-:Assignment Of CCN:- Name College Roll No University Roll No Class BS(CS) Subject Computer Communication & Network Submitted to Semester 4 th Group Evening Q1: Token Ring: Token ring is also a...




-:Assignment Of CCN:-






Name




College Roll No



University Roll No



Class BS(CS)



Subject Computer Communication & Network



Submitted to





Semester 4th



Group Evening

























Q1: Token Ring:


Token ring is also a LAN technology. It allows network devices to access the network by passing a special signal called token.



FDDI:


FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for data transmission on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol. FDDI is frequently used on the backbone for a wide area network (WAN).



Q2: ARCNET:


Attached Resource Computer Network (abbreviated ARCNET or ARCnet) is a communications protocol for local area networks. ARCNET is a widely-installed local area network (LAN) technology that uses a token-bus scheme for managing line sharing among the workstations and other devices connected on the LAN.



Q3: Address Resolution Protocol (ARP):



The address resolution protocol (ARP) is a protocol used by the Internet Protocol (IP), specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer.



Q4: Asynchronous transfer mode (ATM):



Asynchronous transfer mode (ATM) is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells. This is different from Ethernet or Internet, which use variable-sized packet for data or frames.



Q5: Broadband:


It is a technique to transmit large amount of data such as voice and video over a long distance. It is faster than baseband.



Baseband:



It is a communication technique in which digital signals are placed on the transmission line without change in modulation. Digital signals are commonly called baseband signals.





Q6: Bus:



A bus is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocols.


All buses consist of two parts. A data bus and an address bus. The data bus transfers actual data whereas the address bus transfers information about where the data should go.



Q7: Checksum
:


A checksum or hash sum is used for the purpose of detecting errors which may have been introduced during its transmission or storage. It is usually applied to an installation file after it is received from the download server.



Q8: Cyclic redundancy check (CRC):


A cyclic redundancy check (CRC) is a method of detecting errors in the transmission of data. Before data is sent, a CRC number is calculated by running the data through an algorithm and producing a unique number. At the receiving end of the transmission, the data is run through the same algorithm again to produce the


number. If numbers match, the data was sent error free. The unique value generated from the algorithm is called a checksum.



Q9: Datagram:


A datagram is a basic transfer unit associated with a packet-switched network. The delivery, arrival time, and order of arrival need not be guaranteed by the network.



Q10: Electromagnetic interference (EMI):


Electromagnetic interference (EMI), also called radio-frequency interference (RFI). When in the radio frequency spectrum, is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.



Q11: Ethernet:


Ethernet is a LAN technology. It is based on bus topology but Ethernet network can be wired in star topology also. It is the most popular LAN because it is inexpensive and easy to install and manage. Ethernet network normally uses cables to transmit data.


Ethernet is a family of computer networking technologies commonly used in local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3.



Q12: Ethernet Types:






­


• Standard Ethernet (10 Mbps) can be configured with cables, hubs, or switches. CSMA/CD (Carrier sense multiple access with collision detection) uses this Ethernet.


• Fast Ethernet (100 Mbps) was designed to compete with LAN protocols such as FDDI (Fiber Distributed Data Interface) or Fiber Channel.








• The need for higher data rate resulted in the design of the Gigabit Ethernet (1000 Mbps or 1Gbps).


• Ten Gigabit Ethernet (10GbE) is a group of computer networking technologies for transmitting Ethernet frames at a rate of 10Gbps (gigabits per second). Ten Gigabit Ethernet defines only full duplex. 10GbE can use either copper or fiber cabling.



Q13: Gateway:


Gateway is a device that connects two or more networks with different types of protocols. For example: The computers on a LAN requires gateway to access the internet.



Bridges:


Bridges is a device that connects two network segments. It is used to connect similar types of networks. Bridges is a Data link layer device.



Q14: HDLC (High-level Data Link Control):


HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes). In HDLC, data is organized into a unit (called a frame) and sent across a network to a destination that verifies its successful arrival.



Point-to-Point Protocol (PPP):



In computer networking, Point-to-Point Protocol (PPP) is a data link (layer 2) protocol used to establish a direct connection between two nodes. It can provide connection authentication, transmission encryption, and compression.



Q15: Intermediate Devices:


The Network layer decides what path data will take if the destination device is located on another network. Data passes through the network by devices called Intermediate devices.



Q16: Internet Protocol (IP):


The Internet Protocol (IP) is the protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.



IPX (Internetwork Packet Exchange):


IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers. IPX is a datagram or packet protocol. IPX works at the Network layer of communication protocols and is connectionless. It may act as a transport layer protocol as well.



Q17: SMTP (Simple Mail Transfer Protocol):


SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. Users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail.



Simple Network Management Protocol (SNMP):


Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.



Q18: Transmission Control Protocol (TCP):


Transmission Control Protocol (TCP) is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.



User Datagram Protocol (UDP):


UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections between applications on the Internet. Both UDP and TCP run on top of the Internet Protocol (IP) and are sometimes referred to as UDP/IP or TCP/IP. Both protocols send short packets of data, called datagrams.



Q:

IP Addressing:




































Class



First Octet Range



Max Hosts



A



1-126



16M



B



128-191



64K



C



192-223



254



D



224-239



N/A



E



240-255



N/A







Q: What are Straight and Crossover cable:



















































Pin ID



Straight cable



Crosssover cable



1



Orange - White



Green – White



2



Orange



Green



3



Green – White



Orange – White



4



Blue



Brown – White



5



Blue-White



Brown



6



Green



Orange



7



Brown – White



Blue



8



Brown



Blue - White




























Q: Network security issues:


Hardware or Physical Security issues involve four types of issues:


1) Physical


2) Electrical


3) Environmental


4) Maintenance


· Physical security is the protection of personal,hardware,software,networks and date from physical action and events that could cause serious loss or damage to an enterprise,agency or institution.


· A short circuit is an electrical circuit that allows a current to travel along an unintended path with no or very low electrical impendance.


· Environmental issues are defined as problems with the plant systems that have developed as a result of human interference or mistreatment of the plantet.


· The act of maintaining or the state of being maintained nutrients essential to the maintenance of good health.


Other types of network security issues or attacks:


a) Active Attack:


b) Distributed Attack:


c) Phishing Attack:


d) Password attack:


e) Hijack attack:


· An active attact is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.


· A distributed attack is an attack in which multiple compromised computer systems atteck a target ,such as a server,website or other network resource.


· Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge.


· In cryptanalysis and computer security,password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.



· Hijacking is a type of network security attack in which the attacker takes control of communication – just as an airplane hijacker takes control of a flight – between two entities and masquerades as one of them.

Oct 31, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here