Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

YESHWANTHPUR CAMPUS

Computer Networks
(BCA 107-3)

SUBMITTED TO: SUBMITTED BY:


Dr.Kalpana P Abhiram S
Department of Computer Science 2343002
Assignment Questions on Topology
1. Assume six devices are arranged in a mesh topology. How many cables are needed?
How many ports are required for each device?
ANS:

In a mesh topology, each device is connected to every other device except itself. Therefore,
the number of cables needed can be calculated using the formula for combinations:

C=(n/2)

For n=6:

C=15

So, 15 cables are needed in total for the mesh topology with 6 devices.

Therefore, each device requires n−1 ports.

For n=6:

Ports per device:6−1=5

So, 5 ports are required for each device in the mesh topology.

2. Discuss the consequences of each of the following four networks if a connection

fails.

a. Five devices arranged in a mesh topology

b. Five devices arranged in a star topology (not counting the hub)

c. Five devices arranged in a bus topology

d. Five devices arranged in a ring topology

ANS:
a. Mesh Topology: Resilient to single connection failures but complex to manage multiple
failures.
b. Star Topology: Vulnerable to hub failure; individual device failures are isolated.
c. Bus Topology: Vulnerable to main bus line failure; individual tap failures isolate single
devices.
d. Ring Topology: Vulnerable to single connection failures disrupting the entire ring;
multiple failures can segment the network.
3. What happens if one of the stations is unplugged in the ring topology?

ANS:

In a ring topology network, if one of the stations (or nodes) is unplugged or fails, the entire
network can be disrupted

4. What happens if one of the stations is unplugged in the bus topology?

ANS:

In a bus topology network, where all stations are connected to a single central cable (the
bus), if one station is unplugged or fails, the overall network performance is generally not
severely impacted.

Assignment Questions for LAN, WAN, and MAN

Short Answer:

1. Explain LAN, MAN, and WAN with a neat sketch.

ANS: LAN(Local Area Network)


o Local Area Network is a group of computers connected to
each other in a small area such as building, office.
o LAN is used for connecting two or more personal
computers through a communication medium such as
twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware
such as hubs, network adapters, and ethernet cables.
o The data is transferred at an extremely faster rate in
Local Area Network.

o Local Area Network provides higher security.


MAN(Metropolitan Area Network)
o A metropolitan area network is a network that covers a
larger geographic area by interconnecting a different
LAN to form a larger network.

o Government agencies use MAN to connect to the citizens

and private industries.

o In MAN, various LANs are connected to each other

through a telephone exchange line.

o The most widely used protocols in MAN are RS-232,


Frame Relay, ATM, ISDN, OC-3, ADSL, etc.

o It has a higher range than Local Area Network(LAN).


Uses Of Metropolitan Area Network:
o MAN is used in communication between the banks in a
city.

o It can be used in an Airline Reservation.

o It can be used in a college within a city.

o It can also be used for communication in the military.

WAN(Wide Area Network)


o A Wide Area Network is a network that extends over a
large geographical area such as states or countries.

o A Wide Area Network is quite bigger network than the


LAN.

o A Wide Area Network is not limited to a single location,


but it spans over a large geographical area through a
telephone line, fibre optic cable or satellite links.

o The internet is one of the biggest WAN in the world.

o A Wide Area Network is widely used in the field of


Business, government, and education.
Examples Of Wide Area Network:
o Mobile Broadband: A 4G network is widely used across
a region or country.

o Last mile: A telecom company is used to provide the


internet services to the customers in hundreds of cities by
connecting their home with fiber.

o Private network: A bank provides a private network that


connects the 44 offices. This network is made by using
the telephone leased line provided by the telecom
company.

Advantages Of Wide Area Network:


Following are the advantages of the Wide Area Network:

o Geographical area: A Wide Area Network provides a


large geographical area. Suppose if the branch of our
office is in a different city then we can connect with them
through WAN. The internet provides a leased line
through which we can connect with another branch.

o Centralized data: In case of WAN network, data is


centralized. Therefore, we do not need to buy the emails,
files or back up servers. o Get updated files: Software
companies work on the live server. Therefore, the
programmers get the updated files within seconds.

o Exchange messages: In a WAN network, messages are


transmitted fast. The web application like Facebook,
Whatsapp, Skype allows you to communicate with
friends.

o Sharing of software and resources: In WAN network,


we can share the software and other resources like a hard
drive, RAM.

o Global business: We can do the business over the


internet globally.

o High bandwidth: If we use the leased lines for our


company then this gives the high bandwidth. The high
bandwidth increases the data transfer rate which in turn
increases the productivity of our company.

Disadvantages of Wide Area Network:


The following are the disadvantages of the Wide Area Network:

o Security issue: A WAN network has more security issues


as compared to LAN and MAN network as all the
technologies are combined together that creates the
security problem.

o Needs Firewall & antivirus software: The data is


transferred on the internet which can be changed or
hacked by the hackers, so the firewall needs to be used.
Some people can inject the virus in our system so
antivirus is needed to protect from such a virus.

o High Setup cost: An installation cost of the WAN


network is high as it involves the purchasing of routers,
switches. o Troubleshooting problems: It covers a large
area so fixing the problem is difficult.

Conceptual Understanding (True/False, Fill in the Blanks, Multiple Choice):

1. True or False: A LAN typically covers a larger geographical area than a WAN.
ANS: False
2. What is the primary purpose of a MAN?
ANS: The primary purpose of a MAN (Metropolitan Area Network) is to connect
multiple LANs within a city or metropolitan area.
3. Which network technology is most commonly used in a LAN? (Ethernet, WiFi,
Cellular)
ANS: Ethernet is the network technology most commonly used in LANs. It provides a
wired connection typically over twisted-pair cables.
4. Fill in the blank: A(n) __________ network connects geographically dispersed
location across a large area, often using a variety of communication technologies.
ANS: WAN

5. Multiple Choice: Which of the following statements is NOT true about MANs?

o a) They cover a larger area than a LAN but smaller than a WAN.

o b) They are often used to connect universities or businesses within a city.

o c) They typically use high-bandwidth technologies like fiber optics.

o d) They are a common choice for connecting home networks.

ANS: d) They are a common choice for connecting home networks.

Scenario-Based Questions:
1. We have two computers connected by an Ethernet hub at home. Is this a LAN or a

WAN? Explain the reason.


ANS:
In this scenario, where two computers are connected by an Ethernet hub at home, it
constitutes a LAN (Local Area Network).
The connection of two computers using an Ethernet hub within a home constitutes a LAN
because it involves devices that are in close physical proximity and are connected through a
local network infrastructure (the Ethernet hub) without the involvement of wide-reaching
communication services that define WANs.
2. You are tasked with designing a network for a new office building with 50 employees. Each
employee will have a desktop computer and a phone. What type of network would you
recommend? Explain your reasoning and consider factors like security, scalability, and cost.
ANS:
a LAN setup is recommended for the new office building with 50 employees due to its
advantages in security, scalability, and cost-effectiveness. This approach ensures efficient
network management, robust security measures, and flexibility for future growth, meeting
the needs of the organization effectively.
Security: LANs offer better security compared to wide area networks (WANs) because they
are contained within a single physical location (the office building).
Scalability: LANs can be easily scaled to accommodate growth within the office building.
Cost: LANs are generally more cost-effective for a single office building setup compared to
WANs, which involve higher costs due to leased lines, routers, and possibly more complex
network equipment.

3. Imagine you are the IT manager of CHRIST University, spread across several campuses
within a city. How might you utilize a MAN to connect these campuses and enable resource
sharing?

ANS:

As the IT manager of CHRIST University spread across multiple campuses within a city,
utilizing a Metropolitan Area Network (MAN) would be a strategic approach to connect
these campuses and enable efficient resource sharing.

1. Understanding MAN:
o A Metropolitan Area Network (MAN) covers a larger geographic area than a
LAN but is smaller than a WAN. It typically spans a city or a metropolitan
area, connecting multiple LANs across different locations.
2. Connecting Campuses:
o Establish high-speed fiber optic links or other reliable broadband connections
between the various campuses of CHRIST University. These links will form the
backbone of the MAN.
3. Enabling Resource Sharing:
o Centralized Services: Host critical services such as email servers, file servers,
and databases in a centralized data center or a designated campus. All
campuses can access these resources over the MAN, ensuring consistent and
efficient service delivery.
o Unified Communication: Implement unified communication systems that
leverage the MAN to enable seamless voice and video communication
between different campuses. This could include VoIP (Voice over IP) systems
for telephony and video conferencing solutions.
o Shared Internet Access: Provide shared internet access through the MAN,
possibly with redundant connections for reliability. This allows all campuses
to benefit from high-speed internet services without each campus needing its
own separate connection.
o Resource Pooling: Utilize network-attached storage (NAS) devices or cloud
storage accessible via the MAN for centralized file storage and backup. This
simplifies data management and ensures data integrity across campuses.
4. Security and Management:
o Implement robust security measures such as VPNs (Virtual Private Networks),
firewalls, and encryption protocols to secure data transmission over the
MAN.
5. Scalability and Future Expansion:
o Design the MAN with scalability in mind to accommodate future growth of
the university, including additional campuses or increased bandwidth
demands.
o Regularly assess and upgrade network infrastructure and bandwidth
capacities as needed to meet evolving requirements.
6. Collaboration and Academic Initiatives:
o Facilitate collaboration among campuses for academic research, joint
projects, and resource sharing like libraries and online learning platforms.
o Enable distance learning programs and virtual classrooms that leverage the
MAN’s capabilities for real-time interaction and access to educational
resources.

4. A company has offices in different cities across the country. They need a network to
connect these offices for data exchange and communication. Describe the key
considerations when designing such a WAN, including security measures and potential
challenges.

ANS:
Designing a Wide Area Network (WAN) to connect offices in different cities across the
country involves several key considerations to ensure efficient data exchange,
communication, security, and reliability. Here are the key aspects to consider:

Topology: Decide on the WAN topology based on the organization's needs. Common choices
include a hub-and-spoke topology (centralized with one main office acting as a hub) or a
mesh topology (all offices interconnected).

Bandwidth and Performance: Assess bandwidth requirements based on the volume of data
exchange, applications used, and expected growth.

Redundancy and Resilience: Implement redundancy at critical points in the WAN to ensure
continuous connectivity.

SECURITY:
Encryption: Use strong encryption protocols (e.g., AES-256) for data transmitted over the
WAN to protect against unauthorized access and interception.

Authentication and Authorization: Ensure robust authentication mechanisms (e.g.,


multifactor authentication) and granular authorization to prevent unauthorized access to
sensitive resources.

POTENTIAL CHALLENGES:

Cost: WAN infrastructure, especially dedicated leased lines or MPLS circuits, can be costly to
deploy and maintain. Consider cost-effective alternatives like SD-WAN for certain use cases.

Security Risks: WANs are susceptible to security threats such as data breaches and malware
attacks. Continuous monitoring, regular updates, and adherence to security best practices
are crucial.

Comparison and Contrast:

1. Create a table comparing and contrasting LAN, WAN, and MAN. Include factors like
geographical scope, typical technologies used, common applications, and security
considerations.

ANS:

2. How does the design and implementation of a network security strategy differ between a
LAN and a WAN? Explain the specific threats and security measures relevant to each type of
network.

ANS:
Local Area Network (LAN)

Characteristics:

 Limited geographic area (e.g., a single building or campus).


 Typically under the control of a single organization.
 Higher bandwidth and lower latency.

Specific Threats:

1. Internal Threats: Insiders (employees, contractors) with access to network resources.


2. Malware: Viruses, worms, and ransomware introduced through infected devices.
3. Unauthorized Access: Physical access to network hardware or through network
exploits.
4. Man-in-the-Middle (MitM) Attacks: Eavesdropping on communications within the
LAN.
5. Denial of Service (DoS): Attacks that overwhelm network resources.

Security Measures:

1. Access Control: Implementing strict access control policies using technologies like
802.1X, RADIUS, and role-based access control (RBAC).
2. Network Segmentation: Dividing the network into segments or VLANs to limit the
spread of attacks.
3. Firewalls: Deploying internal firewalls to control traffic between segments.
4. Intrusion Detection/Prevention Systems (IDS/IPS): Monitoring and responding to
suspicious activities within the LAN.
5. Endpoint Security: Ensuring that all devices connected to the LAN have updated
antivirus, anti-malware software, and adhere to security policies.
6. Physical Security: Securing access to network hardware and ensuring only authorized
personnel can physically access network devices.

Wide Area Network (WAN)

Characteristics:

 Covers a large geographic area, often spanning cities, countries, or continents.


 Connects multiple LANs and often involves multiple organizations.
 Typically lower bandwidth and higher latency compared to LANs.

Specific Threats:

1. Data Interception: Eavesdropping on data as it traverses public or less secure links.


2. Routing Attacks: Manipulating routing information to redirect or intercept data.
3. DDoS Attacks: Distributed Denial of Service attacks that can overwhelm WAN links.
4. Malware: Similar to LANs but can spread more widely across the connected
networks.
5. Man-in-the-Middle (MitM) Attacks: More likely due to the use of public or semi-
public networks.

Security Measures:

1. Encryption: Using strong encryption (e.g., IPsec, SSL/TLS) to protect data in transit
across the WAN.
2. Virtual Private Networks (VPNs): Establishing secure tunnels between remote sites
and central offices.
3. Firewalls and Gateways: Deploying robust perimeter defenses at WAN entry and exit
points.
4. Traffic Filtering and Monitoring: Implementing deep packet inspection and anomaly
detection to identify and mitigate threats.
5. Redundancy and Failover: Ensuring high availability and reliability with redundant
WAN links and automatic failover mechanisms.
6. Secure Routing Protocols: Using secure versions of routing protocols (e.g., OSPF with
authentication, BGP with MD5) to prevent routing attacks.
7. Security Policies and Agreements: Establishing clear security policies and agreements
(e.g., SLAs) with WAN service providers to ensure security standards are met.

Design and Planning:

1. You are planning a LAN for a small coffee shop with several point-of-sale
systems, a printer, and free Wi-Fi for customers. Design a basic network
layout, including devices and connections. Consider factors like cable
type, placement of network devices (router, switch), and security
measures for guest Wi-Fi access.

ANS:

Components and Devices:

1. Router: Connects the coffee shop to the internet service provider (ISP) and provides
basic firewall and network address translation (NAT).
2. Switch: Connects all wired devices within the LAN.
3. Point-of-Sale (POS) Systems: Multiple POS terminals for processing transactions.
4. Printer: For printing receipts and other documents.
5. Access Points (APs): Provide Wi-Fi access to customers.
6. Cabling: Ethernet cables (Cat 6) for wired connections.
7. Firewall: For enhanced security, a dedicated hardware firewall can be used.
8. Wi-Fi Network Segmentation: To separate internal devices from guest Wi-Fi access.
Network Layout:

1. Router Placement:
o Place the router centrally in a secure, accessible location.
o Connect the router to the ISP's modem (if separate).

2. Switch Placement:
o Connect the switch to the router via an Ethernet cable (Cat 6).
o Place the switch in a central location to minimize cable lengths and ensure
efficient connectivity.

3. POS Systems:
o Connect each POS terminal to the switch using Ethernet cables (Cat 6) for
reliable, fast connectivity.
o Ensure POS terminals are physically secured and protected from unauthorized
access.

4. Printer:
o Connect the printer to the switch via Ethernet cable (Cat 6) or use Wi-Fi if the
printer supports it.
o Place the printer in a convenient location for staff use.

5. Access Points (APs):


o Deploy multiple access points to cover the entire coffee shop, ensuring strong
Wi-Fi signal throughout.
o Connect each AP to the switch using Ethernet cables (Cat 6).
o Configure the APs to provide separate SSIDs for staff and guest Wi-Fi.

Security Measures:

1. Guest Wi-Fi Access:


o Set up a separate SSID for guest Wi-Fi.
o Enable a captive portal for guest Wi-Fi access, requiring customers to agree to
terms and conditions.
o Use a different subnet for the guest network to isolate it from the internal
network.

2. Network Segmentation:
o Create VLANs on the switch to separate POS systems, printers, and staff
devices from guest Wi-Fi traffic.
o Ensure that POS systems and other critical devices are on a secure, isolated
VLAN.

3. Firewall:
o Implement a dedicated hardware firewall or enable firewall features on the
router to protect against external threats.
o Configure the firewall to allow only necessary traffic and block unauthorized
access.

4. Access Control:
o Use strong, unique passwords for all network devices and change default
credentials.
o Enable WPA3 encryption on the Wi-Fi network for enhanced security.

5. Regular Updates and Monitoring:


o Keep the firmware of all network devices up to date.
o Regularly monitor network activity for suspicious behavior and potential
security threats.

Explanation:

 Router: Acts as the gateway to the internet and provides NAT and basic firewall
functionality.
 Switch: Connects all wired devices, ensuring efficient and reliable communication.
 POS Systems and Printer: Connected via Ethernet for stability and performance.
 Access Points: Provide Wi-Fi coverage for customers and staff, configured to ensure
network segmentation.
 Security Measures: Include network segmentation, separate SSIDs for guest and
staff, a dedicated firewall, strong encryption, and regular monitoring.

This design ensures that the coffee shop’s network is secure, efficient, and provides a good
user experience for both staff and customers.

2. Imagine you are tasked with expanding the existing network infrastructure of a company
to accommodate a new department in a separate building within the same city. How might
you approach this task? Explain the steps involved and the technologies you might consider
using to connect the two buildings within a MAN.

ANS:

Expanding an existing network infrastructure to accommodate a new department in a


separate building within the same city involves creating a Metropolitan Area Network
(MAN). This task involves careful planning, selecting the right technologies, and
implementing robust security measures. Here’s a step-by-step approach:

Steps to Expand the Network Infrastructure

1. Assessment and Planning

 Network Requirements: Assess the network requirements of the new department,


including the number of users, devices, bandwidth needs, and specific applications.
 Site Survey: Conduct a site survey of the new building to understand the physical
layout, existing infrastructure, and potential challenges.
 Integration: Plan how the new department’s network will integrate with the existing
network, considering factors like IP address management, domain integration, and
security policies.

2. Selecting the Connection Method

 Leased Lines: Consider using leased lines (e.g., MPLS, T1/T3 lines) for a dedicated,
reliable connection between the buildings.
 Fiber Optic Connection: If available, use fiber optic cables for high-speed, low-
latency connectivity. This can be done via a point-to-point fiber link.
 Wireless Point-to-Point Links: If laying physical cables is impractical, consider using
high-speed wireless point-to-point links (e.g., microwave or millimeter-wave links).

3. Designing the Network

 Network Topology: Design the network topology to include the new building,
ensuring redundancy and high availability.
 IP Addressing: Update the IP addressing scheme to include the new department,
ensuring no conflicts and proper segmentation.
 VLANs: Use VLANs to segment the network logically, separating different
departments and ensuring security and efficient traffic management.

4. Implementing the Physical and Logical Network

 Cabling and Hardware: Install necessary cabling (fiber or copper) and network
hardware (switches, routers, firewalls) in the new building.
 Network Equipment: Ensure that network equipment in the new building is
compatible with the existing infrastructure. This includes switches, routers, and
access points.
 Wireless Links: If using wireless links, install and align the antennas for optimal
performance and ensure secure and encrypted communication.

5. Configuring and Testing

 Network Configuration: Configure network devices, including IP addressing, routing


protocols, VLANs, and security settings.
 Security: Implement security measures such as firewalls, intrusion
detection/prevention systems (IDS/IPS), and VPNs for secure communication
between buildings.
 Testing: Perform thorough testing to ensure connectivity, performance, and security.
This includes ping tests, bandwidth tests, and failover testing.

6. Monitoring and Maintenance

 Monitoring Tools: Deploy network monitoring tools to keep track of network


performance and detect issues early.
 Maintenance Plan: Establish a maintenance plan for regular updates, backups, and
security audits.

Technologies to Consider

1. Fiber Optic Cables:


o Pros: High bandwidth, low latency, secure.
o Cons: Expensive to install, may require right-of-way permits.

2. Leased Lines (e.g., MPLS, T1/T3):


o Pros: Reliable, dedicated bandwidth, managed by service providers.
o Cons: Expensive recurring costs, dependent on service provider.

3. Wireless Point-to-Point Links:


o Pros: Quick deployment, cost-effective, avoids physical cabling.
o Cons: Susceptible to environmental interference, line-of-sight requirements.

4. VPN (Virtual Private Network):


o Pros: Secure communication over public internet, cost-effective.
o Cons: Dependent on internet quality, may introduce latency.

5. SD-WAN (Software-Defined Wide Area Network):


o Pros: Centralized management, optimized traffic routing, flexible.
o Cons: Requires proper configuration and management.

Explanation

 Core Switch and Switch: Central devices connecting all local network devices in each
building.
 Router: Directs traffic between buildings and to/from the internet.
 Firewall: Ensures security by filtering traffic and preventing unauthorized access.
 Fiber/Wireless Link: Provides a high-speed connection between the two buildings.
 Access Points: Provide Wi-Fi connectivity for wireless devices in both buildings.

By following these steps and using the appropriate technologies, you can ensure a seamless
and secure network expansion to accommodate the new department in a separate building
within the same city.

You might also like