Solved S.Y. B.B.A. (Computer Application) CA-401: NETWORKING (2019 Pattern) Exam Paper
Here are the solutions to the S.Y. B.B.A. (C.A.) CA-401 Networking exam paper:
Q1) Attempt any eight of the following:
a) What is protocol?
- A protocol is a set of rules and standards that define how data is transmitted and received over a network. It ensures the correct and efficient communication between devices within a network. Common protocols include TCP/IP, HTTP, FTP, and DNS.
b) What is cladding?
- Cladding refers to the outer layer of a fiber optic cable. It is made of a material that has a lower refractive index than the core, causing light to be reflected back into the core, enabling the signal to travel through the fiber without loss.
c) What is proxy server?
- A proxy server is an intermediary server that sits between the client (user) and the destination server. It handles requests from the client and forwards them to the destination, often used for security, caching, and content filtering purposes.
d) What is meant by classless addressing?
- Classless addressing refers to the use of an IP address system without predefined classes (A, B, C, etc.). It allows for flexible allocation of IP addresses, especially in IPv4, through techniques like CIDR (Classless Inter-Domain Routing).
e) What is transmission media?
- Transmission media refers to the physical pathways that connect network devices and enable data transmission. It can be wired (e.g., twisted pair, coaxial cable, fiber optics) or wireless (e.g., radio waves, microwaves, infrared).
f) What is internetwork?
- An internetwork is a network of networks. It involves connecting multiple local area networks (LANs) or wide area networks (WANs) together, often via routers, to allow them to communicate as a single cohesive system (e.g., the internet).
g) Define steganography.
- Steganography is the practice of hiding secret information within other non-suspicious data, such as embedding text messages in images or audio files. Unlike encryption, steganography focuses on concealing the existence of the message.
h) What is Hub?
- A hub is a basic networking device used to connect multiple devices in a network. It broadcasts incoming data packets to all connected devices. It works at the physical layer (Layer 1) and does not filter or direct traffic.
i) What is Standard Ethernet?
- Standard Ethernet refers to the most common form of Ethernet networking, typically using Cat 5e or Cat 6 cables and operating at speeds of 10 Mbps, 100 Mbps (Fast Ethernet), or 1 Gbps (Gigabit Ethernet). It is defined by IEEE 802.3 standards.
j) What is Firewall?
- A firewall is a security system designed to monitor and control incoming and outgoing network traffic. It is used to protect networks by filtering traffic based on predetermined security rules.
Q2) Attempt any four of the following:
a) What is Computer Network? Explain Goals of Computer Network.
- A Computer Network is a collection of interconnected devices that communicate and share resources over a network. This can involve computers, servers, printers, and other network devices.
Goals of Computer Network:
- Resource Sharing: Allows sharing of hardware (e.g., printers), software, and data across connected devices.
- Reliability: Ensures continued communication even if one part of the network fails, by using redundancy.
- Cost Efficiency: Reduces the need for expensive hardware by allowing resource sharing.
- Security: Protects data and prevents unauthorized access through encryption, firewalls, and other security measures.
b) Explain Function of each layer in the ISO-OSI reference model.
- Physical Layer: Deals with the physical connection between devices (e.g., cables, switches).
- Data Link Layer: Provides node-to-node communication and error correction, organizing data into frames.
- Network Layer: Responsible for routing data and assigning logical addresses (e.g., IP addresses).
- Transport Layer: Ensures reliable data transfer by managing flow control, error detection, and segmentation (e.g., TCP).
- Session Layer: Establishes, maintains, and terminates sessions between applications.
- Presentation Layer: Translates data formats, handles encryption, and compresses data for the application layer.
- Application Layer: Provides network services to end-user applications, such as HTTP, FTP, and DNS.
c) What is wireless transmission? Explain any one media in detail.
- Wireless transmission refers to the transfer of data without using physical cables, through the air using electromagnetic waves. Common types of wireless transmission include radio waves, microwaves, and infrared.
One Media:
- Microwaves: Microwaves are used for long-range communication like satellite links and point-to-point connections. They operate at high frequencies and require a line-of-sight path between the sender and receiver, which limits their application in urban areas with obstructions.
d) Explain IEEE standard 802.11 (WLAN) in detail.
- IEEE 802.11 is the set of standards for wireless local area networks (WLANs). The key standards include:
- 802.11a: Operates at 5 GHz with speeds up to 54 Mbps.
- 802.11b: Operates at 2.4 GHz with speeds up to 11 Mbps.
- 802.11g: Operates at 2.4 GHz with speeds up to 54 Mbps.
- 802.11n: Operates at both 2.4 GHz and 5 GHz with speeds up to 600 Mbps.
- 802.11ac: Provides speeds up to 1.3 Gbps and operates at 5 GHz.
These standards provide the foundation for Wi-Fi networks in homes, businesses, and public spaces.
e) What is attack? Explain various types of attacks.
- An attack refers to any attempt to compromise the security, availability, or integrity of a network or system. Attacks can come in many forms.
Types of Attacks:
- Denial of Service (DoS): Overwhelms a system or network, making it unavailable to users.
- Man-in-the-Middle (MITM): Intercepts and alters communication between two parties.
- Phishing: Trick users into divulging sensitive information by pretending to be a trusted entity.
- Malware: Malicious software that harms or disrupts computer systems (e.g., viruses, worms, ransomware).
- SQL Injection: Inserting malicious SQL queries into a database to extract sensitive information.
Q3) Attempt any four of the following:
a) What is Bridge? Explain types of bridges.
- A bridge is a device used to connect two or more network segments, effectively reducing network traffic and increasing performance. It works at the Data Link Layer.
Types of Bridges:
- Transparent Bridge: Learns MAC addresses and forwards frames between network segments based on the destination MAC address.
- Source Routing Bridge: Used in Token Ring networks, the source device determines the route for the data.
- Remote Bridge: Connects two networks over long distances, typically using leased lines.
b) Explain different modes of communication with a sketch.
- Modes of Communication:
- Unidirectional: Data flows in only one direction (e.g., TV broadcast).
- Bidirectional: Data flows in both directions, either simultaneously (Full-duplex) or alternately (Half-duplex).
- Sketch: A simple diagram of two devices, showing unidirectional and bidirectional data flow.
c) Explain TCP/IP protocol in detail.
- TCP/IP (Transmission Control Protocol/Internet Protocol) is the fundamental communication protocol of the internet.
- TCP: Ensures reliable communication by providing error checking, flow control, and retransmission of lost data packets.
- IP: Routes data packets to their destination using IP addresses.
- Other protocols in the TCP/IP suite include HTTP, FTP, and SMTP for specific types of communication.
d) What is guided media? Explain any one in detail.
- Guided Media refers to physical transmission paths that guide the signal along a predetermined route. These include cables and fiber optics.
Example:
- Twisted Pair Cable: Composed of pairs of copper wires twisted together, used for telecommunication. It is inexpensive and flexible but vulnerable to interference.
e) What is Fast Ethernet? Explain categories of Fast Ethernet.
- Fast Ethernet refers to Ethernet networks that operate at 100 Mbps (compared to the original Ethernet at 10 Mbps).
Categories of Fast Ethernet:
- 100BASE-TX: Uses twisted pair cables, commonly used in office environments.
- 100BASE-FX: Uses fiber optic cables, often used in large or high-performance networks.
Q4) Attempt any four of the following:
a) What is topology? Explain types of topology.
- Topology refers to the physical or logical arrangement of devices in a network.
Types of Topologies:
- Bus: All devices are connected to a single central cable.
- Star: Devices are connected to a central hub or switch.
- Ring: Devices are connected in a circular fashion.
- Mesh: Every device is connected to every other device.
- Hybrid: A combination of two or more topologies.
b) What is addressing? Explain different types of addresses.
- Addressing is the method of assigning unique identifiers to network devices.
Types of Addresses:
- IP Address: Identifies devices at the network layer (e.g., 192.168.1.1).
- MAC Address: A unique identifier assigned to each network interface card (NIC).
- Port Address: Identifies specific services or applications on a device.
c) Explain propagation method.
- Propagation methods refer to how signals travel through various mediums.
- Line-of-Sight: Requires direct path between sender and receiver.
- Ground Wave: Travels along the earth’s surface.
- Sky Wave: Reflected from the ionosphere.
- Space Wave: Direct transmission through the air (e.g., satellite communication).
d) What is copyright? Explain applications of copyright.
- Copyright is a legal protection granted to creators of original works (literary, artistic, and intellectual).
Applications of Copyright:
- Books: Protection for written works.
- Software: Ensures creators’ rights to control the use and distribution of their programs.
- Music: Protects musical compositions and recordings.
e) What is Bluetooth? Explain its architecture.
- Bluetooth is a wireless technology for exchanging data over short distances.
Bluetooth Architecture:
- Devices: Bluetooth devices communicate in a master-slave relationship.
- Piconet: A small network of Bluetooth devices.
- Scatternet: A network of multiple interconnected piconets.
Q5) Write short note on any two:
a) Switch: A switch is a device that connects multiple devices in a LAN and forwards data based on MAC addresses. It operates at the Data Link Layer and reduces network congestion.
b) Virtual LAN (VLAN): A VLAN is a logical grouping of devices within a LAN, allowing network administrators to segment networks for security and traffic management purposes.
c) Types of Network:
- LAN (Local Area Network): A network confined to a small geographical area (e.g., home or office).
- WAN (Wide Area Network): A network that covers a large geographical area (e.g., the internet).