1 244 ANSWER KEY PART A 1. Mention the need for computer networks? [2marks] Local Area Network (LAN) A metropolitan area network (MAN) A Wide area network (WAN) 2. What is LOS? [2marks] Low Orbit Satellite: Satellites are launched into orbit, which is to say that they are shot up into the sky on rockets to get them up above the atmosphere where there is no friction. 3. What are the standard of data communication system? [2marks] Data communication standards fall into two categories: de facto (meaning "by fact" or "by convention") and de jure (meaning "by law" or "by regulation"). 4. What is 10BASE-T? [2marks] The third implementation is called 10Base-T or twisted-pair Ethernet. 1OBase-T uses a physical star topology. The stations are connected to a hub via two pairs of twisted cable. 5. What is authentication? [2marks] This is another important principle of cryptography. In a layman’s term, authentication ensures that the message was originated from the originator claimed in the message. This can be made possible if A performs some action on message that B knows only A can do. Well, this forms the basic fundamental of Authentication. 6. Define digital signature? [2marks] Digital signatures are the public-key primitives of message authentication. In the physical world, it is common to use handwritten signatures on handwritten or typed messages. They are used to bind signatory to the message 7. Define application gateway? [2marks] An application-level gateway, also called an application proxy, acts as a relay of application level traffic. The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed. 8. Define super-netting? [2marks] Super netting is the opposite of Subletting. In subnetting, a single big network is divided into multiple smaller sub networks. In Supernetting, multiple networks are combined into a bigger network termed as a Super network or Supernet. PART B 9. Give a brief note about point to point and multipoint connection? [3marks] Point –to-point
12
Embed
244 · Mention the need for computer networks? [2marks] Local Area Network (LAN) A metropolitan area network (MAN) A Wide area network (WAN) 2. What is LOS? [2marks] Low Orbit Satellite:
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
244 ANSWER KEY
PART A
1. Mention the need for computer networks? [2marks]
Local Area Network (LAN)
A metropolitan area network (MAN)
A Wide area network (WAN)
2. What is LOS? [2marks]
Low Orbit Satellite: Satellites are launched into orbit, which is to say that they are shot
up into the sky on rockets to get them up above the atmosphere where there is no friction.
3. What are the standard of data communication system? [2marks]
Data communication standards fall into two categories: de facto (meaning "by fact" or
"by convention") and de jure (meaning "by law" or "by regulation").
4. What is 10BASE-T? [2marks]
The third implementation is called 10Base-T or twisted-pair Ethernet. 1OBase-T uses a
physical star topology. The stations are connected to a hub via two pairs of twisted cable.
5. What is authentication? [2marks]
This is another important principle of cryptography. In a layman’s term,
authentication ensures that the message was originated from the originator claimed in the
message. This can be made possible if A performs some action on message that B knows
only A can do. Well, this forms the basic fundamental of Authentication.
6. Define digital signature? [2marks]
Digital signatures are the public-key primitives of message authentication. In the physical
world, it is common to use handwritten signatures on handwritten or typed messages.
They are used to bind signatory to the message
7. Define application gateway? [2marks]
An application-level gateway, also called an application proxy, acts as a relay of
application level traffic. The user contacts the gateway using a TCP/IP application, such
as Telnet or FTP, and the gateway asks the user for the name of the remote host to be
accessed.
8. Define super-netting? [2marks]
Super netting is the opposite of Subletting. In subnetting, a single big network is divided
into multiple smaller sub networks. In Supernetting, multiple networks are combined into
a bigger network termed as a Super network or Supernet.
PART B
9. Give a brief note about point to point and multipoint connection? [3marks]
Point –to-point
2
This type of connection provides a dedicated link between two devices. The entire
capacity of the link is used only for transmission between those device connected point-
to-point.
Multipoint
A multipoint connection is one in which more than two specific devices share a
single link. In this type of connections the link is shared by the devices either spatially i.e
if the devices connected can use the link simultaneously or time shared connection. If a
user make turns, it is a time-shared connection
10. What is gigabit Ethernet? [3marks]
The need for an even higher data rate resulted in the design of the Gigabit Ethernet
protocol (1000 Mbps). The IEEE committee calls the Standard 802.3
The goals of the Gigabit Ethernet
1. Upgrade the data rate to 1 Gbps.
2. Make it compatible with Standard or Fast Ethernet.
3. Use the same 48-bit address.
4. Use the same frame format.
5. Keep the same minimum and maximum frame lengths.
6. To support auto negotiation as defined in Fast Ethernet
11. Draw the FDDI frame format? [3marks]
3
12. Explain connection oriented and connection less service? [3marks]
Connection oriented service we have to establish a connection before starting the
communication.
The following steps are performed in connection oriented service
1. Connection is established.
2. Send the message or the information
3. Release the connection
Connection oriented service is more reliable than connectionless service. Example
of connection oriented is TCP (Transmission Control Protocol) protocol.
Connectionless service the data is transferred in one direction from source to
destination without checking that destination is still there or not or if it prepared to accept
the message. Authentication is not needed in this. Example of Connectionless service is
UDP (User Datagram Protocol) protocol.
13. What is Kerberos? [3marks]
Kerberos is a key distribution and user authentication service developed at MIT. The
problem that Kerberos addresses is this: Assume an open distributed environment in
which users at workstations wish to access services on servers distributed throughout the
network. We would like for servers to be able to restrict access to authorized users and to
be able to authenticate requests for service
14. Define WEP and write its features? [3marks]
Wired Equivalent Privacy:
Features:
➢ 802.11 standard encryption algorithms originally designed to provide your
wireless LAN with the same level of privacy available on a wired LAN.
➢ TKIP (Temporal Key Integrity Protocol)—TKIP is a suite of algorithms
surrounding WEP that is designed to achieve the best possible security on legacy
hardware built to run WEP.
➢ TKIP (Temporal Key Integrity Protocol)—TKIP is a suite of algorithms
surrounding WEP that is designed to achieve the best possible security on legacy