Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 4/
  5. Computer Networking (4343202)/

Computer Networking (4343202) - Winter 2024 Solution

26 mins· ·
Study-Material Solutions Computer-Networking 4343202 2024 Winter
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Question 1(a) [3 marks]
#

What is the Computer Network? Why it is important?

Answer: A computer network is a collection of interconnected computing devices that can exchange data and share resources.

Diagram:

CCoommppuutteerrCCoommppuutteerr
  • Resource sharing: Enables sharing of printers, files, applications
  • Communication: Facilitates information exchange between users
  • Scalability: Allows networks to grow as needs increase

Mnemonic: “CSI” - “Connect, Share, Interact”

Question 1(b) [4 marks]
#

Define terms: 1) Web Server, 2)Encrypted data, 3)Hacking, 4)Client-server

Answer:

TermDefinition
Web ServerSoftware/hardware that serves web content to clients using HTTP/HTTPS
Encrypted DataInformation converted to code to prevent unauthorized access
HackingUnauthorized access to computer systems through security vulnerabilities
Client-ServerNetwork model where centralized servers provide services to client computers

Diagram:

CLIENCTL-ISEENRTVERMORRDEEEQSLUP:EOSNTSESERVER

Mnemonic: “WECHS” - “Web servers Encrypt data, Clients and Hackers use Servers”

Question 1(c) [7 marks]
#

Classify and explain the transmission media in detail.

Answer: Transmission media are physical pathways that carry data in a network.

CategoryTypesCharacteristicsApplications
Guided Media
Twisted PairUTP, STP100m range, 10Mbps-10GbpsOffice LANs
Coaxial CableBaseband, Broadband500m range, 10-100MbpsCable TV, Internet
Fiber OpticSingle-mode, Multi-modeLong distance, 100Mbps-100GbpsBackbone, WAN
Unguided Media
Radio WavesWiFi, CellularOmnidirectional, 1-100MbpsWireless networks
MicrowavesTerrestrial, SatelliteLine-of-sight, 1-10GbpsPoint-to-point links
InfraredIrDAShort-range, 4-16MbpsRemote controls

Diagram:

GUUNITCFGRMIDwoiUainEiabIdcfDsxeDirrtirEooaMeaD:wrEdlOaeD:pMvdIPtEe:AaiD::icIr:A::===~=====~=====~|====~=====~=====~|====~=============>
  • Guided media: Physical paths for signal confinement
  • Unguided media: Wireless transmission through air/space
  • Selection factors: Cost, bandwidth, distance, environment

Mnemonic: “TCFRIM” - “Twisted pair, Coaxial, Fiber, Radio, Infrared, Microwave”

Question 1(c) OR [7 marks]
#

Explain WAN and MAN type of network.

Answer: Wide Area Networks (WAN) and Metropolitan Area Networks (MAN) are network types classified by geographic scope.

FeatureMAN (Metropolitan Area Network)WAN (Wide Area Network)
CoverageCity-wide (5-50 km)Country/Global (>50 km)
Speed10 Mbps - 10 Gbps1.5 Mbps - 1 Gbps
OwnershipMunicipal/TelecomMultiple organizations
TechnologiesEthernet, SONET, WiMAXFrame Relay, ATM, MPLS
ExamplesCity networks, Campus networksInternet, Corporate networks

Diagram:

GMCWluoAoluNbtnaitlprlieesCCiCatomynpCnuaMiesrAtceeNytsae/sd
  • MAN: Connects LANs within a city/metropolitan area
  • WAN: Spans large geographical areas across cities/countries
  • Management: WAN typically requires service providers
  • Infrastructure: Different transmission media and technologies

Mnemonic: “SWIM” - “Size: WAN Is Massive compared to MAN”

Question 2(a) [3 marks]
#

Explain in detail: Transmission technology.

Answer: Transmission technology refers to methods used to transfer data between network devices.

Technology TypeDescriptionExample
Point-to-PointDirect connection between two nodesLeased line
BroadcastSingle communication channel shared by all nodesWireless LAN
MultipointMultiple devices share single linkCable networks
  • Analog transmission: Continuous signal, susceptible to noise
  • Digital transmission: Discrete signal, more reliable
  • Baseband: Single signal uses entire bandwidth (Ethernet)
  • Broadband: Multiple signals share bandwidth (Cable TV)

Mnemonic: “ABP-DMB” - “Analog or Baseband, Point-to-point; Digital or Multipoint, Broadcast”

Question 2(b) [4 marks]
#

Draw and explain Star topology in detail.

Answer: Star topology is a network configuration where all devices connect to a central hub/switch.

Diagram:

NNooddee14STARSNNTHWooOUIddPBTeeOC25LHO|GYNNooddee36
AdvantagesDisadvantages
Easy installationSingle point of failure (hub/switch)
Simple troubleshootingRequires more cable than bus topology
ScalableHigher cost due to central device
Better performanceHub/switch limits determine network size
  • Operation: All data passes through central device
  • Installation: Easier to manage and expand
  • Fault isolation: Node failure doesn’t affect others

Mnemonic: “CASE” - “Centralized, All connected, Simple expansion, Easy troubleshooting”

Question 2(c) [7 marks]
#

Draw and explain TCP/IP model.

Answer: TCP/IP model is a conceptual framework used for network communications, consisting of four layers.

Diagram:

((HETtTNhPEe,(TrAIWnPPFTIPOeHPTRN,RtYLPA(TK,SI,NTEIICSCRCAWCASPPNMCiATMO,EPC-LITRT,EFOPTUSiMN,DLAS,ELPARDLDA)YPLPIANYE)APAYSERYPE,RE,RReettcc..))
LayerMain FunctionsProtocols
ApplicationUser interfaces, data formattingHTTP, FTP, SMTP, DNS
TransportEnd-to-end communication, reliabilityTCP, UDP
InternetLogical addressing, routingIP, ICMP, ARP, IGMP
Network AccessPhysical addressing, media accessEthernet, WiFi, PPP
  • Application Layer: Interface between applications and network
  • Transport Layer: Reliable data transfer between end systems
  • Internet Layer: Routing packets across networks
  • Network Access Layer: Physical connection to network media

Mnemonic: “ATNI” - “Application Talks, Network Internet Interfaces”

Question 2(a) OR [3 marks]
#

Draw and explain Bus topology in detail

Answer: Bus topology is a network configuration where all devices connect to a single communication line.

Diagram:

Node1=B=U=S=TNOoPdNOeoL2dOeG=5Y===Node3====Node4
AdvantagesDisadvantages
Simple layoutSingle point of failure (main cable)
Less cablingLimited cable length
Low costPerformance degrades with more nodes
Easy to extendDifficult to troubleshoot
  • Operation: Data travels along the bus in both directions
  • Terminator: Required at both ends to prevent signal reflection
  • Usage: Primarily in older networks, small setups

Mnemonic: “SLUE” - “Simple Layout, Uses less cable, Easy installation”

Question 2(b) OR [4 marks]
#

Explain Network Classification based on its architecture.

Answer: Networks can be classified based on their architectural models that define how devices interact.

ArchitectureCharacteristicsExample
Peer-to-PeerEqual privileges, no dedicated serversHome networks, small workgroups
Client-ServerCentralized services, dedicated serversEnterprise networks, web services
Three-TierPresentation, application, and data tiersModern web applications
N-TierMultiple specialized tiersLarge distributed systems

Diagram:

PEERNN-ooTddOee-PEEXR:NNooddeeCLIECSNleTir-evSneEtrRVER:
  • Peer-to-Peer: Direct device communication, distributed resources
  • Client-Server: Centralized resource management, better security
  • Hybrid: Combines elements of both architectures

Mnemonic: “PCAN” - “Peer-to-peer, Client-server, Architecture Networks”

Question 2(c) OR [7 marks]
#

Explain classification of IP address.

Answer: IP addresses are classified into different categories based on their structure and purpose.

IP ClassificationRangeDefault MaskAvailable NetworksHosts/Network
Class A1.0.0.0 - 127.255.255.255255.0.0.0 (/8)12616,777,214
Class B128.0.0.0 - 191.255.255.255255.255.0.0 (/16)16,38465,534
Class C192.0.0.0 - 223.255.255.255255.255.255.0 (/24)2,097,152254
Class D (Multicast)224.0.0.0 - 239.255.255.255N/AN/AN/A
Class E (Reserved)240.0.0.0 - 255.255.255.255N/AN/AN/A

Special IP Ranges:

  • Private IPs: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
  • Loopback: 127.0.0.0/8 (typically 127.0.0.1)
  • Link-local: 169.254.0.0/16

Diagram:

CCCCCLLLLLAAAAASSSSSSSSSSABCDE:::::01111|0111N|011E|01TWNNOEERTTKWW(OO7RRKKb((MRi12UEt41LSsTE)bbIR|iiCVttAEssSD))TAADDDHDRORESESTSS(S(2H24O28S8bTHbi(Obit1Sits6Tts)(s)b8)itbsi)ts)
  • Classful addressing: Original IP address classification scheme
  • CIDR (Classless): Modern approach that allows flexible subnet masks
  • IPv4 vs IPv6: IPv4 uses 32-bit addresses, IPv6 uses 128-bit addresses

Mnemonic: “ABCDE” - “Address Blocks Categorized by Decreasing End-host counts”

Question 3(a) [3 marks]
#

What is full name of LAN? Explain it in detail.

Answer: LAN stands for Local Area Network, a network confined to a limited geographic area.

Diagram:

ComputerLOCALPrAiRSnEwtAietrNcEhTWORKCCoommppuutteerr
LAN CharacteristicsDescription
Geographic ScopeBuilding, campus, or small area (1-2 km)
Data RateHigh (10 Mbps to 10 Gbps)
OwnershipSingle organization or individual
TechnologyEthernet, WiFi, Token Ring
MediaTwisted pair, fiber optic, wireless
  • Purpose: Connect nearby devices for resource sharing
  • Administration: Easier management than larger networks
  • Applications: Office networking, home networking

Mnemonic: “LOCAL” - “Limited in range, Owned by one entity, Connected devices, Access control, Low latency”

Question 3(b) [4 marks]
#

Write a short-note of Repeater.

Answer: A repeater is a network device that amplifies and regenerates signals to extend network range.

Diagram:

SwNSieeegatgnkwmaeoelnrnsktWSeiagknalRSreiepgsentaaotlreerdSStirgonnaglNSeetgwmoernkt
FeatureDescription
OSI LayerPhysical Layer (Layer 1)
FunctionSignal regeneration and amplification
PurposeExtend network transmission distance
LimitationCannot filter traffic or connect different networks
  • Operation: Receives, regenerates, and retransmits signals
  • Usage: Extending cable length beyond normal limits
  • Types: Traditional repeaters, hubs (multiport repeaters)

Mnemonic: “RARE” - “Repeaters Amplify and Regenerate Electrical signals”

Question 3(c) [7 marks]
#

Write short note on FTP.

Answer: File Transfer Protocol (FTP) is a standard network protocol for transferring files between clients and servers.

Diagram:

CLIENTCDoanttaroClonCnoencnteicotnio(nPo(rPtor2t0)21)SERVER
FeatureDescription
PortControl: 21, Data: 20
ModeActive or Passive
AuthenticationUsername/password (or anonymous)
Transfer TypesASCII (text) or Binary (raw data)
SecurityBasic FTP (unsecured), FTPS, SFTP (secure variants)
  • Dual Channel: Separate control and data connections
  • Commands: GET, PUT, LIST, DELETE, RENAME, etc.
  • User Authentication: Requires login credentials

Mnemonic: “CDATA” - “Control channel, Data channel, Active/passive modes, Transfer types, Authentication”

Question 3(a) OR [3 marks]
#

What is full name of PAN? Explain in detail.

Answer: PAN stands for Personal Area Network, a network for connecting devices centered around an individual.

Diagram:

SEmaarrbtupdhsPoEnReS|ONA|LPSemAraRsrEotAnwaNtEcThW|OR|KLaptop
PAN CharacteristicsDescription
Geographic ScopeVery small (1-10 meters)
Data RateLow to medium (100 Kbps - 100 Mbps)
OwnershipIndividual person
TechnologyBluetooth, Zigbee, NFC, Infrared
DevicesPersonal devices (phones, wearables, laptops)
  • Purpose: Connect personal devices for communication/data sharing
  • Types: Wired PAN (USB) and Wireless PAN (Bluetooth)
  • Applications: Data synchronization, audio streaming, health monitoring

Mnemonic: “PIPER” - “Personal, Individual, Proximity, Easy setup, Reduced range”

Question 3(b) OR [4 marks]
#

What is the importance of a Bridge? Write short-note on it.

Answer: A bridge is a network device that connects and filters traffic between network segments.

Diagram:

SEDGeMvEiNcTeABRIDGESEDGeMvEiNcTeB
FeatureDescription
OSI LayerData Link Layer (Layer 2)
FunctionConnect similar network segments
IntelligenceUses MAC addresses to filter traffic
AdvantageReduces unnecessary traffic between segments
  • Importance: Extends network, reduces collision domains
  • Operation: Learns MAC addresses, forwards frames selectively
  • Types: Transparent, translational, source-route bridges

Mnemonic: “SELF” - “Segmentation, Extension, Learning addresses, Filtering traffic”

Question 3(c) OR [7 marks]
#

What is DSL? Explain its different types.

Answer: Digital Subscriber Line (DSL) is a family of technologies that provides digital data transmission over telephone lines.

Diagram:

HOME----MDOSDLEMC(oLPpiOpnTeeSr)DISSLPAM-INTERNET
DSL TypeFull NameSpeed (Down/Up)DistanceApplication
ADSLAsymmetric DSL8 Mbps/1 MbpsUp to 5.5 kmResidential internet
SDSLSymmetric DSL2 Mbps/2 MbpsUp to 3 kmSmall business
VDSLVery high-bit-rate DSL52-85 Mbps/16-85 MbpsUp to 1.2 kmVideo streaming, businesses
HDSLHigh-bit-rate DSL2 Mbps/2 MbpsUp to 3.6 kmT1/E1 replacement
IDSLISDN DSL144 Kbps/144 KbpsUp to 5.5 kmISDN alternative
  • Working Principle: Uses unused frequency spectrum on phone lines
  • Advantage: Uses existing telephone infrastructure
  • Always-on: Continuous connection without dial-up

Mnemonic: “SAVHI” - “Symmetric, Asymmetric, Very high-bit-rate, High-bit-rate, ISDN DSL”

Question 4(a) [3 marks]
#

Explain an error control and flow control at data link layer.

Answer: Error and flow control are essential data link layer functions that ensure reliable data transmission.

MechanismPurposeTechniques
Error ControlDetect/correct transmission errorsCRC, Checksums, Parity bits
Flow ControlPrevent sender overwhelming receiverStop-and-wait, Sliding window

Diagram:

EFRLROOSWSReenCnCdOdOeNeNrTrTRROOLLD:DS:AATTTOAAPCRheacnenievle|r-|A-C-K-/-N-A-K-->Receiver|
  • Error Detection: CRC, checksum identify corrupted frames
  • Error Correction: Forward Error Correction (FEC), retransmission
  • Flow Control: Prevents buffer overflow at receiver

Mnemonic: “SAFE” - “Stop-and-wait, Acknowledgment, Flow control, Error detection”

Question 4(b) [4 marks]
#

What is Firewall? Explain it in detail.

Answer: A firewall is a network security device that monitors and filters incoming and outgoing network traffic.

Diagram:

INHHTooEssRttN13ALNEHHTooWssOttR24KFIRFEIWLATLELR|---|INE|TxSEteRerNrvEneTarl
Firewall TypeFunctionalityExample
Packet FilteringExamines packet headersRouter ACLs
Stateful InspectionTracks connection stateMost hardware firewalls
Application LayerInspects contentWeb application firewalls
Next-GenerationCombines multiple technologiesPalo Alto, Fortinet
  • Purpose: Protects networks from unauthorized access
  • Implementation: Hardware, software, or cloud-based
  • Security Policy: Rules defining allowed/blocked traffic

Mnemonic: “PAPSI” - “Packet filtering, Application layer, Policies, Stateful inspection”

Question 4(c) [7 marks]
#

Compare IPV4 and IPV6.

Answer: IPv4 and IPv6 are Internet Protocol versions with significant differences in addressing and capabilities.

FeatureIPv4IPv6
Address Size32-bit (4 bytes)128-bit (16 bytes)
FormatDotted decimal (192.168.1.1)Hexadecimal with colons (2001:0db8:85a3::8a2e:0370:7334)
Address Space~4.3 billion addresses340 undecillion addresses
HeaderVariable length (20-60 bytes)Fixed length (40 bytes)
FragmentationRouters and sending hostsOnly sending hosts
ChecksumIncluded in headerRemoved from header
SecurityNot built-in (IPsec optional)Built-in IPsec support

Diagram:

IIPPvv46::VTVETERILR|D|PIE|TAHNPRYLTRDAL|IOEFODFTSSFASIOOTIDCCCUIOCDPAORNPLSE|TLCATCEOSEI|ETILNUTCOIOAGRINNAONSTCN|HDNSSHEAED.|TARA.AIT|DED.DOOFESD|DNTLRSRNRAAEEEALGCSFXSDSHSLTSDL|EOREFCWHENRKDSGASLRSTGUA|HMMBHEEONLPT|LIMIT
  • Auto-configuration: IPv6 has stateless address auto-configuration
  • NAT: Not required in IPv6 due to larger address space
  • Transition: Dual-stack, tunneling, translation mechanisms
  • Header efficiency: IPv6 has streamlined header for better performance

Mnemonic: “SHAPE” - “Size, Header, Addressing, Performance, Extensibility”

Question 4(a) OR [3 marks]
#

What is an IP address? How it is used in network?

Answer: An IP address is a numerical identifier assigned to each device connected to a network that uses Internet Protocol.

Diagram:

IP1A9D2DR1E6S8S:11921.01068.1HS.ouN1sbe0tnt0Dewoitotdrteikenddteiinddfteeiinceftiriimefarilernotation
IP Address UsageDescription
IdentificationUniquely identifies devices on a network
RoutingDetermines path for data packets
AddressingEnables sending data to specific destinations
Network DivisionAllows subdivision into subnets
  • Structure: Network portion and host portion
  • Assignment: Static (manual) or dynamic (DHCP)
  • Versions: IPv4 (32-bit) and IPv6 (128-bit)

Mnemonic: “IRAN” - “Identification, Routing, Addressing, Network division”

Question 4(b) OR [4 marks]
#

Compare FDDI and CDDI.

Answer: FDDI (Fiber Distributed Data Interface) and CDDI (Copper Distributed Data Interface) are high-speed network technologies.

FeatureFDDICDDI
MediumFiber optic cableCopper twisted pair
Speed100 Mbps100 Mbps
DistanceUp to 200 km total, 2 km between stationsUp to 100 m between stations
TopologyDual counter-rotating ringsDual counter-rotating rings
CostHigherLower
ReliabilityVery highModerate
StandardANSI X3T9.5Same as FDDI (adapted for copper)

Diagram:

FDDI/CDDNNIooddDeeU14ALRINGTOPONNLooOddGeeY23:
  • Redundancy: Secondary ring for fault tolerance
  • Access Method: Token passing with timed token rotation
  • Applications: FDDI for backbones, CDDI for workstations

Mnemonic: “FDDI Flies, CDDI Crawls” - Fiber for long distance, Copper for shorter runs

Question 4(c) OR [7 marks]
#

Draw and explain OSI reference model in detail.

Answer: The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes network functions into seven layers.

Diagram:

NERoPDCnodhaodueyUtn-t-ssantitiePeonocArRfcT-gD-aPEoStReNAnPlPiSrEiAnEbToHLnEmSoNdTeAdYtItNaSnSWteSrCeTtIPrOwLIaArA,OmOeReIrCnTfTNaRlKeNeAsIaIenTinKlLmOcOn(aa(iiNeNc5g(b3n(a(s,r)e4i)e2b1s((ym)lt)i)i7a6peiwlo)p)tntoinpityrtsokyns
LayerPrimary FunctionProtocols/StandardsData Unit
ApplicationUser interface, network servicesHTTP, FTP, SMTPData
PresentationData formatting, encryptionSSL/TLS, JPEG, MIMEData
SessionConnection establishment, managementNetBIOS, RPCData
TransportEnd-to-end delivery, flow controlTCP, UDPSegments
NetworkLogical addressing, routingIP, ICMP, OSPFPackets
Data LinkPhysical addressing, media accessEthernet, PPP, HDLCFrames
PhysicalBit transmission, cabling, signalingUSB, Ethernet, BluetoothBits
  • Layer Independence: Each layer performs specific functions
  • Encapsulation: Data wrapped with headers at each layer
  • Standardization: Promotes interoperability between systems
  • Troubleshooting: Isolates problems to specific layers

Mnemonic: “All People Seem To Need Data Processing” (Layers 7 to 1)

Question 5(a) [3 marks]
#

What is ISO? How it works in information security?

Answer: ISO (International Organization for Standardization) develops and publishes standards including those for information security.

ISO Security StandardsPurpose
ISO/IEC 27001Information security management systems
ISO/IEC 27002Code of practice for security controls
ISO/IEC 27005Information security risk management
ISO/IEC 27017Cloud security
ISO/IEC 27018Protection of personally identifiable information

Working in Information Security:

  • Framework-based: Provides structured approach to security
  • Risk-based: Focuses on identification and mitigation of risks
  • Process-oriented: Establishes continuous improvement cycle
  • Certification: Organizations can be certified for compliance

Mnemonic: “PRIMP” - “Policies, Risk assessment, Implementation, Monitoring, Process improvement”

Question 5(b) [4 marks]
#

Explain terms in detail for cryptography: 1) Encryption 2) Decryption

Answer: Encryption and decryption are fundamental processes in cryptography that secure information.

TermDefinitionTypesExample Algorithms
EncryptionProcess of converting plaintext to ciphertext using an algorithm and keySymmetric, Asymmetric, HybridAES, RSA, ECC
DecryptionProcess of converting ciphertext back to plaintext using an algorithm and keySymmetric, Asymmetric, HybridAES, RSA, ECC

Diagram:

EDNECCRRYPYCPLPITATPIIIHONOENTNR:E:TXETXTAKELEAKNGYDLECOEGYRRCOYIRRPTYITHPTIMTHOIMN&ON&CIPPLHAEIRNTTEEXXTT||

Encryption:

  • Purpose: Protects confidentiality of information
  • Methods: Substitution, transposition, block cipher, stream cipher
  • Key Management: Critical aspect of secure encryption

Decryption:

  • Purpose: Retrieves original information from encrypted form
  • Requirements: Correct algorithm and key
  • Implementation: Hardware or software-based

Mnemonic: “PACK-DUKE” - “Plaintext Algorithm Cipher Key - Decoding Using Key for Extraction”

Question 5(c) [7 marks]
#

Write a short-note on 1) E-mail and 2) DNS

Answer: 1) E-mail (Electronic Mail):

E-mail is a method of exchanging digital messages over a communication network.

Diagram:

E-MAILSCELSNIYDESENTRTEM:SMTPSSMEEARDRIVNVLESERRPOP3/IMAPRECCLEIIEVNETR
ComponentFunction
Mail User Agent (MUA)Email client software used by end-users
Mail Transfer Agent (MTA)Server software that transfers emails
Mail Delivery Agent (MDA)Delivers email to recipient’s mailbox
ProtocolsSMTP (sending), POP3/IMAP (receiving)
  • Structure: Headers (To, From, Subject) and Body
  • Security: Features like encryption (TLS), authentication (SPF, DKIM)
  • Attachments: Binary files encoded for text transmission
  • Features: Forwarding, filtering, organizing, searching

2) DNS (Domain Name System):

DNS is a hierarchical and decentralized naming system for translating domain names to IP addresses.

Diagram:

DNSewHxwIawEcm.RopeAmlxReaC.mHcpYol:me.c|oemR"ox|o.rao"gmtple.(oSrugb|don|meeatxianmsp)le.net(|TLDs)(Domains)
DNS ComponentFunction
Root ServersTop of DNS hierarchy
TLD ServersManage top-level domains (.com, .org)
Authoritative ServersStore DNS records for specific domains
Recursive ResolversQuery other servers to resolve domain names
DNS RecordsResource records (A, AAAA, MX, CNAME, etc.)
  • Purpose: Map human-readable names to machine-readable addresses
  • Resolution Process: Recursive or iterative queries through hierarchy
  • Caching: Temporary storage of results to improve performance
  • Security: DNSSEC provides authentication and integrity

Mnemonic: “MAPS” - “Mail needs Addresses, Protocols, and Servers” Mnemonic: “HARD” - “Hierarchy, Addressing, Resolution, Distributed system”

Question 5(a) OR [3 marks]
#

What do you mean by security topology and security zone?

Answer: Security topology and security zones are network security concepts that organize and protect network resources.

ConceptDefinitionExamples
Security TopologyPhysical and logical arrangement of security controlsDMZ, Defense-in-depth
Security ZoneSegment of network with specific security requirementsDMZ, Intranet, Extranet

Diagram:

SECURITIZYNOTNUZTRESOOAENPNREOELTOGYWWIoTIrHNkTDsZEMtORZaNNFFtEEiiiSTrro:eenwwsaalllWleb,SZEOECNmUEaRiElD,DNSSesnesrivteirvsedata
  • Security Topology: Overall security architecture design
  • Security Zones: Logical boundaries with consistent security policies
  • Defense-in-depth: Multiple layers of security controls

Mnemonic: “TIPS” - “Topology Isolates and Protects Systems”

Question 5(b) OR [4 marks]
#

Write short-note on Voice and Video IP.

Answer: Voice and Video over IP (VoIP/Video IP) refers to technologies for transmitting voice and video communications over IP networks.

Diagram:

DeCCinAogcLdioLetdEcaiRlngRTPI/NUTDEPR/NIEPTRDdECieCogcEdioIetdVcaiElnRg
ComponentFunction
CodecsEncode/decode audio and video (G.711, H.264)
Signaling ProtocolsCall setup/teardown (SIP, H.323)
Transport ProtocolReal-time media transport (RTP/RTCP)
QoS MechanismsPrioritize voice/video traffic

Voice over IP (VoIP):

  • Benefits: Cost savings, flexibility, integration with apps
  • Challenges: Latency, jitter, packet loss
  • Applications: IP phones, softphones, conferencing

Video over IP:

  • Types: Video conferencing, streaming, surveillance
  • Requirements: Higher bandwidth, low latency
  • Technologies: WebRTC, SIP video, RTSP streaming

Mnemonic: “CLEAR” - “Codecs compress, Latency matters, Encodes audio/video, Applications integrate, Real-time transport”

Question 5(c) OR [7 marks]
#

What is IP security? Explain in detail.

Answer: IP Security (IPsec) is a suite of protocols designed to secure IP communications by authenticating and encrypting each IP packet.

Diagram:

IPSEC(PARTuORAtTAHhONCSHOPd(NLAOrKEPR)IeTSPTIKyWULPEOIIL/MRTCALIaKEAYASn:TEYAaAIREKgCORMeCN((PmESTEeSCnnSPct/E)USSDPePc)Pay
IPsec ProtocolFunctionProtection
Authentication Header (AH)Data integrity, authenticationNo encryption
Encapsulating Security Payload (ESP)Confidentiality, integrity, authenticationEncrypts data
Internet Key Exchange (IKE)Key exchange, SA negotiationSecure key management

IPsec Modes:

ModeDescriptionUse Case
Transport ModeProtects payload onlyHost-to-host communications
Tunnel ModeProtects entire packetSite-to-site VPNs, remote access

Security Services:

  • Authentication: Verifies identity of communicating entities
  • Confidentiality: Protects data from unauthorized disclosure
  • Data Integrity: Ensures data hasn’t been altered in transit
  • Replay Protection: Prevents packet replay attacks
  • Access Control: Limits access to network resources

Applications:

  • VPNs: Remote access and site-to-site connections
  • Secure Routing: Protects routing protocols
  • Secure Host-to-Host: End-to-end security

Mnemonic: “AVID TC” - “Authentication, Verification, Integrity, Datagram protection, Transport mode, Confidentiality”

Related

Computer Networking (4343202) - Summer 2024 Solution
23 mins
Study-Material Solutions Computer-Networking 4343202 2024 Summer
Cyber Security (4353204) - Winter 2024 Short Solution
10 mins
Study-Material Solutions Cyber-Security 4353204 2024 Winter
Cyber Security (4353204) - Winter 2024 Solution
14 mins
Study-Material Solutions Cyber-Security 4353204 2024 Winter
Digital & Data Communication (4343201) - Winter 2024 Solution
25 mins
Study-Material Solutions Digital-Communication 4343201 2024 Winter
Digital Communication (4341102) - Winter 2024 Solution
22 mins
Study-Material Solutions Digital-Communication 4341102 2024 Winter
Java Programming (4343203) - Winter 2024 Solution
27 mins
Study-Material Solutions Java-Programming 4343203 2024 Winter