3 COMPUTER NETWORKS AND NETWORK SECURITY 1. Definition of Computer Network: A network is a set of devices (also known as nodes, terminals or stations) interconnected by communication links. A computer network is collection of computers and terminal devices connected together by a communication system. 1.1 Scope of Network: File sharing; Print sharing, E-mail, Fax facility, Remote Access, Shared databases, Fault tolerance, Internet access and security, Communication and collaboration, Organization. 1.2 Benefits of using networks: Improve communication, Reduce costs and improve efficiency, Reduce errors. 2. Networks Classification 2.1 Function Based: Data Network, Voice Network, and Multimedia Network. 2.1.1 Data Networks: A communication network that transmits data. 2.1.2 Voice Networks: A communication network that transmits voice. 2.1.3 Multimedia Networks: A communications network that transmits data, voice, image, video etc. 2.2 Area Coverage Based: LAN, MAN, WAN. 2.2.1 Local Area Network (LAN): A high speed data transfer network that supports 1 Mbps to 30 Mbps or more. 2.2.2 Metropolitan Area Network (MAN): Based on Fiber Optic transmission technology that supports 10 Mbps transferring of data. 2.2.3 Wide Area Networks (WAN): Uses long distance telephone services and satellite transmission. It operates at lower link speeds of about 1 Mbps. 2.3 Forwarding Based: Switched Network, Shared Network and Hybrid Network. 2.3.1 Switched Network: Switched network is a type of network that provide switched communication system and in which users are connected with each other through the circuits, packets, sometimes message switching and the control devices. 2.3.2 Shared Networks: A shared network is also known as hubbed network which is connected with a hub. When packets arrive in to the network, all segments can see packets. LAN using hub is an example of shared networks. 2.3.3 Hybrid Networks: Network comprising the features of switched and shared networks. 2.4 Ownership Based: Public Network, Private Network, Virtual Private Network, and Leased Network.
3.2 Information Technology 2.4.1 Public Networks: Networks established for all users across the world is known as public networks. Internet is an example of public networks. 2.4.2 Private Networks: Private network is used by particular organization, particular campus or particular enterprise only. This is a network that is not available to the outside world. Intranet is an example of it. 2.4.3 Virtual Private Networks: A virtual private network (VPN) is a network that uses a public network, such as the Internet, to provide secure access to organization's private network. 2.4.4 Leased Networks: Dedicated or leased lines exist to support network communication. 2.5 Media Based: Wired Network and Wireless Network. 2.5.1 Wired Networks: Networks communication supported by physical (wired) medium. 2.5.2 Wireless Networks: Networks communication supported by wireless medium. 2.6 Network Models: Client Server Model and Peer-to-peer Model. 2.6.1 Client Server Model: In Client-Server networks, servers are typically powerful computers running advanced network operating systems and user workstations (clients) access data or run applications located on the servers. 2.6.2 Peer-to-peer Model: In peer-to-peer architecture, there are no dedicated servers. All computers are equal, and therefore, are termed as peer and each of these machines functions both as a client and a server. Peer-to-Peer networks are designed for small to medium LANs. 3. Components of Network 3.1 Sender / Receiver: A host computer at both ends which sends and receives the data. 3.2 Communication Interface Devices: Network Interface Cards, Switches and Routers, Hubs, Bridges, Repeaters and Gateways, Modems, Multiplexer, Front-end communication processors, Protocol converters, Remote access devices. 3.3 Communication Channel: Guided Media (Twisted Pair cable, Coaxial cable and Optical Fiber cable) and Unguided Media (Radio waves, Micro waves, Infrared waves). 3.4 Communication Software Functions: Access control, Network management, Data and file transmission, Error detection and control, Data security. 4. Definition of Network Structure or Topology: Geometrical arrangement of computer resources, remote devices, and communication facilities to share the information. The four types of network topology are: 4.1 Star Topology: Communication channel controlled by Centralized System. 4.2 Bus Topology: Single network cable connected with node via communication line. 4.3 Ring Topology: Direct point-to-point link between two neighboring nodes with unidirectional mode of data transmission. 4.4 Mesh Topology: Random connection of nodes using communication links.
Computer Networks and Network Security 3.3 5. Data Transmission Technologies: Transferring of data on a communication channel between sender and receiver determines by transmission techniques which include direction of exchanges of data, no. of bits sent and synchronization between the transmitter and receiver. 5.1 Serial versus Parallel transmission: Single path of data transmission serially versus multiple path of data transmission simultaneously. 5.2 Synchronous versus Asynchronous transmission: Data transmission based on regular versus irregular time interval. 5.3 Transmission modes: Characterized on the basis of direction of exchanges, they are classified into three categories: Simplex, Half-duplex and Full-duplex connection. 5.4 Transmission Techniques: Circuit switching, Message switching, Packet switching. 6. Transmission Protocols: Protocols are set of rules for communication between computers ensuring timings, sequencing, and error checking for data transmission. 6.1 Protocol Definition: Syntax, Semantics and Timing. 6.2 Open System Interconnection (OSI) Model: Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data link layer, Presentation layer. 6.3 Transmission Control Protocol / Internet Protocol (TCP/IP): Application layer, Transport layer, Internet layer, Network Interface layer. 7. Definition of Local Area Network: A data transmission system intended to link computers and associated devices with in a restricted geographical area. It is useful for sharing resources like files, printers or other applications. 7.1 Benefits of using LAN: Security, Inexpensive workstation, Distributed processing, Emailing and message broadcasting, Organizational benefits, Data management benefits, Software cost and up-gradation. 7.2 LAN Requirements: Compatibility, Internetworking, Growth path and modularity, System reliability and maintenance. 7.3 Components of a LAN: File server, Network operating system, Workstations, Network Interface Card (NIC), Network cabling. 7.4 Wireless LAN: It is a flexible data communication systems that uses radio waves, micro waves and infrared waves to transmit and receive data over the air with minimizing the need for wired connections. 8. Client/Server Technology: A computing technology in which the hardware and software components are distributed across a network to accept the request sent by the client machine to the server machine for processing of data. 8.1 Limitation of the traditional computing models: Mainframe architecture, Personal computers, File sharing architecture. 8.2 Component of C/S technology: Client, Server, Middleware, Fat-client or Fat-server, Network.
3.4 Information Technology 9. Virtual Private Network (VPN): A private network that uses a public network (usually the Internet) to connect remote sites or users together with virtual connections routed through the Internet from the company s private network to the remote site or employee. Two types of VPNs are: Virtual Private Dial-up Network (VPDN) Site-to-Site VPN 10. Broad Band Networks (ISDN): System of digital phone connections to allow simultaneous voice and data transmission across the world. Two types of ISDN services are: 10.1 Basic Rate Interface (BRI): BRI consists of two 64 Kbps B channels and one 16 Kbps D channel suitable for individual users. 10.2 Primary Rate Interface (PRI): PRI consists of 23 B channels and one 64 Kbps D channel for users with higher capacity requirements. 11. Types of Servers 11.1 Database Servers, Application Servers (Web Information Server, Component Server, Active Application Server), Print Servers, and Transaction Servers. 11.2 Types of Internet Server : File Server, Mail Server, Gopher Server, Web Server, FTP Server, News Server, Chat Server, Caching Server, Proxy Server. 12. Network Tier Architectures: A tier is a distinct part of hardware or software. It comprises: 12.1 Single tier system: Single computer that contains a database and a front end to access the database. 12.2 Two tier system: Client at front-end and server at back-end. 12.3 Three tier system: provides process management with business logic and rules. 12.4 Multi tier system: An application is executed by more than one distinct software agent. 13. Definition of Data Centre: Centralized repository for the storage, management and dissemination of data and information with high security, fault-resistant facilities, hosting customer equipment that connects to telecommunication networks. Two types of data centers are: Private and Public Data Centre. Tier 1 data centre can tolerate upto 28.8 hours of downtime per year. Tier 4 data centre can tolerate upto 0.4 hours of downtime per year. 13.1 Value added services by Data Centre: Database monitoring, Web monitoring, Backup and restore, Intrusion detection system, Storage on demand. 13.2 Features of Data Centers: Size, Data Security, Availability of Data, Electrical and power systems, Security, Backup Systems, Continuous monitoring 24x7, Environment - cooling. 13.3 Data Center Protection challenges and Best Practice Solutions: Control skyrocketing data growth, System performance and scalability, Network congestion and connectivity
Computer Networks and Network Security 3.5 architecture, It administration and staff time at premium, Inadequate Disaster Recovery Plans, Adopting new risk prone, cost-effective data protection technologies and Resource balancing. 13.4 Disaster recovery sites: Cold site, Warm site, Hot site. 14. Network Security: Ensure safeguarding assets and maintain the data integrity within the system. 14.1 Need of Security: safeguard assets, ensure and maintain the data integrity. 14.2 Threats and Vulnerabilities 14.2.1 Threats: Unstructured threats, Structured threats, External threats, Internal threats 14.2.2 Vulnerabilities: Software bugs, Timing windows, insecure default configurations, Bad protocols, trusting Untrustworthy information, End users. 14.3 Level of Security: Preparing project plan for enforcing security, Assets identification, Assets valuation, Threats identification, Threats probability of occurrence assessment, Exposure analysis, Controls adjustment, and Report generation outlining the levels of security to be provided for individual systems, end users etc. 14.3 Network Security Techniques: Firewalls, IDS technologies 14.3.1 IDS Technologies: Network Intrusion Detection, Host-based Intrusion Detection, Hybrid Intrusion Detection, Network-Node Intrusion Detection. Question 1 (a) Describe briefly, the following terms: (i) Switch (ii) Data Centre (iii) Repeaters (iv) DNS Server (v) MODEM (vi) VPDN (vii) Layer 3 or Network Layer (viii) Virtual Private Network (VPN) (ix) Protocol (x) Chat Server (xi) Wireless LAN (b) Explain each of the following: (i) Multiplexer (ii) E-mail (iii) Web Casting
3.6 Information Technology (a) (i) (ii) Switch: It is hardware device used to direct messages across a network. Switches create temporary point to point links between two nodes on a network and send all data along that link. Data Centre: It is a centralized depository for the storage, management and discrimination of data and information. It can be defined as highly secure, fault-resistant facilities, hosting customer equipment that connects to telecommunications networks. (iii) Repeaters: Repeaters are devices that solve the snag of signal degradation which results as data is transmitted along the cables. It boosts or amplifies the signals before passing it through to the next section of cable. (iv) DNS Server: Domain Name Service Server is an Internet-wide distributed database system that documents and distributes network specific information such as the associated IP address for a host name, and vice-versa. The host storing this database is a DNS server. (v) MODEM: It stands for Modulator/Demodulator and is an encoding as well as decoding device used in data transmission that converts a digital computer signal into an analog telephone signal (i.e. it modulates the signal) and converts an analog telephone signal into a digital computer signal (i.e. it demodulates the signal) in a data communication system. (vi) VPDN: VPDN (Virtual Private Dial-Up Network) is a user-to-lan connection used by a company that has employees who need to connect to the private network from various remote locations. (vii) Layer 3 or Network Layer: Network Layer corresponds to the layer 3 of the OSI model and enables a choice of the physical route of transmission of a message packet by Creating a virtual circuit for upper layers to make them independent of data transmission and switching. Establishing, maintaining, and terminating connections between the nodes. Ensuring proper routing of data. (viii) Virtual Private Network (VPN): It is a private network that uses a public network (usually the Internet) to connect remote sites or users together to provide secure access to organization s private network. Instead of using a dedicated, real-world connection such as leased line, a VPN uses virtual connections routed through the Internet from the company's private network to the remote site or employee. There are two types of VPN. A Remote-access VPN is a user-to-lan connection which can be used by an organization that has employees who need to connect to the private network from various remote locations. A Site-to-Site VPN provides connection with remote site based on number of users who wants to connect to either Intranet or Extranet.
Computer Networks and Network Security 3.7 (ix) Protocol: A protocol is a set of conventions or rules that must be adhered by both the inter-computer communication parties to ensure that the information being exchanged between the two parties is received and interpreted correctly. In other words, Protocol is software that performs variety of actions necessary for data transmission between computers. A protocol defines the following three aspects of digital communications. Syntax: The format of data being exchanged, character set used, types of error correction used, type of encoding scheme (e.g. signal levels) being used. Semantics: Type and order of messages used to ensure reliable and error free information transfer. Timing: Defines data rate selection and correct timing for various events during data transfer. (x) Chat Server: Some organizations choose to run a server that allows multiple users to have real-time discussions, called chats on the Internet. Most chat servers allow the creation of private chat rooms where participants can meet for private discussions. (xi) Wireless LAN: Wireless Local Area Network (WLAN) is a flexible data communications system that does not require any physical media or cables for data transmission. Using Radio Frequency (RF) technology, Wireless LANs transmit and receive data over the air. Users can access shared information without any plug in or without any physical connection. Wireless LAN configurations range from simple peer-to-peer topologies to complex networks offering distributed data connectivity, flexibility and mobility. (b) (i) Multiplexer: It is a device that enables several devices to share one communication line. The multiplexer scans each device to collect and transmit data on a single line to the CPU, and also communicates transmission from the CPU to the appropriate terminal linked to the multiplexer. The devices are polled and periodically asked whether there is any data to transmit. (ii) E-mail: E-mail is a method of composing, sending, storing and receiving messages over electronic communication systems. The term e-mail applies both to the Internet e-mail system based on the Simple Mail Transfer Protocol (SMTP) and to intranet systems allowing users within one company to e-mail each other. (iii) Web Casting: Web casting is a media presentation distributed over the Internet using streaming media technology to distribute a single content source to many simultaneous listeners/viewers. A webcast may either be distributed live or on demand. Essentially, webcasting is broadcasting over the Internet. Question 2 Describe the functions of layers in TCP/IP protocol.
3.8 Information Technology TCP/IP Protocol Layers: TCP/IP protocol suit has four layers and each layer performs specific function so that packet can be moved to next layer in TCP/IP protocol suit. These layers are given below: (i) Application layer: It provides services directly to the user such as email. (ii) Transport layer: It provides end-to-end communication between applications and verifies correct packets arrival. (iii) Internet layer: It provides packet routing for error checking, addressing and integrity. (iv) Network Interface layer: It provides an interface to the network hardware and device drivers. This can also be called Data link layer. Question 3 Describe the ways a computer network can help business. A computer network can help the business in following ways: (i) File Sharing - It provides sharing and grouping of data files over the network. The data file stored on the server allows easy access to all the staff in the organization. (ii) Print Sharing - It provides sharing of computer resources such as hard disk, printers etc by multiple users simultaneously to reduce the cost of installing and maintaining multiple resources in the organization. (iii) E-Mail - It provides collaboration tools such as group e-mail application which enables staff in the office to communicate with each other quickly and effectively. Further, group e-mail applications support contact management, scheduling and task assignment useful for every staff in the organization. The Internet e-mail facility can be embedded so that staff can send and receive e-mail attachments outside of the organization in faster, cheaper and easier way. (iv) Fax Sharing - Using network, sharing of fax documents directly from computer reduces the paper consumption and printer usage and is more convenient for staff in the organization. Also fax applications can be integrated with e-mail contact lists to be sent to groups of recipient for efficient sharing of documents over the network. (v) Remote Access - Network allows users to remotely access the data and information from organization s network via Internet in cost effective manner. (vi) Shared Databases - Network facilitates simultaneous access to the shared databases to multiple users at the same time by ensuring the integrity of the database. (vii) Fault Tolerance - By using network, fault tolerance can be implemented as a defense against accidental data loss. Usually, primary and secondary line of defense backups the
Computer Networks and Network Security 3.9 data in case of system failure. Additional measures can also be taken by attaching a server with un-interruptible power supply in case of power failure or blackouts. (viii) Internet Access and Security - It provides access to the Internet for transferring the document and to access the resources available on World Wide Web by maintain data security through firewall system in the organization s network. (ix) Communication and Collaboration - It facilitates communication and collaboration amongst employees of the organization by sharing of files, views and exchanging ideas more efficiently. (x) Organization - By using various network managing and scheduling software, it is now possible to arrange meetings without constantly checking everyone s schedules. Question 4 What do you understand by Message Switching? Message Switching: In message switching, end-users communicate by sending each other a message, which contains the entire data being delivered from the source to destination node. As a message is routed from its source to its destination, each intermediate switch within the network stores the entire message, providing a very reliable service. In fact, when congestion occurs, the message-switched network will store and delay the traffic until sufficient resources are available for successful delivery of the message. There is no direct connection between the source and destination nodes. The intermediary nodes (switches) have the responsibility of conveying the received message from one node to another in the network. Therefore, each intermediary node within the network must store all messages before retransmitting them one at a time as proper resources become available. This characteristic is often referred to as store-and-forward. Question 5 Define computer network? What are the benefits of using computer network? Describe in brief. A computer network is a collection of computers and terminal devices connected together by a communication system. The set of computers may include large-scale computers, medium scale computers, mini computers and microprocessors. The set of terminal devices may include intelligent terminals, dumb terminals, workstations of various kinds and miscellaneous devices such as the commonly used telephone instruments. Benefits of Using Networks: (i) Organizations can improve communication by connecting their computers and working on standardized systems. Staff, suppliers and customers are able to share information and get in touch more easily.
3.10 Information Technology More information sharing can make the business more efficient - eg networked access to a common database can avoid the same data being keyed multiple times, which would waste time and could result in errors. As staff are better equipped to deal with queries and deliver a better standard of service as they can share information about customers. (ii) Organization can reduce costs and improve efficiency - by storing information in one centralized database and streamlining working practices. Staff can deal with more customers at the same time by accessing customer and product databases. Network administration can be centralized, less IT support is required. Costs are cut through sharing of peripherals such as printers, scanners, external discs, tape drives and Internet access. (iii) Organizations can reduce errors and improve consistency - by having all staff work from a single source of information, so that standard versions of manuals and directories can be made available, and data can be backed up from a single point on a scheduled basis, ensuring consistency. Question 6 What is Data Communication? Discuss various types of networks in brief. The transmission of data from one computer to another, or from one device to another is known as data communication. A communications device, therefore, is any machine that assists data transmission. For example, modems, cables, and ports are all communications devices. All of the interconnected data communication devices can form a wide area network, a local area network, or a metropolitan area network, or virtual private network. (i) Local Area Networks (LAN): A Local Area Network (LAN) covers a limited geographical area. A typical LAN connects as many as hundred or so microcomputers that are located in a relatively small area, such as a building or several adjacent buildings. (ii) Metropolitan Area Networks (MAN): A Metropolitan Area Network (MAN) is somewhere between a LAN and a WAN. The terms MAN is sometimes used to refer to networks which connect systems or local area networks within a metropolitan area (roughly 40 km in length from one point to another). MANs are based on fiber optic transmission technology and provide high speed (10 Mbps or so), interconnection between sites. A MAN can support both data and voice. Cable television networks are examples of MANs that distribute television signals. A MAN just has one or two cables and does not contain switching elements. (iii) Wide Area Networks (WAN): A Wide Area Network (WAN) covers a large geographic area with various communication facilities such as long distance telephone service,
Computer Networks and Network Security 3.11 satellite transmission, and under-sea cables. The WAN typically involves different types of communication hardware and software. Examples of WANs are interstate banking networks and airline reservation systems. Wide area networks typically operate at lower link speeds (about 1 Mbps). Question 7 Discuss any five Communication Interface Devices. Five commonly used Communication Interface Devices are discussed as follows: (i) Network Interface Card (NIC): It is an electronic card which is installed in server as well as in all the nodes for interconnection of nodes with server. Network Interface card provides a connector on its back for connection of nodes and server using network cable. NIC has buffer for storing incoming and outgoing packets, thus improving the network throughput. NIC uses linear bus topology, according to which only one node can access the data from the server at a time. NIC is installed in one of the available PCI/ISA slot on the motherboard. (ii) Modem (Modulator/Demodulator): It is a device that converts a digital computer signal into an analog telephone signal (i.e. it modulates the signal) and converts an analog telephone signal into a digital computer signal (i.e. it demodulates the signal) in a data communication system. MODEMs are classified on the basis of different criteria such as the place where they are installed (External vs Internal MODEMs), the manner in which they accept information (Standard vs Intelligent Modems) and the way they transmit signals (Short-haul and Wireless Modems). (iii) Multiplexer (MUX): It is an electronic device which allows number of devices to share a single communication line. Multiplexer continuously scans the nodes and server to find out whether any of them wants to send data to other nodes or not. This process of continuously scanning by multiplexer is called Polling. Multiplexer may perform Time division multiplexing (TOM) or Frequency division multiplexing (FOM). (iv) Front-end communication processor: In case of high volume data transfer, a separate computer, known as front-end communication processor is used for sending and receiving data, code conversions, editing and verification of data, terminal recognition and control of transmission lines thus relieving the main computer for data processing tasks rather than data transmission. (v) Protocol Converter: Protocols are the standard set of rules which govern the flow of data on a communication network. Dissimilar devices, which follow different protocols, can not communicate with each other without protocol conversion. Thus, a protocol converter is a device that provides interoperability amongst networking devices by converting protocols of one device to another. They transform data and commends from one application to another for exchanging information. For example, one computer representing data in ASCII code can not communicate with another computer using EBCDIC code for data representation without protocol conversion.
3.12 Information Technology Question 8 Briefly explain various functions of Communication Software. Various Functions of Communication Software: Communication software manages the flow of data across a network. It performs the following functions: (i) Access control: Linking and disconnecting different devices; automatically dialing and answering telephones; restricting access to authorized users and establishing parameters such as speed, mode, and direction of transmission. (ii) Network management: Polling devices to see whether they are ready to send or receive data; queuing input and output; determining system priorities; routing messages and logging network activity, use, and errors. (iii) Data and file transmission: Controlling the transfer of data, files, and messages among various devices. (iv) Error detection and control: Ensuring that the data sent is indeed the data received. (v) Data security: Protecting data during transmission from unauthorized access. Question 9 Explain Star Network Topology in brief. Or Discuss various advantages and disadvantages of Star Network Topology. Star Network Topology The geometrical arrangement of computer resources, remote devices and communication facilities is known as Network Structure or Network Topology. Star Network topology is characterized by communication channels emanating from centralized computer system as shown in figure given below: Fig: Star Network Topology The processing nodes in a star network interconnect directly with a central system. Each terminal, small computer or large main frame can communicate only with the central site and not with other nodes in the network. If it is desired to transmit information from one node to another, it can be done only by sending the details to the central node, which in turn sends them to the destination.
Computer Networks and Network Security 3.13 Advantages: It is easy to add new and remove nodes. A node failure does not bring down the entire network. It is easier to diagnose network problems through a central hub. Disadvantages: If the central hub fails, the whole network ceases to function. It costs more to cable a star configuration than other topologies. Question 10 Describe the Ring Network. Discuss its advantages and disadvantages. Ring Network: This is one of the structures for local area networks. In this topology, the network cable passes from one node to another until all nodes are connected in the form of a loop or ring. There is a direct point-to-point link between two neighboring nodes. These links are unidirectional which ensures that transmission by a node traverses the whole ring and comes back to the node, which made the transmission. Ring Network topology is particularly appropriate for organizations that require a centralized database or a centralized processing facility. Advantages: (i) Ring networks offer high performance for a small number of workstations. (ii) These can span longer distances compared to other types of networks. (iii) Ring networks are easily extendable. Disadvantages: (i) It is relatively expensive and difficult to install. (ii) Failure of one computer on the network can affect the whole network. (iii) It is difficult to trouble shoot a ring network. Adding or removing computers can disrupt the network. Question 11 Write the features of Synchronous transmission. Features of Synchronous transmission are as follows: The bits are transmitted at fixed rate. The transmitter and receiver both use the same clock signals for synchronization. It allows characters to be sent without start-stop bit.
3.14 Information Technology It allows data to be sent as multi-word block. Synchronization bit is placed at the beginning and end of each block. Timing is determined by MODEM. It is faster but more expensive transmission. Question 12 Discuss various Data transmission modes. Or Discuss in brief various data transmission modes. There are three Data transmission modes: (i) Simplex: A simplex communication mode permits data to flow in only one direction. A terminal connected to such a line is either a send-only or receive only device. Simplex mode is seldom used because a return path is generally needed to send acknowledgements, control or error signals. (ii) Half duplex: In this mode, data can be transmitted back and forth between two stations, but data can only go in one of the two directions at any given point of time. (iii) Full duplex: A full duplex connection can simultaneously transmit and receive data between two stations. It is most commonly used communication mode. A full duplex line is faster, since it avoids the delay that occurs in a half-duplex mode each time the direction of transmission is changed. Question 13 Explain the OSI Model of communication. OSI or the Open System Interconnection Model of Communication has been outlined by International Organization for Standardization (ISO) to facilitate communication among the various hardware and software platforms which are heterogeneous in nature. It consists of following seven layers of functions: (i) Layer 7 or Application Layer: This layer is closest to the end user through which the user interacts directly with the software application. Database concurrency and deadlock situation controls are undertaken at this layer and also provides services for file transfer, file sharing, etc. (ii) Layer 6 or Presentation Layer: This layer controls on screen display of data, transforms data to a standard application interface, encrypt or compress the data as per requirement. (iii) Layer 5 or Session Layer: This layer establishes, maintains and terminates sessions (dialogues) between user processes. Identification and authentication are undertaken at this layer level.
Computer Networks and Network Security 3.15 (iv) Layer 4 or Transport Layer: This layer ensures reliable and transparent transfer of data between user processes, assembles and disassembles message packets, provides error recovery and flow control. At this layer, multiplexing and encryption take place. (v) Layer 3 or Network Layer: This layer makes a choice of the physical route of transmission, creates a virtual circuit for upper layers to make them independent of data transmission and switching, establishes, maintains, terminates connections between the nodes and ensure proper routing of data. (vi) Layer 2 or Data Link Layer: This layer is a hardware layer which specifies channel access control method and ensures reliable transfer of data through the transmission medium. (vii) Layer 1 or Physical Layer: This layer is a hardware layer which specifies mechanical features as well as electromagnetic features of the connection between the devices and the transmission. Question 14 Write short notes on TCP/IP. TCP/IP: The protocols used on the Internet are called TCP/IP (Transmission Control Protocol/Internet Protocol). A TCP/IP protocol has two parts which create packet switching network: (a) TCP deals with exchange of sequential data. (b) IP handles packet forwarding and is used on the Internet. TCP/IP has following four layers. (i) The Application Layer, which provides service directly to the user. (ii) The Transport Layer, which provides end-to end communication between applications and verifies correct packet arrival. (iii) The Internet Layer, which provides packet routing for error checking, addressing and integrity. (iv) The Network Interface Layer, which provides an interface to the network hardware and device drivers. This can also be called the data link layer. Some reference books also include a fifth layer namely Physical Layer as part of TCP / IP which transmits the data from one system to another system in the form of bits - 0 and 1. The TCP protocol breaks file or message in small packets. Each packet is then given a header, which contains the destination address and is then sent over the Internet. The IP protocol guides the packets so that they arrive at the destination. Once there, the TCP protocol resembles the packets into the original message.
3.16 Information Technology Question 15 Describe the various factors which have contributed to the growth of Local Area Network (LAN). The following factors have contributed to the growth of LAN. (i) Security: Security for programs and data can be achieved using servers that are locked through both software and physical means such as diskless nodes. (ii) Expanded PC Usage: Once a LAN has been set up, it actually costs less to automate all processes as existing PCs can be easily converted into nodes by adding network interface card. (iii) Distributed Processing: LAN with inter-user communication and information exchange helps to develop distributed processing system. (iv) Electronic mail and Message Broadcasting: E-mail allows users to communicate more easily among themselves through a mail-box on the server. (v) Organizational Benefits: The information flow becomes a lot smoother with various departments, having the ability to access or request for information and data pertinent to them. Besides these, it leads to reduction in costs of Hardware, Software, and also in time, and cost of training on manpower to use the system. (vi) Data Management Benefit: Since data is located centrally on the server, it becomes much easy to manage it, as well as back it up. (vii) Software cost and up-gradation: Network version software cost is less compared to single version software. Software upgrade is easy as package is stored centrally on the server. Question 16 Explain briefly Asynchronous Transmission. Asynchronous Transmission: In asynchronous transmission mode, each character (1 byte) to be transmitted is preceded by a start bit and terminated by one or more stop bits. The function of start bit is to tell the receiver where the new character starts and the function of the stop bit is to tell the receiver that the character has ended. This mode of transmission is designed for a situation where the characters are transmitted intermittently. This mode is inefficient as compared to the synchronous transmission as the extra start and stop bits slow down the process of data transmission when there is huge volume of data to be transmitted. Question 17 What do you understand by Local Area Network? Describe its basic components.
Computer Networks and Network Security 3.17 A Local Area Network (LAN) is primarily a data transmission system intended to link computers and associated devices within a restricted geographical area such as an office building or several adjacent buildings. The linked computers and related equipments may be anything from full-scale mainframe computing systems to small desktop office workstations, terminals and peripherals etc. Organizations use LANs because they enable multiple users to share software, data and devices. LANs use a shared physical media, which is routed in the whole campus to connect various systems. LAN uses high-speed media (1Mbps to 30 Mbps or more) and are mostly privately owned and operated. Local area network has following five components: (i) File Server: A network file server is a computer system used for the purpose of managing the file system, servicing the network printers, handling network communications, and other functions. A server may be dedicated in which case all of its processing power is allocated to network functions, or it may be non-dedicated which means that a part of the servers functions may be allocated as a workstation or DOS-based system. (ii) The network operating system: It is loaded into the server s hard disk along with the system management tools and user utilities. When the system is restarted, NetWare boots and the server come under its control. (iii) Workstations: Workstations are attached to the server through the Network Interface Card and the cabling. Workstations are normally intelligent systems, such as the IBM PC. The concept of distributed processing relies on the fact that personal computers attached to the networks perform their own processing after loading programs and data from the server. Hence, a workstation is called an Active Device on the network. After processing, files are stored back on the server where they can be used by other workstations. (iv) Network Interface Card: Every device connected to a LAN needs a Network Interface Card (NIC) to plug into the LAN. For example, a PC may have an Ethernet card installed in it to connect to an Ethernet LAN. (v) Network Cabling: Once the server, workstations and network interface cards are in place, network cabling is used to connect everything together. The most popular type of network cable is the shielded twisted-pair, co-axial and fiber optic cabling. Question 18 Discuss the various attributes of Local Area Network (LAN). Main attributes of Local Area Networks are as follows: (i) Inexpensive transmission media is used to connect computers in limited geographical area mainly through coaxial cable.
3.18 Information Technology (ii) Inexpensive devices like modems, repeaters and transceiver is used to interface with the transmission media. (iii) Provide easy physical connection of devices to the media. (iv) Provide high data transmission rates between source and the destination. (v) Network data transmissions are easier for the devices with different transmission rates in the network. (vi) Provide high degree of interconnection between the network devices. (vii) All devices have the potential to communicate with other devices on the network. (viii) It does not provide central controlling processor on the network. (ix) Each attached device may only hear and does not necessarily process messages or instructions. Question 19 Describe the important characteristic of client / server technology. Characteristics of Client / Server Technology: (i) It consists of a client process and a server process that can be distinguished from each other. (ii) The client portion and the server portion can operate on separate computer platforms. (iii) Either the client or the server platform can be upgraded without having to upgrade the other platform. (iv) The server is able to service multiple clients concurrently. (v) The system includes some sort of networking capability. (vi) A significant portion of the application logic resides at the client end. (vii) Action is usually initiated at the client end and not the server end. (viii) A user-friendly Graphical User Interface (GUI) generally resides at the client end. (ix) A Structured Query Language (SQL) capability is available to client server system. (x) Database server provides data protection and security. Question 20 Describe in brief the various components of Client Server Architecture.
Computer Networks and Network Security 3.19 The various components of Client-Server Architecture are as follows: (i) Client: Clients, which are typically PCs, are the users of the services offered by the servers. There are basically three types of clients: Non-Graphical User Interface (GUI) Clients: These require a minimum amount of human interaction e.g. ATMs, cell phones, fax machines, and robots. GUI-Clients: These are human interaction models usually involving object/action models like the pull-down menus in Windows 3-X. Object-Oriented User Interface (OOUI) Clients: These take GUI-Clients even further with expanded visual formats, multiple workplaces, and object interaction rather than application interaction. Window 7 is a common OOUI Client. (ii) Server: Servers await request from the client and regulate access to shared resources and perform action based on client request. File servers make it possible to share files across a network by maintaining a shared library of documents, data, and images. Database servers, transaction servers and web servers are some of the servers used in client server architecture. (iii) Middleware: The network system implemented within the client/server technology is termed as Middleware. It is all the distributed software needed to allow clients and servers to interact. General Middleware allows for communication, directory services, queuing, distributed file sharing, and printing. (iv) Fat-client or Fat-server: Fat-client or Fat-server allows more of the processing to take place on the client, like with a file server or database server. Fat-servers place more emphasis on the server and try to minimize the processing done by clients. Transactions, GroupWare, and web servers are examples of Fat Servers. Fat Clients are also referred to as 2-Tier systems and Fat-servers as 3-Tier systems. Question 21 What is VPN? Discuss different types of VPN. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses virtual connections routed through the Internet from the company's private network to the remote site or employee. There are two common types of VPN: (i) Remote-access VPN: Remote-access, also called a Virtual Private Dial-up Network (VPDN), is a user-to-lan connection which can be used by an organization that has employees who need to connect to the private network from various remote locations. The Enterprise Service Provider (ESP) sets up a Network Access Server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can
3.20 Information Technology then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network. Remote-access VPNs permit secure, encrypted connections between an organization's private network and remote users through a third-party service provider. (ii) Site-to-Site VPN: Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be one of two types: Intranet-based: If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based: When a company has a close relationship with another company, they can build an extranet VPN that connects LAN to LAN, and allows the various companies to work in a shared environment. Question 22 What is Integrated Services Digital Network (ISDN)? Write its advantages. ISDN: Integrated Services Digital Network is a system of digital phone connections to allow simultaneous voice and data transmission across the world. Such voice and data are carried by bearer channels known as B channels having a bandwidth of 64 kilobits per second. ISDN provides two types of services namely Basic Rate Interface (BRI) and Primary Rate Interface (PRI). BRI consists of two 64 kbps B channels and one 16 kbps D channel and is suitable for individual users. PRI consists of twenty three B channels and one 64 kbps D channel and is suitable for users with higher capacity requirements. Various advantages of ISDN are as follows: (i) ISDN allows multiple digital channels to be operated simultaneously through the same regular phone cable meant for analog signals. The digital connection scheme permits a much higher data transfer rate than analog connections. (ii) In ISDN, digital data sources can be combined together to route the information at the destination point without any loss of data or voice. (iii) ISDN sends a digital packet on a separate channel without disturbing the established connections with high data rate transfer. (iv) ISDN transmits full duplex data using single device that can be connected with a U interface, which is known as Network Termination 1. Question 23 Describe Caching Server and Proxy Server. How are they different from each other? Caching Server: A caching server is used to restrict number of one s own access to the Internet. Basically, a caching server sits between the client computer and the server that would normally
Computer Networks and Network Security 3.21 fulfill a client s request. The caching server intercepts the request sent and maintains a library of files that have been requested in the recent past by users on the Internet. If the request is found in the library, the server returns the desired information without going out to the Internet. Thus, a caching server does not restrict information flow. Instead, it makes a copy of requested information, so that frequent requests can be served locally, rather than from the original Internet source. It provides a good means to reduce overall traffic to and from the Internet. It is also possible to connect the caching servers in a hierarchy so that if the requested information is not available locally, it can be passed to the nearby caching servers for possible availability. Proxy Server: A proxy server is designed to restrict access to information on the Internet. A proxy server can be configured to refuse to pass the request to the intended Internet server. Such a server operates on a list of rules given to it by a System Administrator. Some proxy software use list of specific forbidden sites, the others examine the content of a page pertaining to the request. Question 24 Explain the various types of Internet servers. Types of Internet Servers: (i) File server: It manages requests from clients for files stored on the server s local disk. A central file server permits groups and users to share and access data in multiple ways. (ii) Mail server: A mail server is the most efficient way to receive and store electronic mail messages for a community of users. A central mail server runs 24 hours a day. The mail server can also provide a global email directory for all community and organization s users, as well as email gateway and relay services for all other mail servers. (iii) DNS server: Domain Name Service is an Internet-wide distributed database system that documents and distributes network-specific information, such as the associated IP address for a host name, and vice versa. (iv) Gopher server: Gopher is an Internet application that uses multiple Gopher servers to locate images, applications, and files stored on various servers on the Internet. Gopher offers menu choices to prompt users for information that interests them, and then establishes the necessary network connections to obtain the resource. (v) Web server: The World Wide Web (WWW) is a very popular source of information on the Internet. Web browsers present information to the user in hypertext format. When the user selects a word or phrase that a Web page s author has established as a hypertext link, the Web browser queries another Web server or file to move to another Web page related to the link. (vi) FTP server: File Transfer Protocol (FTP) is an Internet-wide standard for distribution of files from one computer to another. The computer that stores files and makes them available to others is a server.
3.22 Information Technology (vii) News server: Usenet News is a world wide discussion system consisting of thousands of newsgroups organized into hierarchies by subject. (viii) Chat server: Some organizations choose to run a server that will allow multiple users to have real-time discussions, called chats on the Internet. Most chat servers allow the creation of private chat rooms where participants can meet for private discussions. (ix) Caching server: A caching server is employed when the number of accesses to the Internet is to be restricted. A caching server sits between the client computer and the server that would normally fulfill a client s request. Once the client s request is sent, it is intercepted by the caching server. The caching server maintains a library of files that have been requested in the recent past by users on the network. If the caching server has the requested information in its cache, the server returns the information without going out to the Internet. (x) Proxy server: A proxy server is designed to restrict access to information on the Internet. If, for example, the organization does not want its users to have access to pornographic materials, a proxy server can be configured to refuse to pass the request to the intended Internet server. Question 25 Explain value added services being offered by a Data Centre. Value added services provided by a data centre: (i) Database monitoring: This is done via a database agent, which enables the high availability of the database through comprehensive automated management. (ii) Web monitoring: It assesses and monitors website performance, availability, integrity and the responsiveness from the perspective of the visitor to the site. It also reports on HTTP, FTP service status, monitors URL availability and round-trip response time, and verifies web content accuracy and changes. (iii) Backup and restore: It provides centralized multi-system management capabilities that have comprehensive integrated management solution for enterprise data storage using specialized backup agents for the operating system, database, open files and application. (iv) Intrusion Detection System: It provides automated network-based security assessment and policy compliance evaluation. (v) Storage on demand: It provides the back-end infrastructure as well as the expertise, best practices and proven processes so as to give a robust, easily manageable and cost-effective storage strategy. It provides data storage infrastructure to access information at any time with security, reliability and availability needed to meet the requirements of a company. Question 26 Describe various features of Data Centers. Or
Computer Networks and Network Security 3.23 Describe briefly salient features of Data Centers. Data Center is a centralized repository for the storage, management and dissemination of data and information. Data centers can be defined as highly secure with fault-resistant facilities and hosting computer equipment that connects to telecommunication networks. Features of Data Centers (i) Size: Data centers are characterized foremost by the size of their operations and require a minimum area of around 5,000 to 30,000 square meters. A financially viable data center could comprise of a hundred to several thousand servers. (ii) Data Security: It should ensure maximum data security and 100 per cent availability. Data centers have to be protected against intruders by controlling access to the facility and by video surveillance. They should be able to withstand natural disasters and calamities, like fire and power failures. Recovery sites must be well maintained. (iii) Availability of Data: The goal of a data center is to maximize the availability of data, and to minimize potential downtime. To do this, redundancy has to be built into all the mission critical infrastructure of the data center, such as connectivity, electrical supply, security and surveillance, air conditioning and fire suppression. (iv) Electrical and power systems: A data center should provide the highest power availability with uninterrupted power systems (UPS). (v) Security: Physical security and systems security are critical to operations. Thus, it should provide both types of security measures to ensure the security of equipments and data placed at the data center. Question 27 What are the challenges faced by the management of a data center. Large enterprise IT management look for ways to mitigate the cost, risk and complexity of data protection throughout their enterprises including data centers, disaster recovery sites and branch locations. Some of the top challenges faced by the management are as follows: (i) Control skyrocketing data growth: Data growth is the biggest data center hardware infrastructure challenge for large enterprises which cab to a certain extent be limited by using several types of data deduplication technologies that helps in reducing storage needs by eliminating redundant data. Data deduplication also reduces the data that must be sent across a WAN for remote backups, replication, and disaster recovery. (ii) System performance and scalability: Many enterprises not only have had to add numerous disk-based backup target systems to stay ahead of growing data volumes but also to deal with an aging infrastructure or, in some cases, product obsolescence. To avoid data center sprawl in the data protection environment, IT management should look
3.24 Information Technology ahead 3-5 years and choose a data protection target system that will scale to accommodate the performance and capacity they will need without adding new system images. (iii) Network congestion and connectivity architecture: The new generation of servers with multi-core processors demanding significantly high input/output (I/O) is one of the biggest data center infrastructure challenge. Increased reliance on WAN can be another trigger for network-related challenges as users are consolidating their IT systems, especially as individual users are increasingly working remotely or going mobile. (iv) IT administration and staff time at premium: Data protection IT administrators have more complex data protection standards to meet while staying within a limited budget. They need to invest in systems that automate disk-subsystem management, reduce complexity, provide effective dashboards and reporting, automatic load balancing and tuning, automatic system monitoring and phone home functionality, providing dashboards and reporting, inadequate DR plans, adopting new risk prone, cost-effective data protection technologies, resource balancing etc. (v) Inadequate Disaster Recovery plans: Large enterprises that have been using physical tape backup systems and disparate disk-based solutions in branch offices are particularly vulnerable to downtime and data loss in the event of a disaster. Enterprise IT managers should consider the use of a consistent platform that enables IT staff to manage remoteoffice backup, deduplication, replication and restore operations from a data center headquarters. It also minimizes the burden on IT administrators in branch locations and provides administrators with a company-wide view of data protection efficiency. (vi) Adopting new risk prone, cost-effective data protection technologies: With limited budgets and resources, IT managers have worked to protect their investment in existing technologies. The cost and risk of migrating to a new technology particularly when that migration requires a wholesale rip and replace often outweighs the potential benefits. IT managers should look for enterprise-class data protection solutions that mitigate these costs and risk with features such as robust tape emulation and storage pooling. Question 28 Explain briefly various Disaster Recovery (DR) plans for eliminating Down Time. Disaster Recovery (DR) Plans: Data Centre needs to be equipped with the appropriate disaster recovery system that minimizes downtime for its customers. The following different types of disaster recovery plans are used: (i) Cold site: An alternative facility that is devoid of any resources or equipment, except air conditioning and raised flooring. Equipment and resources must be installed in such a facility to duplicate the critical business functions of an organization. Cold sites may have variations depending on their communication facilities. (ii) Warm site: An alternate processing site that is only partially equipped, as compared to a hot site, which is fully equipped. It may have shared or dedicated server.
Computer Networks and Network Security 3.25 (iii) Hot site: Hot sites may vary in the type of facilities offered such as data processing, communication, or other critical business functions which need duplication. The location and size of the hot site must be proportional to the equipment and resources needed. Question 29 What are the Network Threats and Vulnerabilities? A threat is anything that can disrupt the operation, functioning, integrity, or availability of a network or system. Network security threats can be categorized into four broad themes: Unstructured threats - These originate mostly from inexperienced individuals using easily available hacking tools from the Internet. These tools include port-scanning tools, address-sweeping tools, and many others. Structured threats - These originate from individuals who are highly motivated and technically competent and usually understand network systems design and the vulnerabilities of those systems. An individual who presents a structured threat typically targets a specific destination or group. External threats - These originate from individuals or organizations working outside an organization, which does not have authorized access to organization s computer systems or network. They usually work their way into a network from the Internet or dialup access servers. Internal threats - Typically, these threats originate from individuals who have authorized access to the network. These users either have an account on a server or physical access to the network. An internal threat may come from a discontented former or current employee or contractor. Vulnerabilities: Vulnerability is an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to a threat. The following facts are responsible for occurrence of vulnerabilities in the software: Software Bugs - Software bugs are common and are considered to be a normal part of computing. For example - buffer overflow, failure to handle exceptional conditions, access validation error, input validation errors are some of the common software flaws. Timing Windows - This problem may occur when a temporary file is exploited by an intruder to gain access to the file, overwrite important data, and use the file as a gateway for advancing further into the system. Insecure default configurations - Insecure default configurations occur when vendors use known default passwords to make it as easy as possible for consumers to set up new systems. Unfortunately, most intruders know these passwords and can access systems effortlessly.
3.26 Information Technology Bad Protocols - Some protocols, or the standards by which information is exchanged over the Internet, lack any security at all. For example, unsolicited commercial email, commonly referred to as "spam," is the irritating result of poor protocol programming. Trusting Untrustworthy information - This is usually a problem that affects routers, or those computers that connect one network to another. When routers are not programmed to verify that they are receiving information from a unique host, bogus routers can gain access to systems and do damage. End users - Generally, users of computer systems are not professionals and are not always security conscious. For example, when the number of passwords of an user increases, user may start writing them down, in the worst case to places from where they are easy to find. Question 30 What is fat client / fat server? Fat Client/ Fat Server: A fat client/ fat server is a popular term that provides vivid description of the type of client/server system in place. In a fat client system, more of processing takes place on the client, like with a file server or database server. Fat servers place more emphasis on the server and try to minimize the processing done by clients. E.g. Transaction, groupware, and web server. Fat clients are also referred as 2- Tier system and fat-servers as 3-Tier system Question 31 What are the requirements of LAN? The basic LAN Requirements are stated below: Compatibility: A Local Area Network (LAN) Operating System (OS) must provide a layer of compatibility at the software level so that software can be easily written and widely distributed. A LAN OS must be flexible, which means that it must support a large variety of hardware. Internetworking: Bridging of different LANs together is one of the most important requirements of any LAN. Users should be able to access resources from all workstations on the bridge network in a transparent way; no special commands should be required to cross the bridge. A network OS must be hardware independent, providing the same user interface irrespective of the hardware. Growth Path and Modularity: One of the most important requirements of a LAN is its modularity. A set of PCs should get easily converted into a LAN which can grow in size simply by adding additional workstations. If more storage is required, one should be able to add another hard disk drive, or another server. If there is need to connect with a user on another LAN, one should be able to install a bridge.
Computer Networks and Network Security 3.27 System Reliability and Maintenance: All computers are prone to system lockups, power failure and other catastrophes. If a centralized processing system goes down, all users connected to it are left without a machine to work on. However, a LAN operating system should be fault-tolerant and powerful enough to withstand accidents. Question 32 Describe the components of Intrusion Detection Systems. There are four types of Intrusion Detection systems namely Network Intrusion Detection (NID): NID deals with information in the form of packets passing on wire between hosts. Once captured, the packets are analyzed in number of different ways such as compare the packet to signature database consisting of known attacks and malicious packet fingerprints. Host-based Intrusion Detection (HID): These systems are designed to monitor, detect and respond to user and system activity and attacks on a given host. Some also offer audit policy management and centralization, supply data forensics, statistical analysis and evidentiary support, and in certain instances provide some measure of access control. Hybrid Intrusion Detection: These systems offer management of and alert notification from both network and host-based intrusion detection devices. Hybrid solutions provide the logical complement to NID and HID-central intrusion detection management. Network Node Intrusion Detection (NNID): With NNID, the packet sniffer is positioned in such a way that it captures packets after they reach their final target, the designation host. The packet is then analyzed just as if it were travelling along the network through a conventional packet sniffer. All these Intrusion Detection Systems are generally made up of following major components: Sensors: These are deployed in a network or on a device to collect data. They take input from various resources, including network packets, log files, and system call traces. Input is collected, organized, and then forwarded to one more analyzers. Analyzers: Analyzers in IDS collect data forwarded by sensors and then determine if an intrusion has actually occurred. Output from analyzers should include evidence supporting the intrusion report. The analyzers may also provide recommendations and guidance on mitigation steps. User interface: The user interface of the IDS provides the end users a view and way to interact with the system. Through the interface, the user can
3.28 Information Technology control and configure the system. Many user interfaces can generate reports as well. Honey pot: In fully deployed IDS, some administrators may choose to install a Honey pots, essentially a system components setup as bait or decoy for intruders. Honey pots can be used as early warning systems on an attack, decoys from critical systems, and data collection sources for attack analysis. Question 33 Differentiate between Serial Transmission and Parallel Transmission. Differences between Serial Transmission and Parallel Transmission S.No SERIAL TRANSMISSION PARALLEL TRANSMISSION 1 In this, the data bits are transmitted serially one after another. 2 Data is transmitted over a single wire. 3 It is a cheaper mode of transferring data. 4 Applicable for long distance data transmissions. 5 Relatively slower Relatively faster. EXERCISE In this, the data bits are transmitted simultaneously. Data is transmitted over 8 different wires. Relatively expensive. Not practical for long distance communications as it uses parallel path, so cross talk may occur. 1 Discuss various types of transmission media in brief. Refer to ' Section 3.4.3 of Chapter 3 i.e. Computer Network & Network Security' of Study Material. 2 Define the term Network Topology. Discuss Bus and Mesh topology with their advantages and disadvantages. Refer to 'Section 3.5 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. 3 What is Transmission Protocol? Discuss various Transmission Techniques in brief. Refer to 'Section 3.7 & 3.6.4 of Chapter 3 i.e. Computer Networks & Network Security' respectively of Study Material. 4 What are the requirements in implementing LAN? Refer to 'Section 3.8.3 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. 5 What is wireless LAN? Discuss the working procedures of wireless LAN.
Computer Networks and Network Security 3.29 Refer to 'Section 3.8.5 of Chapter 3 i.e. Computer Networks & Network Security ' of Study Material. 6 Discuss the characteristics of Client Server Technology. Refer to 'Section 3.9.4 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. 7 Discuss the benefits of client/server architecture. Refer to ' Section 3.9.5 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. 8 What do you understand by 3-Tier and n-tier Architecture? Discuss in brief. Refer to 'Section 3.13.3/3.13.4 of Chapter 3 -Computer Networks & Network Security' of Material. 9 What are the constituents of a Data Centre? Refer to 'Section 3.14.5 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. 10 Why network security is needed? Refer to ' Section 3.15 of Chapter 3 i.e. Computer Networks & Network Security ' of Study Material. 11 Differentiate between (i) (ii) (iii) Client-Server Architecture and Peer- to -Peer architecture Serial transmission and Parallel transmission Database Server and Application Server (i) Refer to 'Section 3.3.2 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. (ii) Refer to 'Section 3.6.1 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material. (iii) Refer to 'Section 3.12 of Chapter 3 i.e. Computer Networks & Network Security' of Study Material.