Professional Documents
Culture Documents
19ec412 - CN-QR - Answer Key April 2023 New
19ec412 - CN-QR - Answer Key April 2023 New
19ec412 - CN-QR - Answer Key April 2023 New
Common To
Subject Code 19EC412 Subject Name COMMUNICATION NETWORKS
Dr.M.Vanitha NIL
Faculty Name Dr.R.Vinod Kumar Department ECE
Dr.R.Renuga Devi
(PART A – 2 Marks)
UNIT - I
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Analyze how the HDLC frame types differ from each other.
I-frames are used to transport user data and control information relating to user data
QA101 CO1 K4 2
(piggybacking). S-frames are used only to transport control information. V-frames are reserved
for system management.
Generalize the term Checksum.
A checksum is a value that represents the number of bits in a transmission message and is used
QA102 CO1 K4 2
to detect high-level errors within data transmissions. Prior to transmission, every piece of data
or file can be assigned a checksum value after running a cryptographic hash function.
Mention the criteria necessary for an effective and efficient network.
QA103 Performance, reliability and security CO1 K2 2
The receiver is patiently awaiting the data packet. The receiver does not send an
QA104 CO1 K2 2
acknowledgment because it does not receive the data. The sender won't send the subsequent
packet because it has not received any acknowledgment. The lost data is the root cause of this
issue.
Explain the effect of Jitter in context to communication networks.
It is the variation in the packet arrival time. Uneven Jitter may affect the timeliness of data
QA105* CO1 K2 2
being transmitted
UNIT - II
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Summarize the effect of Hidden node and exposed node problem in networks.
NODE B TO NODE A TO NODE C
UNIT - III
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Interpret on the Count to infinity and Split Horizon issues that occur in Distance vector routing.
The Count to Infinity problem arises from the routing loop in this Distance Vector Routing (DVR)
network. Such Routing Loops usually occurs when 2 routers send an update together at the same
QA301 time or when an interface goes down. CO3 K3 2
A packet has arrived in which the offset value is 100, the value of HLEN is 5 and the value of the
total length field is 100. Calculate the numbers of the first and the last bytes.
QA303 The first byte number is 100 X 8 = 800. The total length is 100 bytes and the header length is 20 CO3 K3 3
bytes (5X4), which means there are 80 bytes in this datagram. If the first byte number is 800, the
last byte number must be 879.
Why is IPV6 preferred over IPV4?
IPv6 (Internet Protocol version 6) is the next version after IPv4. Instead of the 32 bits used by IPv4
QA304 for addressing, IPv6 uses 128 bits for the same purpose - which theoretically makes it possible to CO3 K3 3
assign 2 128 addresses - hence, it offers long term solutions to most of the problems that emerged
while using IPv4.
Identify the class of the given addresses: i) 102.168. 212.226 and ii) 192.168. 123.132
QA305 CO3 K3 2
i) Class A and ii) Class C
UNIT - IV
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Distinguish the Flow control and Congestion control mechanisms.
Flow Control is a mechanism that controls the traffic in a computer network. Traffic represents
QA401 4 K4 2
the flow of data from the sender to the receiver. Congestion Control too is a traffic controlling
mechanism. Data link and Transport layers handle flow control.
Draw the TCP header format.
QA402 4 K4 2
In peer-to-peer systems, you start your local program on a networked computer, and you become
connected to other instances of the same program running on lots of other computers. The local CO5
QA503 K4 2
process starts listening on a local port, and finds IP:port pairs for those other processes.
IMAP enables users to organize messages into folders, flag messages for urgency or follow-up,
QA505 and save draft messages on the server. Users can also have multiple email client applications CO5 K4 3
that sync with the email server to consistently show which messages have been read or are still
unread.
UNIT - I
Knowledge Difficulty
Q. No Questions CO
Level Level (1-5)
(Blooms)
Classify the network topologies and analyze the pros and cons of each category with
justification.
• Bus Topology Simple layout and cheap but vulnerable to failure and only suitable
for low traffic volumes. Not used for office networks today, but can still be found
within some consumer products.
• Ring Topology Easy to manage and with a low risk of collision but reliant on all
nodes being powered up and in full working order. Rarely used today.
• Star Topology All devices are connected to a central switch, which makes it easy to
add new nodes without rebooting all currently connected devices. This topology
makes efficient use of cable and is easy to administer. On the other hand, the health
of the switch is vital. This topology requires monitoring and maintenance. However,
it is a commonly encountered topology.
• Tree Topology A hierarchical layout that links together groups of nodes. Creates
parent-child dependencies between root nodes and regular nodes. This layout can be
vulnerable to failure if a root node has a problem. This topology is complicated and
difficult to manage and it uses a lot of cable.
• Mesh Topology Each node is connected to every other mode with a direct link.
This topology creates a very reliable network, but requires a large amount of cable
and is difficult to administer. Wifi networks make this topology more feasible.
QB101 (a) CO1 K4 3
• Hybrid Topology Combines two or more of the standard topologies. This can be a
good solution to create quickly link together different existing networks into a
unified system. Don’t confuse the term “hybrid network topology” with “hybrid
system” – a term that is applied to the combination of onsite and cloud resources.
Bus Topology
Pros:
• Easy installation
• Fewer cables required than Mesh and star topology
• Good for small businesses
• Low cost
• Easy to manage and expand
Cons:
• Backbone performance is critical
• Easily congested on busy periods
• Efficiency decreases rapidly with each added node
• Data can only travel in one direction at any point in time
Ring Topology
Pros:
• Low incidence of collision
• Low cost
• Suitable for small businesses
• Dual ring option provides continuity through redundancy
Cons:
• One faulty node will bring the entire network down
• Requires extensive preventative maintenance and monitoring
• Performance declines rapidly with each additional node
• Reorganizing the network requires a full system shutdown
Star
Pros:
• Easy to manage from one point – the switch
• Easy to add and remove nodes
• Durable
• Low cable usage
• Good for small businesses
Cons:
• Requires specialist network hardware (the switch)
• Makes the network reliant on the switch’s performance
• A finite number of switch ports limits the network’s size
Tree Topology
Pros:
• Blends bus and star topologies
• Easy to manage
• Easy to expand
• Suitable for middle-sized businesses
Cons:
• The network is dependent on the health of the root node
• Requires networking expertise
• Involves a lot of cable
• Larger implementations require monitoring software
• Can get expensive
Mesh topology
Pros:
• High speeds data transfers
• Durable network that isn’t dependent on any one node
• Very secure
• Suitable for high-value networks for small to middle-sized networks
• Easy to identify faulty equipment
Cons:
• Requires a very large amount of cable
• Can be difficult to secrete all the cable
• Takes a long time to set up
• Requires meticulous planning
• There is a limit to the number of cables each computer can accommodate
Each category explanation with diagram if necessary and Pros and Cons. 13
marks
(Or)
Survey the following Sliding Window Protocols:
In Go-Back-N ARQ, N is the sender's window size. Suppose we say that Go-Back-3, which
means that the three frames can be sent at a time before expecting the acknowledgment from
the receiver.
It uses the principle of protocol pipelining in which the multiple frames can be sent before
receiving the acknowledgment of the first frame. If we have five frames and the concept is
Go-Back-3, which means that the three frames can be sent, i.e., frame no 1, frame no 2, frame
no 3 can be sent before expecting the acknowledgment of frame no 1.
QB101 (b) CO1 K4 3
In Go-Back-N ARQ, the frames are numbered sequentially as Go-Back-N ARQ sends the
multiple frames at a time that requires the numbering approach to distinguish the frame from
another frame, and these numbers are known as the sequential numbers.
In Selective Repeat ARQ only the lost or error frames are retransmitted, whereas correct
frames are received and buffered.
The receiver while keeping track of sequence numbers buffers the frames in memory and
sends NACK for only frames which are missing or damaged. The sender will
send/retransmit a packet for which NACK is received.
Express the various layers and functions of the OSI model with neat diagrams.
o OSI stands for Open System Interconnection is a reference model that describes how
QB102 (a)* CO1 K4 3
information from a software application in one computer moves through a physical
medium to the software application in another computer.
There are seven layers as follows
Physical Layer:
• Synchronization of bits
• Performs modulation – converts a signal from one form to another so that it can be
physically transmitted over a communication channel
• It specifies the transmission rate (number of bits sent per second).
• This layer describes the physical network topologies or how different nodes or
devices are arranged in a network (bus, tree, star, mesh, etc.).
• It specifies the transmission modes or how data flows between the two connected
devices (simplex, half-duplex and full-duplex).
In a nutshell, this layer is “in charge of transmitting raw data which is simply a series of
0s and 1s, using electrical, mechanical or procedural interfaces.”
Network layer:
• Routing: The protocols in this layer identify the suitable routes from source to
destination.
• Logical Addressing: It describes an addressing scheme to uniquely identify each
device on the network.
In a nutshell, this layer is “in charge of breaking up segments into network packets,
reassembling the packets on the receiving end, and determining the shortest and most
secure path for transmitting data packets across a physical network.”
Transport layer:
• Service-point addressing
• Ensures that each message reaches its destination completely.
• Maintains error and flow control from the source to destination to ensure proper
data transmission.
• Multiplexing and Demultiplexing
• Segmentation and Reassembly
Session Layer:
• Establishes, maintains, and terminates sessions.
• Dialog Controller: Enables two systems to start communication with each other in
half-duplex or full-duplex.
• Synchronization: It also allows a process to add some checkpoints into a stream of
data.
Presentation layer:
• Translation: Translates data based on the application’s syntax or semantics
• Performs encryption and decryption of sensitive data before they are transmitted
over common channels.
• Compression: Reduces the number of bits contained in the information to be sent.
Application layer:
• User interfaces (UI)
• Provides compatible support for different services such as e-mail, remote file
transfer, etc.
• no authentication necessary
• no guarantees of delivery
• less reliable
• bursts of communication
• packets do not follow same route
• congestion is possible
• low range bandwidth adequate
(Or)
Categorize the types of networks in detail.
UNIT - II
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
(i)Demonstrate CSMA/CD and its working. (10)
The CSMA method does not specify the procedure following a collision.
Carrier sense multiple access with collision detection (CSMA/CD) augments the algorithm
to handle the collision.
In this method, a station monitors the medium after it sends a frame to see if the transmission
was successful. If so, the station is finished. If, however, there is a collision, the frame is sent
again.
To better understand CSMA/CD, let us look at the first bits transmitted by the two stations
involved in the collision. Although each station continues to send bits in the frame until it
detects the collision, we show what happens as the first bits collide. In below Figure, stations
A and C are involved in the collision.
QB201(a) CO2 K2 3
(OR)
Indicate the deficiencies in IPv4 and express how ICMPv4 compensates them.
The distinction between the error and informational classes of ICMP messages is important.
An ICMP error message is not to be sent in response to any of the following messages:
• Another ICMP error message,
QB201(b)*
• Datagrams with bad headers (e.g., bad checksum), CO3 K4 3
• IP-layer broadcast/multicast datagrams,
• Datagrams encapsulated in link-layer broadcast or multicast frames,
• Datagrams with an invalid or network zero source address,
• Any fragment other than the first.
The reason for imposing these restrictions on the generation of ICMP errors is to limit the
creation of so-called broadcast storms, a scenario in which the generation of a small
number of messages creates an unwanted traffic cascade (e.g., by generating error
responses in response to error responses, indefinitely).
ICMP provides feedback about hosts and networks to the sender of an IP packet. The routers
and switches along the network path are not notified about the errors. An example of ICMP
error reporting includes ‘host/network not found’ when the destination endpoint can’t be
reached.
ICMP does not include error correction, so this does not make IP more reliable. However, it
does allow the sender to be able to handle the errors. The actual error handling is done with
a higher layer protocols (such as TCP) or within the application itself.
To avoid creating error loops, ICMP does not send error notifications about other failed
ICMP packets.
Another use for ICMP is to provide a better path for packets to take to a destination. For
example, if a router receives a packet destined for network ‘A’, this router may know of a
router with a better path. In this case, the first router will send an ICMP redirect back to the
sender, suggesting that it use the other router instead.
An ICMPv4 Time Exceeded message is used by a router to indicate that a packet cannot be
forwarded because the Time to Live (TTL) field of the packet was decremented to 0. If a
router receives a packet and decrements the TTL field in the IPv4 packet to zero, it discards
the packet and sends a Time Exceeded message to the source host.
Enumerate the significance of the Ethernet types and explain in detail about the specifications
and frame format of the same.
10BaseT
10BaseT is one of the most common Ethernet standards used in Ethernet networks. It uses
UTP (Cat3 or higher) cables and Hubs. Hubs use a physical star topology and a logical bus
topology. Hubs repeat and forward signals to all nodes. Because of Hubs, the 10BaseT
networks are slow and susceptible to collisions.
This standard also specifies a rule about how many Hubs you can use in a network. This rule
specifies that a maximum of four hubs can be placed between communicating workstations.
This rule ensures that all stations on the network can detect a collision.
Due to the slow data transmission speed and collision, modern networks do not use the
10BaseT standard.
10BaseF
10BaseF is an implementation of 10BaseT over fiber optic cabling. 10BaseF offers only 10
Mbps, even though the fiber optic media has the capacity for much faster data rates. One of
the implementations of 10BaseF is to connect two hubs as well as connecting hubs to
workstations.
Due to the slow data transmission speed and expensive cabling, the 10BaseT standard is also
not used in modern networks.
100BaseT4
100BaseT4 was created to upgrade 10BaseT networks over Cat3 wiring to 100 Mbps without
having to replace the wiring. Using four pairs of twisted pair wiring, two of the four pairs are
configured for half-duplex transmission (data can move in only one direction at a time). The
other two pairs are configured as simplex transmission, which means data moves only in one
direction on a pair all the time.
100BaseTX
100BaseTX is also known as Fast Ethernet. It transmits data at 100 Mbps. Fast Ethernet
works nearly identically to 10BaseT, including that it has a physical star topology using a
logical bus. 100BaseTX requires Cat5 or higher UTP cabling. It uses two of the four-wire
pairs: one to transmit data and the other to receive data.
Standard IEEE documentation Cable Minimum cable grade Speed Maximum distance
10Base5 802.3 Coxial RG-8 10Mbs 500 meter
10Base2 802.3a Coxial RG-58 10Mbps 200 meter
10Base-T 802.3i UTP Cat 3 10 Mbps 100 meters
100BaseT/TX 802.3u UTP Cat 5 100 Mbps 100 meters
100BaseFX 802.3u MMF or SMF N/A 100 Mbps 2 km over MMF, 10 km over SMF
(Or)
Discuss in detail the architecture of IEEE 802.11.
The 802.11architecture defines two types of services and three different types of stations
802.11 Services
The two types of services are
1. Basic services set (BSS)
2. Extended Service Set (ESS)
1. Basic Services Set (BSS)
• The basic services set contain stationary or mobile wireless stations and a central base
station called access point (AP).
• The use of access point is optional.
QB202 (b)* CO2 K2 2
• If the access point is not present, it is known as stand-alone network. Such a
BSS cannot send data to other BSSs. This type of architecture is known as adhoc
architecture.
2. Extended Service Set (ESS)
• An extended service set is created by joining two or more basic service sets (BSS) having
access points (APs).
These extended networks are created by joining the access points of basic services sets
through a wired LAN known as distribution system.
• The distribution system can be any IEET LAN.
• There are two types of stations in ESS:
(i) Mobile stations: These are normal stations inside a BSS.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.
802.11 Station Types
IEEE 802.11 defines three types of stations on the basis of their mobility in wireless LAN.
These are:
1. No-transition Mobility
2. BSS-transition Mobility
3. ESS-transition Mobility
1. No-transition Mobility: These types of stations are either stationary i.e. immovable or
move only inside a BSS.
2. BSS-transition mobility: These types of stations can move from one BSS to another but
the movement is limited inside an ESS.
3. ESS-transition mobility: These types of stations can move from one ESS to another. The
communication mayor may not be continuous when a station moves from one ESS to
another ESS.
Physical layer functions
• As we know that physical layer is responsible for converting data stream into signals, the
bits of 802.11 networks can be converted to radio waves or infrared waves.
• These are six different specifications of IEEE 802.11. These implementations, except the
first one, operate in industrial, scientific and medical (ISM) band. These three banks are
unlicensed and their ranges are
1. 902-928 MHz
2. 2.400-4.835 GHz
3. 5.725-5.850 GHz
Analyze how a DHCP helps the TCP/IP in address assignment at the network layer.
QB203 (a) 2. DHCPOFFER: If there are multiple servers on the network, the host receives CO2 K2 3
multiple DHCPOFFER messages. It is up to the host to select a particular
message.
(Or)
Explain in detail about the architecture of Bluetooth and its layers.
Bluetooth fills the niche of very short-range communication between mobile phones, PDAs,
notebook computers, and other personal or peripheral devices. For example, Bluetooth can
be used to connect a mobile phone to a headset or a notebook computer to a keyboard.
Roughly speaking, Bluetooth is a more convenient alternative to connecting two devices with
a wire. In such applications, it is not necessary to provide much range or bandwidth. This
means that Bluetooth radios can use quite low power transmission since transmission power
is one of the main factors affecting the bandwidth and range of wireless links. This matches
the target applications for Bluetooth-enabled devices—most of them are battery-powered
(such as the ubiquitous phone headset) and hence it is important that they not consume much
power. Bluetooth operates in the license bandwidth of around 1 to 3 Mbps and
QB203 (b)* communicating devices typically belong to one individual or group, Bluetooth is sometimes CO2 K2 2
categorized as a Personal Area Network (PAN).
Autoconfiguration
(Or)
Demonstrate the function of BGP and Combination of eBGP and IBGP in internet.
(Or)
QB401 (a)* Explain the TCP connection Management using neat diagrams. 4 K4 3
Diagram: 7 marks
Explanation for the diagram: 6 marks
(Or)
QB401 (b)* 4 K4 3
ii) Retransmission after three duplicate ACK segments -Out of order segments,
Lost segments, Fast retransmission
Retransmission After Receiving 3 Duplicate Acknowledgements- Consider sender receives
QB402 (a) three duplicate acknowledgements for a TCP segment sent by it. Then, sender assumes that 4 K4 3
the corresponding segment is lost. So, sender retransmits the same segment without waiting
for its time out timer to expire.
(Or)
QB402 (b) TCP is a reliable protocol. Justify how the mechanisms adopted by TCP for error control 4 K4 3
makes it reliable.
Survey the concept of congestion avoidance in TCP.
QB403 (a)* 4 K4 3
Diagram: 8 marks
Explanation: 5 marks
(Or)
QB403 (b)* 4 K4 3
Categorize the various congestion policies adopted by TCP for Congestion Control.
Explanation for each policy with necessary illustration. (13 marks)
UNIT - V
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Examine the Substitution and Transposition techniques of cryptography with
necessary illustrations. Both Substitution cipher technique and Transposition cipher
technique are the types of Traditional cipher which are used to convert the plain text into
cipher text.
QB501 (b)* Examine the UDP variables, tables and indices in Simple Network Management Protocol CO5 K4 4
(SNMP).
SNMP provides a common mechanism for network devices to relay management
information within single and multi-vendor LAN or WAN environments. It is an application
layer protocol in the OSI model framework. Typically, the SNMP protocol is implemented
using the User Datagram Protocol (UDP)
SNMP works by sending messages, called protocol data units (PDUs), to devices within
your network that “speak” SNMP. These messages are called SNMP Get-Requests. Using
these requests, network administrators can track virtually any data values they specify
Inspect the concepts of Iterative communication using TCP in Client/ Server Programming.
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of
communication protocols used to interconnect network devices on the internet. TCP/IP is
also used as a communications protocol in a private computer network (an intranet or
extranet).
A TCP server listens on a well-known port (or IP address and port pair) and accepts
connections from TCP clients. A TCP client initiates a connection request to a TCP server in
order to setup a connection with the server. A real TCP server can accept multiple
connections on a socket. The server's code runs first, which opens a port and listens for
incoming connection requests from clients. Once a client connects to the same (server) port,
the client or server may send a message. Once the message is sent, whoever receives it (server
or client) will process it accordingly.
TCP Server client Implementation
Classification of firewall:
QB502 (a)* • Packet Filter Firewall CO5 K4 4
• Proxy Firewall
Firewall delivery methods
• Hardware-based firewalls. A hardware-based firewall is an appliance that acts as a
secure gateway between devices inside the network perimeter and those outside it.
• Software-based firewalls. A software-based firewall, or host firewall, runs on a server
or other device.
• Cloud/hosted firewalls.
(Or)
Examine the various steps involved in the non-persistent connection of HTTP.
Non-persistent and persistent are the two types of HTTP connections used to
connect the client with the webserver. The non-persistent connection has connection type
1.0, while the persistent connection has connection type 1.1
The non-persistent connection takes a total time of 2RTT + file transmission time. It
takes the first RTT (round-trip time) to establish the connection between the server and the
client. The second RTT is taken to request and return the object. This case stands for a single
object transmission.
Transport Layer Security (TLS) is a security protocol that encrypts email for privacy. TLS
prevents unauthorized access of your email when it's in transit over internet connections. By
default, Gmail always tries to use a secure TLS connection when sending email.
SSL/TLS Protocols
SSL (the Secure Sockets Layer) is the predecessor of TLS (the Transport Layer Security).
Both are application layer protocols that provide the security framework that works with
SMTP to keep your emails safe. From 2015, SSL was officially deprecated but there still
remain an alarming number of websites that support it. TLS provide additional security for
SMTP and even some other communicating computer programmes. Email clients send and
receive messages using TCP (Transmission Control Protocol) to initiate the ‘’handshake’’.
The handshake is a series of actions that the email client and server go through to validate
QB503 (a) security and begin the email transition. CO5 K4 3
(Or)
Inspect the concepts of Iterative communication using TCP in Client/ Server Programming.
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of
communication protocols used to interconnect network devices on the internet. TCP/IP is
also used as a communications protocol in a private computer network (an intranet or
extranet).
A TCP server listens on a well-known port (or IP address and port pair) and accepts
connections from TCP clients. A TCP client initiates a connection request to a TCP server in
order to setup a connection with the server. A real TCP server can accept multiple
connections on a socket. The server's code runs first, which opens a port and listens for
incoming connection requests from clients. Once a client connects to the same (server) port,
the client or server may send a message. Once the message is sent, whoever receives it (server
or client) will process it accordingly.
UNIT - I
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Given the data word 1101 and the divisor 1001. Show the generation of CRC code
word at the sender site and verify the code at the receiver.
(Or)
Illustrate the functionality of virtual circuit networks and explain the concept in detail.
UNIT - II
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
List the different controlled access methods in CSMA and analyze how the stations
communicate with each other.
In the Controlled access technique, all stations need to consult with one another in order to
find out which station has the right to send the data.
• The controlled access protocols mainly grant permission to send only one node at a
time; thus in order to avoid the collisions among the shared mediums.
• No station can send the data unless it has been authorized by the other stations.
QC201 (a)* CO2 K4 3
The protocols lies under the category of Controlled access are as follows:
• Reservation
• Polling
• Token Passing
1. Reservation
In this method, a station needs to make a reservation before sending the data.
• Time is mainly divided into intervals.
• Also, in each interval, a reservation frame precedes the data frame that is sent in that
interval.
• Suppose if there are 'N' stations in the system in that case there are
exactly 'N' reservation minislots in the reservation frame; where each minislot
belongs to a station.
• Whenever a station needs to send the data frame, then the station makes a
reservation in its own minislot.
• Then the stations that have made reservations can send their data after the
reservation frame.
Let us take an example of 5 stations and a 5-minislot reservation frame. In the first interval,
the station 2,3 and 5 have made the reservations. While in the second interval only station 2
has made the reservations.
2. Polling
The polling method mainly works with those topologies where one device is designated as
the primary station and the other device is designated as the secondary station.
• All the exchange of data must be made through the primary device even though the
final destination is the secondary device.
• Thus to impose order on a network that is of independent users, and in order to
establish one station in the network that will act as a controller and periodically
polls all other stations is simply referred to as polling.
• The Primary device mainly controls the link while the secondary device follows the
instructions of the primary device.
• The responsibility is on the primary device in order to determine which device is
allowed to use the channel at a given time.
• Therefore the primary device is always an initiator of the session.
3. Token Passing
In the token passing methods, all the stations are organized in the form of a logical ring. We
can also say that for each station there is a predecessor and a successor.
• The predecessor is the station that is logically before the station in the ring; while
the successor is the station that is after the station in the ring. The station that is
accessing the channel now is the current station.
• Basically, a special bit pattern or a small message that circulates from one station to
the next station in some predefined order is commonly known as a token.
• Possessing the token mainly gives the station the right to access the channel and to
send its data.
• When any station has some data to send, then it waits until it receives a token from
its predecessor. After receiving the token, it holds it and then sends its data. When
any station has no more data in order to send then it releases the token and then
passes the token to the next logical station in the ring.
• Also, the station cannot send the data until it receives the token again in the next
round.
• In Token passing, when a station receives the token and has no data to send then it
just passes the token to the next station.
• The problem that occurs due to the Token passing technique is the duplication of
tokens or loss of tokens. The insertion of the new station, removal of a station, also
needs to be tackled for correct and reliable operation of the token passing technique.
In the diagram below when station-1 posses the token, it starts transmitting all the data-
frames which are in its queue. now after transmission, station-1 passes the token to station-
2 and so on. Station-1 can now transmit data again, only when all the stations in the
network have transmitted their data and passed the token.
(Or)
Interpret the different addressing mechanisms of IPv4. Show the notations and hierarchy to
support each addressing method.
QC201 (b) CO2 K4 3
IPv4 supports three different types of addressing modes. −
Unicast Addressing Mode
In this mode, data is sent only to one destined host. The Destination Address field contains
32- bit IP address of the destination host. Here the client sends data to the targeted server −
Subnet Mask
The 32-bit IP address contains information about the host and its network. It is very necessary
to distinguish both. For this, routers use Subnet Mask, which is as long as the size of the
network address in the IP address. Subnet Mask is also 32 bits long. If the IP address in binary
is ANDed with its Subnet Mask, the result yields the Network address. For example, say the
IP Address is 192.168.1.152 and the Subnet Mask is 255.255.255.0 then −
This way the Subnet Mask helps extract the Network ID and the Host from an IP Address.
It can be identified now that 192.168.1.0 is the Network number and 192.168.1.152 is the
host on that network
UNIT - III
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Apply Dijkstra’s algorithm and manipulate the shortest path tree and the forwarding table
for node A in the figure.
.
(Or)
Scheduling-FIFO Queuing, Priority Queuing and Weighted Fair Queuing
Priority Queuing
Data Encryption Standard is a symmetric block cipher which takes the input of 64-bit
plain text along with 64-bit key and process it, to generate the 64-bit ciphertext. The diagram
below illustrates the working of DES.
Encryption
Step 1: In the first step the 64-bit plain text undergoes initial permutation which rearranges
the bits to produce two 32-bit permuted block which is called left plain text (LPT 32-bit) and
right plain text (RPT 32-bit).
Step 2: Now, 16 rounds of DES encryption will be performed on this LPT and RPT with
a 56-bit key.
Step 3: After the 16th round the 32-bit LPT and 32-bit RPT are integrated which forms a 64-
bit block again and then the final permutation is applied to this 64-bit block, to obtain the 64-
bit ciphertext.
Decryption
The same Data Encryption Standard algorithm used for encrypting the plain text is also used
to decrypting the ciphertext. But the algorithm is reversed, such as the initial and final
permutation events are reversed. Even the sequence of the subkeys applied in 16 rounds of
DES are also reversed.
Now, we will discuss the process that takes place during the 16 rounds of DES algorithm.
Each round of DES performs the same function. So, below are the steps of the function
performed in each round of DES algorithm:
1. Key Transformation
2. Expansion Permutation
3. S-box Substitution
4. P-box Permutation
Examine the principle of the RSA algorithm and show how the public and secret keys are
derived with proper illustration.
The RSA algorithm is a public-key signature algorithm developed by Ron Rivest, Adi
Shamir, and Leonard Adleman. The algorithm uses logarithmic functions to keep the
QC501 (b) working complex enough to withstand brute force and streamlined enough to be fast CO5 K4 4
post-deployment.
1. Generate the RSA modulus (n) Select two large primes, p and q. ...
2. Find Derived Number (e) Number e must be greater than 1 and less than (p − 1)(q − 1). ...
3. Form the public key. The pair of numbers (n, e) form the RSA public key and is made
public. ...
4. Generate the private key.
An RSA key pair includes a private and a public key. The RSA private key is used to generate
digital signatures, and the RSA public key is used to verify digital signatures. The RSA public
key is also used for key encryption of DES or AES DATA keys and the RSA private key for
key recovery.
Applying
K1 Remembering (Knowledge) K2 Understanding (Comprehension) K3
(Application of Knowledge)
(iii) Any number from 1 to 5 for Difficulty Level (With 1 as Most Easy & 5 as Most Difficult)