Internet and Interanet Question Solution
Internet and Interanet Question Solution
Internet and Interanet Question Solution
( 8TH SEMESTER )
QN (2.) ANS : -
Topology is derived from two Greek words topo and logy, where
topo means 'place' and logy means 'study'. In computer networks, a
topology is used to explain how a network is physically connected
and the logical flow of information in the network. A topology mainly
describes how devices are connected and interact with each other using
communication links.
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
Now let us learn these topologies one by one:
Bus Topology
Bus topology is the simplest kind of topology in which a common
bus or channel is used for communication in the network. The bus is
connected to various taps and droplines. Taps are the connectors,
while droplines are the cables connecting the bus with the computer. In
other words, there is only a single transmission line for all nodes.
When a sender sends a message, all other computers can hear it, but
only the receiver accepts it(verifying the mac address attached with the
data frame) and others reject it. Bus technology is mainly suited for small
networks like LAN, etc.
In this topology, the bus acts as the backbone of the network, which joins
every computer and peripherals in the network. Both ends of the shared
channel have line terminators. The data is sent only in one direction and
as soon as it reaches the end, the terminator removes the data from the
communication line(to prevent signal bounce and data flow disruption).
Ring Topology
Ring topology is a topology in which each computer is connected to
exactly two other computers to form the ring. The message passing is
unidirectional and circular in nature.
This network topology is deterministic in nature, i.e., each computer is
given access for transmission at a fixed time interval. All the nodes are
connected in a closed-loop. This topology mainly works on a token-based
system and the token travels in a loop in one specific direction.
In a ring topology, if a token is free then the node can capture the token
and attach the data and destination address to the token, and then leaves
the token for communication. When this token reaches the destination
node, the data is removed by the receiver and the token is made free to
carry the next data.
1. Easy Installation.
2. Less Cabling Required.
3. Reduces chances of data collision(unidirectional).
4. Easy to troubleshoot(the faulty node does not pass the token).
5. Each node gets the same access time.
Following are the disadvantages of Ring topology:
Star Topology
Star topology is a computer network topology in which all the nodes
are connected to a centralized hub. The hub or switch acts as a
middleware between the nodes. Any node requesting for service or
providing service, first contact the hub for communication.
The central device(hub or switch) has point to point communication
link(the dedicated link between the devices which can not be accessed by
some other computer) with the devices. The central device then broadcast
or unicast the message based on the central device used. The hub
broadcasts the message, while the switch unicasts the messages by
maintaining a switch table. Broadcasting increases unnecessary data
traffic in the network.
In a star topology, hub and switch act as a server, and the other
connected devices act as clients. Only one input-output port and one
cable are required to connect a node to the central device. This topology
is better in terms of security because the data does not pass through
every node.
1. Centralized control.
2. Less Expensive.
3. Easy to troubleshoot(the faulty node does not give response).
4. Good fault tolerance due to centralized control on nodes.
5. Easy to scale(nodes can be added or removed to the network
easily).
6. If a node fails, it will not affect other nodes.
7. Easy to reconfigure and upgrade(configured using a central device).
Following are the disadvantages of Star topology:
Mesh Topology
Mesh topology is a computer network topology in which nodes are
interconnected with each other. In other words, direct communication
takes place between the nodes in the network.
There are mainly two types of Mesh:
5. Tree Topology:
Tree topology is a computer network topology in which all the nodes
are directly or indirectly connected to the main bus cable. Tree
topology is a combination of Bus and Star topology.
In a tree topology, the whole network is divided into segments, which can
be easily managed and maintained. There is a main hub and all the other
sub-hubs are connected to each other in this topology.
Hybrid Topology:
A Hybrid topology is a computer topology which is a combination of
two or more topologies. In practical use, they are the most widely used.
1. Complex design.
2. Expensive to implement.
3. Multi-Station Access Unit(MSAL) required.
Hence, after learning the various computer network topologies, we
can conclude that some points need to be considered when
selecting a physical topology:
Ease of Installation.
Fault Tolerance.
Implementation Cost.
Cabling Required.
Maintenance Required.
Reliable Nature.
Ease of Reconfiguration and upgradation.
Which Topology Should I Choose?
There is a range of factors that you need to take into account when
choosing which topology to use. Before choosing a topology you’ll want to
closely consider the following:
First, you need to take into account the length of the cable you need to
provide service to all your network devices. A bus topology is the most
lightweight in terms of cable needs. In this sense, this would be the
simplest topology to install and buy cables for. This ties into the second
factor, you need to consider the type of cable you’re going to use.
Cable types range from twister pairs to coaxial cables and optical fiber
cables.
The cost of installing the topology is also very important. The more complex
the topology you choose is, the more you’ll need to pay in terms of
resources and time to create that setup.
The final factor you’ll want to take into account is scalability. If you’re
planning to upscale your network infrastructure in the future you want to
make sure that you use a network that is easy to add devices to. A star
topology network is ideal for this because you can add network nodes with
minimal disruption. This isn’t as simple within a ring network because you
will incur downtime if you add any nodes.
QN 5) ANS : -
Still other attacks aim to gain valuable corporate data, such as propriety
information; these types of cyber attacks are a modern, computerized form
of corporate espionage.
Insider threats are attacks that come from employees with malicious intent.
In an untargeted attack, where the bad actors are trying to break into as
many devices or systems as possible, they generally look for vulnerabilities
that will enable them to gain access without being detected or blocked.
They might use, for example, a phishing attack, emailing large numbers of
people with socially engineered messages crafted to entice recipients to
click a link that will download malicious code.
Cyber criminals often create the software tools to use in their attacks, and
they frequently share those on the so-called dark web.
QN 6) ANS : -
A computer that sits between different networks or applications. The
gateway converts information, data or other communications from one
protocol or format to another. A router may perform some of the
functions of a gateway. An Internet gateway can transfer
communications between
an enterprise network and the Internet. Because enterprises often use
protocols on their local-area networks (LANs) that differ from those of
the Internet, a gateway will often act as a protocol converter so that
users can send and receive communications over the Internet.
A product or feature that uses proprietary techniques to link
heterogeneous systems.
(a) Broadcast :- Broadcasting is the distribution of audio and video
content to a dispersed audience via radio, television, or other, often
digital transmission media.
The original term broadcast referred to the literal sowing of seeds on
farms by scattering them over a wide field.
(b) Mulitcast : - In this method traffic recline between the boundaries of
unicast (one point to one destination) and broadcast (one point to all
destinations). And multicast is a “one source to many destinations” way
of traffic distribution, which means that only the destinations that openly
point to their requisite to accept the data from a specific source to
receive the traffic stream.
( c ) Unicast : - Unicast: traffic, many streams of IP packets that move
across networks flow from a single point, such as a website server, to a
single endpoint such as a client PC. This is the most common form of
information transference on networks.
(7.) ans : - The hardware components are the server, client, peer,
transmission medium, and connecting devices. The software components
are operating system and protocols.
The following figure shows a network along with its components −
Hardware Components
Repeaters are simple to install and can easily extend the length or
the coverage area of networks.
They are cost effective.
Repeaters don’t require any processing overhead. The only time they
need to be investigated is in case of degradation of performance.
They can connect signals using different types of cables.
Disadvantages of Repeaters
switches:-
Switches are networking devices operating at layer 2 or a data link layer of
the OSI model. They connect devices in a network and use packet
switching to send, receive or forward data packets or data frames over the
network.
A switch has many ports, to which computers are plugged in. When a data
frame arrives at any port of a network switch, it examines the destination
address, performs necessary checks and sends the frame to the
corresponding device(s).It supports unicast, multicast as well as broadcast
communications.
Features of Switches
A switch operates in the layer 2, i.e. data link layer of the OSI model.
It is an intelligent network device that can be conceived as a multiport
network bridge.
It uses MAC addresses (addresses of medium access control
sublayer) to send data packets to selected destination ports.
It uses packet switching technique to receive and forward data
packets from the source to the destination device.
It is supports unicast (one-to-one), multicast (one-to-many) and
broadcast (one-to-all) communications.
Transmission mode is full duplex, i.e. communication in the channel
occurs in both the directions at the same time. Due to this, collisions
do not occur.
Switches are active devices, equipped with network software and
network management capabilities.
Switches can perform some error checking before forwarding data to
the destined port.
The number of ports is higher – 24/48.
Types of Switches
There are variety of switches that can be broadly categorised into 4 types −
TYPES OF IP ADDRESSES
There are a few different types of IP addresses that each serve a unique
purpose.
Public IP address
Private IP Address
There are two versions of IP addresses commonly in use today. IPv4 used
to be the standard version of IP addresses used for all devices. This
version uses a 32-bit number format, meaning it’s a string of characters
made up of 32 numbers. It can support a maximum of approximately 4.3
billion unique IP addresses. Due to the massive growth in devices
connecting to the internet, the number of unique IPv4 addresses was
eventually depleted.
IPv6 was developed as the new standard to alleviate this issue. In IPv6, the
IP address size is increased from 32-bits to 128-bit. Additionally, letters can
be included along with numbers. This new version of IP address can
theoretically support an infinite number of unique addresses.
QN (9) ans : -
(a) URL : - URL stands for Uniform Resource Locator. It is the address of
a resource, which can be a specific webpage or a file, on the internet. It is
also known as web address when it is used with http. It was created in
1994 by Tim Berners-Lee. URL is a specific character string that is used to
access data from the World Wide Web. It is a type of URI (Uniform
Resource Identifier).
http://www.javatpoint.com/full-form
o protocol: http
o host or domain: www.javatpoint.com
o Path of the resource: /full-form
Data stored in a cookie is created by the server upon your connection. This
data is labeled with an ID unique to you and your computer.
When the cookie is exchanged between your computer and the network
server, the server reads the ID and knows what information to specifically
serve to you.
Magic Cookies
HTTP Cookies
Cookies generally function the same but have been applied to different use
cases:
"Magic cookies" are an old computing term that refers to packets of
information that are sent and received without changes. Commonly, this
would be used for a login to computer database systems, such as a
business internal network. This concept predates the modern “cookie” we
use today.
HTTP cookies are a repurposed version of the “magic cookie” built for
internet browsing. Web browser programmer Lou Montulli used the “magic
cookie” as inspiration in 1994. He recreated this concept for browsers when
he helped an online shopping store fix their overloaded servers.
The HTTP cookie is what we currently use to manage our online
experiences. It is also what some malicious people can use to spy on your
online activity and steal your personal info.
Point of
difference Internet Intranet Extranet
Accessibility
of network Public Private Private
To share
information with
suppliers and
vendors it makes
Specific to an the use of public
Availability Global system. organization. network.
Restricted area
upto an
Restricted area organization and
All over the upto an some of its
Coverage world. organization. stakeholders or so.
Point of
difference Internet Intranet Extranet
Accessible only to
It is accessible the members of
It is accessible only to the organization and
Accessibility to everyone members of external members
of content connected. organization. with logins.
It is dependent
on the user of It is enforced via
the device firewall that
connected to It is enforced via separates internet
Security network. firewall. and extranet.
Employees of the
General Employees of the organization which
Users public. organization. are connected.
There is no
hard and fast Policies of the Policies of the
Policies rule for organization are organization are
behind setup policies. imposed. imposed.
Point of
difference Internet Intranet Extranet
It is maintained by It is maintained by
CIO. HR or CIO. HR or
It is communication communication
maintained by department of an department of an
Maintenance ISP. organization. organization.
It is more
economical to It is less It is also less
Economical use. economical. economical.
It is the
network of It is derived from It is derived from
Relation networks. Internet. Intranet.
QN 2.) ANS :
DNS : -
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Class A
This Class IP address always has its first bit as 0, next 7 bits as a
network address and following 24 bits as the host address.
This means that it allows 2^7 networks and 2^24 hosts per network.
This class of IP address is used for a very large network. Ex. Big
Organisation
Class B
Class B IP address always has its first bits as 10, next 14 bits as a
network address and following 16 bits as the host address.
This means that it allows 2^14 networks and 2^16 hosts per network.
Class C
Class C IP address always has its first bits as 110, next 21 bits as a
network address and following 8 bits as the host address.
This means that it allows 2^21 networks and 2^8 hosts per network.
Class D
Class E
Internet Layer
o An internet layer is the second layer of the TCP/IP model.
o An internet layer is also known as the network layer.
o The main responsibility of the internet layer is to send the packets
from any network, and they arrive at the destination irrespective of
the route they take.
ARP Protocol
o ARP stands for Address Resolution Protocol.
o ARP is a network layer protocol which is used to find the physical
address from the IP address.
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical
address of the device, it broadcasts the ARP request to the
network.
o ARP reply: Every device attached to the network will accept
the ARP request and process the request, but only recipient
recognize the IP address and sends back its physical address
in the form of ARP reply. The recipient adds the physical
address both to its cache memory and to the datagram header
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol
and Transmission control protocol.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of
representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with
another application layer, it forwards its data to the transport layer.
o There is an ambiguity occurs in the application layer. Every
application cannot be placed inside the application layer except those
who interact with the communication system. For example: text editor
cannot be considered in application layer while web browser
using HTTP protocol to interact with the network
where HTTP protocol is an application layer protocol.
The terms “Web directory” and “search engine” are often used
interchangeably. Web directories are organized Web site listings put
together by human reviewers, whereas search engine listings are put
together by automated systems and lack a navigable structure. Much of the
confusion stems from the various hybrid models that have developed over
time, as search engines have incorporated directory features to assist with
issues such as categorization and site quality.
QN (7.) ans : -
QN (8)
(a) ans : -
E-mail System
E-mail system comprises of the following three components:
Mailer
Mail Server
Mailbox
Mailer
It is also called mail program, mail application or mail client. It allows
us to manage, read and compose e-mail.
Mail Server
The function of mail server is to receive, store and deliver the email. It is
must for mail servers to be Running all the time because if it crashes or is
down, email can be lost.
Mailboxes
Mailbox is generally a folder that contains emails and information about
them.
Working of E-mail
Email working follows the client server approach. In this client is the mailer
i.e. the mail application or mail program and server is a device that
manages emails.
Following example will take you through the basic steps involved in
sending and receiving emails and will give you a better understanding of
working of email system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e. mail
client and then select Send option.
The message is routed to Simple Mail Transfer Protocol to person
B’s mail server.
The mail server stores the email message on disk in an area
designated for person B.
The disk space area on mail server is called mail spool.
(b.) ans : -
Role of Web server : - A web server is software and hardware that uses
HTTP (Hypertext Transfer Protocol) and other protocols to respond to client
requests made over the World Wide Web. The main job of a web server
is to display website content through storing, processing and
delivering webpages to users.
Apache : - Apache HTTP Server is a free and open-source web server
that delivers web content through the internet. It is commonly referred
to as Apache and after development, it quickly became the most
popular HTTP client on the web. It’s widely thought that Apache gets
its name from its development history and process of improvement
through applied patches and modules but that was corrected back in
2000. It was revealed that the name originated from the respect of the
Native American tribe for its resiliency and durability.
QN (9.) ans : -
(a) Firewall : -
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based
on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25
years. They establish a barrier between secured and controlled internal
networks that can be trusted and untrusted outside networks, such as the
Internet.
(b) Kerberos : -
Kerberos is a computer network security protocol that authenticates
service requests between two or more trusted hosts across an untrusted
network, like the internet. It uses secret-key cryptography and a trusted
third party for authenticating client-server applications and verifying users'
identities.
Microsoft rolled out its version of Kerberos in Windows 2000, and it's
become the go-to protocol for websites and single sign-on implementations
over different platforms. The Kerberos Consortium maintains the Kerberos
as an open-source project.
The protocol derives its name from the legendary three-headed dog
Kerberos (also known as Cerberus) from Greek myths, the canine guardian
to the entrance to the underworld. Kerberos had a snake tail and a
particularly bad temper and, despite one notable exception, was a very
useful guardian.
But in the protocol's case, the three heads of Kerberos represent the client,
the server, and the Key Distribution Center (KDC). The latter functions as
the trusted third-party authentication service