Professional Documents
Culture Documents
Abhiram S 2343002
Abhiram S 2343002
Computer Networks
(BCA 107-3)
In a mesh topology, each device is connected to every other device except itself. Therefore,
the number of cables needed can be calculated using the formula for combinations:
C=(n/2)
For n=6:
C=15
So, 15 cables are needed in total for the mesh topology with 6 devices.
For n=6:
So, 5 ports are required for each device in the mesh topology.
fails.
ANS:
a. Mesh Topology: Resilient to single connection failures but complex to manage multiple
failures.
b. Star Topology: Vulnerable to hub failure; individual device failures are isolated.
c. Bus Topology: Vulnerable to main bus line failure; individual tap failures isolate single
devices.
d. Ring Topology: Vulnerable to single connection failures disrupting the entire ring;
multiple failures can segment the network.
3. What happens if one of the stations is unplugged in the ring topology?
ANS:
In a ring topology network, if one of the stations (or nodes) is unplugged or fails, the entire
network can be disrupted
ANS:
In a bus topology network, where all stations are connected to a single central cable (the
bus), if one station is unplugged or fails, the overall network performance is generally not
severely impacted.
Short Answer:
1. True or False: A LAN typically covers a larger geographical area than a WAN.
ANS: False
2. What is the primary purpose of a MAN?
ANS: The primary purpose of a MAN (Metropolitan Area Network) is to connect
multiple LANs within a city or metropolitan area.
3. Which network technology is most commonly used in a LAN? (Ethernet, WiFi,
Cellular)
ANS: Ethernet is the network technology most commonly used in LANs. It provides a
wired connection typically over twisted-pair cables.
4. Fill in the blank: A(n) __________ network connects geographically dispersed
location across a large area, often using a variety of communication technologies.
ANS: WAN
5. Multiple Choice: Which of the following statements is NOT true about MANs?
o a) They cover a larger area than a LAN but smaller than a WAN.
Scenario-Based Questions:
1. We have two computers connected by an Ethernet hub at home. Is this a LAN or a
3. Imagine you are the IT manager of CHRIST University, spread across several campuses
within a city. How might you utilize a MAN to connect these campuses and enable resource
sharing?
ANS:
As the IT manager of CHRIST University spread across multiple campuses within a city,
utilizing a Metropolitan Area Network (MAN) would be a strategic approach to connect
these campuses and enable efficient resource sharing.
1. Understanding MAN:
o A Metropolitan Area Network (MAN) covers a larger geographic area than a
LAN but is smaller than a WAN. It typically spans a city or a metropolitan
area, connecting multiple LANs across different locations.
2. Connecting Campuses:
o Establish high-speed fiber optic links or other reliable broadband connections
between the various campuses of CHRIST University. These links will form the
backbone of the MAN.
3. Enabling Resource Sharing:
o Centralized Services: Host critical services such as email servers, file servers,
and databases in a centralized data center or a designated campus. All
campuses can access these resources over the MAN, ensuring consistent and
efficient service delivery.
o Unified Communication: Implement unified communication systems that
leverage the MAN to enable seamless voice and video communication
between different campuses. This could include VoIP (Voice over IP) systems
for telephony and video conferencing solutions.
o Shared Internet Access: Provide shared internet access through the MAN,
possibly with redundant connections for reliability. This allows all campuses
to benefit from high-speed internet services without each campus needing its
own separate connection.
o Resource Pooling: Utilize network-attached storage (NAS) devices or cloud
storage accessible via the MAN for centralized file storage and backup. This
simplifies data management and ensures data integrity across campuses.
4. Security and Management:
o Implement robust security measures such as VPNs (Virtual Private Networks),
firewalls, and encryption protocols to secure data transmission over the
MAN.
5. Scalability and Future Expansion:
o Design the MAN with scalability in mind to accommodate future growth of
the university, including additional campuses or increased bandwidth
demands.
o Regularly assess and upgrade network infrastructure and bandwidth
capacities as needed to meet evolving requirements.
6. Collaboration and Academic Initiatives:
o Facilitate collaboration among campuses for academic research, joint
projects, and resource sharing like libraries and online learning platforms.
o Enable distance learning programs and virtual classrooms that leverage the
MAN’s capabilities for real-time interaction and access to educational
resources.
4. A company has offices in different cities across the country. They need a network to
connect these offices for data exchange and communication. Describe the key
considerations when designing such a WAN, including security measures and potential
challenges.
ANS:
Designing a Wide Area Network (WAN) to connect offices in different cities across the
country involves several key considerations to ensure efficient data exchange,
communication, security, and reliability. Here are the key aspects to consider:
Topology: Decide on the WAN topology based on the organization's needs. Common choices
include a hub-and-spoke topology (centralized with one main office acting as a hub) or a
mesh topology (all offices interconnected).
Bandwidth and Performance: Assess bandwidth requirements based on the volume of data
exchange, applications used, and expected growth.
Redundancy and Resilience: Implement redundancy at critical points in the WAN to ensure
continuous connectivity.
SECURITY:
Encryption: Use strong encryption protocols (e.g., AES-256) for data transmitted over the
WAN to protect against unauthorized access and interception.
POTENTIAL CHALLENGES:
Cost: WAN infrastructure, especially dedicated leased lines or MPLS circuits, can be costly to
deploy and maintain. Consider cost-effective alternatives like SD-WAN for certain use cases.
Security Risks: WANs are susceptible to security threats such as data breaches and malware
attacks. Continuous monitoring, regular updates, and adherence to security best practices
are crucial.
1. Create a table comparing and contrasting LAN, WAN, and MAN. Include factors like
geographical scope, typical technologies used, common applications, and security
considerations.
ANS:
2. How does the design and implementation of a network security strategy differ between a
LAN and a WAN? Explain the specific threats and security measures relevant to each type of
network.
ANS:
Local Area Network (LAN)
Characteristics:
Specific Threats:
Security Measures:
1. Access Control: Implementing strict access control policies using technologies like
802.1X, RADIUS, and role-based access control (RBAC).
2. Network Segmentation: Dividing the network into segments or VLANs to limit the
spread of attacks.
3. Firewalls: Deploying internal firewalls to control traffic between segments.
4. Intrusion Detection/Prevention Systems (IDS/IPS): Monitoring and responding to
suspicious activities within the LAN.
5. Endpoint Security: Ensuring that all devices connected to the LAN have updated
antivirus, anti-malware software, and adhere to security policies.
6. Physical Security: Securing access to network hardware and ensuring only authorized
personnel can physically access network devices.
Characteristics:
Specific Threats:
Security Measures:
1. Encryption: Using strong encryption (e.g., IPsec, SSL/TLS) to protect data in transit
across the WAN.
2. Virtual Private Networks (VPNs): Establishing secure tunnels between remote sites
and central offices.
3. Firewalls and Gateways: Deploying robust perimeter defenses at WAN entry and exit
points.
4. Traffic Filtering and Monitoring: Implementing deep packet inspection and anomaly
detection to identify and mitigate threats.
5. Redundancy and Failover: Ensuring high availability and reliability with redundant
WAN links and automatic failover mechanisms.
6. Secure Routing Protocols: Using secure versions of routing protocols (e.g., OSPF with
authentication, BGP with MD5) to prevent routing attacks.
7. Security Policies and Agreements: Establishing clear security policies and agreements
(e.g., SLAs) with WAN service providers to ensure security standards are met.
1. You are planning a LAN for a small coffee shop with several point-of-sale
systems, a printer, and free Wi-Fi for customers. Design a basic network
layout, including devices and connections. Consider factors like cable
type, placement of network devices (router, switch), and security
measures for guest Wi-Fi access.
ANS:
1. Router: Connects the coffee shop to the internet service provider (ISP) and provides
basic firewall and network address translation (NAT).
2. Switch: Connects all wired devices within the LAN.
3. Point-of-Sale (POS) Systems: Multiple POS terminals for processing transactions.
4. Printer: For printing receipts and other documents.
5. Access Points (APs): Provide Wi-Fi access to customers.
6. Cabling: Ethernet cables (Cat 6) for wired connections.
7. Firewall: For enhanced security, a dedicated hardware firewall can be used.
8. Wi-Fi Network Segmentation: To separate internal devices from guest Wi-Fi access.
Network Layout:
1. Router Placement:
o Place the router centrally in a secure, accessible location.
o Connect the router to the ISP's modem (if separate).
2. Switch Placement:
o Connect the switch to the router via an Ethernet cable (Cat 6).
o Place the switch in a central location to minimize cable lengths and ensure
efficient connectivity.
3. POS Systems:
o Connect each POS terminal to the switch using Ethernet cables (Cat 6) for
reliable, fast connectivity.
o Ensure POS terminals are physically secured and protected from unauthorized
access.
4. Printer:
o Connect the printer to the switch via Ethernet cable (Cat 6) or use Wi-Fi if the
printer supports it.
o Place the printer in a convenient location for staff use.
Security Measures:
2. Network Segmentation:
o Create VLANs on the switch to separate POS systems, printers, and staff
devices from guest Wi-Fi traffic.
o Ensure that POS systems and other critical devices are on a secure, isolated
VLAN.
3. Firewall:
o Implement a dedicated hardware firewall or enable firewall features on the
router to protect against external threats.
o Configure the firewall to allow only necessary traffic and block unauthorized
access.
4. Access Control:
o Use strong, unique passwords for all network devices and change default
credentials.
o Enable WPA3 encryption on the Wi-Fi network for enhanced security.
Explanation:
Router: Acts as the gateway to the internet and provides NAT and basic firewall
functionality.
Switch: Connects all wired devices, ensuring efficient and reliable communication.
POS Systems and Printer: Connected via Ethernet for stability and performance.
Access Points: Provide Wi-Fi coverage for customers and staff, configured to ensure
network segmentation.
Security Measures: Include network segmentation, separate SSIDs for guest and
staff, a dedicated firewall, strong encryption, and regular monitoring.
This design ensures that the coffee shop’s network is secure, efficient, and provides a good
user experience for both staff and customers.
2. Imagine you are tasked with expanding the existing network infrastructure of a company
to accommodate a new department in a separate building within the same city. How might
you approach this task? Explain the steps involved and the technologies you might consider
using to connect the two buildings within a MAN.
ANS:
Leased Lines: Consider using leased lines (e.g., MPLS, T1/T3 lines) for a dedicated,
reliable connection between the buildings.
Fiber Optic Connection: If available, use fiber optic cables for high-speed, low-
latency connectivity. This can be done via a point-to-point fiber link.
Wireless Point-to-Point Links: If laying physical cables is impractical, consider using
high-speed wireless point-to-point links (e.g., microwave or millimeter-wave links).
Network Topology: Design the network topology to include the new building,
ensuring redundancy and high availability.
IP Addressing: Update the IP addressing scheme to include the new department,
ensuring no conflicts and proper segmentation.
VLANs: Use VLANs to segment the network logically, separating different
departments and ensuring security and efficient traffic management.
Cabling and Hardware: Install necessary cabling (fiber or copper) and network
hardware (switches, routers, firewalls) in the new building.
Network Equipment: Ensure that network equipment in the new building is
compatible with the existing infrastructure. This includes switches, routers, and
access points.
Wireless Links: If using wireless links, install and align the antennas for optimal
performance and ensure secure and encrypted communication.
Technologies to Consider
Explanation
Core Switch and Switch: Central devices connecting all local network devices in each
building.
Router: Directs traffic between buildings and to/from the internet.
Firewall: Ensures security by filtering traffic and preventing unauthorized access.
Fiber/Wireless Link: Provides a high-speed connection between the two buildings.
Access Points: Provide Wi-Fi connectivity for wireless devices in both buildings.
By following these steps and using the appropriate technologies, you can ensure a seamless
and secure network expansion to accommodate the new department in a separate building
within the same city.