Easy2Siksha.com
GNDU QUESTION PAPERS 2024
Bachelor of Computer Applicaon (BCA) 6th Semester
(Batch 2023-26) (CBGS)
PAPER-II: COMPUTER NETWORKS
Time Allowed: 3 Hours Maximum Marks: 75
Note: Aempt Five quesons in all, selecng at least One queson from each secon. The
Fih queson may be aempted from any secon. All quesons carry equal marks
SECTION-A
1. What is Network Topology? What are its dierent types? How Ring Topology overcomes
the pros and cons of Star Topology? Discuss in detail.
2. (a) What is TCP/IP? How it works? What are the dierent layers of TCP/IP model?
Discuss.
(b) What are transmission mediums in computer networks. Discuss in brief. 7
SECTION-B
3. (a) What is Modulaon? What are the dierent types of Modulaon techniques?
Discuss in detail.
(b) Where does demodulaon take place?
4. Explain the following:
(a) Packet switching
(b) Hybrid switching
Easy2Siksha.com
SECTION-C
5. (a) What are the IEEE 802 specicaons? What is the status of the IEEE 802.1 working
group?
(b) What is a Token Ring Network?
6. What are the main funcons of Network Layer? Explain Network Layer Design Issues in
detail.
SECTION-D
7. What is cryptography? Discuss its dierent algorithms which help in keeping
informaon secret and secure.
8. What is a network service? What are the common network services? Discuss in detail.
Easy2Siksha.com
GNDU ANSWER PAPERS 2024
Bachelor of Computer Applicaon (BCA) 6th Semester
(Batch 2023-26) (CBGS)
PAPER-II: COMPUTER NETWORKS
Time Allowed: 3 Hours Maximum Marks: 75
Note: Aempt Five quesons in all, selecng at least One queson from each secon. The
Fih queson may be aempted from any secon. All quesons carry equal marks
SECTION-A
1. What is Network Topology? What are its dierent types? How Ring Topology overcomes
the pros and cons of Star Topology? Discuss in detail.
Ans: 󷇳 What is Network Topology?
Easy2Siksha.com
Imagine you and your friends are connected in a group chat. The way messages flow
between youwho sends to whom, and how everyone is connectedcan be compared to
network topology.
󷷑󷷒󷷓󷷔 Definition:
Network topology refers to the arrangement or structure of different devices (nodes) like
computers, servers, and printers in a network, and how they are connected to each other.
There are two main ways to understand topology:
Physical topology → Actual physical layout (cables, wires, devices)
Logical topology → How data flows within the network
󹵍󹵉󹵎󹵏󹵐 Types of Network Topologies
Let’s understand the major types one by one in a very simple way.
1. 󽇐 Star Topology
Easy2Siksha.com
In this topology, all devices are connected to a central hub or switch.
󷷑󷷒󷷓󷷔 Think of it like a teacher (hub) and students (devices). Every student talks through the
teacher.
Advantages:
Easy to install and manage
Failure of one device doesn’t affect others
Easy to detect faults
Disadvantages:
If the central hub fails → entire network stops 󺆅󺉠󺉡󺉢󺉣󺉝󺉞󺉟
Requires more cables (costly)
2. 󹼤 Bus Topology
Easy2Siksha.com
All devices are connected to a single main cable (backbone).
󷷑󷷒󷷓󷷔 Like a single road where all cars (devices) travel.
Advantages:
Easy to install
Less cable required
Disadvantages:
If main cable fails → entire network fails
Difficult to troubleshoot
3. 󷄧󹹯󹹰 Ring Topology
Easy2Siksha.com
Each device is connected to two others, forming a circular loop.
󷷑󷷒󷷓󷷔 Like friends sitting in a circle passing a message one by one.
Advantages:
Data flows in an orderly way
No data collision (especially with token system)
Disadvantages:
If one node fails → network can break
Harder to add/remove devices
4. 󷊋󷊊 Tree Topology
Easy2Siksha.com
Combination of star and bus topology, arranged like a tree structure.
󷷑󷷒󷷓󷷔 Like a family tree with branches.
Advantages:
Scalable (easy to expand)
Easy to manage large networks
Easy2Siksha.com
Disadvantages:
Complex setup
Failure of backbone affects many nodes
5. 󺂧 Mesh Topology
Every device is connected to every other device.
󷷑󷷒󷷓󷷔 Like everyone having direct phone contact with everyone else.
Easy2Siksha.com
Advantages:
Very reliable
No single point of failure
Disadvantages:
Very expensive
Complex wiring
󹺔󹺒󹺓 Deep Understanding: Ring vs Star Topology
Now comes the most important part of your question 󷶹󷶻󷶼󷶽󷶺
󷷑󷷒󷷓󷷔 How Ring Topology overcomes the pros and cons of Star Topology?
Let’s compare them in a simple, relatable way.
󹼣 Problem 1: Central Dependency (Star Topology)
In star topology:
Everything depends on the central hub
If hub fails → whole network fails 󽆱
󷷑󷷒󷷓󷷔 Example: If your school’s Wi-Fi router breaks, no one gets internet.
󺮥 Solution in Ring Topology
In ring topology:
No central hub is needed
Each node is equally important
So, failure of one central device is not possible
󷷑󷷒󷷓󷷔 This removes the single point of failure problem of star topology.
󹼣 Problem 2: High Cost (Star Topology)
Easy2Siksha.com
Star topology:
Requires a lot of cables
Needs a hub/switch (extra cost)
󺮥 Solution in Ring Topology
Ring topology:
Uses fewer cables
No central device needed
More cost-effective
󹼣 Problem 3: Data Collision (Star Topology)
In star topology:
Multiple devices may send data at the same time
This can cause data collision
󺮥 Solution in Ring Topology
Ring topology uses:
󷷑󷷒󷷓󷷔 Token passing method
Only one device can send data at a time
A “token” circulates in the ring
This ensures:
No collision
Smooth data transfer
󽁔󽁕󽁖 But Ring Has Its Own Limitations
Even though ring solves some problems of star, it introduces new issues:
Feature
Star Topology
Ring Topology
Easy2Siksha.com
Central device
Required
Not required
Failure impact
Hub failure = full network down
Node failure may break ring
Cost
High
Lower
Data flow
Random
Sequential
Maintenance
Easy
Difficult
󷷑󷷒󷷓󷷔 So, ring topology does not completely replace star, but it improves some of its
weaknesses.
󷘹󷘴󷘵󷘶󷘷󷘸 Final Concept (Easy Summary)
Let’s simplify everything in one story:
Star topology is like a classroom where the teacher controls everything.
If the teacher is absent → chaos 󺆅󺆙󺆚󺆆󺆇󺆘
Ring topology is like students sitting in a circle and passing messages one by one.
No teacher needed → more independence
󷷑󷷒󷷓󷷔 So, ring topology:
Removes dependency on a central device
Reduces cost
Avoids data collision
But:
If one student leaves the circle → communication breaks 󽆱
󼩏󼩐󼩑 Conclusion
Network topology is the backbone of how devices communicate in a network. Each
topologystar, bus, ring, tree, and meshhas its own strengths and weaknesses.
Ring topology specifically improves some major drawbacks of star topology, especially:
Removing central dependency
Reducing cost
Avoiding data collision
However, it also introduces challenges like difficulty in maintenance and vulnerability to
node failure.
Easy2Siksha.com
󷷑󷷒󷷓󷷔 In real-world networks, combinations of topologies (hybrid networks) are often used
to balance all advantages and minimize disadvantages.
2. (a) What is TCP/IP? How it works? What are the dierent layers of TCP/IP model?
Discuss.
(b) What are transmission mediums in computer networks. Discuss in brief.
Ans: 󷇳 Part (a) What is TCP/IP? How it works? Layers of TCP/IP Model
1. What is TCP/IP?
Imagine you’re sending a letter to a friend in another city. You write the letter, put it in an
envelope, add the address, and drop it in the mailbox. The postal system takes care of
delivering it. Similarly, when computers talk to each other over the internet, they need a set
of rules and a system to ensure the message gets delivered correctly. That system is TCP/IP.
TCP stands for Transmission Control Protocol.
IP stands for Internet Protocol.
Together, they form the backbone of the internet. TCP/IP is like the language computers use
to communicate, ensuring that data travels safely from one machine to another.
2. How does TCP/IP work?
Let’s go back to the letter analogy:
1. Breaking into pieces (TCP’s job): If your letter is too long, the postal service might
split it into multiple envelopes. Similarly, TCP breaks large data into smaller packets.
2. Addressing (IP’s job): Each envelope needs an address. IP adds the sender and
receiver’s addresses to each packet so they know where to go.
3. Delivery and reassembly (TCP again): When the packets reach the destination, TCP
reassembles them in the correct order, just like your friend putting together multiple
pages of your letter.
So, TCP/IP ensures that even if data travels through different routes, it arrives safely and in
the right order.
3. Layers of TCP/IP Model
The TCP/IP model is like a layered cake. Each layer has its own job, and together they make
communication possible. There are four layers:
Layer 1: Application Layer
Easy2Siksha.com
Closest to the user.
Provides services like email (SMTP), web browsing (HTTP/HTTPS), file transfer (FTP).
Think of it as the apps you useWhatsApp, Gmail, Chromeall rely on this layer.
Layer 2: Transport Layer
Ensures reliable delivery of data.
Uses TCP (reliable, ordered delivery) or UDP (faster, but less reliable).
Example: Watching a YouTube video uses UDP (speed matters more than
perfection), while sending an email uses TCP (accuracy matters more).
Layer 3: Internet Layer
Handles addressing and routing.
Uses IP to decide where packets should go.
Example: Like Google Maps guiding your car to the right destination.
Layer 4: Network Access Layer (or Link Layer)
Deals with the physical connection: cables, Wi-Fi, Ethernet.
Ensures data can move across the actual hardware.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 1: TCP/IP Model
+-------------------+
| Application Layer |
+-------------------+
| Transport Layer |
+-------------------+
| Internet Layer |
+-------------------+
| Network Access |
+-------------------+
4. Why is TCP/IP Important?
Without TCP/IP:
Emails wouldn’t reach the right inbox.
Websites wouldn’t load properly.
Online games would be chaotic with missing or jumbled data.
It’s the invisible glue holding the internet together.
󹷂󹷃󹷄󹷅󹷆󹷇󹷈󹷋󹷉󹷊 Part (b) Transmission Mediums in Computer Networks
Easy2Siksha.com
Now let’s talk about transmission mediumsthe actual paths through which data travels.
Imagine you’re sending your letter again. You can send it by road, air, or sea. Similarly, in
computer networks, data can travel through different mediums.
1. Types of Transmission Mediums
There are two broad categories:
A. Guided Media (Wired)
Data travels through physical cables.
Twisted Pair Cable: Looks like telephone wires. Cheap, widely used in LANs.
Example: Ethernet cables.
Coaxial Cable: Thick cable with better shielding. Used in cable TV and older
networks.
Fiber Optic Cable: Uses light signals. Super fast, high bandwidth, long-distance
communication. Example: Internet backbone connections.
B. Unguided Media (Wireless)
Data travels through air using electromagnetic waves.
Radio Waves: Used in Wi-Fi, Bluetooth. Covers short to medium distances.
Microwaves: Used in satellite communication and mobile networks.
Infrared: Used in remote controls and short-range communication.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 2: Transmission Mediums
Guided Media (Wired) Unguided Media (Wireless)
--------------------- -------------------------
Twisted Pair Cable Radio Waves
Coaxial Cable Microwaves
Fiber Optic Cable Infrared
2. Choosing the Right Medium
For home internet: Fiber optic or twisted pair cables.
For mobile phones: Wireless (radio/microwave).
For TV broadcasting: Coaxial or satellite (microwave).
Each medium has trade-offs in speed, cost, and distance.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 3: Fiber Optic vs Copper Cable
Code
Fiber Optic: Light signals → Very fast, long distance
Copper Cable: Electrical signals → Slower, shorter distance
Easy2Siksha.com
󷈷󷈸󷈹󷈺󷈻󷈼 Putting It All Together
TCP/IP is the rulebook that ensures data moves correctly across networks.
Transmission mediums are the actual roads (wired or wireless) that carry the data.
Think of it like this:
TCP/IP is the postal system (rules, addresses, delivery process).
Transmission mediums are the vehicles (trucks, planes, ships, or even drones) that
carry the letters.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 4: How It All Works Together
User → Application Layer → Transport Layer → Internet Layer →
Network Access Layer → Transmission Medium → Destination
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 5: Real-Life Analogy
Letter Writing (Application)
Envelope & Address (Transport + Internet)
Post Office Sorting (Internet Layer)
Delivery Truck (Network Access Layer)
Road/Air/Sea (Transmission Medium)
󼩏󼩐󼩑 Final Wrap-Up
TCP/IP is the foundation of internet communication, ensuring data is broken into
packets, addressed, sent, and reassembled correctly.
It has four layers: Application, Transport, Internet, and Network Access.
Transmission mediums are the physical or wireless paths data takeslike cables,
fiber optics, or radio waves.
Together, they make the internet possible, from sending a WhatsApp message to
streaming Netflix.
SECTION-B
3. (a) What is Modulaon? What are the dierent types of Modulaon techniques?
Discuss in detail.
(b) Where does demodulaon take place?
Ans: 󷇮󷇭 Imagine This First…
Think of communication like sending a message to your friend who lives very far away. You
can’t just shout — your voice won’t reach. So, you need a vehicle (like a phone signal, radio
wave, or internet signal) to carry your message.
Easy2Siksha.com
󷷑󷷒󷷓󷷔 Modulation is the process of putting your message onto that vehicle.
󷷑󷷒󷷓󷷔 Demodulation is the process of taking your message back from that vehicle at the
receiver’s end.
󹼥 (a) What is Modulation?
󷄧󼿒 Simple Definition:
Modulation is the process of converting a low-frequency signal (message signal) into a
high-frequency signal so that it can travel long distances efficiently.
󼩏󼩐󼩑 Why Do We Need Modulation?
Your voice or data signals are usually low frequency, and they have problems:
󽆱 Cannot travel long distances
󽆱 Easily affected by noise
󽆱 Cannot be transmitted efficiently through antennas
So, we use a high-frequency carrier wave to carry the message.
󹷗󹷘󹷙󹷚󹷛󹷜 Analogy:
Your message (voice/data) = Parcel
Carrier wave = Delivery truck
Modulation = Putting the parcel inside the truck
󹵍󹵉󹵎󹵏󹵐 Basic Concept Diagram
Easy2Siksha.com
󷷑󷷒󷷓󷷔 The message signal combines with the carrier wave → forms a modulated signal.
󹼥 Types of Modulation Techniques
There are mainly two categories:
󹼧 1. Analog Modulation
In analog modulation, the message signal is continuous.
󹵙󹵚󹵛󹵜 Types of Analog Modulation:
󹼦 (i) Amplitude Modulation (AM)
󷷑󷷒󷷓󷷔 In AM, the amplitude (height) of the carrier wave changes according to the message
signal.
󼩏󼩐󼩑 Simple Idea:
Message is strong → Wave height increases
Message is weak → Wave height decreases
󹵍󹵉󹵎󹵏󹵐 Diagram:
Easy2Siksha.com
󷄧󼿒 Features:
Simple and cheap
Used in radio broadcasting
󽆱 Disadvantages:
Easily affected by noise
Poor sound quality
󹼦 (ii) Frequency Modulation (FM)
󷷑󷷒󷷓󷷔 In FM, the frequency (speed of wave) changes while amplitude remains constant.
Easy2Siksha.com
󼩏󼩐󼩑 Simple Idea:
Message changes → wave becomes closer or farther
󹵍󹵉󹵎󹵏󹵐 Diagram:
Easy2Siksha.com
󷄧󼿒 Features:
Better sound quality
Less noise
󽆱 Disadvantages:
More complex
Requires more bandwidth
󹼦 (iii) Phase Modulation (PM)
󷷑󷷒󷷓󷷔 In PM, the phase (position) of the carrier wave changes.
󼩏󼩐󼩑 Simple Idea:
The wave shifts left or right depending on the message
󹵍󹵉󹵎󹵏󹵐 Diagram:
Easy2Siksha.com
󷄧󼿒 Features:
Used in advanced communication systems
󽆱 Disadvantages:
Complex to implement
󹼧 2. Digital Modulation
Here, the message signal is in digital form (0s and 1s).
󹵙󹵚󹵛󹵜 Types of Digital Modulation:
Easy2Siksha.com
󹼦 (i) ASK (Amplitude Shift Keying)
󷷑󷷒󷷓󷷔 Amplitude changes between two levels (0 and 1)
󹼦 (ii) FSK (Frequency Shift Keying)
󷷑󷷒󷷓󷷔 Frequency changes between two values
󹼦 (iii) PSK (Phase Shift Keying)
󷷑󷷒󷷓󷷔 Phase changes to represent digital data
󹼦 (iv) QAM (Quadrature Amplitude Modulation)
󷷑󷷒󷷓󷷔 Combination of amplitude + phase modulation
󹵍󹵉󹵎󹵏󹵐 Diagram (Digital Modulation Overview):
Easy2Siksha.com
󷄧󼿒 Advantages of Digital Modulation:
Better noise resistance
Efficient data transmission
Used in modern systems (WiFi, mobile networks)
󼩺󼩻 Summary of Modulation Types
Type
What Changes
Example
AM
Amplitude
Radio
FM
Frequency
FM radio
PM
Phase
Satellite
ASK
Amplitude (digital)
Basic data transmission
FSK
Frequency (digital)
Modems
PSK
Phase (digital)
WiFi
QAM
Amplitude + Phase
4G/5G
󹼥 (b) Where Does Demodulation Take Place?
󷄧󼿒 Simple Definition:
Demodulation is the process of extracting the original message signal from the modulated
signal.
󹵝󹵟󹵞 Where Does It Happen?
󷷑󷷒󷷓󷷔 Demodulation takes place at the receiver end.
󼩏󼩐󼩑 Full Communication Flow:
1. Sender creates message
2. Message is modulated (converted to high frequency)
3. Signal travels through medium (air, cable)
4. Receiver gets signal
5. Demodulation happens → original message recovered
Easy2Siksha.com
󹷗󹷘󹷙󹷚󹷛󹷜 Analogy Again:
Modulation = Packing the parcel
Transmission = Sending via truck
Demodulation = Unpacking the parcel
󹵍󹵉󹵎󹵏󹵐 Simple Communication System Diagram
󹵝󹵟󹵞 Real-Life Examples:
󹹋󹹌󹹒󹹍󹹎󹹏󹹐󹹑 Radio → Receiver demodulates AM/FM signals
󹸔󹸗󹸘󹸕󹸖󹸙 Mobile phone → Demodulates digital signals
󹹂󹹃󹹄󹹈󹹅󹹉󹹊󹹆󹹇 Television → Extracts audio/video signals
󷘹󷘴󷘵󷘶󷘷󷘸 Final Understanding
Let’s simplify everything in one go:
Modulation helps your message travel far without loss
Easy2Siksha.com
It uses a carrier wave to carry your data
There are analog and digital types of modulation
Demodulation happens at the receiver to recover your original message
4. Explain the following:
(a) Packet switching
(b) Hybrid switching
Ans: 󷇳 (a) Packet Switching
1. What is Packet Switching?
Imagine you want to send a long letter to a friend. Instead of putting the entire letter into
one giant envelope, you cut it into smaller pieces, put each piece in its own envelope, and
send them separately. Each envelope has the destination address written on it. When your
friend receives them, they put the pieces back together to read the full letter.
That’s exactly how packet switching works in computer networks.
Data is broken into small packets.
Each packet travels independently across the network.
At the destination, packets are reassembled into the original message.
2. Why Packet Switching?
Before packet switching, networks often used circuit switching (like traditional telephone
lines). Circuit switching required a dedicated path between sender and receiver for the
entire communication. That was fine for voice calls, but inefficient for data.
Packet switching solved this problem by:
Allowing multiple users to share the same network.
Making communication faster and more reliable.
Handling errors better (lost packets can be resent).
3. How Does Packet Switching Work?
Step by step:
1. Breakdown: The message is divided into packets.
2. Addressing: Each packet gets a header with source and destination addresses.
3. Routing: Packets travel independently, possibly through different routes.
Easy2Siksha.com
4. Reassembly: At the destination, packets are put back together in the correct order.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 1: Packet Switching Concept
Message → [Packet 1] [Packet 2] [Packet 3] → Network →
Destination → Reassembled Message
4. Everyday Example
Think of WhatsApp messages. When you send “Hello, how are you?”, the app doesn’t send
it as one big chunk. Instead, it breaks it into packets. These packets may travel different
paths across the internet but eventually reach your friend’s phone, where they’re
reassembled into the full message.
5. Advantages of Packet Switching
Efficient use of network resources.
No need for a dedicated line.
Faster and more reliable.
Supports error detection and correction.
󷄧󹹥󹹦󹹧 (b) Hybrid Switching
1. What is Hybrid Switching?
Now imagine you’re sending a letter again. Sometimes you want the reliability of circuit
switching (a fixed path, guaranteed delivery), and sometimes you want the flexibility of
packet switching (efficient, shared network). What if you could combine both?
That’s Hybrid Switching.
Hybrid switching is a technique that blends the advantages of circuit switching and packet
switching. It tries to get the best of both worlds.
2. Why Hybrid Switching?
Circuit switching is reliable but inefficient.
Packet switching is efficient but sometimes unpredictable (packets may arrive out of
order or face delays).
Hybrid switching balances reliability and efficiency.
3. How Does Hybrid Switching Work?
There are different approaches, but the general idea is:
Establish a temporary path (like circuit switching) for certain types of
communication.
Use packet switching for others.
Easy2Siksha.com
Sometimes, packets are grouped into “virtual circuits,” combining packet flexibility
with circuit reliability.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 2: Hybrid Switching Concept
Sender → Hybrid Network → Receiver
| Circuit-like path for steady flow
| Packet-like path for flexible flow
4. Everyday Example
Think of a video call. You want smooth, continuous communication (like circuit switching),
but you also want efficient use of the network (like packet switching). Hybrid switching
ensures your video and audio packets flow in a steady stream, while still sharing the
network with other users.
5. Advantages of Hybrid Switching
Combines efficiency and reliability.
Reduces delays and jitter in communication.
Suitable for multimedia applications (video calls, streaming).
Flexible enough to handle different types of traffic.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 3: Comparing Switching Methods
Circuit Switching: Dedicated path → Reliable but wasteful
Packet Switching: Shared path → Efficient but variable
Hybrid Switching: Mix → Reliable + Efficient
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 4: Real-Life Analogy
Imagine a highway:
Circuit Switching: You reserve one lane just for your car. Reliable, but wasteful.
Packet Switching: All cars share all lanes. Efficient, but sometimes congested.
Hybrid Switching: You get a reserved lane during rush hour, but share lanes when
traffic is light. Balanced approach.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 5: Flow of Hybrid Switching
Message → Packets → Virtual Circuit → Destination
󷈷󷈸󷈹󷈺󷈻󷈼 Putting It All Together
Packet Switching: Breaks data into packets, sends them independently, reassembles
at the destination. Efficient, flexible, widely used in the internet.
Hybrid Switching: Combines packet and circuit switching. Provides both efficiency
and reliability, especially useful for multimedia communication.
Easy2Siksha.com
󼩏󼩐󼩑 Final Wrap-Up
Think of switching methods as different ways of sending letters:
Circuit Switching: One dedicated courier for your letter. Reliable, but costly.
Packet Switching: Many couriers carry pieces of your letter. Efficient, but sometimes
unpredictable.
Hybrid Switching: A smart system that uses both approaches depending on the
situation.
This is why modern networks often rely on packet switching for general communication but
use hybrid approaches for applications like video conferencing, where both speed and
reliability matter.
SECTION-C
5. (a) What are the IEEE 802 specicaons? What is the status of the IEEE 802.1 working
group?
(b) What is a Token Ring Network?
Ans: 󷇳 1. What are IEEE 802 Specifications?
Imagine a world where every device (computer, mobile, printer, Wi-Fi router) tries to
communicatebut each speaks a different language. Chaos, right?
To avoid this confusion, we need rulesjust like traffic rules on roads.
󷷑󷷒󷷓󷷔 These rules for computer networks are called IEEE 802 specifications.
󹶆󹶚󹶈󹶉 What does IEEE 802 mean?
IEEE → Institute of Electrical and Electronics Engineers
802 → A project started in February 1980 (80 = year, 2 = month)
󷷑󷷒󷷓󷷔 So, IEEE 802 is a set of standards that define how devices communicate over networks
like:
LAN (Local Area Network)
MAN (Metropolitan Area Network)
󼩏󼩐󼩑 Easy Understanding
Easy2Siksha.com
Think of IEEE 802 as:
󷷑󷷒󷷓󷷔 A rulebook for networking devices
It tells:
How data should be sent
How devices identify each other
How errors are handled
How multiple devices share the same network
󼩺󼩻 Where Does IEEE 802 Fit?
In networking, we use the OSI Model (7 layers).
IEEE 802 mainly works in:
Physical Layer
Data Link Layer
And it divides the Data Link Layer into:
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
󹵍󹵉󹵎󹵏󹵐 Simple Layer Diagram
Easy2Siksha.com
󷷑󷷒󷷓󷷔 So IEEE 802 mainly controls how data moves physically and how devices access the
network.
󷄧󹻘󹻙󹻚󹻛 Major IEEE 802 Standards (Very Important)
Here are some important parts of IEEE 802:
Standard
Use
802.1
Controls bridges, VLANs
802.2
Logical communication
802.3
Wired networks
802.4
Old technology
802.5
Ring-based networks
802.11
Wireless networks
󼩏󼩐󼩑 Simple Analogy
802.3 (Ethernet) = Like a busy road (many cars compete)
802.5 (Token Ring) = Like a disciplined queue (one by one)
802.11 (Wi-Fi) = Wireless signals (no cables)
󷇓󷇔󷇕󷇖󷇗󷇘 2. Status of IEEE 802.1 Working Group
Now let’s understand IEEE 802.1.
󷷑󷷒󷷓󷷔 Think of IEEE 802.1 as the “manager” of the network system.
It doesn’t send data itself—it controls and organizes how networks behave.
Easy2Siksha.com
󹺔󹺒󹺓 What Does IEEE 802.1 Do?
It focuses on:
Network management
Bridging (connecting networks)
VLANs (Virtual LANs)
Security
󹵙󹵚󹵛󹵜 Current Status (Very Important for Exams)
󷷑󷷒󷷓󷷔 The IEEE 802.1 working group is:
󽆤 Active and continuously evolving
󽆤 Developing modern technologies
󽆤 Supporting advanced networking (cloud, IoT, etc.)
󹻯 Key Technologies by IEEE 802.1
1. Bridging
o Connects multiple LANs
o Works like a traffic controller
2. VLAN (Virtual LAN)
o Divides one network into multiple logical networks
o Improves security and performance
3. Spanning Tree Protocol (STP)
o Prevents loops in networks
4. Quality of Service (QoS)
o Prioritizes important data (like video calls)
󼩏󼩐󼩑 Simple Analogy
Imagine a school:
Classrooms = Networks
Students = Devices
Principal = IEEE 802.1
󷷑󷷒󷷓󷷔 The principal:
Organizes classes (VLANs)
Easy2Siksha.com
Controls discipline (security)
Prevents chaos (STP)
󹵍󹵉󹵎󹵏󹵐 VLAN Diagram (Simple)
󹵙󹵚󹵛󹵜 Final Line for Exam
󷷑󷷒󷷓󷷔 IEEE 802.1 is active and essential, playing a major role in:
Modern networking
Cloud systems
Enterprise networks
5 (b) What is a Token Ring Network?
Now let’s move to part (b).
Easy2Siksha.com
󷄧󹹯󹹰 What is a Token Ring Network?
Imagine students sitting in a circle, and only the student holding a special token
(permission) can speak.
󷷑󷷒󷷓󷷔 That’s exactly how a Token Ring Network works.
󼩏󼩐󼩑 Definition (Simple)
A Token Ring Network is a network where:
Devices are connected in a ring (circular form)
Data is passed in one direction
A token (special signal) controls who can send data
󹺢 Key Idea: The Token
󷷑󷷒󷷓󷷔 Only the device holding the token can transmit data.
No token → No data transmission
Token moves continuously
󷄧󹹯󹹰 Working Process (Step-by-Step)
1. All devices form a ring
2. A token circulates continuously
3. When a device wants to send data:
o It waits for the token
4. When it gets the token:
o It sends data
o Then releases the token
5. Token moves to next device
󺡒󺡓󺡔󺡕󺡖󺡗󺡘󺡙󺡚󺡛 Why Token Ring is Special?
Unlike Ethernet (where devices compete):
󷷑󷷒󷷓󷷔 Token Ring uses order and discipline
Easy2Siksha.com
No collisions
Smooth communication
󼩏󼩐󼩑 Simple Analogy
Ethernet = People shouting in a crowd
Token Ring = One mic passed around in a meeting
󽁌󽁍󽁎 Features of Token Ring
󽆤 Ring topology
󽆤 Token-based access
󽆤 No data collision
󽆤 Predictable performance
󹵋󹵉󹵌 Disadvantages
󽆱 If one device fails network may stop
󽆱 Expensive compared to Ethernet
󽆱 Slower than modern networks
󹵍󹵉󹵎󹵏󹵐 Token Passing Flow
󹵙󹵚󹵛󹵜 Real-Life Status
󷷑󷷒󷷓󷷔 Token Ring is now:
Mostly obsolete (not used today)
Replaced by Ethernet and Wi-Fi
But still important for exams and concepts.
󼫹󼫺 Final Summary (Very Important)
󷄧󼿒 IEEE 802 Specifications
Easy2Siksha.com
Set of networking standards
Define how devices communicate
Work at Physical + Data Link layer
Include Ethernet, Wi-Fi, Token Ring
󷄧󼿒 IEEE 802.1 Working Group
Active and important
Handles:
o VLAN
o Bridging
o Network control
Used in modern networking
6. What are the main funcons of Network Layer? Explain Network Layer Design Issues in
detail.
Ans: 󷇳 The Network Layer: An Overview
Imagine you’re sending a parcel across the country. You don’t worry about the exact roads,
traffic lights, or bridges—it’s the courier company’s job to figure out the best route.
Similarly, in computer networks, the Network Layer is like the courier company. Its job is to
make sure data gets from one computer to another, even if they’re far apart and connected
through many intermediate devices.
The Network Layer sits between the Transport Layer (which cares about reliable delivery of
data) and the Data Link Layer (which handles communication between directly connected
devices). It’s the middleman that ensures data can travel across multiple networks.
󺛺󺛻󺛿󺜀󺛼󺛽󺛾 Main Functions of the Network Layer
Let’s break down the key responsibilities:
1. Routing
Decides the path data should take from source to destination.
Example: Like Google Maps choosing the best route for your car.
2. Logical Addressing
Provides unique addresses (IP addresses) to devices.
Easy2Siksha.com
Example: Just like houses have postal addresses, computers have IP addresses.
3. Packet Forwarding
Moves packets from one router to the next until they reach the destination.
Example: A courier truck passing your parcel from one distribution center to another.
4. Fragmentation and Reassembly
Breaks large packets into smaller ones if the network can’t handle big sizes.
Reassembles them at the destination.
Example: Splitting a big box into smaller packages so they fit through narrow doors.
5. Error Handling and Congestion Control
Detects problems like lost packets or overloaded routes.
Tries to reroute or manage traffic.
Example: If a road is blocked, the courier finds an alternate path.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 1: Functions of the Network Layer
Code
Source → Routing → Forwarding → Fragmentation → Destination
󽁌󽁍󽁎 Network Layer Design Issues
Designing the Network Layer isn’t simple. Engineers face several challenges, and each
decision affects how efficiently and reliably data travels. Let’s explore these issues one by
one.
1. Routing Algorithms
Problem: How do we decide the best path for data?
Options:
o Static Routing: Fixed paths, simple but inflexible.
o Dynamic Routing: Paths change based on network conditions (like traffic
updates in Google Maps).
Challenge: Balancing speed, reliability, and efficiency.
2. Congestion Control
Problem: What if too much data floods the network?
Solution: The network layer must detect congestion and slow down traffic or reroute
packets.
Analogy: Like traffic police managing cars during rush hour.
3. Quality of Service (QoS)
Easy2Siksha.com
Problem: Not all data is equal. A video call needs smooth delivery, while an email
can wait.
Solution: Prioritize certain packets over others.
Analogy: Ambulances get priority on roads compared to regular cars.
4. Addressing
Problem: Every device needs a unique identifier.
Solution: Use IP addresses.
Challenge: With billions of devices, managing addresses (IPv4 vs IPv6) is complex.
5. Internetworking
Problem: Different networks may use different technologies.
Solution: The network layer must connect them seamlessly.
Analogy: Like connecting highways, local roads, and bridges into one transport
system.
6. Packet Size and Fragmentation
Problem: Different networks allow different packet sizes.
Solution: Break large packets into smaller ones (fragmentation).
Challenge: Reassembling them correctly at the destination.
7. Security
Problem: Packets can be intercepted or tampered with.
Solution: Use encryption and secure routing.
Analogy: Sealing parcels so no one can peek inside.
8. Error Handling
Problem: Packets may get lost or corrupted.
Solution: Detect errors and request retransmission.
Analogy: If a parcel is damaged, the courier sends a replacement.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 2: Design Issues in Network Layer
Routing | Congestion | QoS | Addressing | Internetworking |
Fragmentation | Security | Error Handling
󹶓󹶔󹶕󹶖󹶗󹶘 A Relatable Story
Imagine you’re organizing a road trip with friends:
You decide the route (routing).
Each car has a number plate (addressing).
You split luggage into smaller bags to fit in the trunk (fragmentation).
Easy2Siksha.com
If one road is jammed, you take a detour (congestion control).
You give priority to urgent supplies like food and water (QoS).
You make sure all cars can connect even if they’re different models
(internetworking).
You lock your bags to prevent theft (security).
If a bag gets lost, you replace it (error handling).
That’s exactly how the Network Layer works for data packets!
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 3: Road Trip Analogy
Cars = Packets
Route = Routing
Number Plate = Addressing
Traffic Jam = Congestion
Priority Supplies = QoS
Different Cars = Internetworking
Locked Bags = Security
Lost Bag = Error Handling
󷈷󷈸󷈹󷈺󷈻󷈼 Why These Issues Matter
If the Network Layer isn’t designed well:
Data may take too long to arrive.
Packets may get lost or arrive in the wrong order.
Video calls may lag or drop.
Sensitive information may be exposed.
That’s why engineers spend so much time refining routing algorithms, congestion control
techniques, and addressing schemes.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 4: Flow of Data Through Network Layer
Application → Transport → Network → Data Link → Physical
󼩏󼩐󼩑 Final Wrap-Up
The Network Layer is the backbone of communication across multiple networks.
Its main functions include routing, addressing, forwarding, fragmentation,
congestion control, and error handling.
Design issues revolve around making these functions efficient, secure, and scalable.
Real-life analogies (like courier services or road trips) help us see how these abstract
ideas play out in everyday life.
Easy2Siksha.com
SECTION-D
7. What is cryptography? Discuss its dierent algorithms which help in keeping
informaon secret and secure.
Ans: What is Cryptography?
Imagine you want to send a secret message to your friend. But the message is traveling
through the internet, where many unknown people could try to read it. How can you make
sure only your friend understands it?
This is exactly where cryptography comes in.
1. Meaning of Cryptography
Cryptography is the science (and art) of protecting information by converting it into a secret
form so that only authorized people can read it.
The original message is called Plaintext
The secret message is called Ciphertext
The process of converting plaintext → ciphertext is called Encryption
The reverse process is called Decryption
󷷑󷷒󷷓󷷔 In simple words:
Cryptography = Hiding information in such a way that only the right person can read it.
Diagram 1: Basic Cryptography Process
Easy2Siksha.com
Explanation:
Sender writes a message (plaintext)
Encryption algorithm converts it into ciphertext
Message travels securely
Receiver uses a key to decrypt it back to original message
2. Why Cryptography is Important
In today’s digital world, cryptography is used everywhere:
Online banking (protects your money)
Easy2Siksha.com
WhatsApp messages (end-to-end encryption)
ATM PIN security
Password protection
E-commerce websites (like Amazon)
Without cryptography, anyone could read or steal your data easily.
3. Goals of Cryptography
Cryptography ensures four important things:
1. Confidentiality Only authorized users can read the data
2. Integrity Data cannot be altered without detection
3. Authentication Verifies identity (who sent the message)
4. Non-repudiation Sender cannot deny sending the message
4. Types of Cryptography Algorithms
There are mainly three types of cryptographic algorithms:
1. Symmetric Key Algorithms
2. Asymmetric Key Algorithms
3. Hash Functions
Let’s understand each one step by step.
A. Symmetric Key Cryptography
Concept
In symmetric encryption, the same key is used for both encryption and decryption.
󷷑󷷒󷷓󷷔 Think of it like a lock and key system:
You lock the message with a key
The receiver uses the same key to unlock it
Diagram 2: Symmetric Encryption
Easy2Siksha.com
Working
1. Sender encrypts message using a secret key
2. Message travels as ciphertext
3. Receiver decrypts using the same key
Examples of Symmetric Algorithms
1. DES (Data Encryption Standard)
One of the oldest encryption methods
Uses a 56-bit key
Easy2Siksha.com
Now considered less secure due to small key size
2. AES (Advanced Encryption Standard)
Most widely used today
Used in:
o Banking systems
o Government security
o Wi-Fi encryption
Key sizes: 128-bit, 192-bit, 256-bit
Very strong and secure
3. Blowfish
Fast and flexible encryption
Used in software applications
Good for protecting files
Advantages
Fast and efficient
Suitable for large data
Disadvantages
Key sharing problem (how to safely send the key?)
If key is leaked, security is broken
B. Asymmetric Key Cryptography
Concept
In asymmetric encryption, two different keys are used:
Public Key (shared with everyone)
Private Key (kept secret)
󷷑󷷒󷷓󷷔 Think of it like a mailbox system:
Anyone can put a letter using the public key
Easy2Siksha.com
Only the owner can open it using the private key
Diagram 3: Asymmetric Encryption
Working
1. Sender uses receiver’s public key to encrypt message
2. Message travels securely
3. Receiver decrypts using their private key
Examples of Asymmetric Algorithms
Easy2Siksha.com
1. RSA (Rivest-Shamir-Adleman)
Most popular public key algorithm
Used in:
o Secure websites (HTTPS)
o Digital signatures
Based on mathematical complexity of prime numbers
2. Diffie-Hellman
Used for secure key exchange
Helps two parties create a shared secret over insecure channel
3. ECC (Elliptic Curve Cryptography)
Modern and efficient
Provides same security with smaller key sizes
Used in mobile devices and blockchain
Advantages
No need to share secret key beforehand
More secure for communication
Disadvantages
Slower than symmetric encryption
Complex calculations
C. Hash Functions
Concept
Hashing is different from encryption.
󷷑󷷒󷷓󷷔 It converts data into a fixed-length code (hash)
󷷑󷷒󷷓󷷔 It is one-way (cannot be reversed)
Easy2Siksha.com
Diagram 4: Hash Function
Working
Input: Any data (password, file, message)
Output: Fixed-length hash value
Example:
Password → Hash → X7A9#F2...
Even a small change in input gives a completely different hash.
Easy2Siksha.com
Examples of Hash Algorithms
1. MD5
Old and fast
Not secure today
2. SHA (Secure Hash Algorithm)
SHA-1 (outdated)
SHA-256 (very secure and widely used)
Used in:
Blockchain (Bitcoin)
Password storage
Advantages
Fast
Ensures data integrity
No key required
Disadvantages
Cannot retrieve original data
Some older hashes are vulnerable
5. Comparison of All Algorithms
Feature
Symmetric
Asymmetric
Hashing
Keys Used
One key
Two keys
No key
Speed
Fast
Slow
Very fast
Security
Medium
High
High
Reversible
Yes
Yes
No
Example
AES
RSA
SHA-256
6. Real-Life Example (Easy Understanding)
Let’s say you send a WhatsApp message:
Easy2Siksha.com
Message is encrypted using AES (symmetric)
Keys are exchanged using RSA (asymmetric)
Message integrity is checked using Hashing
󷷑󷷒󷷓󷷔 This combination ensures:
No one can read your message
Message is not changed
Sender is verified
7. Modern Use of Cryptography
Cryptography is used in:
󹺟󹺠󹺡󹺞 HTTPS websites (SSL/TLS)
󹳕󹳖󹳗󹳙󹳘 Online payments
󹸔󹸗󹸘󹸕󹸖󹸙 Messaging apps (WhatsApp, Telegram)
󼲨󼲩󼲪󼲫󼲬󼲭 Digital signatures
󽂖󽂗󽂘󽂙󽂚󽂛󽂞󽂜󽂝 Blockchain & cryptocurrencies
󼾳󼾴 Cloud security
Diagram 5: Real-World Cryptography Usage
Easy2Siksha.com
8. Conclusion
Cryptography is one of the most important technologies in today’s digital world. It ensures
that our data remains safe, private, and trustworthy.
To summarize:
Symmetric algorithms are fast and use one key
Asymmetric algorithms are secure and use two keys
Hash functions ensure data integrity and cannot be reversed
Together, these techniques form the backbone of modern security systems.
Final Simple Line to Remember
󷷑󷷒󷷓󷷔 Cryptography = Protecting information using codes so only the right person can
understand it.
8. What is a network service? What are the common network services? Discuss in detail.
Ans: 󷇳 What is a Network Service?
Imagine you walk into a big hotel. The hotel offers many services: room service, laundry, Wi-
Fi, concierge, etc. You don’t see the behind-the-scenes staff, but they make your stay
comfortable.
In the same way, a network service is something provided by a computer network to make
communication and resource sharing easier. It’s not the hardware (like cables or routers),
but the functions and features that the network offers to users and applications.
󷷑󷷒󷷓󷷔 In simple terms: A network service is any functionality provided by a network that helps
computers, applications, or users communicate, share, and work together.
󺛺󺛻󺛿󺜀󺛼󺛽󺛾 Why Do We Need Network Services?
Without network services:
You couldn’t send emails.
Websites wouldn’t load.
Files couldn’t be shared between computers.
Online games wouldn’t connect players.
Easy2Siksha.com
Network services are the “hotel staff” of the internet—they make sure everything runs
smoothly behind the scenes.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 1: Network Services Analogy
Hotel → Services (Wi-Fi, Room Service, Laundry)
Network → Services (Email, Web, File Sharing, DNS)
󹵑󹵒󹵓󹵔󹵕󹵘󹵖󹵗 Common Network Services
Now let’s dive into the most common network services you use every day. We’ll explain
them with relatable examples.
1. Domain Name System (DNS)
What it does: Translates human-friendly names (like www.google.com) into IP
addresses (like 142.250.190.14).
Analogy: Like a phonebook that maps names to phone numbers.
Why it matters: Without DNS, you’d have to remember long strings of numbers
instead of simple website names.
2. Email Services (SMTP, IMAP, POP3)
What it does: Allows sending and receiving emails.
Protocols:
o SMTP: For sending emails.
o IMAP/POP3: For receiving emails.
Analogy: Like a postal service delivering letters electronically.
3. File Transfer Protocol (FTP)
What it does: Transfers files between computers.
Analogy: Like a courier service moving boxes from one office to another.
Use case: Uploading files to a website or downloading software.
4. Web Services (HTTP/HTTPS)
What it does: Enables browsing websites.
Analogy: Like a waiter bringing you the menu and food in a restaurant.
HTTPS: Adds security (like sealing the food tray so no one tampers with it).
5. Remote Access Services (Telnet, SSH)
What it does: Lets you control another computer remotely.
Analogy: Like having a remote control for your TV, but for another computer.
SSH: Secure version, encrypts communication.
6. File Sharing Services
Easy2Siksha.com
What it does: Allows multiple users to access and share files.
Analogy: Like a shared library where everyone can borrow books.
Examples: Google Drive, Dropbox.
7. Directory Services
What it does: Manages user accounts, permissions, and resources.
Analogy: Like a school register that keeps track of students and their classes.
Example: Active Directory in Windows networks.
8. Dynamic Host Configuration Protocol (DHCP)
What it does: Automatically assigns IP addresses to devices.
Analogy: Like a hotel receptionist giving room numbers to guests.
Why it matters: Saves you from manually configuring IP addresses.
9. Network Time Protocol (NTP)
What it does: Synchronizes clocks across devices.
Analogy: Like a school bell ensuring all classes start at the same time.
Use case: Critical for banking, security, and logging events.
10. Virtual Private Network (VPN)
What it does: Creates a secure tunnel for communication.
Analogy: Like traveling in a private car instead of a public bus.
Use case: Protects privacy and allows secure remote access.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 2: Common Network Services
DNS → Phonebook
Email → Postal Service
FTP → Courier
HTTP → Restaurant Waiter
SSH → Remote Control
DHCP → Receptionist
NTP → School Bell
VPN → Private Car
󽁌󽁍󽁎 How Network Services Work Together
Think of a typical day online:
1. You open your browser and type “www.youtube.com.” → DNS translates the name
into an IP address.
2. You watch a video. → HTTP/HTTPS delivers the content.
3. You send an email to a friend. → SMTP sends it, IMAP/POP3 lets them read it.
4. You download a file. → FTP handles the transfer.
Easy2Siksha.com
5. Your computer gets an IP address automatically. → DHCP assigns it.
6. Your system clock stays accurate. → NTP synchronizes it.
All these services work silently in the background, making your online experience seamless.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 3: Flow of Network Services
User → DNS → HTTP → Email → FTP → DHCP → NTP → VPN → Destination
󷈷󷈸󷈹󷈺󷈻󷈼 Importance of Network Services
Efficiency: Automates tasks like IP assignment.
Convenience: Lets you use names instead of numbers.
Security: Protects communication (HTTPS, VPN).
Collaboration: Enables file sharing and remote access.
Reliability: Ensures synchronized time and proper routing.
Without them, the internet would be chaotic and unusable.
󹶓󹶔󹶕󹶖󹶗󹶘 A Relatable Story
Imagine a university campus:
The receptionist (DHCP) gives students room numbers.
The library catalog (DNS) helps students find books.
The postal service (Email) delivers letters between students.
The courier (FTP) moves boxes of supplies.
The school bell (NTP) keeps everyone on schedule.
The security guard (VPN) ensures private conversations.
That’s exactly how network services keep the digital world organized.
󺄄󺄅󺄌󺄆󺄇󺄈󺄉󺄊󺄋󺄍 Diagram 4: University Analogy
Receptionist = DHCP
Library Catalog = DNS
Postal Service = Email
Courier = FTP
School Bell = NTP
Security Guard = VPN
󼩏󼩐󼩑 Final Wrap-Up
A network service is a function provided by a network to make communication and
resource sharing possible.
Common services include DNS, Email, FTP, HTTP/HTTPS, SSH, DHCP, NTP, VPN, and
Directory Services.
Easy2Siksha.com
They work together like hotel staff or a university system, ensuring everything runs
smoothly.
Without them, the internet would be confusing, insecure, and unreliable.
This paper has been carefully prepared for educaonal purposes. If you noce any
mistakes or have suggesons, feel free to share your feedback.