COMPUTER NETWORKING -2
Q1) Attempt any EIGHT of the following:
a) What is Primary Server?
A primary server is the main DNS server that holds the original copy of a domain's zone files
and handles domain name resolution requests.
b) Write services provided by user agents, and explain composing message.
User agents provide services such as reading, composing, sending, and managing emails.
Composing a message involves writing an email, including the subject, body, and
attachments before sending it to the recipient.
c) Define Jitter and Translation.
Jitter refers to the variation in packet arrival times in a network. Translation is converting one
form of data or signal into another, such as converting an email address into an IP address.
d) What is sampling?
Sampling is the process of converting an analog signal into a digital one by taking regular
intervals of the signal to represent its amplitude.
e) Define cryptanalysis.
Cryptanalysis is the study and practice of finding weaknesses or vulnerabilities in
cryptographic algorithms to break the encryption.
f) What is S-box component of a modern block cipher?
The S-box (Substitution box) is a key component in block ciphers that performs substitution
to increase the security of the cipher by introducing non-linearity.
g) Write the names of steps performed in each round of DES (Data Encryption Standard)
Cipher.
The steps include: Expansion, Key mixing (XOR with round key), Substitution using S-boxes,
and Permutation.
h) What is the purpose of IPSec?
IPSec provides secure communication over IP networks by encrypting and authenticating
data packets.
i) Write the names of protocols on which IKE (Internet Key Exchange) is based.
IKE is based on ISAKMP (Internet Security Association and Key Management Protocol) and
Oakley.
j) A proxy firewall is also called an application gateway. Write true or false and also justify.
True. A proxy firewall acts as an intermediary between the user and the internet, filtering
traffic at the application layer, hence it's also called an application gateway.
Q2) Attempt any FOUR of the following:
a) What is firewall? Explain with diagram.
A firewall is a network security system that monitors and controls incoming and outgoing
traffic based on security rules. It can be hardware, software, or both. [Insert diagram of
firewall here]
b) What is streaming audio/video? Also write examples.
Streaming audio/video is a method of delivering media content over the internet, allowing
users to listen or watch without downloading the file. Examples: YouTube, Netflix.
c) Write information about iterative resolution, with diagram.
In iterative resolution, a DNS server provides the best answer it can based on what it knows,
and refers the client to another DNS server for more information. [Insert diagram of iterative
resolution here]
d) What is anonymous FTP?
Anonymous FTP allows users to access files from an FTP server without requiring a username
and password, typically using "anonymous" as the username.
e) What is Digital Signature?
A digital signature is a cryptographic technique used to validate the authenticity and
integrity of a digital message or document by using encryption.
Q3) Attempt any TWO of the following:
a) Explain security services for message.
Security services for messaging include confidentiality (protecting messages from
unauthorized access), integrity (ensuring message content is unchanged), authentication
(verifying the sender's identity), and non-repudiation (preventing the sender from denying
the message).
b) Explain streaming stored audio/video Third Approach: Using a media server.
In this approach, a media server stores and streams the audio/video to users over a network.
The media is buffered at the client side for smooth playback. The server controls the flow of
media and handles requests.
c) Explain any four user agent services.
1. Reading messages: Allows users to read received emails.
2. Composing messages: Helps users draft new messages.
3. Replying to messages: Provides options to respond to emails.
4. Forwarding messages: Enables sending received emails to other recipients.
Q4) Attempt any TWO of the following:
a) What is IMAP4? Write its features, advantages, and disadvantages.
IMAP4 (Internet Message Access Protocol 4) is an email protocol that allows users to access
and manage their email on a remote server.
Features: Email synchronization, selective downloading, server-side searching.
Advantages: Allows access from multiple devices, messages stored on server.
Disadvantages: Requires internet for access, uses more server storage.
b) Explain asymmetric key cryptography with the help of a diagram.
Asymmetric key cryptography uses a public key for encryption and a private key for
decryption. This ensures secure communication as only the intended recipient can decrypt
the message. [Insert diagram of asymmetric key cryptography here]
c) Explain in detail packet filter firewall, also write its advantages and disadvantages.
A packet filter firewall filters network traffic at the packet level, based on IP addresses, port
numbers, and protocols.
Advantages: Fast, easy to implement, low resource usage.
Disadvantages: Limited functionality, cannot inspect the content of data, vulnerable to
spoofing.
Q5) Attempt any ONE of the following:
a) Using columnar transposition cipher, convert the following plaintext to ciphertext:
‘allthepacketsfromporttenareallowed’, key=”COMPUTER”
To solve, use the key “COMPUTER” to organize the text into columns and rearrange them
based on the alphabetical order of the letters in the key.
b) Write a note on Real-Time Transport Protocol (RTP).
RTP is a protocol designed for delivering audio and video over IP networks. It works in
conjunction with RTCP (Real-Time Control Protocol) to provide real-time streaming by
managing synchronization, sequencing, and delivery of the multimedia content.
Q1) Attempt any Eight of the following:
a) SMTP is a push protocol. State true or false, justify.
True. SMTP (Simple Mail Transfer Protocol) is designed to push emails from the client to the
server or between servers.
b) Write two types of connections used by FTP. Also write their port numbers.
FTP uses Control Connection (Port 21) for commands and Data Connection (Port 20) for
transferring files.
c) What is sampling?
Sampling is the process of converting an analog signal into a digital format by taking discrete
measurements at regular intervals.
d) What is used of “BYE” message in SIP (Session Initiation Protocol)?
The "BYE" message in SIP is used to terminate an active session or call.
e) What is VPN (Virtual Private Network)?
A VPN is a secure connection that encrypts internet traffic and creates a private network over
a public network.
f) What is multicasting?
Multicasting is a method of transmitting data to multiple recipients simultaneously using a
single stream of data.
g) Write advantages of packet filter firewall.
Advantages include simplicity, speed, low resource consumption, and ability to filter traffic
based on IP addresses and ports.
h) Define cryptography.
Cryptography is the practice of securing communication by converting information into a
code to prevent unauthorized access.
i) Encrypt the following plain text with the given key using substitution cipher. Plain text:
India is my county, Key = 4.
Using a key of 4, the ciphertext is: "Mrlme mw q{ dqrwya."
j) List methods for verifying the authenticity of the claimant.
Methods include digital signatures, biometric verification, multi-factor authentication, and
cryptographic keys.
Q2) Attempt any Four of the following:
a) Which are traditional ciphers? Write working of shift cipher.
Traditional ciphers include Caesar cipher, Vigenère cipher, and substitution cipher. The shift
cipher works by shifting each letter in the plaintext by a fixed number down the alphabet.
b) List types of server. Write a short note on any one type.
Types of servers include web servers, file servers, mail servers, and database servers.
Web Server: Hosts websites and serves web pages to clients over the internet using
HTTP/HTTPS protocols.
c) Write advantage of POP.
An advantage of POP (Post Office Protocol) is that it allows users to download emails to their
local device for offline access.
d) What is streaming live audio/video?
Streaming live audio/video delivers real-time content over the internet, allowing users to
listen or watch events as they happen.
e) Write a note on IPSec modes.
IPSec operates in Transport Mode (encrypting only the payload of the IP packet) and Tunnel
Mode (encrypting the entire IP packet), enhancing security in different scenarios.
Q3) Attempt any Two of the following:
a) Explain PGP certificates.
PGP (Pretty Good Privacy) certificates provide a way to establish trust in public keys through
a web of trust model, enabling users to sign each other's keys to verify authenticity.
b) Using columnar transposition cipher convert the given plaintext to ciphertext. Plaintext:
COMMUNICATIONMUSTBESECURE, Key = FASTER.
The plaintext arranged in columns according to the key "FASTER" produces the ciphertext:
"OEIEUSMMSNRCBTAUOC" (arranging and reading columns based on alphabetical order of
key).
c) What is Electronic Code Book (ECB), write its advantages and disadvantages.
ECB is a mode of operation for block ciphers where each block is encrypted independently.
Advantages: Simplicity and parallel processing capability.
Disadvantages: Pattern leakage in identical plaintext blocks, making it less secure for
certain applications.
Q4) Attempt any Two of the following:
a) Write the difference between flat name space and hierarchical name space.
Flat Name Space: All names are unique but do not show relationships; Hierarchical Name
Space: Names are organized in a tree-like structure, showing relationships between them.
b) Explain symmetric key cryptography.
Symmetric key cryptography uses the same key for both encryption and decryption,
requiring both parties to share the key securely.
c) Explain Streaming Stored Audio / Video first approach: using a web server, with
advantages and disadvantages.
This approach uses a web server to store and deliver pre-recorded media content to users.
Advantages: Easy access and distribution, reduced server load with caching.
Disadvantages: Latency issues, requires sufficient bandwidth for quality playback.
Q5) Attempt any One of the following:
a) Explain Real-Time Interactive Audio / Video with diagram.
Real-time interactive audio/video enables live communication between users over the
internet using protocols like RTP. It allows for two-way communication, essential for
applications like video conferencing. [Insert diagram illustrating real-time communication
flow.]
b) Explain SSL services in detail.
SSL (Secure Sockets Layer) provides services such as encryption (protecting data in transit),
authentication (verifying the identities of parties), and data integrity (ensuring that data is
not altered during transmission).
Q1) Attempt any EIGHT of the following: 2024
a) What is Jitter?
Jitter is the variation in packet arrival times in a network, affecting the quality of real-time
communications.
b) Name the two parts of Email?
The two parts of an email are the header and the body.
c) Why is the MIME protocol required?
MIME (Multipurpose Internet Mail Extensions) is required to allow emails to include different
types of content, such as text, images, and attachments.
d) List the types of MPEG frames.
The types of MPEG frames are I-frames (intra-coded), P-frames (predictive-coded), and B-
frames (bi-directionally predictive-coded).
e) What is frequency masking?
Frequency masking is a psychoacoustic phenomenon where certain frequencies are inaudible
due to the presence of louder frequencies, used in audio compression.
f) What do you mean by Proxy firewall?
A proxy firewall acts as an intermediary between users and the internet, filtering traffic and
hiding the user's IP address.
g) What do you mean by cryptography and cryptanalysis?
Cryptography is the practice of securing information through encryption, while cryptanalysis
is the study of breaking encryption to access the original data.
h) List the PGP services.
PGP services include encryption, decryption, digital signatures, and key management.
i) What is the difference between plaintext and cipher text?
Plaintext is the original readable message, while ciphertext is the encrypted output that
appears unreadable.
j) List the services of user agent.
User agent services include reading, composing, sending, receiving, and managing emails.
Q2) Attempt any FOUR of the following:
a) Explain VPN in detail with example.
A VPN (Virtual Private Network) creates a secure and encrypted connection over a less secure
network, allowing remote users to access the private network as if they were directly
connected to it. For example, employees using a VPN can access their company's internal
resources while working from home.
b) Distinguish between message integrity and message authentication.
Message integrity ensures that the message has not been altered in transit, while message
authentication verifies the sender's identity to confirm that the message is from the claimed
sender.
c) What is firewall? Explain its types.
A firewall is a security device that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. Types include packet-filtering firewalls,
stateful inspection firewalls, proxy firewalls, and next-generation firewalls.
d) Write a short note on message access agent: IMAP & POP.
IMAP (Internet Message Access Protocol) allows users to access and manage their emails
directly on the mail server, enabling synchronization across devices, while POP (Post Office
Protocol) downloads emails to the local device for offline access and typically removes them
from the server.
e) Explain in detail use of FTP and HTTP.
FTP (File Transfer Protocol) is used for transferring files over the internet, allowing users to
upload and download files from servers, while HTTP (Hypertext Transfer Protocol) is used for
transmitting web pages and resources, facilitating communication between web browsers
and servers.
Q3) Attempt any TWO of the following:
a) Write a short note on DNS.
DNS (Domain Name System) is a hierarchical system that translates human-readable domain
names (like www.example.com) into IP addresses, allowing users to access websites using
easy-to-remember names instead of numerical addresses.
b) Explain the header format of the authentication header in transport mode.
The authentication header (AH) in transport mode contains fields such as next header,
payload length, reserved, security parameters index (SPI), and sequence number, which help
ensure the integrity and authenticity of the IP packet.
c) Explain the concept of key rings in PGP.
Key rings in PGP (Pretty Good Privacy) are collections of public and private keys used for
encryption and decryption, allowing users to manage multiple keys for secure
communications with various contacts.
Q4) Attempt any TWO of the following.
a) Explain in detail TCP-Message types.
TCP (Transmission Control Protocol) messages include SYN (synchronize) for establishing
connections, ACK (acknowledgment) for confirming receipt of packets, FIN (finish) for
terminating connections, and RST (reset) for resetting a connection.
b) Explain substitution cipher with example.
A substitution cipher replaces each letter in the plaintext with another letter. For example,
using a shift of 3, "HELLO" becomes "KHOOR" by shifting each letter three places down the
alphabet.
c) Explain how a packet filter firewall filters packets.
A packet filter firewall examines packets' headers (source and destination IP addresses, ports,
and protocols) and allows or blocks them based on predefined security rules.
Q5) Attempt any ONE of the following
a) Write a short note on Real-time interactive audio/video.
Real-time interactive audio/video enables live communication between users via the internet,
allowing for two-way interaction using protocols like RTP (Real-Time Protocol) and SIP
(Session Initiation Protocol), often used in applications like video conferencing and online
gaming.
b) Using columnar transposition, convert the ciphertext
“STMTCRCCOVUSITEEYPEHCILDIIOAAE” to plain text. The key is CIPHER.
To convert the ciphertext to plaintext using the columnar transposition with the key
"CIPHER", first write the ciphertext in a grid based on the key's length, then reorder the
columns according to the alphabetical order of the letters in the key, and read the plaintext
vertically. The plaintext is: "SOMETHINGISCOMPLICATEDHERE".
Q1) Attempt any EIGHT of the following:
a) What is FQDN?
FQDN (Fully Qualified Domain Name) is the complete domain name for a specific computer,
including both the hostname and the domain name (e.g., www.example.com).
b) Where does MIME header appear?
The MIME header appears in the email header section, specifying the content type and
format of the message.
c) What is an anonymous FTP?
Anonymous FTP allows users to access files on a server without needing a specific account,
typically using "anonymous" as the username.
d) Give the purpose of RTCP.
RTCP (Real-Time Control Protocol) is used in streaming media to monitor transmission
statistics and quality of service, providing feedback on the media distribution.
e) What is playback buffer?
A playback buffer is a temporary storage area that holds data before it is played back, helping
to ensure smooth playback by compensating for network delays.
f) What is Cipher key?
A cipher key is a string of characters used in cryptography to encrypt and decrypt data.
g) Does SSL mean HTTPS?
Yes, SSL (Secure Sockets Layer) is a protocol that provides security for HTTP connections,
resulting in HTTPS (HTTP Secure).
h) What does a VPN do for?
A VPN (Virtual Private Network) creates a secure and encrypted connection over a less secure
network, protecting data and ensuring privacy.
i) Define firewall.
A firewall is a security device that monitors and controls incoming and outgoing network
traffic based on predefined security rules.
j) What is the root server in DNS?
The root server in DNS is the highest level of the DNS hierarchy, responsible for directing
queries to the appropriate top-level domain (TLD) servers.
Q2) Attempt any FOUR of the following:
a) Explain the Working of POP3.
POP3 (Post Office Protocol version 3) allows email clients to download emails from a mail
server to a local device, typically deleting them from the server, facilitating offline access.
b) Discuss streaming live audio/video and give its examples.
Streaming live audio/video delivers real-time content over the internet, such as live sports
broadcasts or online concerts, using protocols like RTSP and RTP.
c) What is meant by transposition cipher? Give an example.
A transposition cipher rearranges the letters of the plaintext to create ciphertext. For
example, using a key of "3124", "HELLO" can be rearranged to "LHEO".
d) Explain the working of TLS.
TLS (Transport Layer Security) establishes a secure connection over the internet by
encrypting data transmitted between clients and servers, ensuring privacy and data integrity.
e) What is PGP? Write its purpose.
PGP (Pretty Good Privacy) is an encryption program that provides cryptographic privacy and
authentication for data communication, enabling secure email and file encryption.
Q3) Attempt any TWO of the following:
a) What are the advantages and disadvantages of recursive DNS?
Advantages: Simplifies user experience by resolving domain names without user intervention;
can cache results for faster responses.
Disadvantages: Can increase load on DNS servers and may be vulnerable to certain types of
attacks, such as cache poisoning.
b) Write a short note on SIP.
SIP (Session Initiation Protocol) is a signaling protocol used to initiate, maintain, and
terminate real-time communication sessions, such as voice and video calls over IP networks.
c) What are the steps used in DES?
The Data Encryption Standard (DES) involves steps like initial permutation, 16 rounds of
substitution and permutation, and final permutation to encrypt data using a 56-bit key.
Q4) Attempt any TWO of the following:
a) What is MAC? HMAC? Give one difference.
MAC (Message Authentication Code) is a short piece of information used to authenticate a
message; HMAC (Hash-based Message Authentication Code) uses a cryptographic hash
function with a secret key.
Difference: HMAC provides a higher level of security by incorporating a hash function.
b) Discuss various IPSec services.
IPSec provides services such as confidentiality (encryption of data), integrity (ensuring data
has not been altered), and authentication (verifying the identities of the parties involved).
c) What is firewall? What are its types?
A firewall is a security system that monitors and controls network traffic. Types include
packet-filtering firewalls, stateful inspection firewalls, proxy firewalls, and next-generation
firewalls.
Q5) Attempt any ONE of the following:
a) How do digital signatures work?
Digital signatures use public key cryptography to provide authentication and integrity: the
sender generates a hash of the message, encrypts it with their private key, and the recipient
verifies it with the sender's public key.
b) In an RSA crypto system, a particular A uses two prime numbers, 13 and 17, to generate
the public and private keys. If the public key of A is 35, then the private key of A is?
To find the private key, calculate n=p×q=13×17=221n = p \times q = 13 \times 17 =
221n=p×q=13×17=221 and the totient ϕ(n)=(p−1)(q−1)=192\phi(n) = (p-1)(q-1) = 192ϕ(n)=(p−1)
(q−1)=192. With a public key e=35e = 35e=35, use the Extended Euclidean Algorithm to find the
private key ddd such that e×dmod ϕ(n)=1e \times d \mod \phi(n) = 1e×dmodϕ(n)=1. The
private key ddd is 83.