Question & Key Set A
Question & Key Set A
Max.: 60 Mks.
SECTION - A (10 x 1 = 10Mks.)
Answer all the following.
6. __________layer of the OSI model is responsible for translating data (Level- K1, CO1, Unit
between different network formats 1)
a) ARP b) DHCP
c) DNS d) TCP
9. In the TCP/IP protocol suite, which layer is responsible for logical (Level- K1, CO4, Unit
addressing and routing? 4)
Section C ( 3 * 4 = 12 Marks)
16 a) Difference Between Virtual Circuits and Datagram Networks (Level- K2, CO1, Unit 3)
(OR)
16 b) Discuss about the advantages of circuit switching. (Level- K2, CO1, Unit 3)
17 a) Examine about symmetric key cryptography with suitable examples. (Level- K4, CO2, Unit 5)
(OR)
17 b) Illustrate digital signature and how does it work? (Level- K4, CO2, Unit 5)
Section D (2 * 10 = 20 Marks)
19 a) Compare and contrast IPv4 and IPv6 addressing schemes. (Level- K4, CO5, Unit 4)
(OR)
19 b) Analyze the role of the transport layer in process-to-process delivery and (Level- K4, CO5, Unit 4)
how it ensures reliable communication.
Section E (1 * 10 = 10 Marks)
20. Explain the Cyclic Redundancy Checks (CRCs) of error detection and correction.
SUMMARY OF ASSESSMENT
K1 - 14 Mks. - 23.33 %
K2 - 12 Mks. - 20.00 %
K3 - 20 Mks. - 33.33 %
K4 - 14 Mks. - 23.34 %
Key - SET - A
1. seven
2. Network
3. IP (Internet Protocol)
4. Transport layer
5. TCP/IP
II. CHOOSE THE CORRECT ANSWER
6. d) Presentation layer
7. d) Application, Transport, Network, and Physical
8. b) DHCP
9. a) Internet layer
10. d) 7
Section B (4 * 2 = 8 Marks)
The Internet is a global network of billions of computers and other electronic devices.
Bigger Bandwidth. Longer Distance, Faster Speed. Higher Resistance. Greater Security.
IP information is attached to each packet, and this information helps routers to send packets to
the right place.
Section C ( 3 * 4 = 12 Marks)
o Unguided media are essential for wireless communication systems, enabling connectivity
over large distances without the need for physical connections.
o There are three types of Unguided Transmission media: Microwave Transmission, Radio
Transmission, Infrared Transmission
15 b) Write shortly on Repeaters
o Repeaters are defined as a networking device that is used to amplify and generate the
incoming signal.
o Repeaters work at the physical layer of the OSI model. The main aim of using a
repeater is to increase the networking distance by increasing the strength and quality
of signals.
o The performance of Local Area Networks (LANs) and Wide Area Networks (WANs)
repeaters are used. Using repeaters helps to reduce error, and loss of data and provides
with delivery of data at specified locations only.
o The major advantage of using a repeater is that it provides with transfer of data with
more security and over a long distance.
In cryptography, a symmetric key is one that is used both to encrypt and decrypt
information. This means that to decrypt information, one must have the same key that was used
to encrypt it.
Examples:
Blowfish, AES, RC4, DES, RC5, and RC6 are examples of symmetric encryption.
1. Key Generation: A secret key is generated using a secure random key generator. The
key must be kept confidential and securely exchanged between the sender and the
receiver.
2. Encryption: The sender uses the secret key to encrypt the plaintext (original message)
into ciphertext (encrypted message) using a cryptographic algorithm. The ciphertext is
unintelligible without the corresponding key.
3. Decryption: The receiver uses the same secret key to decrypt the ciphertext back into the
original plaintext using the decryption algorithm. Only the parties possessing the key can
decrypt the message successfully.
Section D (2 * 10 = 20 Marks)
o The main aim of the layered architecture is to divide the design into small pieces.
o Each lower layer adds its services to the higher layer to provide a full set of services to
manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction between subsystems.
o It ensures the independence between layers by providing the services from lower to
higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.
o The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower to a
higher layer and hiding the details from the layers of how the services are implemented.
o The basic elements of layered architecture are services, protocols, and interfaces.
o Protocol: It defines a set of rules that a layer uses to exchange the information
with peer entity. These rules mainly concern about both the contents and order of
the messages used.
o Interface: It is a way through which the message is transferred from one layer to
another layer.
o In a layer n architecture, layer n on one machine will have a communication with the
layer n on another machine and the rules used in a conversation are known as a layer-n
protocol.
Syntax : syntax refers to the structure or the format of the data that gets exchanged
between the devices. Syntax of message includes the type of data, composition of
message and sequencing of message. The starting 8 bits of data is considered as the
address of the sender. The next 8 bits is considered to be the address of the receiver. The
remaining bits are considered as the message itself.
Semantics : Semantics defines data transmitted between devices. It provides rules and
norms for understanding message or data element values and actions.
Timing : Timing refers to the synchronization and coordination between devices while
transferring the data. Timing ensures at what time data should be sent and how fast data
can be sent. For example, If a sender sends 100 Mbps but the receiver can only handle 1
Mbps, the receiver will overflow and lose data. Timing ensures preventing data loss,
collisions and other timing related issues.
Sequence control : Sequence control ensures the proper ordering of data packets. The
main responsibility of sequence control is to acknowledge the data while it get received,
and the retransmission of lost data. Through this mechanism the data is delivered in
correct order.
Flow Control : Flow control regulates device data delivery. It limits the sender’s data or
asks the receiver if it’s ready for more. Flow control prevents data congestion and loss.
Error Control : Error control mechanisms detect and fix data transmission faults. They
include error detection codes, data resend, and error recovery. Error control detects and
corrects noise, interference, and other problems to maintain data integrity.
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration
In IPv4 Packet flow identification is not In IPv6 packet flow identification are Available
available and uses the flow label field in the header
In IPv4 Encryption and Authentication facility In IPv6 Encryption and Authentication are
not provided provided
IPv4 has a header of 20-60 bytes IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are separated by IPv6 consists of 8 fields, which are separated by a
addresses dot (.) colon (:)
IPv4’s IP addresses are divided into five IPv6 does not have any classes of the IP address.
different classes. Class A , Class B, Class C,
Class D , Class E.
IPv4 supports VLSM(Variable Length subnet IPv6 does not support VLSM.
mask).
Example of IPv4: 66.94.29.13 Example of IPv6:
2001:0000:3238:DFE1:0063:0000:0000:FEFB
19 b) Analyze the role of the transport layer in process-to-process delivery and how it ensures
reliable communication.
Section E (1 * 10 = 10 Marks)
20. Explain the Cyclic Redundancy Checks (CRCs) of error detection and correction.
The Cyclic Redundancy Checks (CRC) is the most powerful method for Error-Detection and
Correction.
Qualities of CRC
It should have accurately one less bit than the divisor.
Joining it to the end of the data unit should create the resulting bit sequence precisely
divisible by the divisor.
CRC generator and checker
Process
A string of n 0s is added to the data unit. The number n is one smaller than the number of
bits in the fixed divisor.
The new data unit is divided by a divisor utilizing a procedure known as binary division;
the remainder appearing from the division is CRC.
The CRC of n bits interpreted in phase 2 restores the added 0s at the end of the data unit.
Example
Message D = 1010001101 (10 bits)
Predetermined P = 110101 (6 bits)
FCS R = to be calculated 5 bits
Hence, n = 15 K = 10 and (n – k) = 5
The message is generated through 25: accommodating
1010001101000
The product is divided by P.