Solution - Session (NETWORK) From 2010-1-To 2018-2 - BT3 Information Technology
Solution - Session (NETWORK) From 2010-1-To 2018-2 - BT3 Information Technology
Ad-Hoc Mode: Direct connection between the units without the need for
a central access point.
Infrastructure Mode: Connection through a central access point, such as
a wireless router.
Ad-Hoc Mode:
+-----------------+
| 7. Application |
+-----------------+
| 6. Presentation |
+-----------------+
| 5. Session |
+-----------------+
| 4. Transport |
+-----------------+
| 3. Network |
+-----------------+
| 2. Data Link |
+-----------------+
| 1. Physical |
+-----------------+
b. If a packet is sent from PC3 to PC2, which unit(s) will receive this
packet? Justify your answer.
In a typical Ethernet setup, all units in the same collision domain will
receive the packet, but only PC2 will process it because the packet's
destination address matches PC2's address. Other units will discard
the packet.
c. If a packet is sent from PC1 to PC3, which unit(s) will receive this
packet? Justify your answer.
Similar to the previous answer, all units in the same collision domain
will receive the packet, but only PC3 will process it since the packet is
addressed to PC3.
d. If a packet is sent from PC2 to PC4, which unit(s) will receive this
packet? Justify your answer.
Question 5: IP Address
5. IP Address:
1. Topologies
a. Bus Topology
Advantages:
Disadvantages:
Difficult to troubleshoot.
Limited cable length and number of stations.
A failure in the main cable (bus) will cause the whole network to go
down.
b. Ring Topology
Advantages:
Disadvantages:
c. Star Topology
Advantages:
Disadvantages:
2. Types of Cables
a. Coaxial Cable
Description: Consists of a core conductor (usually copper), surrounded
by insulation, a metallic shield, and a plastic outer jacket.
Usage: Used in older Ethernet networks, television, and radio signal
transmission.
b. DHCP
Description: Dynamic Host Configuration Protocol. It automatically
assigns IP addresses and other network configuration details to devices
on a network.
c. CSMA/CD
Description: Carrier Sense Multiple Access with Collision Detection. A
network protocol used in Ethernet networks to manage data
transmission and avoid collisions.
d. Telnet
Description: A network protocol that allows for remote control of
computers over a network. It provides a bidirectional interactive text-
oriented communication facility.
e. ARP
Description: Address Resolution Protocol. It maps IP addresses to MAC
(Media Access Control) addresses, allowing devices on a local network to
discover each other.
f. Ping
Description: A network utility used to test the reachability of a host on
an IP network. It measures the round-trip time for messages sent from
the originating host to a destination computer.
g. SMTP
Description: Simple Mail Transfer Protocol. It is used for sending emails
between servers and from email clients to servers.
h. Phishing
Description: A fraudulent attempt to obtain sensitive information such
as usernames, passwords, and credit card details by disguising as a
trustworthy entity in electronic communications.
b. Class
Answer: Class C (First octet: 192, which is between 192 and 223)
d. Network Address
Answer: 192.168.211.0 (Network address is obtained by performing a
bitwise AND between the IP address and the subnet mask)
e. Broadcast Address
Answer: 192.168.211.255 (Broadcast address is obtained by setting all
host bits to 1 in the subnet)
h. Subnetwork Addresses
Answer:
o 192.168.211.0
o 192.168.211.64
o 192.168.211.128
o 192.168.211.192
6. Network Security
a. Definitions
Spyware: Malicious software designed to gather information from a
computer without the user's knowledge.
Malware: General term for any software designed to cause harm to a
computer system, including viruses, worms, trojans, and spyware.
Adware: Software that automatically displays or downloads advertising
material when a user is online.
b. Protection Methods
Spyware Protection: Use anti-spyware software, keep software up to
date, avoid clicking on unknown links or attachments.
Malware Protection: Use antivirus and anti-malware software, keep
systems and software updated, practice safe browsing and email habits.
Adware Protection: Use ad-blocking software, avoid downloading
software from untrusted sources, regularly scan the system for adware.
1. Concepts
a. Bandwidth
Bandwidth is the maximum rate at which data can be transmitted over a network or
internet connection in a given amount of time. It is usually measured in bits per
second (bps), with common multiples being megabits per second (Mbps) and
gigabits per second (Gbps). Higher bandwidth indicates a higher capacity for data
transfer, allowing more data to be sent or received simultaneously.
b. Data Transmission
Data transmission refers to the process of sending digital or analog data from one
point to another through a communication channel. This can be done using various
mediums such as copper wires, fiber optics, or wireless signals. The transmission
involves encoding data into signals that can be transmitted and decoded by the
receiving end to interpret the original information. Efficient data transmission
ensures that the data is delivered accurately and quickly, minimizing errors and
delays.
Encryption: Using protocols like WPA3 to encrypt data transmitted over the
network, making it unreadable to unauthorized users.
Authentication: Implementing robust methods to verify the identity of users
and devices trying to access the network.
Firewalls and Intrusion Detection Systems: Monitoring network traffic to
detect and block unauthorized access attempts or malicious activities.
Regular Updates and Patches: Keeping firmware and software up-to-date to
protect against vulnerabilities.
2. Network Characteristics
LAN (Local Area Network)
Scope: Covers a small geographical area such as a single building or campus.
Speed: Typically high, ranging from 100 Mbps to 10 Gbps.
Configuration: Usually managed by a single organization or individual.
Examples: Home networks, office networks.
3. Schema Representation
The image shows different types of fiber optic connectors.
They ensure that light can pass through with minimal loss or interference,
4. IP Address Calculation
a. IP Address Class
The IP address 162.15.11.0 belongs to Class B.
b. Network Address
For a Class B address, the default subnet mask is 255.255.0.0. Therefore, the
network address is 162.15.0.0.
c. Broadcast Address
The broadcast address for a Class B network with the given IP address and subnet
mask is 162.15.255.255.
b. Utility
DHCP simplifies network administration by automatically managing IP address
assignments, reducing the risk of conflicts and errors associated with manual
configuration.
c. Advantages
Ease of Management: Reduces administrative workload by automating IP
address assignment.
Flexibility: Easily accommodates changes in network topology.
Scalability: Suitable for both small and large networks.
d. Disadvantages
Single Point of Failure: If the DHCP server fails, new devices cannot join the
network.
Security Risks: Unauthorized devices may obtain IP addresses if network
security is weak.
b) Draw a network with a star topology. Name all the devices and
materials that you have used in your drawing.
Devices and materials:
[Computer 1]
|
[Computer 2] - [Switch/Hub] - [Computer 3]
|
[Computer 4]
c) Draw the OSI model while appearing all its layers.
+---------------------+
| Application |
+---------------------+
| Presentation |
+---------------------+
| Session |
+---------------------+
| Transport |
+---------------------+
| Network |
+---------------------+
| Data Link |
PREPARED BY SAMAR.I.SHOUMAN Page 16
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology
+---------------------+
| Physical |
+---------------------+
d) What is a virus? How can you hide your network in order to be
inaccessible from the outside?
Virus: A virus is a malicious software program designed to replicate itself
and spread from one computer to another, often causing harm to the data
and system.
Hiding a network: Use a firewall to block unauthorized access, employ
network address translation (NAT), disable SSID broadcasting on Wi-Fi
networks, and use strong encryption methods like WPA3.
e) What is WWW?
WWW (World Wide Web): A system of interlinked hypertext documents
accessed via the internet using web browsers.
f) What is a "Browser"?
Browser: A software application used to access and view websites on the
World Wide Web. Examples include Chrome, Firefox, and Safari.
g) What is a URL?
URL (Uniform Resource Locator): A reference (an address) to a
resource on the Internet. It specifies the location of a resource and the
protocol used to access it (e.g., http://www.example.com).
4.
a) Give the names of devices shown in "figure 1" and "figure 2" (1 pt)
The two devices shown in the images are BNC (Bayonet Neill-Concelman)
connectors. The first image is a BNC T-connector, and the second image is a
BNC plug connector with a green cover.
Let's draw a simple network that shows the use of these two devices:
Network Diagram:
Device 1 (BNC Plug Connector)
|
|
(Cable 1)
|
|
(BNC T-connector)
/ \
/ \
(Cable 2) (Cable 3)
PREPARED BY SAMAR.I.SHOUMAN Page 18
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology
/ \
/ \
Device 2 (BNC Plug) Device 3 (BNC Plug)
In this diagram:
Device 1 connects to the BNC T-connector via Cable 1 using a BNC plug
connector.
Device 2 and Device 3 connect to the BNC T-connector via Cables 2 and 3
respectively using BNC plug connectors.
The BNC T-connector is the central point where all three cables meet,
enabling the connection between Device 1, Device 2, and Device 3.
b) When will you use each one of the two devices? (1 pt)
Switch: Used within a local area network (LAN) to connect multiple
devices and facilitate communication within the network.
Router: Used to connect different networks together, such as connecting
a home network to the internet.
c) Draw a network that shows the use of these two devices. (1 pt)
[Internet]
|
[Router]
|
[Switch]
/ | \
[PC1][PC2][PC3]
5. Give the slash notation of the following subnet masks: (1 ½ pts)
a) 255.255.0.0 -> /16 b) 255.0.0.0 -> /8 c) 255.255.255.0 -> /24
9. Your institute is covered by a Wi-Fi network and you want to access the
internet, from your laptop, through this network. (2 pts)
a) What hardware and software configuration must be present on your
laptop so that you can access the internet?
Hardware: Wi-Fi adapter
Software: Operating system with network drivers, web browser, Wi-Fi
management software
b) Does the Wi-Fi network you ensure a total protection? Justify your
answer.
No, it does not ensure total protection.
Justification: Wi-Fi networks can be vulnerable to various attacks (e.g.,
man-in-the-middle, deauthentication). While using strong encryption
(WPA3) and secure configurations enhances security, it cannot guarantee
total protection against all threats.
Use Case: When you need to connect multiple devices within a network
to allow them to communicate efficiently by directing data only to the
device it is intended for. It operates at the Data Link layer (Layer 2) of the
OSI model.
b. Hub:
Use Case: When you need a simple device to connect multiple Ethernet
devices in a network, primarily used in small networks where traffic is
light and there is no need for data filtering or intelligence. It operates at
the Physical layer (Layer 1) of the OSI model.
c. Bridge:
Use Case: When you need to connect and filter traffic between two
network segments, helping to reduce traffic on a LAN by dividing it into
segments and reducing collisions. It operates at the Data Link layer
(Layer 2) of the OSI model.
d. Router:
Use Case: When you need to connect multiple networks together and
route traffic between them. It determines the best path for data to travel
from source to destination across networks. It operates at the Network
layer (Layer 3) of the OSI model.
5. IP Address Analysis
a. Class:
Answer: 255.255.0.0
c. Network Address:
Answer: 172.15.0.0
d. Broadcast Address:
Answer: 172.15.255.255
f. Usable Addresses:
h. Binary Representation:
Answer: 10101100.00001111.00000000.00000001
Answer: 48 bits
b. Uniqueness:
c. Modifiability:
Question 1
a. What is the length in bytes of an IP address?
IPv4: An IPv4 address is 4 bytes long (32 bits).
IPv6: An IPv6 address is 16 bytes long (128 bits).
7. Application Layer
Question 2
The access to Internet is accomplished through modems of different
types. Enumerate these modems and describe one of them.
1. Dial-up Modems
2. DSL Modems
3. Cable Modems
4. Fiber Optic Modems
5. Satellite Modems
Question 3
a. Given the class B network 172.16.0.0, we need 200 subnets, what is the
subnet mask to be used? Justify your answer.
Class B default subnet mask: 255.255.0.0
Required subnets: 200
To find the required subnet mask, calculate the number of bits needed for
subnetting: 2n≥2002^n \geq 2002n≥200.
n=8n = 8n=8 (since 28=2562^8 = 25628=256 is the smallest power of 2
greater than 200).
Question 4
A machine has an IP address IP 172.32.33.34 and S/M 255.255.0.0
a. Is it a private or public address?
Public address
h. Can we use, for the purpose of subnetting, the following S/M: (Justify
your answer)
i. 255.255.0.0
Yes: This is the default subnet mask for a Class B address and allows
subnetting.
ii. 255.255.64.0
Yes: This subnet mask allows for larger subnets within the Class B
address space by borrowing 2 bits for subnetting (providing 4 subnets).
iii. 255.255.255.0
Yes: This subnet mask allows for more subnets within the Class B address
space by borrowing 8 bits for subnetting (providing 256 subnets).
Question 5
Explain the security techniques used in wireless networks.
1. WEP (Wired Equivalent Privacy)
2. WPA/WPA2 (Wi-Fi Protected Access)
3. WPA3
4. MAC Address Filtering
5. SSID Hiding
6. Network Encryption (e.g., AES)
7. Firewalls
8. Intrusion Detection Systems (IDS)
Question 6
Talk about dynamic security protection in Internet networks.
Dynamic security protection: Refers to adaptive and real-time
measures taken to protect networks from evolving threats. It includes
technologies like Intrusion Detection and Prevention Systems (IDPS),
firewalls, anti-malware software, Security Information and Event
Management (SIEM), and advanced threat protection (ATP). These
PREPARED BY SAMAR.I.SHOUMAN Page 29
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology
e. What are the uses of protocols POP3 and IMAP4 and how do they
differ?
POP3 (Post Office Protocol version 3) and IMAP4 (Internet Message Access
Protocol version 4) are protocols used by email clients to retrieve messages
from a mail server.
POP3: Downloads emails from the server to the client and typically
deletes them from the server. It is suitable for users who want to store
their emails locally and access them from a single device.
IMAP4: Allows multiple devices to access the same email account by
synchronizing the email content across devices. Emails are stored on the
server, allowing users to manage their emails from various devices.
2.
a. Switch:
A switch operates at the data link layer (Layer 2) of the OSI model. When a
switch receives a data packet, it examines the packet's destination MAC
address and compares it to the MAC address table it maintains. If the
destination MAC address is found in the table, the switch forwards the packet
only to the port associated with that MAC address. If the address is not found,
the switch broadcasts the packet to all ports except the one it was received on,
and then it waits for a reply to learn the address and update its table.
b. Router:
A router operates at the network layer (Layer 3) of the OSI model. When a
router receives a packet, it examines the packet's destination IP address and
consults its routing table to determine the best path for forwarding the packet.
The router uses the IP address to determine which interface to send the packet
out on, based on the network address and subnet mask. If the destination
network is directly connected, the router forwards the packet to the
appropriate interface; otherwise, it sends the packet to the next hop router.
3.
Comparative table between OSI and TCP/IP data models:
Layer OSI Model TCP/IP Model
The purpose of this address is for use within a private network. It is not
routable on the public internet and is used for internal communication within
an organization.
With a subnet mask of 255.255.0.0, there are 16 bits available for host
addresses. The maximum number of valid users (hosts) in this subnet is
216−2=655342^{16} - 2 = 65534216−2=65534 (subtracting 2 for the network
and broadcast addresses).
The broadcast address is 10.32.255.255. This is obtained by setting all the host
bits to 1 in the subnet.
1. 145.245.45.225
o Class: B
o Default Subnet Mask: 255.255.0.0
o Network Address: 145.245.0.0
o Modified Mask for 60 Subnets:
26=642^6 = 6426=64 (sufficient for 60 subnets)
New Subnet Mask: 255.255.252.0 (3 bits for subnetting, 6 bits
for hosts)
Network Address of this Subnet: 145.245.44.0
2. 202.2.48.149
o Class: C
o Default Subnet Mask: 255.255.255.0
o Network Address: 202.2.48.0
o Modified Mask for 15 Subnets:
24=162^4 = 1624=16 (sufficient for 15 subnets)
New Subnet Mask: 255.255.255.240 (4 bits for subnetting)
Network Portion in Binary:
11001010.00000010.00110000.1001****
3. 97.124.36.142
o Class: A
o Default Subnet Mask: 255.0.0.0
o Network Address: 97.0.0.0
o Modified Mask for 200 Subnets:
28=2562^8 = 25628=256 (sufficient for 200 subnets)
New Subnet Mask: 255.255.255.0 (8 bits for subnetting)
Machine Portion in Binary:
10001001.01111110.00100100.****
5. Network Design
For the given network:
Rectangles A, B, C, D, E, F, and G:
o A, D, F, G: Switches (for local network traffic).
o C, E: Routers (for interconnecting subnets and providing Internet
access).
6. Best Solution for Required Wiring
1. Dial-up:
o Phone line
o Modem
o Computer with dial-up software
PREPARED BY SAMAR.I.SHOUMAN Page 38
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology
o DSL modem
o Phone line
o DSL filters (splitters)
o Ethernet cable
3. Cable Internet:
o Cable modem
o Coaxial cable
o Ethernet cable
o Router (optional)
4. Fiber Optic Internet:
2. Determine in the following cases the best solution for the cabling
requirements, and justify your answer:
Solution: Fiber optic cables. Justification: Fiber optic cables are immune to
electromagnetic interference, which is crucial in regions with frequent
thunderstorms. They also offer high-speed and long-distance connectivity.
Solution: Fiber optic cables. Justification: Fiber optic cables can cover long
distances without significant signal loss and provide high bandwidth, making
them ideal for a 1 km span.
Solution: Cat 5e or Cat 6 Ethernet cables. Justification: Both Cat 5e and Cat 6
Ethernet cables can support 100Mb/s speeds over distances up to 100 meters,
which is sufficient for the 60m maximum distance requirement.
Answer: Class C.
d. What is the network and broadcasting address of the 6th usable sub-
network?
Answer:
Answer:
Reason: Using a dynamic IP address simplifies network management,
conserves IP addresses, and makes it easier to allocate addresses to
devices that join and leave the network frequently.
Protocol: DHCP (Dynamic Host Configuration Protocol).
Working: DHCP assigns IP addresses dynamically from a pool of
available addresses. When a device connects to the network, it sends a
DHCP discover message. A DHCP server responds with an offer, and upon
acceptance, assigns an IP address to the device for a specified lease time.
Possible Reasons:
1. Faulty or disconnected cables
2. Incorrect IP configuration
3. Network adapter issues
4. Router or switch problems
5. Firewall settings
6. Driver issues
7. Hardware failure
Approach to Repair:
1. Check physical connections and cables.
2. Verify IP configuration settings.
3. Restart the network adapter.
4. Restart the router/switch.
PREPARED BY SAMAR.I.SHOUMAN Page 41
Solution – Session( NETWORK) From 2010-1- To 2018-2 - BT3 Information Technology
6. Name the OSI model Layers and specify in which layer works each of
the following equipment and protocols: switch, hub, router, TCP, ARP,
UDP, IP, bridge.
7. Taking into account the private and public addresses, give the number
of the available networks on the internet in class A, as well as the number
of maximal hosts in each network.
Answer:
Class A Networks: 128 available networks (1.0.0.0 to 126.0.0.0, 127.0.0.0
is reserved).
Maximal Hosts in Each Network: 16,777,214 hosts (2^24 - 2).
8. What is the TCP/IP attack principle? Name 3 types. How to prevent this
type of attack on a data network?
Types of Attacks:
1. Denial of Service (DoS)
2. Man-in-the-Middle (MitM)
3. IP Spoofing
Prevention:
1. Use firewalls and intrusion detection systems.
2. Implement encryption (e.g., TLS) for data transmission.
3. Employ anti-spoofing measures and IP address verification.
4. Regularly update and patch systems.
5. Use secure authentication methods.
Material_2: Switch (to connect multiple devices within the same network
and manage internal traffic).
Material_3: Firewall (to protect the network from external threats and
control incoming/outgoing traffic).
Answer:
LAN WAN
Flow rate or speed High Lower compared to LAN
Number of
Limited Can be very large
computers
Security Easier to secure Harder to secure
5. Enumerate some of the TCP/IP attacks. (2 pts)
Denial of Service (DoS)
Man-in-the-Middle (MITM)
IP Spoofing
Packet Sniffing
SYN Flood
Google Chrome
Mozilla Firefox
Microsoft Edge
b. Role of Parental Control: Parental control tools help monitor and restrict
the online activities of children, ensuring they are not exposed to
inappropriate content and limiting their screen time.
Justification: The first octet (165) falls between 128 and 191, which
corresponds to Class B. b. Default subnet mask: 255.255.0.0 c. Network
address: 165.1.0.0 d. Broadcast address: 165.1.255.255
These solutions should help secure a WLAN, understand DHCP, compare LAN
and WAN, identify TCP/IP attacks, and address issues with network
communication.
1. Among the following commands, which one can be used to display the IP
configuration of the system?
o b) ifconfig
o c) ipconfig
2. Among the following elements, which are the protocols of the transport
layer in the TCP/IP model? (Choose 2 answers.)
o b) UDP
o e) TCP
3. How are data encapsulated when transmitted to lower layers in the OSI
model?
o c) Data, segments, packets, frames, bits
4. Among the following equipment, which one can make a collision domain?
(Choose 2 answers.)
o b) A hub
o e) A repeater
5. What is attenuation?
o c) The degradation of a signal during its passage through a
transmission media.
6. Identify an advantage of using optical fibers in networks.
o c) Insensitive to electromagnetic interference.
7. Which layer does not contain any information about bits, any address or
any data and has only the role to move bits?
o a) Layer 1
8. What checks the command ping 127.0.0.1?
o a) The functioning of TCP/IP protocol, and this address is called the
internal loopback test.
II. The DHCP Protocol: (3 pts)
a. Definition:
Dynamic Host Configuration Protocol (DHCP) is a network management
protocol used to dynamically assign IP addresses and other network
configuration parameters to devices on a network.
b. Mode of operation:
DHCP operates based on a client-server model. The DHCP server
maintains a pool of available IP addresses and leases an IP address to a
DHCP client for a specified period. When a device joins the network, it
sends a DHCPDISCOVER message. The DHCP server responds with a
I- True or False:
.
o This is a valid MAC address format.
6. a) The transmission capacity of a communication channels.
o Bandwidth in networking refers to the transmission capacity of a
communication channel.
7. a) To test the connectivity to a device on the network.
o The Ping command is used to test connectivity between devices on a
network.
8. b) Windows Defender.
o Windows Defender helps protect computers from various threats,
including spyware.
II. Associate descriptions with physical topologies:
1. c) A ring topology.
2. b) A bus topology.
3. d) An extended star topology.
4. a) A star topology.
5. e) A mesh topology.
III. DHCP:
a. DHCP stands for Dynamic Host Configuration Protocol, which automates the
assignment of IP addresses and other network configuration parameters to
devices on a network.
b. DHCP operates in a client-server model where a DHCP server dynamically
assigns IP addresses from a predefined range to DHCP clients. Clients request
IP addresses and other configuration settings, and the server responds with
the appropriate information.
c. Advantages of DHCP include:
Simplifies IP address management.
Reduces configuration errors.
Supports mobility (devices can easily move between networks without
manual reconfiguration).
Centralized network management.
IV. Modem:
a. A modem (Modulator-Demodulator) is a device that modulates digital data
into analog signals for transmission over analog communication links, and
demodulates analog signals back into digital data.
b. ADSL (Asymmetric Digital Subscriber Line) operates on existing copper
telephone lines to provide high-speed digital data transmission. It uses
a. Bus Topology:
Advantage: Simple to implement and cost-effective.
Disadvantage: Single point of failure; performance decreases as more devices
are added.
b. Ring Topology:
Advantage: Equal access to resources; no collisions.
Disadvantage: Failure of one device can disrupt the entire network.
IX. IP Address Details (172.16.5.32/24):
1. Subnet Mask: 255.255.255.0
2. Binary: 11111111.11111111.11111111.00000000
3. Class: Class B
4. Network Address: 172.16.5.0
5. Broadcast Address: 172.16.5.255
X. Class B Network (255.255.240.0):
a. Maximum number of computers per subnet: 4094 b. Number of subnets: 16