Solved S.Y. B.B.A. (Computer Application) CA-401: NETWORKING (2019 Pattern) Exam Paper
Here are the solutions to the S.Y. B.B.A. (C.A.) CA-401 Networking exam paper:
Q1) Attempt any three of the following:
a) What is unguided media? Explain types of unguided media.
- Unguided Media refers to transmission media that does not require physical conductors for signal transmission. It uses air or vacuum to transmit signals in the form of electromagnetic waves. The signal propagates freely through the atmosphere.
Types of Unguided Media:
- Radio Waves: Used for short-range communication, such as AM/FM radio, Bluetooth, and Wi-Fi.
- Microwaves: Used for long-range communication, including satellite communication and point-to-point communication systems. They operate at higher frequencies than radio waves.
- Infrared: Used for short-range communication, such as remote controls and some wireless communication systems.
- Visible Light: Used for communication in fiber optics (Optical wireless communication).
b) What is a switch? How does it differ from a hub?
- A Switch is a device used in networking to connect devices within a LAN. It operates at the Data Link Layer (Layer 2) of the OSI model and forwards data frames based on MAC addresses. It reduces network congestion by directing data to the specific device rather than broadcasting it to all devices.
- A Hub is a basic networking device that connects multiple devices within a LAN and operates at the Physical Layer (Layer 1) of the OSI model. It broadcasts data to all connected devices, regardless of the destination, leading to inefficient use of bandwidth.
Differences between Switch and Hub:
Feature | Switch | Hub |
---|---|---|
Layer | Data Link Layer (Layer 2) | Physical Layer (Layer 1) |
Data Forwarding | Directs data to the specific device based on MAC address | Broadcasts data to all devices |
Efficiency | More efficient, reduces network traffic | Less efficient, causes congestion |
Collision Domain | Reduces collision domain | All devices are in one collision domain |
c) What is copyright? Explain applications of copyright.
- Copyright is a legal protection granted to the creators of original works, such as literary, artistic, musical, and other intellectual works. It provides the creator with exclusive rights to reproduce, distribute, and perform the work, and prevents others from using it without permission.
Applications of Copyright:
- Literary Works: Protects written works like books, articles, and poetry.
- Music: Protects musical compositions and sound recordings.
- Software: Protects computer programs and source code.
- Artworks: Protects visual works like paintings, sculptures, and photographs.
- Films and Videos: Protects films, movies, and audiovisual works.
d) Differentiate between connection-oriented and connectionless services.
- Connection-Oriented Service: In this type of service, a connection is established between the sender and the receiver before any data transfer occurs. Data is transmitted in an orderly and reliable manner. Characteristics:
- Reliable delivery of data.
- Data packets are sequenced and acknowledged.
- Example: TCP (Transmission Control Protocol).
- Connectionless Service: In this service, there is no need to establish a connection before sending data. Data is sent as independent packets, and each packet may take a different path. Characteristics:
- Unreliable delivery of data.
- No need for acknowledgments or sequence.
- Example: UDP (User Datagram Protocol).
Feature | Connection-Oriented | Connectionless |
---|---|---|
Reliability | Reliable (acknowledgments, retransmissions) | Unreliable |
Data Transfer | Sequential, ordered | Independent packets |
Examples | TCP | UDP |
Connection Setup | Requires connection setup (handshaking) | No connection setup required |
Q2) Attempt any three of the following:
a) Explain the functions of each layer in the ISO-OSI reference model.
- Physical Layer (Layer 1): Deals with the physical transmission of data over a medium (cables, fiber, etc.). It defines the hardware elements involved in the communication.
- Data Link Layer (Layer 2): Responsible for error detection and correction, and framing data for transmission. It also handles access to the physical medium (e.g., Ethernet).
- Network Layer (Layer 3): Handles routing and forwarding of data packets across different networks. It provides logical addressing (IP addresses).
- Transport Layer (Layer 4): Provides reliable data transfer, flow control, error checking, and segmentation of data into smaller packets. It includes protocols like TCP and UDP.
- Session Layer (Layer 5): Manages sessions or connections between applications. It is responsible for setting up, maintaining, and terminating communication sessions.
- Presentation Layer (Layer 6): Ensures that data is in a readable format. It handles encryption, compression, and translation of data formats.
- Application Layer (Layer 7): Provides network services to applications, such as email (SMTP), file transfer (FTP), and web browsing (HTTP).
b) What is Backbone Network? Explain types of Backbone network.
- A Backbone Network is the central part of a network that connects different networks or sub-networks and provides high-speed data transfer between them. It serves as the primary pathway for data traffic.
Types of Backbone Networks:
- Enterprise Backbone: Used within a company to connect different departments, floors, or buildings, typically operating within a limited geographic area.
- Regional Backbone: Connects multiple enterprise backbones within a region or country.
- Wide Area Backbone: A large-scale backbone that connects multiple regional or enterprise backbones across the globe, like the internet.
c) State the advantages and disadvantages of LAN, with uses.
- Advantages of LAN:
- High Data Transfer Speed: LANs typically offer high-speed data transfer compared to WANs.
- Resource Sharing: Devices can share resources like printers, files, and applications.
- Cost-Effective: LANs reduce the need for duplicating resources, saving costs.
- Easy to Manage: Easier to maintain, as network administrators can manage resources centrally.
- Disadvantages of LAN:
- Limited Range: LANs are typically limited to small geographical areas (e.g., a building or campus).
- Security Issues: Since all devices are connected, there are potential security risks from unauthorized access.
- Maintenance Costs: Hardware, such as switches, routers, and cables, may require regular maintenance.
- Uses of LAN:
- In homes, offices, and schools to connect computers and share resources like printers and internet connections.
d) Explain Ground wave propagation with a diagram.
- Ground Wave Propagation refers to the propagation of radio waves along the surface of the Earth. It is commonly used for AM radio broadcasting, where the waves travel across the ground to reach the receiver.
Explanation:
- Ground waves follow the curvature of the Earth, allowing communication over long distances. The signal strength decreases as it travels away from the source due to the absorption of energy by the Earth’s surface.
Diagram:
_________
| |
| Transmitter
|_________|
|
| Ground Wave Propagation
|
_________
| |
| Receiver|
|_________|
Q3) Attempt any three of the following:
a) Define computer network? Explain goals of computer network.
- A Computer Network is a system of interconnected computers and devices that can share resources, exchange data, and communicate with one another.
Goals of Computer Network:
- Resource Sharing: Allows users to share resources such as printers, data, and software applications.
- Communication: Enables communication through email, chat, video conferencing, and other tools.
- Data Security: Protects data from unauthorized access through encryption, firewalls, and authentication.
- Scalability: Networks are designed to easily add new devices or nodes without disrupting existing services.
b) What is an attack? Explain various types of attacks.
- An attack in networking refers to any malicious attempt to gain unauthorized access, disrupt services, or damage systems.
Types of Attacks:
- Denial of Service (DoS): Overloads a system or network, making it unavailable to users.
- Man-in-the-Middle (MITM): Intercepts communication between two parties and may alter or steal information.
- Phishing: Attempts to trick users into disclosing sensitive information by masquerading as a legitimate entity.
- Malware: Malicious software, such as viruses, worms, and ransomware, designed to damage or disrupt systems.
- SQL Injection: Attacks web applications by inserting malicious SQL code to extract data from a database.
c) What is Gateway? Explain various levels of gateways.
- A Gateway is a network device that connects different networks and facilitates communication between them, often working across different protocols.
Levels of Gateways:
- Application-Level Gateway: Operates at the application layer, filtering data for specific applications (e.g., HTTP, FTP).
- Transport-Level Gateway: Operates at the transport layer to manage communication protocols like TCP.
- Network-Level Gateway: Operates at the network layer and translates protocols between different network architectures (e.g., converting IPv4 to IPv6).
- Protocol-Level Gateway: Converts one type of communication protocol into another.
d) What is VLAN? What are the features of VLAN?
- A VLAN (Virtual Local Area Network) is a logical grouping of devices within a LAN, regardless of their physical location, to enhance network management and security.
Features of VLAN:
- Segmentation: Divides a network into smaller, isolated sub-networks for better traffic management.
- Security: Restricts access between devices on different VLANs.
- Efficiency: Reduces unnecessary traffic by restricting communication to only devices within the same VLAN.
- Flexibility: Devices can be moved to a different VLAN without physical re-cabling.
Q4) Attempt any three of the following:
a) Explain TCP/IP protocol in detail.
- TCP/IP (Transmission Control Protocol/Internet Protocol) is the fundamental protocol suite for communication over the internet.
- TCP: Ensures reliable communication by establishing a connection, managing flow control, and retransmitting lost data.
- IP: Responsible for addressing and routing data packets across the network. It uses IP addresses to identify source and destination devices.
- Other Protocols in TCP/IP:
- HTTP: HyperText Transfer Protocol, used for web communication.
- FTP: File Transfer Protocol, used for transferring files.
- SMTP: Simple Mail Transfer Protocol, used for email communication.
b) What is HUB? Explain types of HUB?
- A Hub is a network device that connects multiple devices in a LAN. It works at the physical layer and broadcasts data to all connected devices.
Types of Hubs:
- Passive Hub: Simply connects devices and does not amplify or modify the signals.
- Active Hub: Amplifies signals to extend the distance between devices.
- Intelligent Hub: Offers additional functionality, such as monitoring and management capabilities.
c) Explain Bluetooth architecture in detail.
- Bluetooth is a wireless communication technology used for short-range data exchange.
Bluetooth Architecture:
- Devices: Bluetooth devices communicate in a master-slave relationship.
- Piconet: A small network formed by connecting a master device and up to seven active slave devices.
- Scatternet: A network of multiple interconnected piconets.
- Protocol Stack: Includes layers for application, session, transport, and link management.
d) Explain different modes of communication.
- Unidirectional: Data flows in only one direction (e.g., radio broadcasts).
- Half-Duplex: Data flows in both directions, but not at the same time (e.g., walkie-talkies).
- Full-Duplex: Data flows in both directions simultaneously (e.g., telephones).
Q5) Write notes on: (any two)
a) Proxy Server: A proxy server acts as an intermediary between a client and the server, forwarding requests and responses on behalf of the client. It provides benefits like privacy, security, and content filtering.
b) Fiber Optic Cable: A fiber optic cable uses light signals to transmit data at high speeds over long distances. It offers higher bandwidth and is less susceptible to interference compared to copper cables.
c) IP Addressing: IP addressing is a system used to identify devices on a network using unique numerical addresses. IP addresses are divided into IPv4 (32-bit) and IPv6 (128-bit) formats, each with specific address ranges and uses.
d) Topology: Network topology refers to the physical or logical arrangement of devices in a network. Types of topology include bus, star, ring, mesh, and hybrid, each offering different advantages in terms of performance, cost, and reliability.