Friday, 12 August 2016

BSIT 63 (ADVANCED COMPUTER NETWORKS) ~ gniithelp

CHAPTER-1 (Application Layer)

1. List the functions of application layer.?
Answer-
  • The functions of the application layer are:
    It is responsible for facilitating interaction between many applications like WWW, EMAIL, FTP, and DNS, and servers like mail server and FTP server.
  • It interfaces directly to and performs common application services for the application processes; it also issues requests to the presentation layer.

2. What is DNS?
Answer- 
DNS is a name resolution service that resolves host names to the IP addresses. DNS has a hierarchical and distributed database that contains mappings of host names with the corresponding IP addresses.

3. Explain the working of DNS with an example.
Answer- 
DNS is a name resolution service that resolves host names to IP addresses. A DNS server resolves host names to IP addresses for DNS queries sent by the DNS clients. These queries can be in the form of a name resolution query or a resource record. The resolver sends a User Datagram Protocol (UDP) packet to the local DNS server. The DNS server searches its table and returns the IP address, which matches the domain name. DNS has a hierarchical and distributed database that contains mappings of host names with the corresponding IP addresses.
Resource records are stored in a specific portion of the DNS database called the DNS zone. A DNS zone contains resource records along with the owner names.
For example, an application program calls a procedure with its domain name as parameter. The procedure sends an UDP packet to the local DNS server. The DNS server searches its table and returns the IP address which matches the Domain name. The program can now establish a TCP connection or send UDP packets. 

4. What is iterative resolution? Give example.
Answer- 
Iterative resolution refers to the name resolution technique in which a server sends back the information to a client or sends the name of the server that has the information. The client then iterates by sending a request to this referred server. This server may return the information itself or send the name of another server. This process continues till the time the client receives the required information. 

5. What are the functions of the user agent in the Email architecture?
Answer-
In the e-mail architecture, the user agent helps users to interact with the e-mail systems. The functions of the user agent in e-mail architecture are:
  • Composition: It refers to writing the mail. Here users type the message that they want to convey. The users have to mention the recipient’s e-mail address.
  • Receiving: It refers to retrieving the e-mails from the POP3 server.
  • Replying to messages: It refers to replying to a received e-mail. To reply to the e-mail, the user has to click reply, type the message, and send it back.
  • Support manipulation of mail box: It refers to customization of the mail box. Here users can create folders and manage the mail according to the sender.
6. Discuss the sending and receiving process in Email?
Answer- 
The prerequisites for sending and receiving an e-mail are:
  • Both the sender and recipient should have an e-mail account.
  • The sender must provide the destination address and write a message. 
The following is the sequence of the e-mail sending process:
  1. When the sender clicks send, the machine establishes a connection with the SMTP server by using port 25.
  2. An SMTP configured e-mail daemon/process uses this port. This daemon/process accepts incoming connections and sends the mails to its appropriate domain. For example if you send the mail from yahoo.com to hotmail.com, the mail goes to the yahoo SMTP server, and then the SMTP server sends it to the POP3 server of hotmail.com.
  3. If a message cannot be delivered, an error report containing the first part of the undeliverable message is returned to the sender.

  In the implementations of POP3, the server maintains a collection of text files, one for each e-mail account. When a message arrives, the POP3 server simply appends it to the bottom of the recipient's file. 

The following is the sequence of the e-mail receiving process:-
  1. The e-mail client connects to the POP3 server by using port 110. The POP3 server requires an account name and a password.
  2. After providing a valid username and password, the user gets verified by the POP3 server.
  3. If the username and password are valid, the POP3 server opens your text file and allows you to access it.

7. Write a brief note on SMTP?
Answer- 
SMTP is a protocol that transfers mail reliably and efficiently. SMTP is independent of a particular transmission subsystem and needs only a reliable ordered data stream channel. An important feature of SMTP is its capability to relay mail across transport service environments. 

8. Discuss the working of POP3 in an Email system? What are its limitations?
Answer- 
When users check their e-mail, the e-mail client connects to the POP3 server by using port 110. The POP3 server requires an account name and a password.
The POP3 server issues a series of commands to bring copies of user e-mail messages to user’s local machine. Generally, it will then delete the messages from the server (unless the user chooses the not to option in the e-mail client). Once the connection has been established, the POP3 protocol goes through three stages in sequence:
  1. Authorization
  2. Transactions
  3. Update

The authorization state deals with the user log in. The transaction state deals with the user collecting e-mail messages and marking them for deletion from the mailbox. The update state causes the e-mail messages to be deleted. During the authorization state, at times, when the server is set for three passwords trials, if you give the wrong password thrice, your mail box will get locked.

POP3 servers have certain limitations such as :-
  • There is no folder structure for sorting e-mail messages that are saved on the POP3 server. The server has only one folder for incoming mails, which is the inbox.
  • No rules can be set at the POP3 server. All rules are set at the client end only. If a user’s machine crashes, e-mail messages can only be recovered if a copy of them is left on the server.
  • To check e-mail, users have to download them first and only then they can view their mails on the   e-mail client software. User cannot see mails first and then download the required mails. If there are spam e-mail messages in the inbox that can be dangerous for the computer, these will also get downloaded and the user has to delete them.

9. What is www? 
Answer- 
WWW is a hypertext-based system that provides a uniform and a user-friendly interface for accessing the resources on the Internet. It is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI). 

10. Discuss the architecture of WWW? 
Answer- 
The architecture of WWW is two tiered. It consists of the client and the server. The client (web browser) requests for a web page. This page is retrieved from the server. The architecture depends on three key standards: HTML for encoding document content, Uniform Resource Locator (URL) for naming remote information objects in a global namespace, and HTTP for staging the transfer. The following figure shows the two-tiered architecture of WWW
   
                      Request
CLIENT ------------------ > SERVER
                    <--------------
                        Response

           Two-Tier Architecture of WWW


If the web pages are interacting with the database, then the architecture becomes three-tiered, as shown in the following figure.

                 Request
CLIENT --------------->  SERVER  ----------------->  DATA BASE
              <---------------                <----------------
                  Response
       
                      three-Tier Architecture of WWW 

11. Explain the client side and server side events when a user click on a URL?
Answer- 
The client side events when a user clicks on a URL are as follows: 

  1. The browser locates the URL.
  2. The browser asks DNS for the IP address.
  3. DNS replies with the IP address.
  4. The browser makes the Transmission Control Protocol (TCP) connection to Port 80 on the machine with the above IP address.
  5. The browser sends a request for the specific file.
  6. The server sends the required file.
  7. The TCP connection is closed.
  8. The browser displays all text information.
  9. The browser displays all images.

When a user clicks on a URL, the server side events are as follows:
  1. Server accepts a TCP connection from a client.
  2. Server searches the file associated with the web page.
  3. File from the disk is retrieved.
  4. The web page is returned to the client.
  5. TCP connection is released.

12. Explain what is a server farm? Give an example.
Answer-
A server farm is a group of networked servers that are housed in one location. A server farm streamlines internal processes by distributing the workload between the individual components of the farm and expedites computing processes by harnessing the power of multiple servers. The farms rely on load balancing software that accomplishes the following tasks:
  • Tracking demand for processing power from different machines.
  • Prioritizing the tasks.
  • Scheduling and rescheduling tasks depending upon priority and demand that users put on the network. 

When one server in the farm fails, another can step in as a backup.
  • Combining servers and processing power into a single entity has been relatively common for many years in research and academic institutions. Today, more and more companies are utilizing server farms as a way of handling the enormous amount of computerization of tasks and services that they require.
  • Server farm, or web farm, refers to either a web site that runs on more than one server or an Internet Service Provider (ISP) that provides web hosting services by using multiple servers.
  • Server compute farms are making their way into large manufacturing environments for electronic design automation, and to accelerate processes and complete tasks. 
  • A server farm accomplishes this by harnessing computing power from multiple machines and combining that power. Example of a server farm includes Google. Google’s services run on several server farms
--------------------
CHAPTER-2 (Routing Protocols)

1. What is Routing? Discuss direct and indirect Routing?

Answer-
Routing is the process of moving information across an internetwork from a source router to a destination router. Routing occurs at the third layer of the Open System Interconnect (OSI) model, known as the network layer. Routing protocols use metrics to evaluate what path will be the best for a packet to travel. The differences between direct routing and indirect routing are as follows.
  1. In direct routing, packet delivery occurs when the source and destination of the packet is located on the same physical network or if the packet delivery is between the last router and the destination host  AND  In indirect routing, the packet goes from router to router until it reaches the router connected to the same physical network as its final destination.
  2. In direct routing, the address mapping is between the IP address of the final destination and the physical address of the final destination AND In an indirect routing, the address mapping is between the IP address of the next router and the physical address of the next router.
  3. A packet delivery always involves one direct routing AND A packet delivery may or may not involve indirect routing.

2. Discuss different approaches used to make the routing table more efficient?
Answer- 
There are many approaches to make a routing table efficient such as:
  • Next hop routing: In this technique, the routing table holds only the address of the next hop instead of holding information about the complete route. Routing tables are thereby consistent with each other.
  • Network specific routing: In this technique, routing tables are made smaller so that the search process becomes simpler. Instead of having an entry for every host connected to the same physical network, we have only one entry to define the address of the network itself.

3. Name RIP’s various stability features.
Answer-
The stability features of RIP are:
  • Hop-count limit: This feature limits the number of hops allowed in a path from source to destination. The maximum number of hops in a path is 15. If for some reasons the router receives a routing update that contains a new or changed entry, and if increasing the metric value by 1 causes the metric to be infinity (that is, 16), the network destination is considered unreachable.
  • Hold-down timers: This feature is useful in preventing routing information from flooding the network when network links are unstable.
  • Split horizons: This feature prevents routing loops within the network.

4. What is the purpose of the timeout timer?
Answer- 
The purpose of the route timeout timer is to help purge invalid routes from a RIP node. Routes that are not refreshed for a given period of time are likely to be invalid because of some change in the network. Thus, RIP maintains a timeout timer for each known route. When a route's timeout timer expires, the route is marked invalid but is retained in the table until the route-flush timer expires.

5. What two capabilities are supported by RIP 2 but not RIP?
Answer- 
Two capabilities, which are supported by RIP2 but not by RIP1, are:
  • RIP1 cannot increase the network diameter or disseminate network bit masks needed to properly interpret routes. Therefore, using RIP1 is a poor choice for modern networks. An updated version of RIP1, known as RIPv2 (RIP2) can do this. RIP Version 2 (RIPv2) adds a "network mask" and "next hop address" field to the original RIP packet while remaining completely compatible with RIP. Thus RIPv2 routers can coexist with RIP routers without any problems.
  • The other improvement that RIPv2 offers over RIP1 is authentication, which defines the password authentication mechanism for RIPv2 routers to prevent accidental updates for wrongly configured hosts.
6. What is the maximum network diameter of a RIP network?
Answer- 
The maximum network diameter of a RIP network is 15 hops. 

7. When using OSPF, can you have two areas attached to each other where only one AS has an interface in Area 0?
Answer- 
Yes, you can. This describes the use of a virtual path. One area has an interface in Area 0 (legal), and the other AS is brought up and attached off an ABR in Area 1, so you can call it Area 2. Area 2 has no interface in Area 0, so it must have a virtual path to Area 0 through Area 1. When this is in place, Area2 looks like it is directly connected to Area 0. When Area 1 wants to send packets to Area 2, it must send them to Area 0, which in turn redirects them back through Area 1 by using the virtual path to Area 2. 

8. Area 0 contains five routers (A, B, C, D, and E), and Area 1 contains three routers (R, S, and T). What routers does Router T know exists? Router S is the ABR.
Answer- 
Router T knows about routers R and S only. Likewise, Router S only knows about R and T, as well as routers to the ABR in Area 0. The AS’s separate the areas so that router updates contain only information needed for that AS. 

9. Can IBGP be used in place of an IGP (RIP, IGRP, EIGRP, OSPF, or ISIS)?
Answer- 
Use of IBGP in place of IGP is conditional. The next-hop information from EBGP is carried into IBGP. If IBGP does not have a route to reach the next hop, then the route will be discarded. Typically, an IGP needs to be used to exchange routes to the next hop, but this can be achieved by using static routes on all the routers running IBGP. So, the answer is yes if you want to use and maintain static routes. Otherwise, you can not use IBGP in place of IGP.

10. Assume that a BGP router is learning the same route from two different EBGP peers. The AS_path information from peer 1 is {2345,86,51}, and the AS_path information from peer 2 is {2346,51}. What BGP attributes could be adjusted to force the router to prefer the route advertised by peer 1?
Answer- 
Weight and local preference are two BGP attributes that make adjustments to force the router to prefer the route advertised by peer 1. Both have a higher preference than AS_path length. 

11. Can BGP be used only by Internet service providers?
Answer- 
No. BGP can also be used to scale large enterprise networks. A large network can be divided into segments, with each segment running an IGP. Routing information between segments could then be exchanged by using BGP. 

12. If a directly connected interface is redistributed into BGP, what value will the origin attribute have for this route?
Answer- 
Any redistributed route will have an incomplete value of origin.

--------------------

CHAPTER-3  (Multimedia Networking)

1. What is multimedia? Give examples of multimedia data.
Answer- 
Multimedia defines applications and technologies that manipulate text, data, images, and voice and full motion video objects. Classic example of multimedia is the games available on CDs or songs and music available on sites. 

2. What is an audio? What is a video?
Answer- 
Audio: It deals with only voice. For example, a song or a lecture on any university site.
Video: It has got both voice and live image, such as a movie, a song, or a clipping of a lecture. 

3. What is streaming?
Answer- 
Streaming is the process of receiving stored audio/video application from a server where they are placed. A client begins to play either an audio or a video once the media player of the client’s PC begins receiving the audio or video file from the server. During the process, the client will be playing audio/video from one location in the file while it is receiving the remaining parts of the file from the server. In other words, streaming avoids long download times and the need to store the entire file on the user's computer. 

4. List the drawbacks of the current internet to drive the multimedia data?
Answer- 
The Internet has some drawbacks with regard to multimedia data. For example, the media player does not communicate with the streaming server directly. This delay, before play-out begins, is typically unacceptable for audio/video clips of moderate length.For this reason, audio/video streaming implementations typically have the server send the audio/video file directly to the media player process. In other words, a direct socket connection is made betwen the server process and the media player process.

5. How the existing internet can be made to port multimedia data?
Answer- 
For making the existing Internet portable to multimedia data, the following modifications need to be done: 
  1. A protocol is required that reserves bandwidth on behalf of the streaming server applications.
  2. The scheduling policies in the router queues should be modified so that the bandwidth reservations can be done. With the new scheduling policies, not all packets get equal treatment, instead the packets from the multimedia provider sites that reserve and pay more, get more bandwidth.
  3. The applications must give the network a description of the traffic that they intend to send to the network.
  4. The bandwidth and switching capacity should be enhanced to provide satisfactory delay and packet loss performance within the network.
  5. Caches must be installed in the networks. Caches bring stored content (web pages as well as stored audio and video) closer to users, thereby reducing the traffic in the higher-tier ISPs.
  6. Content providers that pay for a Content Distribution Networks (CDN) service should deliver content faster and more effectively.
  7. Multicast overlay networks can be deployed. A multicast overlay network consists of servers scattered throughout the ISP network and potentially throughout the entire Internet. Servers and the logical links between servers collectively form an overlay network, which multicasts traffic from a source to millions of users.

6. Explain the Why Audio and Video need to be compressed?
Answer- 
Compression is required to reduce the size of audio and video so that they can be easily transmitted over the Internet. For example, a single image consisting of 1024 pixel * 1024 pixels, with each pixel encoded into 24 bits requires 3 MB of storage without compression. There are eight bits, three each for the colors red, green, and blue. It would take approximately seven minutes to send the image over a 64 kbps link. If the image is compressed at a modest 10:1 compression ratio, the storage requirement is reduced to 300 Kbytes and the transmission time also drops by a factor of 10. 

7. Explain audio streaming process?
Answer- 
Audio streaming is the transfer of audio-encoded packets that are decoded and sent to the client’s soundcard upon reception. The host side is responsible for encoding and packetizing the audio stream. The client side is responsible for decoding the packets and sending the decoded audio to the sound card.  There are delays inherent in the overall system. These delays are contributed by the encode/decode delay, transfer delay, buffer delay, modem delay, sound card delay, and other delays. As long as the delays are kept constant, then the audio will be delivered uninterrupted.

8. What is a streaming server?
Answer- 
Streaming servers are meant for the audio/video streaming applications. Upon client request, a server directs an audio or a video file to the client by sending the file into a socket. Both the TCP and UDP socket connections are used. Before sending the audio/video file to a network, the file is segmented, and the segments are typically encapsulated with special headers appropriate for audio and video traffic. Streaming servers send digital video for news, entertainment, or educational content over the Internet by using RTP/RTSP. A multimedia file gets uploaded on the server and streaming servers encodes content in the latest media formats including MPEG- 4 (Moving Picture Expert Group) and the AAC (Advanced Audio Coder) audio. 

9. What are the limitations of the best effort service? Explain.
Answer- 
Limitations of the best effort service are:
  • Packet loss: As a IP datagram crosses through a network over UDP, it passes through buffers in the routers in order to access outbound links. It is possible that one or more of the buffers in the route from sender to receiver is full and cannot admit the datagram. In this case, the IP datagram is discarded, never to arrive at the receiving application. Loss could be eliminated by sending the packets over TCP rather than over UDP.
  • Excessive end-to-end delay: End-to-end delay is the accumulation of transmission, processing, and queuing delays in routers, propagation delays in the links, and end-system processing delays.
  • Packet jitter: A crucial component of end-to-end delay is the random queuing delays in the routers.  Because of these varying delays within the network, the time from when a packet is generated at the source until it is received at the receiver can fluctuate from packet to packet. This phenomenon is called jitter.
10. Discuss the features of Real Time Protocol?
Answer- 
The features of Real Time Protocol (RTP) are:
  1. RTP provides end-to-end delivery services for data with real-time characteristics such as interactive audio and video. However, RTP itself does not provide any mechanism to ensure timely delivery. It needs support from the lower layers of OSI model that actually have control over resources in switches and routers. RTP depends on Resource Reservation Protocol (RSVP) to reserve resources and to provide the requested quality of service.
  2. RTP provides timestamps, sequence numbers as hooks for adding reliability, flow, and congestion control for packet delivery, but implementation is totally left to the application.
  3. RTP is a protocol framework that is deliberately not complete. It is open to new payload formats and new multimedia software. By adding new profile and payload format specifications, one can tailor RTP to new data formats and new applications.
  4. The flow and congestion control information of RTP is provided by Real-Time Control Protocol (RTCP) sender and receiver reports.
  5. RTP/RTCP provides functionality and control mechanisms necessary for carrying real-time content. But RTP/RTCP itself is not responsible for the higher-level tasks like assembly and synchronization. These have to be done at the application level.

11. Explain how does the helper application get the data from a streaming server?
Answer- 
Getting data from streaming server to helper application like the media player requires at least two servers where data is placed. One server is the HTTP server, and the second server is the streaming server. For example, when a user visits any songs/news web site, the web browser communicates with the web server where the user chooses the file that has music or news. The moment the user clicks any media file; media player requests for the media file to the streaming server and user receives the media file on the media player.

12. Explain RTSP?
Answer- 
RTSP is a protocol that enables a media player to control the transmission of a media stream. RTSP messages use the port number 544 from the media stream. The RTSP specification, RFC 2326, permits RTSP messages to be sent over TCP or UDP. RTSP server keeps a track of the state of the client for each ongoing RTSP session. For example, the server keeps track of whether the client is in an initialization state, a play state, or a pause state. The session and sequence numbers, which are part of each RTSP request and response, help the server to keep track of the session state. The session number is fixed throughout the entire session; the client increments the sequence number each time it sends a new message; the server echoes back the session number, and the current sequence number. 

--------------------
CHAPTER-4 (Wireless Local Area Network (WLAN))

1. What are WLANs?
Answer- 
WLAN is a network that uses high-frequency radio waves rather than wires to communicate between nodes. WLAN technologies enable users to establish wireless connections within a local area such as within a corporate or campus building, or in a public space like airport. IEEE approved the 802.11 standard for WLANs, which specifies a data transfer rate of 1-2 Mbps.

2. What is modulation?
Answer- 
Modulation is the addition of information or the signal to an electronic or optical signal carrier. There are several reasons to modulate a signal before transmitting signal in a medium. This includes the ability of various users sharing a medium and making the signal properties physically compatible with the propagation medium. 

3. What is a carrier signal?
Answer- 
A carrier signal is a specific frequency in an analog communication channel that is modulated with an information-carrying signal. Carrier signals are commonly used in Amplitude Modulation (AM), Frequency Modulation (FM), and other radio transmissions to differentiate among channels. You turn a radio dial to select a carrier frequency. The radio then amplifies the signal carried on the selected frequency. In AM, modulation changes the strength or amplitude of the carrier signal. In FM, the frequency of the carrier signal is modulated. 

4. Define SNR?
Answer- 
SNR stands for Signal-to-Noise Ratio. It is the ratio between the typical signal level and the softest signal that can be produced accurately.

5. What is BW?
Answer- 
BW stands for bandwidth, which is the range within a band of frequencies or wavelengths. BW can also be defined as the amount of data that can be transmitted in a fixed amount of time. For digital devices, bandwidth is usually expressed in bits per second or bytes per second (bps). For analog devices, bandwidth is expressed in cycles per second or Hertz (Hz).

6. Compare 802.11a, 802.11b, 802.11g and blue tooth.
Answer- 
Feature  --  802.11a --  802.11b --  802.11g --  Bluetooth
Data rate -- 54-72Mbps-11Mbps 54Mbps-- 721Kbps--56 Kbps
Frequency --5Ghz -- 2.4Ghz--   2.4Ghz--   2.4Ghz  
Modulation-- OFDM--   DSSS/CCK -- DSSS/PBCC--   FHSS  
Channels -- 12/8 --  11/3 --  11/3--   79  ( 1Mhz wide)
Bandwidth Available--300--83.5-- 83.5(22MHz per channel)--83.5
Power -- 40-800mW --   100mW -- 100mW --  100mW 
  

7. List out the advantages and disadvantages of WLAN?
Answer- 
The advantages of WLAN are:
  • Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio waves can penetrate walls, and senders and receivers can be placed anywhere.
  • Easy to use: The wireless networks are easy to set-up and use. Just plug-in a base station and equip your laptops with WLAN cards.
  • Robustness: Wireless networks can survive disasters. Networks requiring a wired infrastructure will break down completely some time. If one base station goes down, users may be able to physically move their PCs to be in range of another.

The disadvantages of WLAN are:
  • Quality of Service (QoS): WLANs typically offer lower quality than wired networks. The main reasons for offering low quality are lower bandwidth due to limitations in radio transmission, higher error rates due to interference (10-4 instead of 10-10 for fiber optics), and higher delay/delay variation.
  • Vulnerable to interference: If a powerful transmitter operating in the same band as the wireless network is nearby, the wireless network could be rendered completely useless.
  • Speed: Data speeds drop as the user moves further away from the access point.
  • Operation within limited distance: Devices will only operate at a limited distance from an access point. Obstacles between the access point and the user such as walls, glass, water, trees and leaves can also determine the distance of operation.
  • Safety and security: Using radio waves for data transmission might interfere with other high-tech equipment. Additionally, the open radio interface makes eavesdropping much easier in WLANs than in the case of fiber optics.

8. Compare Infrared and Radio transmission?
Answer- 
Comparision of Infrared and Radio transmission
  1. Infrared transmission cannot penetrate walls or other obstacles AND Radio transmission can cover larger areas and can penetrate walls, furniture, plants, and so on.
  2. Infrared is For good transmission quality and high data rates, typically a LOS is needed between the sender and the receiver. AND Radio transmission does not typically need a direct line of sight (LOS) to exist between the receiver and the sender if the frequencies are not too high.
  3. Infrared  transmission offers lower transmission rates. The products using the latest version of Infrared Data Association interface support data transfer rates up to 4 Mbps AND Radio transmission offers very high data transfer rates than Infrared. Current radio-based products offer transmission rates up to 10 Mbps.
  4. In this case, shielding is very simple. Therefore, electrical devices do not interfere with infrared transmission AND In this case, shielding is not so simple. Therefore, radio transmission can interfere with other senders and electrical devices can destroy data transmission via radio.
  5. No licenses are required for infrared technology BUT Radio transmission is only permitted in certain frequency bands. Very limited ranges of license-free bands are available worldwide, and those available are typically not the same in all countries.
  6. Infrared technology is normally used for devices like PDAs, laptops, notebooks, mobile phones, and so on AND Radio transmission is used for wide area networks (WAN) such as microwave links and mobile cellular phones.
  7. In Infrared Only IEEE 802.11 makes use of this type of transmission AND In Radio transmission WLAN technologies such as IEEE 802.11, HIPERLAN, and Bluetooth make use of this type of transmission.

9. Discuss the architecture of WLAN?
Answer- 
WLAN architecture consists of three components:
  1. Wireless end stations
  2. Access points
  3. Basic service sets (BSS)

The wireless end station can be any device that can communicate using the 802.11 standard. These devices include laptops, workstations, and PDAs, as well as printers and scanners.
The access point (AP) is a device. It acts as a network platform for connections between WLANs or to a wired LAN and as a relay between stations attached to the same AP. 

BSS is the logical component of wireless architecture. In general, it is a set of wireless stations controlled by a single management function and has two configuration options that is, Infrastructure BSS (IBSS) and Extended Service Set (ESS).

In an IBSS, the stations communicate directly to one another without the need for an access point. An ESS is a set of infrastructure BSSs that appear as a single BSS. This is important for connection redundancy but has some security issues that need to be addressed.

10. Briefly explain the WLAN protocol architecture?
Answer- 
In a typical WLAN setup, the IEEE 802.11 standard WLAN (Access Point) gets connected to an IEEE 802.3 standard Ethernet (Switch/HUB) via a bridge. The higher layers (application, TCP, IP) look the same for the wireless node as for the wired node. The IEEE 802.11 standard only covers the physical layer (PHY) and medium access layer (MAC) like the other 802.x LANs do. The physical layer is sub divided into the Physical Layer Convergence Protocol (PLCP) and the Physical Medium Dependent Sub Layer. The basic tasks of the MAC layer comprise medium access, fragmentation of user data, and encryption. The PLCP sublayer provides a carrier sense signal called Clear Channel Assessment (CCA), and provides a common PHY interface for the MAC, which is independent of the transmission technology.

11. Write a note on DSSS?
Answer- 
Direct Sequence Spread Spectrum (DSSS) is the alternative spread spectrum method, in which the signal is spread over a wide range of frequencies using a chipping code. In the case of IEEE 802.11 DSSS, spreading is achieved by using the 11-chip sequence (+1,-1,+1,+1,-1,+1,+1,+1,-1,-1,-1), which is also called the Barker code. 

12. Discuss MAC layer of WLAN.
Answer- 
MAC layer controls medium access, and also offers support for roaming, authentication, and power conservation. The services offered by MAC are mandatory asynchronous data service and an optional time-bounded service. 

--------------------

CHAPTER-5 (Crytography and Network Security)

1. What is cryptography?
Answer- 
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables us to store or transmit sensitive information across insecure networks (like the Internet) so that unauthorized users except the intended recipient cannot read it. 

2. Explain cryptographic algorithms.
Answer- A cryptographic algorithm, also referred to as cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key. The key may be a word, number, or phrase used to encrypt the plain text, also called a message. The plain text encrypts to cipher text with different keys. The security of encrypted data is entirely dependent on the strength of the cryptographic algorithm and the secrecy of the key. 

3. Explain different types of attacks.
Answer- 
Attacks are of two types. The types are:
    1.Passive attack: In this attack, the goal of the unauthorized user is to obtain information that is being transmitted. Passive attacks have two subtypes, release of message contents and traffic analysis.
  • The release of message contents includes conversation over the phone or through email or transferring a file from one place to another, which might contain sensitive information.
  • The traffic analysis is more delicate. Suppose that we had a way of masking the contents of messages or other information traffic so that unauthorized users could not extract the information from the message. The common technique for masking contents is encryption. If we had encryption protection in place, an opponent might still be able to observe the pattern of these messages. The opponent could determine the location and identity of communication hosts, and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place.
Passive attacks are very difficult to detect because they do not involve any alteration of the data. The emphasis in dealing with passive attacks is to prevent the attack rather than to detect it.

    2.Active attacks: These attacks involve some modification of the data stream or the creation of a false stream. These attacks are divided into four categories such as masquerade, replay, modification of messages, and denial of service (DoS).
  • Masquerade: It takes place when an entity pretends to be different than the other entity. This includes one of the other forms of an active attack, which is modification of messages or denial of service.
  • Replay: It involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
  • Modification of messages: It implies that some portion of the message is altered or messages are delayed or reordered to produce an unauthorized effect.
  • DoS: It prevents or inhibits the normal use or the management of communications facilities. This type of attack has a specific target. For example, an entity may suppress all messages directed to a particular destination. Another form of DoS is the disruption of an entire network, either by disabling the network or by overloading it with messages to degrade the performance of the network.
Active attacks posses opposite characteristics than that of passive attacks. Active attacks are difficult to prevent because physical protection of all communications facilities and paths at all times is required. Instead, the goal is to detect active attacks and to restore the network from any disruption or delays caused by them. 

4. Explain briefly on security mechanisms.
Answer- 
Mechanisms that ensure security of an organization are known as security mechanisms. Encryption or encryption like transformations of information is the most common means of providing security.
There are certain common information integrity functions to secure network/data like identification, validation, authorization, time of occurrence, signature, authenticity, concurrence, ownership, receipts, registration, endorsement, privacy, access, and endorsement. 

5. Explain conventional encryption model?
Answer- 
Before the development of public key encryption, the conventional encryption (single-key encryption) was available to secure the networks.
There are two types of encryption, classical encryption and modern encryption techniques. These are key based algorithms known as symmetric and public key algorithms.
In conventional algorithms, the encryption key can be calculated from the decryption key. Alternatively, the decryption key can be calculated from the encryption key. In these algorithms, the encryption key and the decryption key are same. These algorithms are also called secret key algorithms, or the one key algorithm. In this encryption technique, the sender and receiver agree to use a key before they communicate securely. The security of the symmetric algorithm rests in the key. The key allows users to encrypt and decrypt messages by using any encryption and decryption algorithms. 

6. What is STEGANOGRAPHY?
Answer- 
Steganography is a technique that is used to hide the secret message in other messages.
A few examples of steganography are:-
  • Character marking: Selected letters of printed or type written text are overwritten in pencil. The marks are ordinarily not visible unless the paper on which text is printed or type written is held at an angle to bright light.
  • Invisible ink: A number of substances can be used for writing but the ink leaves no visible trace until heat or a specific chemical is applied to the paper.
  • Pin punctures: Small pin punctures on selected letters are ordinarily not visible unless the paper is held up in front of a light.
  • Typewriter correction ribbon: This is a black ribbon used between typed lines typed. The results of typing with the correction tape are visible only in good light.

----------------(END)---------------

No comments:

Post a Comment