information about the certificate
owner.
Limitations of HTTPS
HTTPS protocol can't stop stealing confidential information from the pages
cached on the browser
SSL data can be encrypted only during transmission on the network. So it can't
clear the text in the browser memory
o TELNET : The main task of the internet is to provide services to users. For
example, users want to run different application programs at the remote site and
transfers a result to the local site. This requires a client-server program such as
FTP, SMTP. But this would not allow us to create a specific program for each
demand.
o The better solution is to provide a general client-server program that lets the user
access any application program on a remote computer. Therefore, a program that
allows a user to log on to a remote computer. A popular client-server program
Telnet is used to meet such demands. Telnet is an abbreviation for Terminal
Network.
o Telnet provides a connection to the remote computer in such a way that a local
terminal appears to be at the remote side.
Q5.5 {A} What do you mean by networking devices? Explain any 2 devices.?
Answer :-
Hardware devices that are used to connect computers, printers, fax machines and other
electronic devices to a network are called network devices. These devices transfer data
in a fast, secure and correct way over same or different networks. Network devices may
be inter-network or intra-network. Some devices are installed on the device, like NIC
card or RJ45 connector, whereas some are part of the network, like router, switch, etc.
Let us explore some of these devices in greater detail.
Types :-
Modem
Modem is a device that enables a computer to send or receive data over telephone or cable
lines. The data stored on the computer is digital whereas a telephone line or cable wire can
transmit only analog data.
The main function of the modem is to convert digital signal into analog and vice versa. Modem
is a combination of two devices − modulator and demodulator. The modulator converts
digital data into analog data when the data is being sent by the computer.
The demodulator converts analog data signals into digital data when it is being received by
the computer.
Switch – A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a
large number of ports imply less traffic) and performance. A switch is a data link layer device. The
switch can perform error checking before forwarding data, that makes it very efficient as it does not
forward packets that have errors and forward good packets selectively to correct port only. In other
words, switch divides collision domain of hosts, but broadcast domain remains same.
Q4.4 {B} What are Network security goals? Also explain different kind of
network attack possible.?
Answer :-
These goals form the confidentiality, integrity, availability (CIA) triad, the basis of
all security programs. The CIA triad is a security model that is designed to guide
policies for information security within the premises of an organization or
company. This model is also referred to as the AIC (Availability, Integrity, and
Confidentiality) triad to avoid the confusion with the Central Intelligence
Agency. The elements of the triad are considered the three most crucial
components of security.
The CIA criteria are one that most of the organizations and companies use when
they have installed a new application, creates a database or when guaranteeing
access to some data. For data to be completely secure, all of these security goals
must come into effect. These are security policies that all work together, and
therefore it can be wrong to overlook one policy.
Unlike attacks that are designed to enable the attacker to gain or increase access,
denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s
enough to have the satisfaction of service denial. However, if the attacked resource
belongs to a business competitor, then the benefit to the attacker may be real
enough. Another purpose of a DoS attack can be to take a system offline so that a
different kind of attack can be launched. One common example is session hijacking,
which I’ll describe later.
There are different types of DoS and DDoS attacks; the most common are TCP SYN
flood attack, teardrop attack, smurf attack, ping-of-death attack and botnets.
A MitM attack occurs when a hacker inserts itself between the communications of a
client and a server. Here are some common types of man-in-the-middle attacks:
Session hijacking
In this type of MitM attack, an attacker hijacks a session between a trusted client and
network server. The attacking computer substitutes its IP address for the trusted
client while the server continues the session, believing it is communicating with the
client. For instance, the attack might unfold like this: