0% found this document useful (0 votes)
51 views

Computer Network

The document provides information about networking concepts including peer-to-peer networks, client-server networks, connecting computers, the internet, intranet and extranet. It also summarizes the OSI model layers including physical, data link, network, transport, session, presentation and application layers. Finally, it discusses network hardware including the purpose of a network interface card and types of NICs for desktops and laptops.

Uploaded by

anoopsam115
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Computer Network

The document provides information about networking concepts including peer-to-peer networks, client-server networks, connecting computers, the internet, intranet and extranet. It also summarizes the OSI model layers including physical, data link, network, transport, session, presentation and application layers. Finally, it discusses network hardware including the purpose of a network interface card and types of NICs for desktops and laptops.

Uploaded by

anoopsam115
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

SESSION 1: NETWORKING

Answer the following Questions


1. Explain the purpose of Networking
networking is widely used for accessing and sharing information;
examples include web browsing, downloading & uploading, file sharing,
printer sharing, etc.

2. Explain Peer-to-Peer Networks


* Consist maximum of 10-20 computers.
* used in simple setup
*used in home and small office network

3. Explain Client Server networks


* Consist of 10 to hundreds of computers
* centralised connection
* Server is main compute and client uses the services from server

4. Explain any three methods for connecting two or more computers.


 Use a cross-over cable
Use Serial and Parallel ports
Use Wi-Fi
Use Hub or Network Switch
SOHO Router or Wi-Fi Router

5. Explain Internet, Intranet & Extranet.


Internet: world wide connection to share information
Intranet: private computer network used by organizations for sharing
Resources
Extranet: Extranet is a computer network used outside the Intranet.
Fill in the blanks
1. Acronym for LAN Local Area Network.
2. Acronym for WAN Wide Area Network.
3. In PEER TO PEER( P2P) model, a computer can act both as a server
and a client.
4. List any three resources that can be shared across a network.
Printer, CDROM, Hard Drives
5Client / Server: model uses centralized security database.
6. Client is also referred to as Service Requestors.
7. Server:is also referred to as Service Providers.
8. internet is the largest network in the world.
9. _Intranet is commonly referred to as a private network by most
Organizations.
SESSION 2: THE OSI MODEL
Answer the following
1. Explain the purpose of OSI Model.
 To provide a conceptual model for networking .
 It gives the guidelines for network manufactures The OSI
Model defines how data communication occurs on
2. Explain Physical Layer of the OSI Model.
 Physical Layer is the first (lowest) layer in the OSI Model and
deals with
media, signal and binary transmission.
 Establishes and terminates connections to communication
 controls modulation & demodulation of networks
 Unit of measurement at physical layer is bits such as Kbps,
Mbps or Gbps.

3. Explain Data Link Layer of the OSI Model.
 Data Link Layer is the second (Layer 2) layer in the OSI
Model
 local delivery of frames between devices on the same
LAN
 layer include Network Interface Cards, Bridges
andSwitches
 Data Link Layer has the following two sub layers:a.
Logical Link Control (LLC) b. Media Access Control (MAC)
 Unit of measurement in data link layer is frames
4. Explain Network Layer of the OSI Model.
Determines how data moves between network devices
Protocols in this layer include IPv4, IPv6, IPX,
Unit of measurement in network layer is packets or
datagram

5. Explain Transport Layer of the OSI Model.


Ensures end-to-end communication and error-free transmission
Protocols in this layer include TCP, UDP, etc.
The unit of measurement in transport layer is segments.

6. Explain Session Layer of the OSI Model.


 referred to as Layer 5, is responsible for establishing,
between network applications
 Reports upper layer for errors
 unit of measurement in layer is data
7. Explain Presentation Layer of the OSI Model.
 Presentation Layer is also referred to as Layer 6.
 unit of measurement in layer is data
Encodes/decodes, encrypts/decrypts,
compresses/decompresses dat

8. Explain Application Layer of the OSI Model.


 protocols in this layer are responsible for process-to-process
communication across an IP network.
 Unit of measurement at Application layers is data
 Provides standardized services such as virtual terminal, file
and job
transfer and operations
Fill in the blanks
1. Acronym for ISO International Standards Organization.
2. Acronym for OSI Open Systems Interconnect.
3. Seven layers of the OSI model are (write in correct order):
Physical layer,data link layer, network layer, transport layer,session
layer, presentstion layer, application layer
4. Sub layers of Layer 2 are:Logical Link Control (LLC) b. Media
Access Control (MAC)
.
5. network layer handles the function of logical addressing & routing.
6. physical layer deals with standards for cabling & connectors.
7. presentation layer deals with standards for data formats, encryption
&Compression.
8. 10BASE-T, 10BASE2, 10BASE5 are examples of layer 1 protocols.
9. IP, IPX, Decnet are examples of layer 2 protocols.
10. IPv4, IPv6, IPX are examples of layer 3 protocols.
11. TCP, UDP, etc _ are examples of layer 4 protocols.
12. PAP, PPTP, L2TP are examples of layer 5 protocols.
13. MIDI, SSL, TLS are examples of layer 6 protocols.
14. HTTP, FTP, SMTP are examples of layer 7 protocols.
15. session layer is used for creating communication sessions
between computers.
16. presentation layer of the OSI model is used to encrypt and
compress data.
17. PDU is the unit of measurement at Layer 1.
18. frames is the unit of measurement at Layer 2.
19 frames or data packets is the unit of measurement at Layer 2.
20 segments is the unit of measurement at Layer 4.
21. data is the unit of measurement at Layer 7
Session 3 terminology and technology
Answer the following
1. Explain the difference between baseband & broadband.
Baseband Broadband
Data sent in single channel Multiple channel
Uses TDM Uses FDM
High transfer rate Less transfer rate

2. Explain TDM & FDM.


TDM is the method in which multiple signal transmitted over single
transmission media ex: wires or radiowaves
FDM is a method in which multiple signals are transmitted at different
frequencies ex: (FM) or cable TV

3.Explain CSMA/CD.
It is a mechanism that defines how transmission takes place in a
network.
It will sense the cariier or channel and if find any blocks or problem
of system.it will send back information to sender.
4. Explain CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA) is a
network multiple access method which check idle channel. It will
sense the cariier or channel and if find any blocks or problem of
system.it will send back information to sender. Also find out the
alternate channel to reach the receiver.

Fill in the blanks


1. Acronym for TDM Time Division Multiplexing
2. Acronym for FDM _frequency division multiplexing
3. Acronym for CSMA Carrier sense multiple access
4. In Circuit Switching a dedicated path is established before
transmitting data.
5. In Packet Switching method, data is divided into packets and can
take different routes to reach the destination.
6. Define Unicast one-to-one communication
7. Define Multicast one-to-many communication
8. Define Broadcast one-to-all communication
9. Simplex mode of communication in one way.
10. Half-duplex mode of communication in two way.
11. Full-duplex mode of communication two way simultaneous.
12. IEEE Standard for CSMA/CD IEEE 802.3.
13. Baseband refers to digital signals that support single
communication at a
time.
14. Broadband refers to analog signals that support multiple signals
sent over a
Single cable.
15. CSMA/CA is the mechanism used in wireless networks.
16. X.25 and Frame Relay are examples of connection-oriented mode
methods.
S-4 NETWORK TOPOLOGY AND ACCESS METHOD
Answer the following
1. Explain the devices used in Star Topology.
HuB , Switch,RJ45,UTP

2. Explain the types of cables used in Star Topology.


Twisted pair cable is used
3. Explain the advantages of fiber-optic cables.
 Great speed for long distance
 It consist of high quality glass
 Plenum rated cable used to protect from fire and smoke
Fill in the blanks
1. IEEE Standards related to bus topology are 10BASE2and 10BASE5.
2. 10BASE2 is referred as (Thinnet)
3. 10BASE5 is referred as (Thicknet).
4. bus topology is easy and simple to set up.
5. mesh topology is redundant and considered expensive.
6. _star topology is the most widely used topology today.
7. Star topology uses Twisted pair type of cable and HUB type of
Connectors.
8. Write any three IEEE standards that relate to star topology.
10BASET, 100BASE-TX, 1000BASET
9. MMF type of cable uses light as a medium of transmission.
10. SMF type of optic cables is used for long distances.
11. co axial cable can be used for connecting two computers without
using
a switch.
12. ________ cable is used for connecting dissimilar devices such as
network
switch & desktop.
13. repeater are devices used for amplifying and retransmitting
signals.
14. twisted pair is the most common cable used today on computer
networks.
15. cat-5 is the category of UTP cable that supports minimum 100
Mbps.
16. fiber optical cable should be used in locations such as heavy
machineries
that have high EMI.
17. _planum rated cable should be used if fire protection is required.
18. _single mode fiber supports longer distances than multi mode fiber.
19. Acronym for MSAU Multistation Access Unit.
20. Acronym for NEXT Near-end Crosstalk.
21. Acronym for FEXT Far-end Crosstalk.
22. ___________ is a device used for testing patch cables and pins.
SESSION 5: NETWORK HARDWARE- NETWORK INTERFACE CARD

Answer the following questions


1. Explain the purpose of NIC.
Network cards are devices that connect computers to the network

3. Explain the types of NIC’s for use in Desktops.


PCI Ethernet Card
4. Explain the types of NIC’s for use in Laptops.
Cardbus Ethernet Card
5. Explain MAC address with an example.
* 48 bit unique address used in NIC of computer
* It is displayed in hexadecimal format.
* GETMAC is a command line utility used for viewing the MAC
address of an NIC.
5. Explain the purpose of WOL

6. Explain the purpose of Boot ROM.


To load an operating system from another computer on the network,
these
Computers require a special chip called the BOOT ROM
Fill in the blanks
1. _________ types of NICs are designed for use in desktop computers.
2. _________ types of NICs are designed for use in laptop computers.
3. USB Ethernet Card type of NICs can be used in both desktop &
laptop computers.
4. List any three manufactures of NICs. IBM, Asus,Intel , zoom ,
gigabytes
5. MAC Addresses are displayed in hexadecimal format, separated by
Hyphen.
6. ___________ refers to the procedure through which the devices
choose
compatible network speed.
7. MAC address is also known as Physical address of an NIC.
8. GETMAC is a command line utility is used for viewing the physical
address
of an NIC.
IPCONFIG Internet Protocol Configuration Utility
PING Test network connectivity
TRACERT Trace Route from source to destination
ARP Resolve IP address to MAC address
Hostname View computer name or hostname
NETSTAT View TCP/IP statistics
Nbtstat View NetBIOS over TCP/IP statistics
Nslookup View DNS related information
Route View or modify routing table
PATHPING Trace packets and view detailed packet information

SESSION 6: NETWORK HARDWARE- HUB, SWITCH & ROUTERS


Answer the following questions
1. Explain the purpose of a Hub.
* A hub is a device that connects multiple computers using a twisted-
pair cable.
*Hubs operate at Layer 1 (Physical)
*4 to 8 computer can connect to hub and also called as multiport
repeater

2. Explain the purpose of bridge.


*Bridge is a device that can connect network segments
*Bridges operate at Layer 2 of the OSI Model.

3. Explain the purpose of network switch.


*Switch is a device that allows multiple computers using twisted
paircable.
*Switches operating at Level 2

4. Explain the purpose of PoE.


PoE describes a standardized system to provide electrical power
supply through Ethernet cable.
PoE provide power up to 25 watts and connected up to 100 meter

5. Explain the purpose of a router.


Routers are Layer 3 devices that allow packets to be routed to different
logical networks.SOHO router (for home)and sophisticated routers(for
office) are examples

6. Differentiate between hub, switch and router.


Fill in the blanks
1. Hubs operate at the ________ layer of the OSI Model.
2. Switch operates at the _______ layer of the OSI Model.
3. Router operates at the __________ Network Layer of the OSI Model.
4. ________ are also referred to as multiport repeaters.
5. Unmanaged type of switches require no administrative efforts.
6. VLAN's, PoE, bandwidth restrictions can be used only on managed
switches.
7. Acronym for VLAN Virtual LANs.
8. Acronym for PoE Power over Ethernet.
9. layer-2 layer of OSI Model is used for VLANs.
10. Routing _ is the process of selecting paths in a network when
sending or
receiving packets from one computer or device to another.
11. Switches use __________, _____________, ____________ or ____________
methods.
12. managed switches are used to create VLANs.
13. switches are also referred to as multiport bridges.

SESSION 7: PROTOCOLS
Answer the following questions
1. Explain Proprietary Protocols with an example.
Proprietary protocols are communications protocol used in single
organization or individuals.ex: IPX from novella and apple talk from
apple, NETBEUI from microsoft

2. Explain Open Standard Protocols with an example.


Open Standard protocols are communication protocols that are
publicly available,ex: TCP/IP
3. What is IP?
TCP/IP (Transmission Control Protocol / Internet Protocol) is a
routable protocol suite that is also known as the Core Protocol.

4. List the classes of IPv4.


Class A,B,C,D,E
Fill in the blanks
1. Protocols are set of rules for communication.
2. Examples of Proprietary Protocols ___________ , __________ &
___________.
3. Acronym for NetBEUI NetBIOS Extended User Interface.
4. Acronym for IPX/SPX Internetwork Packet Exchange/Sequenced
Packet Exchange
5. Acronym for TCP/IP Transmission Control Protocol / Internet
Protocol.
6. _________ is an example of a protocol that is Open Standard.
7. Versions of IP are ______ & ______.
8. IPV4 is a connectionless protocol used on packet-switched
networks.
9. Acronym for IANA Internet Assigned Numbers Authority.
10. IPv4 uses 32-bit addressing scheme
11. IP address classes are ______ , ______ , _______ , ________ & _______.
12. Number of logical networks in Class A 126 and host per network _
16,777,214 _.
13. Number of logical networks in Class B _ 16,384 _ and host per
network 65,532
14. Number of logical networks in Class C 2,097,152 and host per
network 254.
15. Range of IP Address Class A 0.0.0.0 - 126.255.255.255.
16. Range of IP Address Class B _ 128.0.0.0 - 191.255.255.255 _.
17. Range of IP Address Class C 192.0.0.0 - 223.255.255.255.
18. Range of IP Address Class D 224.0.0.0 - 239.255.255.255
19. Range of IP Address Class E 240.0.0.0 - 255.255.255.255.
20. E _ class of IP addresses are reserved for multicasting.

SESSION 8: IP ADDRESS
Answer the following questions
1. Explain the purpose of Public IP address with an example.
Public IP addresses are IP addresses obtained from an ISP .
organizations to provide services such as web hosting, email, etc.
example: Regional Internet Registry
2. Explain the purpose of Private IP address with an example.
Private IP addresses are addresses used in private networks such as
homes and internal office networks. Ex: IETF, IANA

3. Explain the purpose of Subnet Masks.


Network & Host portion of an IPaddress is decided based on an
additional value called the Subnet Mask

4. Explain the procedure to determine the network ID and host ID of an


IP
address with an example.

5. Explain the purpose of IPCONFIG utility with an example.


IPCONFIG is used typically for viewing IP configuration of a computer;
Fill in the blanks
1. Acronym for RIR ________________________________ .
2. ____________ IP addresses are required to communicate with other
computers
on the Internet.
3. ____________ IP addresses are used within Local Area Networks such
as home
or office networks.
4. _____________ , ________________ & _______________ are reserved
ranges
of Private IP Addresses.
5. ________ is a command line utility for working with IP configuration in
a
computer.
6. Device that is required for transmitting data across different logical
networks___________ Router.
7. 123.43.12.11 is an example of Class _____ IP address.
8. 223.143.112.18 is an example of Class _____ IP address.
9. 74.13.123.14 is an example of Class _____ IP address.

SESSION 9: IP ADDRESS ASSIGNMENT


Answer the following questions
1. Explain the procedure of assigning a static IP address with an
example.
Administrators can allocate and assign unique non-changing IP
addresses to hosts or computers. Such addresses are called Static IP
address. Ex: IP addressing
2. Explain the PING utility with an example.
It is a command line utility used for testing network connectivity: ex it
is used for network connectivity.

3. Explain the purpose of loopback IP address and its range with an


example.
It is a special IP address reserved for testing local machine’s NIC or
device drivers or TCP/IP stack within the local computer. Range is
127.0.0.1 to 127.255.255.254.

4. Explain the purpose of CIDR Method with an example.


CIDR(Classless Inter-domain Routing), was introduced for efficient use
of IP addresses. Ex: a Class C IP address can accommodate only 254
host so multiple ranges from Class C will be needed. CIDR helps
resolve these issues.

5. Explain ARP.
Address Resolution Protocol is used for resolving IP addresses to
MAC address When two computers communicate using IP address
(Layer 3) on the same subnet, IP address will be resolved to MAC
address (Layer 2) and they start communicating using MAC Address
through Network Switch

Fill in the blanks


1. Acronym for ARP ______________________________.
2. Acronym for CIDR ________________________________________________.
3. _____________ protocol is used by ping utility for displaying
messages.
4. ICMP operate at _network layer of the OSI Model.
5. Acronym for ARP _____________________________________.
6. 22.123.12.255 is an example of ___________ address.
7. Number of bits in IPv4 address 32.
8. __________ is a command line utility used for testing network
connectivity.
9. ___________ protocol is used for translating IP addresses to MAC
addresses.
10. ARP is a command line utility used for managing ARP Cache.
11. IP address range reserved for loopback purpose __________________.
12. IP address assigned through DHCP is referred to as dynamic IP
addresses.
SESSION 10: TRANSPORT LAYER PROTOCOLS – TCP & UDP
Answer the following
1. Explain the purpose of Transport Layer Protocols.
transport layer protocols provide end-to-end communication between
hosts or
computers. Unit measurement is data.

2. Explain UDP.
is a transport layer protocol that is used for sending messages to
other hosts on the network without prior communication. it answer the
small queries such as DNS and other online games

3. Explain TCP.
provides reliable, ordered delivery from a program on one computer to
another program on a different computer on the network. it services
email, web service, file transfer

4. Differentiate TCP & UDP


TCP UDP
Reliable Unreliable
Connection Oriented Connectionless
Segment Sequencing No Sequencing
Acknowledge Segments No Acknowledgement
Retransmission and flow control No retransmission

5. Explain sockets with an example.


operating system uses a combination of the assigned IP address
along with a port number referred to as a socket for end-to-end
communication.

Fill in the blanks


1. Acronym for TCP _________________________________.
2. Acronym for UDP _________________________________.
3. ____________ is a command line utility is used for viewing network
statistics.
4. __________ is a transport layer protocol has less overhead and higher
performance than TCP.
5. __________ is a transport layer protocol provides reliability.
6. Acronym for ARP _________________________________.
7. Acronym for IMAP ________________________________.
8. Acronym for LDAP ________________________________.
9. Acronym for FTP _________________________________.
10. Default port number for HTTP ________ .
11. Default port number for DNS Query ________ .
12. Default port number for POP3 ________ .
13. Default port number for SMTP ________ .
14. Default port number for IMAP4 ________ .
15. Default port number for LDAP ________ .
16. Default port number for HTTPS ________ .
17. Default port number for Telnet ________ .
18. Acronym for IGMP ___________________ .
19. Acronym for ARP ___________________.
SESSION 11: SERVER OPERATING SYSTEMS

Answer the following questions


1. Explain the purpose of Server or Network Operating Systems.
Server Operating Systems(SOS) are system software that run on a
server and enable the server to manage data

2. Explain any five functions of a Server Operating System.


Name Server (DNS, WINS, DDNS)
Database Server Communications Server
Mail Server File Server
Print Server Proxy Server
Web Server Remote Access Server
Gaming Server Terminal Server, etc

3. List the editions of Microsoft Windows 2008.


Microsoft Windows NT 4.0 Server
Microsoft Windows 2000 Server
Microsoft Windows 2003 Web,
Microsoft Windows 2008 Web,
Microsoft Windows 2012 Foundation,

4. List any five variants of UNIX.


SUN Solaris
IBM AIX
BSD OS
Digital Unix
HP-UX
MAC OS X Server, etc

5. List any five distributions of Linux.


Debian
Redhat
openSUSE
Android
Ubuntu
Bharat
Fedora, etc
Fill in the blanks
1. Write five functions of a Server Operating System. ____________ ,
____________ , ________________, ________________ & ________________.
2. List the editions of Windows 2003. ______________ , ________________ ,
_____________ & ______________.
3. List the editions of Windows 2008. ______________ , ________________ ,
_____________ & ______________.
4. List the editions of Windows 2012. ______________ , ________________ ,
_____________ & ______________.
5. List any 5 variants of UNIX. _____________ , ___________ , _____________
,
_____________ & ______________.
6. List any 5 Linux distributions. _____________ , ___________ ,
_____________ ,
_____________ & ______________.

SESSION 12: NETWORKING SERVICES - DYNAMIC HOST


CONFIGURATION PROTOCOL (DHCP)
Answer the following questions
1. Explain the purpose of DHCP.
DHCP) is a network protocol used to configure network devices to
enable them to communicate on an IP network.

2. Explain the DORA Process.


DHCP follows a basic process to automatically configure a DHCP
client, widely
referred to as DORA

4. Explain the purpose of Auto-IP.


If DHCP doesn’t have IP address it leads the miscommunication with
DHCP server.computers or hosts select a random IP address within a
reserved range in order to communicate with other computers within
that network
Fill in the blanks
1. Acronym for DHCP ____________________________________________.
2. _________ protocol is used for automatic configuration of IP
addresses.
3. Acronym for UNC ___________________________________.
4. Acronym for APIPA __________________________________.

SESSION 13: NETWORKING SERVICES - NAME RESOLUTION

Answer the following questions


1. List the methods used for name resolution.
Using a HOSTS file Using DNS Using WINS Using DDNS

2. Explain the procedure to create a record in HOSTS file.


Click Start > Run > type C:\Windows\system32\drivers\etc •
Click OK. Notice the contents of this folder. To view HOSTS file
click NOTPAD

3. Explain the DNS Process.


DNS provides centralized name resolution and can help reduce
administrative costs and efforts, Domain DNS can be quickly updated
and updates are distributed to other DNS servers across the globe.

4. Explain the purpose of NSLOOKUP with an example.


NSLOOKUP is a command line utility used for querying DNS
servers.

Fill in the blanks


1. Hostname can be up to maximum of 255 characters.
2. Location of HOSTS file in Linux /etc/hosts
3. Location of HOSTS file in Microsoft Windows
%SystemRoot%\system32\drivers\etc\hosts.
4. DNS uses a hierarchical distributed naming system.
5. host file & DNS can be used for resolving domain name to IP
address.
6. Acronym for TLD Top Level Domain.
7. Acronym for ICANN Internet Corporation for assigned names and
Number
8. Acronym for IANA internet assigned number authority.
9. Examples of TLD .com , .org & .gov
10. Acronym for FQDN Fully Qualified Domain Name.
11. NSLOOKUP is a command line utility used for querying a DNS
Server.
12. NSLOOKUP is used for resolving IP address to domain name.
13. IPCONFIG is used for clearing the DNS resolver cache.

SESSION 14: NETWORKING SERVICES – NETBIOS, WINS & DDNS


Answer the following questions
1. Explain the procedure to change a computer name.
My computer>>right click>>properties>>change
settings>>change>>change computer name>>ok>>restart

2. Explain the purpose of NBTSTAT with an example.


NBTSTAT is a command line utility for viewing statistics of
NetBIOS over TCP/IP. ex: go to Command prompt>>type
NBTSTAT>>it will display the statistics of NetBIOS such as IP
address , scope ID etc

3. Explain the purpose of WINS.


WINS supports name resolution mapping using dynamic IP
addresses assigned to computers.EX: computer configured as a
WINS client (client01), WINS server (winserver01) with NETBIOS
computer name

4. Explain the purpose of DDNS.


DDNS service that maps internet domain name to IP address.(u
can access ur home computer form any ware in the world

Fill in the blanks


1. Computer names are 15 characters in length.
2. Hostname is a command line utility that can retrieve computer name.
3. NBTSTAT is a command line utility for viewing statistics of NetBIOS
over TCP/IP.
4. Acronym for WINS Windows Internet Name Service.
5. Acronym for DDNS Dynamic Domain Name Service.

SESSION 15: NETWORKING SERVICES – TERMINAL SERVICES &


ACTIVE
DIRECTORY
Answer the following questions
1. Explain the purpose of Terminal Services.
Terminal services are useful to reduce hardware costs by hosting
Applications. Terminal services also enhance application access
security by installing the application

2. Explain the procedure to set up terminal services for an application


with an example. Terminal Services can also be used where an
application is not compatible with an operating system. For example
an application designed to run on Windows will not run on machines
with MAC OS, UNIX or Linux. In such a case, you can install the
terminal client software and access the application from a computer
running terminal services.

2. Describe Thin Clients.


Thin client refers to computing devices that have minimum
processing and storage capabilities.Thin clients are not expensive
and help organizations reduce cost.ex: server client of winbee

3. Differentiate Workgroups vs. Domains.


Workgroup Domain
Decentralize model centralize model
Fewer user many user
Use for 10 to 15 computer many computer

5. Explain Active Directory.


Active Directory is a directory service used in Microsoft Windows
Domain Networks. Active Directory enforces security policies Such as
password length, password complexity, user restriction, etc.
Fill in the blanks
1. In Workgroup model, security is decentralized.
2. In Domain model, security is centralized.
3. Thin clients are computers that have limited processing capabilities
and Depend on powerful computer for processing needs.
4 Active Directory is an example of directory service included with
server
Operating systems from Microsoft.

SESSION 16: WIRELESS NETWORKING


Answer the following questions.
1. Explain WLAN.
\WLAN refers to connectivity between two or more devices within
short distances such as homes or campus. WLAN uses spread-
spectrum or OFDM technologies

2. Explain IEEE 802.11 standards.


IEEE 802.11: IEEE 802.11 standard defines the Wi-Fi standard,
used for wireless
networks and is Sub classified into IEEE 802.11b, a, g and n..
Access method is CSMA / CA
3. Explain Wireless Access Points.
WAP are devices that connect WNIC to wired networks thus acting like
a bridge between wired and wireless networks. Range extenders are
devices used for wireless LAN.

4. Differentiate AHDOC & Infrastructure Networks.


ADHOC Infrastructure Mode
Decentralize model centralize model
Service in wireless Services in wired
Directly communicate Communicate Using central
divice

5. Explain the procedure to setup a AHDOC Network.


ADHOC mode allows wireless devices to directly communicate
with each other. This method is usually used by two or more
wireless computers that connect to each other to form a network.
the procedure is straight-forward and simple

6. Explain the procedure to setup a Infrastructure Network.


communication happens via a centralized device called the access
point. For example, you may have an existing wired network with two
desktops connected for Internet access; to add wireless clients such
as a laptop, you can attach an access point to the network switch

7. Differentiate Wireless Zero Configuration & Proprietary Utility.


WZC Proprietary Utility
Wireless auto configuration No auto configuration
Use any vender for user Confuse user with different
Install with adopters vendors
Install with drivers
Fill in the blanks
1 WAP are devices that acts like a bridge connecting wired & wireless
networks.
2. Acronym for SOHO Small Office Home Office
3. Acronym for WAP Wireless Access Points
4 SSID or Service Set Identifier is used for identifying a WLAN.
5. _BSS mode in WLAN uses an AP.
6. _ Independent basic service set (IBSS) mode in WLAN does not
require an AP.
7. Wi-Fi or Wireless Routers type of SOHO routers have integrated WAP.
8. IEEE 802.11b can support maximum speed up to 11 Mbps.
9. IEEE 802.11a can support maximum speed up to _ 54 _ Mbps.
10. IEEE 802.11g can support maximum speed up to _54 _ Mbps.
11. IEEE 802.11n can support maximum speed up to 600 Mbps.
12. IEEE 802.11g is backward compatible with IEEE 802.11___.
13. IEEE 802.11b & g devices operate in the frequency range of 2.4
GHz.
14. IEEE 802.11a devices operate in the frequency range of 5 GHz

SESSION 17: WIRELESS SECURITY


Answer the following Questions
1. Explain Wireless security.
Wireless security is the prevention of unauthorized access or damage
to computers using wireless networks.we could protect using (WEP)
and Wi-Fi Protected Access (WPA)

2. Explain piggybacking with an example.


Piggybacking refers to the practice of using wireless Internet
connection subscribed by others. For example, a user can connect to
his/her neighbor’s WLAN and access the Internet without permission

3. List any three methods that can be used for protecting WLAN with
an
example. 1.Use MAC address authentication / filtration: You can add
the list of MAC addresses of computers or devices to the WAP. 2.
Implement WEP 3. Implement WPA

4. Explain WEP.
WEP is a widely used security algorithm. WEP uses 64-bit or 128-bit
encryption. WEP uses two methods of authentication:1. Open System
authentication and
2.Shared Key authentication.
5. Explain WPA.
WPA and WPA2 are two security protocols and security certification
programs
developed by the Wi-Fi Alliance to secure wireless computer networks.
WPA protocol implements a lot of the IEEE 802.11i standard. WPA also
includes a message integrity check. WPA operates in two modes:
a. First mode to provide different keys to each user through a 801.x
authentication server.
b. Second mode, a less secure PSK mode.
Fill in the blanks
1. Piggybacking refers to the practice of using wireless Internet
connection
that others have subscribed.
2. Acronym for WEP Wired Equivalent Privacy.
3. _____ WEP key is entered as a string of 10 hexadecimal characters
4. _____ WEP key is entered as a string of 26 hexadecimal characters
5. Acronym for WPA _(Wi-Fi Protected Access.
6.CCMPis the most secure wireless encryption standard.

SESSION 18: WIDE AREA NETWORKS CONCEPTS


Answer the following questions
1. Explain the purpose of Dial-up connections.
A Dial-up connection is a form of network connectivity using telephone
networks. Dial-up connections have a maximum theoretical speed of
56 Kbps. Major disadvantages of dial-up are the inability to use
telephone lines for calls during Internet

2. Explain the procedure to set up a dial-up connection.


Dial To set up a dial-up connection, two parts are involved: RAS & Dial-
Up Clients. One computer needs to be setup for accepting connections
and the other, for connecting to a remote computer. setup for
accepting remote is RAS . computers that connect to remote is Dial-up
clients

3. Differentiate SLIP and PPP.

4. What is RRAS?
RRAS (Routing & Remote Access Server) is a feature that is used for
managing remote connections.

5. Explain Static routing with an example.


In Static routing, packets are transmitted through a fixed route.
Packets are transmitted by the router only through the path set in the
routing table. For example if the route is fixed to travel only through B
& D from A to E, packet will never be delivered if there is a broken link
between B & D

6.Explain Dynamic routing with an example.


Dynamic routing refers to the capability where the routes are
determined by the router automatically based on conditions. Packets
may take alternate routes in case of a change in network condition. For
example, if the packet has to travel between A to E, packets may be
transmitted typically through D as it is the shortest path

Fill in the blanks


1. Acronym for SLIP Serial Line Internet Protocol
2. Acronym for PPP __________________________________________.
3. Acronym for RRAS Routing & Remote Access Server
4. TRACERT is a command line utility used for viewing the route taken
by a
packet.
5. Acronym for RIP Routing Information Protocol.
6. Acronym for OSPF Open Shortest Path First.
7. Acronym for IGRP Interior Gateway routingProtocol.
8. Acronym for BGP Border Gateway Protocol
9. ___________ is used for indicating IP packets to be routed.
10. Route is a command line utility used for viewing and manipulating
routing table.
11. __________ is a command line utility that combines the power of
both PING
and TRACERT.
12. ________ is a command line utility can be used for viewing the route
taken by
a packet.
13. ________ is a command line utility can be used for viewing the
routing table.
14. List any two distance-vector routing protocols. _________ &
__________.
15. List any two distance-vector routing protocols. _________ &
__________
SESSION 19 : DIFFERENT WIDE AREA NETWORKS

Answer the following questions


1.Explain ISDN.
*ISDN is a circuit switched network that enables digital transmission
over
telephone lines.
*It allows data, voice; video transmissions over a single line
*ISDN is widely used for high speed Internet access in most countries.
ISDN offers speed in increments of 64 Kbps

2. Explain DSL.
* Digital subscriber line is a family of technologies that provide Internet
access by transmitting digital data over telephone network.
*DSL speeds in the range of 128 Kbps to over 40 Mbps

3. Explain Cable Internet Access.


* Cable Internet access is a form of broadband communication that
uses cable television infrastructure.
*Internet access is provided through coaxial or fiber optic cables from
the ISP to customer’s
*speeds are offered in the range of 1 Mbps to over 400 Mbps.

4.Explain WiMAX.
*WiMAX wireless communication standard used for providing Internet
Access to fixed stations.
*WiMAX can provide speeds of 30 to 40 Mbps with current trend at
around 1 Gbps
Fill in the blanks
1. Acronym for ISDN. Integrated Services Digital Network.
2. Acronym for DSL. Digital subscriber line.
3. Acronym for WiMAXWorldwide Interoperability for Microwave
Access.
4. Acronym for ATM Asynchronous Transfer Mode.
5. Acronym for PAD Packet Assembler/ Dis-assembler.
6. Acronym for DSLAM Digital Subscriber Line Access Multiplexer

SESSION 20: NETWORKING SERVICES – PROXY SERVERS & ADDRESS


TRANSLATION

Answer the following questions


Explain the purpose of a Proxy Server with an example.
They are used to share internet connections across multiple
computers such as an Internet Café. For an example on Caching Proxy.
Proxy Server are connected to a centralized switch of internet. When
Client 1 requests a website, it will be forwarded to the Proxy Server. If
the content is not in its cache. Proxy Server will forward the request
outside this network and provide Client 1. stores it in its cache

2. Explain NAT.
Network Address Translation or NAT is the process of modifying a
private IP address to a public address and vice versa. NAT is
commonly used where a single public address is used for sharing
Internet access. NAT is a feature used widely in home, small & medium
to enterprise networks. EX: Internet Café

3. Explain ICS.
Internet Connection Sharing is a feature in Windows Operating System
that enables you to share Internet access with other computers on a
network. ICS has a built-in DHCP service that automatically allocates
IP address
Fill in the blanks
1. Acronym for NAT Network Address Translation.
2. NAT remaps private to public IP addresses and vice versa.
3. Port used by RDP Remote Desktop Protocol.
4. Acronym for ICS Internet Connection Sharing
5. IP address range reserved for ICS, from 192.168.0.2 to
192.168.0.254

SESSION 21: NETWORK INFRASTRUCTURE – VPN & IPV6


Answer the following questions
1. Explain VPN with an example.
VPN allows private network (LAN) to be extended outside the
network * A VPN connection is created through a

WAN link
For example, employee is allowed to access office network from
a remote location:
1. Employee connects to the ISP to gain access to the Internet.
2. ISP assigns a public IP address to the employee’s computer.
3. Employee connects to the office using VPN.
4. VPN server validates, authorizes and allows

2. Explain IPv6 with an example.


Internet Protocol version 6 (IPv6) is the latest revision of the Internet
Protocol * IPv6 was developed by IETF * IPv6 uses a 128-bit address*
IPv6 addresses consist of eight groups of four hexadecimal digits
separated bycolons, for example:
2001:0db8:85a3:0042:1000:8a2e:0370:7334. 3.

3.Explain the purpose of NETSH.


NETSH is a command line utility that is used for viewing and modifying
network configurations of a local or remote computer
Fill in the blanks
1. Acronym for PPTP Point to Point Tunneling Protocol.
2. Acronym for L2TP Layer 2 Tunneling protocol.
3. Acronym for VPN Virtual Private Network.
4. NETSH is a command line utility used for modifying network
connection.
4. Number of bits in IPv6 address 128-bit

SESSION 22: NETWORK SECURITY I


Answer the following questions
1. Explain Network Security.
Network security refers to the practice of securing computers and
devices in a
network from unauthorized users and attacks.

2. What is spoofing?
Spoofing is a method that refers to use of forged IP address, MAC
address, E-mail
address, etc.

3. What is a Root kit?


Root kits are special programs that take control of a computer by
replacing critical system files and usually do undetected

4. Explain Denial of service.


Denial of service is a kind of attack that causes services to become
unavailable
when they are expected.
5. Explain Firewall.
Firewalls are software or hardware devices that protect a computer
and/or a
network by analyzing and controlling both incoming and outgoing
network traffic

6. Explain the procedure to add a program to the exception list of a


firewall.
Click Start > Run and type FIREWALL.CPL. Click OK.>> Select
Exceptions tab.>>select option>> ok

7. Explain the purpose of Port scanner with an example.


Port scanner software that scans and provides a detailed report on
used and unused
ports

8. Explain the purpose of TELNET.


Telnet is a client-server protocol used for established connections to a
remote host. Telnet uses TCPand port number 23.
Fill in the blanks
1. Acronym for DOS in computer security context Denial of service.
2. Firewalls is a software application or hardware device that protects
computers or network by monitoring network traffic.
3. Acronym for SPI Stateful Packet inspection
4. Acronym for TELNET Terminal Network.
5. Telnet uses port number 23.

SESSION 23: NETWORK SECURITY II


Answer the following Questions
1. Explain Patch Management.
Operating systems and applications may have vulnerabilities
(weakness) that can be corrected using by applying security patches, a
process referred to as Patch Management. ex: Belarc Advisor

2. Explain Packet Analyzers.


Packet Analyzer is a software or hardware that can be used for
monitoring network traffic passing over wired or wireless networks.
Popular packet analyzers include Wire shark, Microsoft Network
Monitor

3. Explain the procedure to use Network Monitor with an example.


4. What is IDS?
IDS is a software application or a hardware device used for monitoring
a computer or a network for any malicious activities or violations and
reports to a management system. IDS can be host based or network
based.

5. Explain MBSA.
Microsoft Baseline Security Analyzer (MBSA) is another utility that can
be used for scanning vulnerabilities by checking an operating system.
MBSA checks most products such as the operating system itself,
Internet Explorer, IIS, SQL Server, etc.
Fill in the blanks
1. List any two utilities that can be used for analyzing vulnerabilities.
Belarc Advisor and a MBSA
2. List any three Packet Analyzers. Wireshark, Microsoft Network
Monitor TCPDUMP, SniffPass
3. Acronym for IDS Intrusion Detection System.
4. Acronym for MBSA Microsoft Baseline Security Analyzer.

SESSION 24: TROUBLESHOOTING NETWORKS


Answer the following questions:
1. Explain any three well-known error messages and cause of the error
messages.
Network cable unplugged: check if the cable foult Use alternate cables
to confirm.
Limited or No Network Connectivity: Indicates issue with network
card or IP settings. Check relevant settings.
The Network Path cannot be found: Indicates issue with network
card, IP settings Use the File and Print Sharing troubleshooting
procedure.

2. Explain the procedure to troubleshoot:


I. If you are unable to connect to another computer within a LAN
*Verify the cables are connected properly at both ends.
a. Use a cable tester if required.
b. Replace RJ-45 Jacks or use different cable if possible.
c. Check LED indicators on the NIC

II. If you are unable to connect to the Internet


1. Test if the computer is able to communicate with the gateway :
2. Test if the computer is able to communicate with the DNS server
3. Explain the procedure to use remote desktop.
Start > Run and type SYSDM.CPL, click OK. >>
>> >>ok
On computer B, click Start > Run and
type MSTSC.EXE, click OK.>> >>

4. Explain the purpose of Remote Assistance with an example.


Remote Assistance is a GUI utility that can help you take control of a
remote
Computer ex::: VNC, TeamViewer, GoToAssist, Ammyy admin,
GoToMyPC

5. Explain any two remote administration tools.


Fill in the blanks
1. Remote Assistance is a built-in utility that is used for connecting
and
troubleshooting issues on a remote computer.
2. List any five free remote administration utilities. ______________ ,
___________ , ____________, ____________ & _______________.
3. Shortcut (executable) for Remote Assistance msra.
4. FTP is a command line utility used for transferring files between
remote computers.
5. FTP uses port number __.
6. Remote Desktop uses RDP protocol.
7. RDP uses port number 3389..
8. Shortcut (executable) for Remote Desktop mstsc.

You might also like