0% found this document useful (0 votes)
74 views8 pages

Question & Key Set A

The document is a question paper for an exam on data communications and networking. It consists of multiple choice questions, fill in the blank questions, and short answer questions testing knowledge across various levels (K1-K4) on topics related to the OSI model, TCP/IP protocol suite, transmission media, routing, and network security. The summary includes the number and types of questions in each section, the topics covered, and the knowledge levels assessed.

Uploaded by

Sri Gayu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views8 pages

Question & Key Set A

The document is a question paper for an exam on data communications and networking. It consists of multiple choice questions, fill in the blank questions, and short answer questions testing knowledge across various levels (K1-K4) on topics related to the OSI model, TCP/IP protocol suite, transmission media, routing, and network security. The summary includes the number and types of questions in each section, the topics covered, and the knowledge levels assessed.

Uploaded by

Sri Gayu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Q - SET - A

FATIMA COLLEGE (Autonomous), MADURAI – 625 018.


DEGREE END SEMESTER EXAMINATION – APRIL. 2024
SEMESTER VI

Data Communications and Networking

Time: 2 ½ Hrs. COURSE CODE: 19B6CC13

Max.: 60 Mks.
SECTION - A (10 x 1 = 10Mks.)
Answer all the following.

I.FILL IN THE BLANKS

(Level- K1, CO1, Unit 1)


1. The OSI model consists of ________ layers.
(Level- K1, CO2, Unit 2)
2. The ________ layer of the OSI model is responsible for logical addressing
and routing.
(Level- K1, CO3, Unit 3)
3. _________ addresses are typically associated with the Network layer of the
OSI model.
(Level- K1, CO4, Unit 4)
4. ________ is responsible for ensuring the reliable transmission of data
between systems on a network.
(Level- K1, CO3 Unit 5)
5. The ________ protocol suite is commonly used for communication over
the Internet.

II. CHOOSE THE CORRECT ANSWER

6. __________layer of the OSI model is responsible for translating data (Level- K1, CO1, Unit
between different network formats 1)

a) Physical layer b) Data Link layer


c) Network layer d) Presentation layer
7. The TCP/IP protocol suite corresponds most closely to which layers of (Level- K1, CO2, Unit
2)
the OSI model.
b) Transport, Network, Data Link, and
a) Application, Presentation, and Session
Physical
c) Application, Transport, Internet, and d) Application, Transport, Network, and
Network Access Physical
8. _________ protocol is commonly used for assigning IP addresses Level- K1, CO3, Unit
dynamically to devices on a network 3)

a) ARP b) DHCP
c) DNS d) TCP
9. In the TCP/IP protocol suite, which layer is responsible for logical (Level- K1, CO4, Unit
addressing and routing? 4)

a) Internet layer b) Transport layer


c) Network Access layer d) Application layer
Level- K1, CO5, Unit
10. The OSI model consists of _______ layers 5)
a) 4 b) 5
c) 6 d) 7
Section B (4 * 2 = 8 Marks)

III. Answer all the following


11. Define Internet. (Level K2, CO1, Unit 1)
12. What are the Advantages of optical fiber as a transmission medium? (Level K2, CO2, Unit 2)
13. Discuss the role of IP in the Network Layer. (Level K2, CO2, Unit 4)
14. What is the primary purpose of a firewall in network security? (Level K2, CO3, Unit 5)

Section C ( 3 * 4 = 12 Marks)

IV. Answer all the following


15 a) Describe about the Unguided Media (Level- K1, CO1, unit 2)
(OR)
15 b) Write shortly on Repeaters (Level- K1, CO1, unit 2)

16 a) Difference Between Virtual Circuits and Datagram Networks (Level- K2, CO1, Unit 3)

(OR)
16 b) Discuss about the advantages of circuit switching. (Level- K2, CO1, Unit 3)

17 a) Examine about symmetric key cryptography with suitable examples. (Level- K4, CO2, Unit 5)
(OR)
17 b) Illustrate digital signature and how does it work? (Level- K4, CO2, Unit 5)

Section D (2 * 10 = 20 Marks)

V. Answer all the following


18 a) Explain the concept of layered tasks in OSI model. Level- K3, CO4, Unit 1)
(OR)
18 b) List out the key Elements of Protocol (Level- K3, CO4, Unit 1)

19 a) Compare and contrast IPv4 and IPv6 addressing schemes. (Level- K4, CO5, Unit 4)
(OR)
19 b) Analyze the role of the transport layer in process-to-process delivery and (Level- K4, CO5, Unit 4)
how it ensures reliable communication.

Section E (1 * 10 = 10 Marks)

VI. Answer all the following (Level- K3, CO3, Unit 3)

20. Explain the Cyclic Redundancy Checks (CRCs) of error detection and correction.

SUMMARY OF ASSESSMENT

K1 - 14 Mks. - 23.33 %

K2 - 12 Mks. - 20.00 %

K3 - 20 Mks. - 33.33 %

K4 - 14 Mks. - 23.34 %
Key - SET - A

COURSE CODE - 19B6CC13


TITLE Data Communications and Networking
SECTION - A (10 x 1 = 10Mks.)
Answer all the following.

I.FILL IN THE BLANKS

1. seven
2. Network
3. IP (Internet Protocol)
4. Transport layer
5. TCP/IP
II. CHOOSE THE CORRECT ANSWER

6. d) Presentation layer
7. d) Application, Transport, Network, and Physical
8. b) DHCP
9. a) Internet layer
10. d) 7
Section B (4 * 2 = 8 Marks)

III. Answer all the following

11. Define Internet.

The Internet is a global network of billions of computers and other electronic devices.

12. What are the Advantages of optical fiber as a transmission medium?

Bigger Bandwidth. Longer Distance, Faster Speed. Higher Resistance. Greater Security.

13. Discuss the role of IP in the Network Layer.

IP information is attached to each packet, and this information helps routers to send packets to
the right place.

14. What is the primary purpose of a firewall in network security?

A firewall is a security system designed to prevent unauthorized access into or out of a


computer network.

Section C ( 3 * 4 = 12 Marks)

15 a) Describe about the Unguided Media

o An unguided transmission transmits the electromagnetic waves without using any


physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can flow
easily.

o Unguided media are essential for wireless communication systems, enabling connectivity
over large distances without the need for physical connections.
o There are three types of Unguided Transmission media: Microwave Transmission, Radio
Transmission, Infrared Transmission
15 b) Write shortly on Repeaters

o Repeaters are defined as a networking device that is used to amplify and generate the
incoming signal.
o Repeaters work at the physical layer of the OSI model. The main aim of using a
repeater is to increase the networking distance by increasing the strength and quality
of signals.
o The performance of Local Area Networks (LANs) and Wide Area Networks (WANs)
repeaters are used. Using repeaters helps to reduce error, and loss of data and provides
with delivery of data at specified locations only.
o The major advantage of using a repeater is that it provides with transfer of data with
more security and over a long distance.

16 a) Difference Between Virtual Circuits and Datagram Networks

Criteria Virtual Circuit Networks Datagram Networks


Connection Establishment Prior to data transmission, a No connection setup is
connection is established required.
between sender and receiver.

Routing Routing decisions are made Routing decisions are made


once during connection setup independently for each packet
and remain fixed throughout and can vary based on
the duration of the network conditions.
connection.
Flow Control Uses explicit flow control, Uses implicit flow control,
where the sender adjusts its where the sender assumes a
rate of transmission based on certain level of available
feedback from the receiver. bandwidth and sends packets
accordingly.
Congestion Control Uses end-to-end congestion Uses network-assisted
control, where the sender congestion control, where
adjusts its rate of transmission routers monitor network
based on feedback from the conditions and may drop
network. packets or send congestion
signals to the sender.
Error Control Provides reliable delivery of Provides unreliable delivery
packets by detecting and of packets and does not
retransmitting lost or guarantee delivery or
corrupted packets. correctness.
Overhead Requires less overhead per Requires more overhead per
packet because connection packet because each packet
setup and state maintenance contains information about its
are done only once. destination address and other
routing information.
Example Protocol ATM, Frame Relay IP (Internet Protocol)

16 b) Discuss about the advantages of circuit switching.

o In circuit switching, a dedicated communication path or circuit is established between the


communicating devices before transmission begins.

o Circuit switching enables synchronous communication.


o Since the dedicated path is set up in advance, there are no delays in transmission.

o Dedicated circuits provide error-free transmission of data.

o The dedicated connections ensure bandwidth is available when needed.

17 a) Examine about symmetric key cryptography with suitable examples

In cryptography, a symmetric key is one that is used both to encrypt and decrypt
information. This means that to decrypt information, one must have the same key that was used
to encrypt it.

Examples:

Blowfish, AES, RC4, DES, RC5, and RC6 are examples of symmetric encryption.

Process of Symmetric-Key Cryptography:

1. Key Generation: A secret key is generated using a secure random key generator. The
key must be kept confidential and securely exchanged between the sender and the
receiver.

2. Encryption: The sender uses the secret key to encrypt the plaintext (original message)
into ciphertext (encrypted message) using a cryptographic algorithm. The ciphertext is
unintelligible without the corresponding key.

3. Decryption: The receiver uses the same secret key to decrypt the ciphertext back into the
original plaintext using the decryption algorithm. Only the parties possessing the key can
decrypt the message successfully.

17 b) Illustrate digital signature and how does it work?

o A digital signature—a type of electronic signature—is a mathematical algorithm


routinely used to validate the authenticity and integrity of a message (e.g., an email, a
credit card transaction, or a digital document).
o Digital signatures create a virtual fingerprint that is unique to a person or entity and are
used to identify users and protect information in digital messages or documents.
o In emails, the email content itself becomes part of the digital signature.
o Digital signatures are significantly more secure than other forms of electronic signatures.

Section D (2 * 10 = 20 Marks)

V. Answer all the following

18 a) Explain the concept of layered tasks in OSI model.

o The main aim of the layered architecture is to divide the design into small pieces.

o Each lower layer adds its services to the higher layer to provide a full set of services to
manage communications and run the applications.

o It provides modularity and clear interfaces, i.e., provides interaction between subsystems.
o It ensures the independence between layers by providing the services from lower to
higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.

o The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower to a
higher layer and hiding the details from the layers of how the services are implemented.

o The basic elements of layered architecture are services, protocols, and interfaces.

o Service: It is a set of actions that a layer provides to the higher layer.

o Protocol: It defines a set of rules that a layer uses to exchange the information
with peer entity. These rules mainly concern about both the contents and order of
the messages used.

o Interface: It is a way through which the message is transferred from one layer to
another layer.

o In a layer n architecture, layer n on one machine will have a communication with the
layer n on another machine and the rules used in a conversation are known as a layer-n
protocol.

18 b) List out the key Elements of Protocol

 Syntax : syntax refers to the structure or the format of the data that gets exchanged
between the devices. Syntax of message includes the type of data, composition of
message and sequencing of message. The starting 8 bits of data is considered as the
address of the sender. The next 8 bits is considered to be the address of the receiver. The
remaining bits are considered as the message itself.

 Semantics : Semantics defines data transmitted between devices. It provides rules and
norms for understanding message or data element values and actions.

 Timing : Timing refers to the synchronization and coordination between devices while
transferring the data. Timing ensures at what time data should be sent and how fast data
can be sent. For example, If a sender sends 100 Mbps but the receiver can only handle 1
Mbps, the receiver will overflow and lose data. Timing ensures preventing data loss,
collisions and other timing related issues.

 Sequence control : Sequence control ensures the proper ordering of data packets. The
main responsibility of sequence control is to acknowledge the data while it get received,
and the retransmission of lost data. Through this mechanism the data is delivered in
correct order.

 Flow Control : Flow control regulates device data delivery. It limits the sender’s data or
asks the receiver if it’s ready for more. Flow control prevents data congestion and loss.
 Error Control : Error control mechanisms detect and fix data transmission faults. They
include error detection codes, data resend, and error recovery. Error control detects and
corrects noise, interference, and other problems to maintain data integrity.

 Security : Network security safeguards data confidentiality, integrity, and authenticity.


which includes encryption, authentication, access control, and other security procedures.
Network communication’s privacy and trustworthiness are protected by security
standards.

19 a) Compare and contrast IPv4 and IPv6 addressing schemes.

IPv4 IPv6

IPv4 has a 32-bit address length IPv6 has a 128-bit address length

It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration

In IPv4 end to end, connection integrity is In IPv6 end-to-end, connection integrity is


Unachievable Achievable
It can generate 4.29×109 address space The address space of IPv6 is quite large it can
produce 3.4×1038 address space
The Security feature is dependent on the IPSEC is an inbuilt security feature in the IPv6
application protocol

Address representation of IPv4 is in decimal Address Representation of IPv6 is in hexadecimal


Fragmentation performed by Sender and In IPv6 fragmentation is performed only by the
forwarding routers sender

In IPv4 Packet flow identification is not In IPv6 packet flow identification are Available
available and uses the flow label field in the header

In IPv4 checksum field is available In IPv6 checksum field is not available


It has a broadcast Message Transmission In IPv6 multicast and anycast message transmission
Scheme scheme is available

In IPv4 Encryption and Authentication facility In IPv6 Encryption and Authentication are
not provided provided
IPv4 has a header of 20-60 bytes IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4

IPv4 consists of 4 fields which are separated by IPv6 consists of 8 fields, which are separated by a
addresses dot (.) colon (:)

IPv4’s IP addresses are divided into five IPv6 does not have any classes of the IP address.
different classes. Class A , Class B, Class C,
Class D , Class E.
IPv4 supports VLSM(Variable Length subnet IPv6 does not support VLSM.
mask).
Example of IPv4: 66.94.29.13 Example of IPv6:
2001:0000:3238:DFE1:0063:0000:0000:FEFB

19 b) Analyze the role of the transport layer in process-to-process delivery and how it ensures
reliable communication.

Role of the Transport Layer

o Segmentation and Reassembly


o Addressing
o Reliable Delivery (TCP)
o Acknowledgment
o Sequence Numbers
o Flow Control
o Best Effort Delivery (UDP)
Ensuring Reliable Communication
o Error Detection and Correction
o Timeouts and Retransmissions
o Congestion Control
o Error Recovery

Section E (1 * 10 = 10 Marks)

VI. Answer all the following

20. Explain the Cyclic Redundancy Checks (CRCs) of error detection and correction.

The Cyclic Redundancy Checks (CRC) is the most powerful method for Error-Detection and
Correction.

Qualities of CRC
 It should have accurately one less bit than the divisor.
 Joining it to the end of the data unit should create the resulting bit sequence precisely
divisible by the divisor.
CRC generator and checker

Process
 A string of n 0s is added to the data unit. The number n is one smaller than the number of
bits in the fixed divisor.
 The new data unit is divided by a divisor utilizing a procedure known as binary division;
the remainder appearing from the division is CRC.
 The CRC of n bits interpreted in phase 2 restores the added 0s at the end of the data unit.

Example
Message D = 1010001101 (10 bits)
Predetermined P = 110101 (6 bits)
FCS R = to be calculated 5 bits
Hence, n = 15 K = 10 and (n – k) = 5
The message is generated through 25: accommodating
1010001101000
The product is divided by P.

The remainder is inserted to 25D to provide T =


101000110101110 that is sent.

You might also like