Professional Documents
Culture Documents
June
June
June
Give
suitable example of each.
ANS:- Private Key Cryptography (Symmetric Cryptography) - In private key
cryptography, the same
key is used for both encryption and decryption of data. This means that
both the sender and the
receiver must share the same key and keep it secret from everyone else.
Characteristics:
Key Management: Both parties must securely share and manage a single
key.
Security: The security depends on the key remaining secret. If the key is
exposed, the encrypted
data can be easily decrypted.
Example Scenario:
1. Rahul and Raj agree on a secret key.
2. Rahul uses the secret key to encrypt a message and sends the ciphertext
to Raj.
3. Raj uses the same secret key to decrypt the ciphertext and read the
original message.
Public Key Cryptography (Asymmetric Cryptography) - In public key
cryptography, two different but
mathematically related keys are used: a public key and a private key. The
public key is used for
encryption(transforms the message into an unreadable format), while the
private key is used for
decryption or signing .
Characteristics:
Key Distribution: The public key can be openly shared with anyone, while
the private key must be
kept secret.
Security: The system is secure as long as the private key remains secret.
Example Scenario:
1. Anjali generates a pair of keys: a public key and a private key.
2. Anjali shares her public key with Taarak.
3. Taarak uses Anjali's public key to encrypt a message and sends the
ciphertext to Anjali.4. Anjali uses her private key to decrypt the ciphertext
and read the original message.
(b) Briefly discuss the concept of frequency shift
keying and phase shift keying. Give an application
of each. (6)
ANS:- Frequency Shift Keying (FSK) - Frequency Shift
Keying (FSK) is a method of transmitting digital
data by changing the frequency of a carrier signal. For
instance, a higher frequency might represent a
"1" and a lower frequency a "0".
Application: FSK is commonly used in low-bandwidth
applications due to its simplicity and robustness
against noise. Examples include:
Garage door openers: The remote control transmits a
specific FSK signal to unlock the door.
Phase Shift Keying (PSK) - Phase Shift Keying (PSK)
is a method of transmitting digital data by
changing the phase of a carrier signal. Common
variations include Binary PSK (BPSK) using two
phases
(0, 1) and Quadrature PSK (QPSK) using four phases
(00, 01, 10, 11) for data transmission.
Application: PSK offers better data efficiency
compared to FSK as it can encode more information
per
symbol (using multiple phases). Examples include:
Wi-Fi: Modern Wi-Fi networks use PSK to send data
wirelessly. This method helps to send data
faster and more reliably.
(c) What is count to infinity problem in distance
vector routing protocol ? How does it happen ?
Explain with an example. (10)
ANS:- The count-to-infinity problem happens in
distance vector routing when routers keep increasing
the distance to a particular destination that has
become unreachable. This can cause delays and
inefficient routing.
How It Happens -
In distance vector protocols, routers share their
routing tables with neighboring routers periodically.
These tables contain information about reachable
destinations and the number of "hops" (metric) to
get there.
When a router receives an updated routing table
from a neighbor, it updates its own table based on
the new information. The count-to-infinity problem
occurs when a network becomes unreachable
(e.g., due to a link failure) and the routers do not
recognize this immediately. Instead, they increment
the distance metric for the unreachable network
gradually until it reaches an arbitrary "infinity" value.
(d) Briefly discuss the functions of Layer-2 switch and Layer-3 switch.
Compare Switch with Hub. (6)
ANS:- Layer-2 Switch -
Function: Operates on Layer 2 (Data Link Layer) of the OSI model.
Functionality: Learns and forwards packets based on Media Access
Control (MAC) addresses.
Use Case: Suitable for connecting devices within the same local area
network (LAN) segment.
Limitations: Cannot route packets between different subnets
(networks with different IP address
ranges).
Layer-3 Switch -
Function: Operates on Layer 3 (Network Layer) of the OSI model,
offering functionalities of a
Layer-2 switch along with routing capabilities.
Functionality: Learns and forwards packets based on MAC addresses,
but can also route packets
between different subnets based on IP addresses.
Use Case: Ideal for complex networks with multiple subnets, allowing
for efficient traffic
management between them.
Switch - A switch is a smart network device that sends data only to
the intended device, reducing
congestion and collisions. It learns device addresses and provides
dedicated bandwidth to each port.
Switches also support VLANs for better network segmentation and
security.
Hub - A hub is a basic device that broadcasts data to all connected
devices, causing potential
congestion and collisions. It does not learn addresses and shares
bandwidth among all ports. Hubs are
simple and suitable for small, basic networks.
Switches are more efficient and advanced, making them better for
modern networks, while hubs are
simpler and less efficient.
(e) How does pure ALOHA differ from slotted ALOHA ? Explain.
(6)
ANS:-
Pure ALOHA:
Transmission: Nodes send data whenever they have data to
send, without waiting for a specific
time.
Collisions: High chance of collisions because multiple nodes
might send data simultaneously.
Efficiency: Less efficient due to frequent collisions, with a
maximum throughput of about 18.4%.
Implementation: Simple to implement because it doesn't require
any synchronization of nodes.
Example: Imagine a network where computers send messages as
soon as they are ready, without
checking if another message is being sent at the same time.
Slotted ALOHA:
Transmission: Time is divided into equal slots, and nodes can
only start sending data at the
beginning of these slots.
Collisions: Lower chance of collisions since transmissions are
synchronized to time slots.
Efficiency: More efficient due to reduced collisions, with a
maximum throughput of about 36.8%.
Implementation: Requires nodes to be synchronized so that they
all start sending data at the
beginning of time slots.
Example: Picture a network where computers wait for the start of
a specific time slot before sending
their messages, reducing the likelihood of messages colliding.
(f) What are virtual circuits ? Discuss the effect of router failure in
virtual circuits. (6)
ANS:- Virtual circuits (VCs) are a communication method within
computer networks that provide a
connection-oriented service. They offer a reliable and ordered data
transfer experience, similar to a
dedicated physical connection, but operate on top of
packet-switching networks.
Concept:
VCs establish a logical connection between two network nodes before
data transmission begins.
This initial handshake sets up resource allocation (bandwidth,
buffers) along the chosen path.
Data is then broken into packets, each carrying a sequence number
for in-order delivery and error
checking.
VCs guarantee in-order delivery and error-free data transfer, making
them suitable for
applications requiring reliable data exchange like file transfers.
Impact of Router Failure: When a router failure occurs in a network
utilizing virtual circuits, several
effects may be observed:
Connection Disruption: If a router essential for the VC path fails, the
connection between the
sender and receiver is disrupted. Packets in transit might be lost or
delayed.
Retransmission: The network attempts to recover by rerouting the VC
through an alternative
path. However, this process takes time, leading to a period of data
transfer interruption.
Re-establishment: Depending on the specific protocol, the VC might
need to be completely re-
established, including negotiating a new path and resource allocation.
This can cause significant
Delays.
2. (a) Differentiate between ARP and RARP. Explain the working of ARP using a
diagram. (10)
ANS:- Difference Between ARP and RARP -
ARP (Address Resolution Protocol):
1. Purpose: ARP is used to find the MAC (Media Access Control) address of a
device when the IP
(Internet Protocol) address is known.
2. Usage: Commonly used in IPv4 networks.
3. Function: Maps an IP address to a MAC address.
4. Direction: IP address to MAC address.
RARP (Reverse Address Resolution Protocol):
1. Purpose: RARP is used to find the IP address of a device when the MAC
address is known.
2. Usage: Less commonly used today, replaced by DHCP (Dynamic Host
Configuration Protocol).
3. Function: Maps a MAC address to an IP address.
4. Direction: MAC address to IP address.
ARP Working Explained with a Diagram:
1. Initiation: A device (Host A) has data to send to another device (Host B) on the
same network.
Host A knows the destination's IP address (B's IP) but needs the MAC address for
actual data
transmission.
2. ARP Request Broadcast: Host A broadcasts an ARP request packet on the
LAN. This packet
contains Host A's MAC address and B's IP address.
3. Listening Devices: All devices on the network receive the ARP
request, including Host B.
4. Matching Destination IP: Only Host B recognizes its own IP
address (B's IP) within the ARP request.
5. ARP Reply: Host B sends an ARP reply packet back to Host A.
This reply packet contains Host B's MAC address and B's IP
address (confirmation).
6. ARP Cache Update: Host A receives the ARP reply and stores
the mapping between B's IP address and B's MAC address in its ARP cache for
future reference.
7. Data Transmission: With the destination's MAC address acquired, Host A can
now send its data
packets directly to Host B using B's MAC address.
(b) How does classful addressing differ from classless
addressing ? How does classless addressing
result in decrease in the table size ? (10)
ANS:-
Classful Addressing:
1. Fixed Classes: IP addresses are divided into five classes (A, B,
C, D, E) based on the leading bits.
o Class A: 0.0.0.0 to 127.255.255.255
o Class B: 128.0.0.0 to 191.255.255.255
o Class C: 192.0.0.0 to 223.255.255.255
o Class D: 224.0.0.0 to 239.255.255.255
o Class E: 240.0.0.0 to 255.255.255.255
2. Fixed Network and Host Portions: The division between the
network and host portions of the IP
address is fixed.
o Class A: First 8 bits for the network, remaining 24 bits for hosts.
o Class B: First 16 bits for the network, remaining 16 bits for
hosts.
o Class C: First 24 bits for the network, remaining 8 bits for hosts.
3. Dividing Networks: Dividing networks is less flexible because
it has to follow fixed class rules. This
makes it harder to create network segments that fit exact needs.
4. Inefficiency: Can waste IP addresses since the fixed class
sizes often don’t match the number of
devices needing addresses.
Classless Addressing (CIDR - Classless Inter-Domain Routing):
1. No Fixed Classes:
o IP addresses are not divided into fixed classes. Instead,
addresses are assigned based on
prefixes.
o Example: 192.168.1.0/24, where "/24" denotes the length of the
network prefix(portion).
2. Variable-Length Subnet Mask (VLSM):
o Allows more flexible division between network and host
portions.
o Network prefixes can vary in length, e.g., /8, /16, /24, providing
precise allocation of IP
addresses.
3. Efficient Use of Address Space: More efficient allocation of IP
addresses by allowing different-
sized networks. Reduces wastage of IP addresses.
4. Aggregation (Route Summarization): This handy process
combines several IP addresses into a
single, compact entry in the routing table. Instead of listing each
individual address separately,
aggregation bundles them up neatly, making the routing table
shorter and more efficient.