INC3701 ASSIGNMENT 4 2024
Topic: Network Fundamentals
Q1: What is the OSI model? Describe its layers.
A1: The OSI (Open Systems Interconnection) model is a conceptual framework used to
understand and implement standard protocols in network communication. It has seven layers:
1. Physical Layer: Deals with the physical connection between devices and the
transmission of binary data over physical mediums like cables.
2. Data Link Layer: Responsible for node-to-node data transfer and error detection and
correction.
3. Network Layer: Manages data transfer between devices on different networks; handles
logical addressing and routing (e.g., IP addresses).
4. Transport Layer: Ensures error-free data transfer between host systems, provides flow
control, and handles retransmission of lost packets (e.g., TCP/UDP).
5. Session Layer: Manages sessions or connections between applications; handles
establishment, maintenance, and termination of connections.
6. Presentation Layer: Translates data between the application layer and the network
format; handles data encryption, decryption, compression, and decompression.
7. Application Layer: Interfaces directly with the end user; provides network services to
applications (e.g., HTTP, FTP, SMTP).
Topic: TCP/IP Protocol Suite
Q2: What is the difference between TCP and UDP?
A2:
● TCP (Transmission Control Protocol): Connection-oriented protocol that ensures
reliable data transfer through error-checking and retransmission. It establishes a
connection before data is sent and ensures that data arrives in the correct order.
● UDP (User Datagram Protocol): Connectionless protocol that does not guarantee
reliable data transfer. It sends data without establishing a connection and does not
ensure data arrives in order or is error-free. It is faster and used in applications where
speed is critical (e.g., streaming, gaming).
Topic: Network Security
Q3: What are common network security threats and their countermeasures?
A3:
● Malware: Software designed to harm or exploit networks or devices. Countermeasures
include antivirus software, firewalls, and regular software updates.
● Phishing: Fraudulent attempts to obtain sensitive information by disguising as a
trustworthy entity. Countermeasures include educating users, spam filters, and anti-
phishing tools.
, ● DDoS (Distributed Denial of Service): Attacks that overwhelm a network or service
with excessive traffic. Countermeasures include traffic filtering, rate limiting, and using
DDoS protection services.
● Man-in-the-Middle (MitM) Attacks: Intercepting and altering communication between
two parties. Countermeasures include encryption (e.g., SSL/TLS), secure network
configurations, and using VPNs.
● SQL Injection: Attacks that exploit vulnerabilities in SQL-based applications.
Countermeasures include input validation, parameterized queries, and using ORM
frameworks.
Topic: Network Design and Implementation
Q4: What are the key considerations in designing a network?
A4:
● Scalability: Ensuring the network can grow and support an increasing number of
devices and applications.
● Reliability: Ensuring the network is robust and can provide consistent performance and
uptime.
● Security: Implementing measures to protect data and resources from unauthorized
access and attacks.
● Performance: Ensuring the network can handle the required data throughput and
latency needs.
● Redundancy: Adding backup paths and systems to ensure network availability in case
of failure.
● Cost: Balancing the budget with the network’s performance, reliability, and scalability
requirements.
Topic: Wireless Networks
Q5: What are the advantages and disadvantages of wireless networks?
A5:
● Advantages:
○ Mobility: Users can access the network from various locations without being
tethered by cables.
○ Ease of Installation: Reduces the need for extensive cabling and can be
deployed in challenging environments.
○ Flexibility: Easily scalable and can be expanded to accommodate more users
and devices.
● Disadvantages:
○ Security Risks: More susceptible to unauthorized access and eavesdropping.
○ Interference: Susceptible to interference from other wireless devices and
physical obstacles.
○ Speed and Reliability: Typically slower and less reliable than wired networks,
especially in congested areas.
Topic: Network Troubleshooting
, Q6: What are some common network troubleshooting tools and their uses?
A6:
● Ping: Tests connectivity between devices by sending ICMP echo requests and
measuring the response time.
● Traceroute: Traces the path packets take to reach a destination and identifies where
delays or failures occur.
● Netstat: Displays network connections, routing tables, and network interface statistics.
● Wireshark: Captures and analyzes network traffic to diagnose issues and monitor
network performance.
● NSLookup: Queries DNS servers to find domain name or IP address information.
Topic: IP Addressing and Subnetting
Q7: What is the difference between IPv4 and IPv6?
A7:
● IPv4 (Internet Protocol version 4):
○ 32-bit address length, allowing for about 4.3 billion unique addresses.
○ Written in decimal format (e.g., 192.168.0.1).
○ Supports broadcasting.
○ Limited address space leading to the use of NAT (Network Address Translation).
● IPv6 (Internet Protocol version 6):
○ 128-bit address length, allowing for a vastly larger number of unique addresses
(approximately 340 undecillion).
○ Written in hexadecimal format (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
○ Supports new features like multicast and anycast.
○ No need for NAT due to the abundant address space.
Q8: How do you calculate the subnet mask for a given network?
A8:
1. Determine the number of required subnets or hosts.
2. Calculate the number of bits needed to accommodate the required subnets or hosts.
○ For subnets: Use 2^n >= number of subnets.
○ For hosts: Use 2^n - 2 >= number of hosts (subtract 2 for network and broadcast
addresses).
3. Convert the bits to the corresponding subnet mask.
○ For example, if you need 4 subnets, you need 2 bits (2^2 = 4). The subnet mask
will be 255.255.255.192 (or /26).
Topic: Network Protocols
Q9: Explain the DHCP process.
Topic: Network Fundamentals
Q1: What is the OSI model? Describe its layers.
A1: The OSI (Open Systems Interconnection) model is a conceptual framework used to
understand and implement standard protocols in network communication. It has seven layers:
1. Physical Layer: Deals with the physical connection between devices and the
transmission of binary data over physical mediums like cables.
2. Data Link Layer: Responsible for node-to-node data transfer and error detection and
correction.
3. Network Layer: Manages data transfer between devices on different networks; handles
logical addressing and routing (e.g., IP addresses).
4. Transport Layer: Ensures error-free data transfer between host systems, provides flow
control, and handles retransmission of lost packets (e.g., TCP/UDP).
5. Session Layer: Manages sessions or connections between applications; handles
establishment, maintenance, and termination of connections.
6. Presentation Layer: Translates data between the application layer and the network
format; handles data encryption, decryption, compression, and decompression.
7. Application Layer: Interfaces directly with the end user; provides network services to
applications (e.g., HTTP, FTP, SMTP).
Topic: TCP/IP Protocol Suite
Q2: What is the difference between TCP and UDP?
A2:
● TCP (Transmission Control Protocol): Connection-oriented protocol that ensures
reliable data transfer through error-checking and retransmission. It establishes a
connection before data is sent and ensures that data arrives in the correct order.
● UDP (User Datagram Protocol): Connectionless protocol that does not guarantee
reliable data transfer. It sends data without establishing a connection and does not
ensure data arrives in order or is error-free. It is faster and used in applications where
speed is critical (e.g., streaming, gaming).
Topic: Network Security
Q3: What are common network security threats and their countermeasures?
A3:
● Malware: Software designed to harm or exploit networks or devices. Countermeasures
include antivirus software, firewalls, and regular software updates.
● Phishing: Fraudulent attempts to obtain sensitive information by disguising as a
trustworthy entity. Countermeasures include educating users, spam filters, and anti-
phishing tools.
, ● DDoS (Distributed Denial of Service): Attacks that overwhelm a network or service
with excessive traffic. Countermeasures include traffic filtering, rate limiting, and using
DDoS protection services.
● Man-in-the-Middle (MitM) Attacks: Intercepting and altering communication between
two parties. Countermeasures include encryption (e.g., SSL/TLS), secure network
configurations, and using VPNs.
● SQL Injection: Attacks that exploit vulnerabilities in SQL-based applications.
Countermeasures include input validation, parameterized queries, and using ORM
frameworks.
Topic: Network Design and Implementation
Q4: What are the key considerations in designing a network?
A4:
● Scalability: Ensuring the network can grow and support an increasing number of
devices and applications.
● Reliability: Ensuring the network is robust and can provide consistent performance and
uptime.
● Security: Implementing measures to protect data and resources from unauthorized
access and attacks.
● Performance: Ensuring the network can handle the required data throughput and
latency needs.
● Redundancy: Adding backup paths and systems to ensure network availability in case
of failure.
● Cost: Balancing the budget with the network’s performance, reliability, and scalability
requirements.
Topic: Wireless Networks
Q5: What are the advantages and disadvantages of wireless networks?
A5:
● Advantages:
○ Mobility: Users can access the network from various locations without being
tethered by cables.
○ Ease of Installation: Reduces the need for extensive cabling and can be
deployed in challenging environments.
○ Flexibility: Easily scalable and can be expanded to accommodate more users
and devices.
● Disadvantages:
○ Security Risks: More susceptible to unauthorized access and eavesdropping.
○ Interference: Susceptible to interference from other wireless devices and
physical obstacles.
○ Speed and Reliability: Typically slower and less reliable than wired networks,
especially in congested areas.
Topic: Network Troubleshooting
, Q6: What are some common network troubleshooting tools and their uses?
A6:
● Ping: Tests connectivity between devices by sending ICMP echo requests and
measuring the response time.
● Traceroute: Traces the path packets take to reach a destination and identifies where
delays or failures occur.
● Netstat: Displays network connections, routing tables, and network interface statistics.
● Wireshark: Captures and analyzes network traffic to diagnose issues and monitor
network performance.
● NSLookup: Queries DNS servers to find domain name or IP address information.
Topic: IP Addressing and Subnetting
Q7: What is the difference between IPv4 and IPv6?
A7:
● IPv4 (Internet Protocol version 4):
○ 32-bit address length, allowing for about 4.3 billion unique addresses.
○ Written in decimal format (e.g., 192.168.0.1).
○ Supports broadcasting.
○ Limited address space leading to the use of NAT (Network Address Translation).
● IPv6 (Internet Protocol version 6):
○ 128-bit address length, allowing for a vastly larger number of unique addresses
(approximately 340 undecillion).
○ Written in hexadecimal format (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
○ Supports new features like multicast and anycast.
○ No need for NAT due to the abundant address space.
Q8: How do you calculate the subnet mask for a given network?
A8:
1. Determine the number of required subnets or hosts.
2. Calculate the number of bits needed to accommodate the required subnets or hosts.
○ For subnets: Use 2^n >= number of subnets.
○ For hosts: Use 2^n - 2 >= number of hosts (subtract 2 for network and broadcast
addresses).
3. Convert the bits to the corresponding subnet mask.
○ For example, if you need 4 subnets, you need 2 bits (2^2 = 4). The subnet mask
will be 255.255.255.192 (or /26).
Topic: Network Protocols
Q9: Explain the DHCP process.