Computer Network
Computer Network
3.Explain CSMA/CD.
It is a mechanism that defines how transmission takes place in a
network.
It will sense the cariier or channel and if find any blocks or problem
of system.it will send back information to sender.
4. Explain CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA) is a
network multiple access method which check idle channel. It will
sense the cariier or channel and if find any blocks or problem of
system.it will send back information to sender. Also find out the
alternate channel to reach the receiver.
SESSION 7: PROTOCOLS
Answer the following questions
1. Explain Proprietary Protocols with an example.
Proprietary protocols are communications protocol used in single
organization or individuals.ex: IPX from novella and apple talk from
apple, NETBEUI from microsoft
SESSION 8: IP ADDRESS
Answer the following questions
1. Explain the purpose of Public IP address with an example.
Public IP addresses are IP addresses obtained from an ISP .
organizations to provide services such as web hosting, email, etc.
example: Regional Internet Registry
2. Explain the purpose of Private IP address with an example.
Private IP addresses are addresses used in private networks such as
homes and internal office networks. Ex: IETF, IANA
5. Explain ARP.
Address Resolution Protocol is used for resolving IP addresses to
MAC address When two computers communicate using IP address
(Layer 3) on the same subnet, IP address will be resolved to MAC
address (Layer 2) and they start communicating using MAC Address
through Network Switch
2. Explain UDP.
is a transport layer protocol that is used for sending messages to
other hosts on the network without prior communication. it answer the
small queries such as DNS and other online games
3. Explain TCP.
provides reliable, ordered delivery from a program on one computer to
another program on a different computer on the network. it services
email, web service, file transfer
3. List any three methods that can be used for protecting WLAN with
an
example. 1.Use MAC address authentication / filtration: You can add
the list of MAC addresses of computers or devices to the WAP. 2.
Implement WEP 3. Implement WPA
4. Explain WEP.
WEP is a widely used security algorithm. WEP uses 64-bit or 128-bit
encryption. WEP uses two methods of authentication:1. Open System
authentication and
2.Shared Key authentication.
5. Explain WPA.
WPA and WPA2 are two security protocols and security certification
programs
developed by the Wi-Fi Alliance to secure wireless computer networks.
WPA protocol implements a lot of the IEEE 802.11i standard. WPA also
includes a message integrity check. WPA operates in two modes:
a. First mode to provide different keys to each user through a 801.x
authentication server.
b. Second mode, a less secure PSK mode.
Fill in the blanks
1. Piggybacking refers to the practice of using wireless Internet
connection
that others have subscribed.
2. Acronym for WEP Wired Equivalent Privacy.
3. _____ WEP key is entered as a string of 10 hexadecimal characters
4. _____ WEP key is entered as a string of 26 hexadecimal characters
5. Acronym for WPA _(Wi-Fi Protected Access.
6.CCMPis the most secure wireless encryption standard.
4. What is RRAS?
RRAS (Routing & Remote Access Server) is a feature that is used for
managing remote connections.
2. Explain DSL.
* Digital subscriber line is a family of technologies that provide Internet
access by transmitting digital data over telephone network.
*DSL speeds in the range of 128 Kbps to over 40 Mbps
4.Explain WiMAX.
*WiMAX wireless communication standard used for providing Internet
Access to fixed stations.
*WiMAX can provide speeds of 30 to 40 Mbps with current trend at
around 1 Gbps
Fill in the blanks
1. Acronym for ISDN. Integrated Services Digital Network.
2. Acronym for DSL. Digital subscriber line.
3. Acronym for WiMAXWorldwide Interoperability for Microwave
Access.
4. Acronym for ATM Asynchronous Transfer Mode.
5. Acronym for PAD Packet Assembler/ Dis-assembler.
6. Acronym for DSLAM Digital Subscriber Line Access Multiplexer
2. Explain NAT.
Network Address Translation or NAT is the process of modifying a
private IP address to a public address and vice versa. NAT is
commonly used where a single public address is used for sharing
Internet access. NAT is a feature used widely in home, small & medium
to enterprise networks. EX: Internet Café
3. Explain ICS.
Internet Connection Sharing is a feature in Windows Operating System
that enables you to share Internet access with other computers on a
network. ICS has a built-in DHCP service that automatically allocates
IP address
Fill in the blanks
1. Acronym for NAT Network Address Translation.
2. NAT remaps private to public IP addresses and vice versa.
3. Port used by RDP Remote Desktop Protocol.
4. Acronym for ICS Internet Connection Sharing
5. IP address range reserved for ICS, from 192.168.0.2 to
192.168.0.254
WAN link
For example, employee is allowed to access office network from
a remote location:
1. Employee connects to the ISP to gain access to the Internet.
2. ISP assigns a public IP address to the employee’s computer.
3. Employee connects to the office using VPN.
4. VPN server validates, authorizes and allows
2. What is spoofing?
Spoofing is a method that refers to use of forged IP address, MAC
address, E-mail
address, etc.
5. Explain MBSA.
Microsoft Baseline Security Analyzer (MBSA) is another utility that can
be used for scanning vulnerabilities by checking an operating system.
MBSA checks most products such as the operating system itself,
Internet Explorer, IIS, SQL Server, etc.
Fill in the blanks
1. List any two utilities that can be used for analyzing vulnerabilities.
Belarc Advisor and a MBSA
2. List any three Packet Analyzers. Wireshark, Microsoft Network
Monitor TCPDUMP, SniffPass
3. Acronym for IDS Intrusion Detection System.
4. Acronym for MBSA Microsoft Baseline Security Analyzer.