COMPUTER NETWORKS - II
P5150
Q1) Attempt any Eight of the following (out of Ten) [8 × 1 = 8]
a) SMTP is a push protocol. State true or false, Justify.
Answer: True. SMTP (Simple Mail Transfer Protocol) is a push protocol because it pushes emails
from the sender’s email server to the receiver’s email server.
b) Write two types of connections used by FTP. Also write their port numbers.
Answer: FTP (File Transfer Protocol) uses two types of connections:
- Control Connection on port 21
- Data Connection on port 20
c) What is sampling?
Answer: Sampling is the process of converting a continuous signal into a discrete signal by
measuring its amplitude at regular intervals.
d) What is use of “BYE” message in SIP (Session Initiation Protocol)?
Answer: In SIP, the "BYE" message is used to terminate an active session between two parties.
e) What is VPN (Virtual Private Network)?
Answer: A VPN (Virtual Private Network) is a secure network that uses encryption to protect
data over the internet, allowing users to send and receive data as if their devices were directly
connected to a private network.
f) What is multicasting?
Answer: Multicasting is a method of sending a single message or stream of data to multiple
specific recipients on a network simultaneously.
g) Write advantages of packet filter firewall.
Answer: Advantages of a packet filter firewall include:
- Blocking unauthorized access to a network
- Reducing network traffic by filtering packets based on IP addresses and ports
h) Define cryptography.
Answer: Cryptography is the practice of securing information by converting it into a coded format
that only authorized parties can decode and understand.
i) Encrypt the following plain text with given key using substitution cipher. Plain text: India
is my country, Key = 4.
Answer: Encrypting "India is my country" using a substitution cipher with a key of 4 shifts each
letter forward by 4 letters:
- Encrypted text: "Mrhmc mw qc gsyrzx"
j) List methods for verifying the authenticity of the claimant.
Answer: Methods for verifying the authenticity of the claimant include:
- Passwords
- Biometric verification (e.g., fingerprint, face recognition)
- Digital certificates
- Two-factor authentication (2FA)
Q2) Attempt any Four of the following (out of Five) [4 × 2 = 8]
a) Which are traditional ciphers? Write working of shift cipher.
Answer:
- Traditional Ciphers: Shift Cipher, Substitution Cipher, and Transposition Cipher.
- Working of Shift Cipher: Each letter in the plaintext is shifted by a certain number of positions
in the alphabet (the "key"). For example, with a key of 3, "A" becomes "D," "B" becomes "E," etc.
This makes the text unreadable without the key.
b) List types of server. Write short note on any one type.
Answer:
- Types of Servers: Web Server, File Server, Mail Server, Database Server, Proxy Server.
- Web Server: Stores and serves web pages to users. When a user requests a page (through a
URL), the web server responds by sending the requested page to the user’s browser. Web servers
communicate using HTTP and HTTPS protocols.
c) Write advantage of POP.
Answer:
- Offline Access: POP (Post Office Protocol) allows emails to be downloaded from the server to
a local device, enabling offline access.
- Saves Server Space: Since emails are stored on the user's device, they don’t need to remain on
the server, freeing up storage space.
d) What is streaming live audio/video?
Answer:
- Definition: Streaming live audio/video is the process of sending audio and video content over
the internet in real-time.
- Benefits: Users can watch or listen to content immediately without downloading, which is ideal
for live events, news, and online broadcasts.
e) Write note on IPSec modes.
Answer:
- Transport Mode: Encrypts only the data part of the IP packet, leaving the header intact; used
for secure communication between two devices.
- Tunnel Mode: Encrypts the entire IP packet (header and data) and adds a new IP header,
commonly used for VPNs to protect data over untrusted networks.
Q3) Attempt any Two of the following (out of Three) [2 × 4 = 8]
a) Explain PGP certificates.
Answer:
- Definition: PGP (Pretty Good Privacy) certificates are digital certificates used to encrypt and
secure email and file sharing.
- Structure: Each PGP certificate contains a public key and information about the owner (like
name and email address).
- Working:
- PGP certificates use asymmetric encryption, which means there are two keys: a public key
for encryption and a private key for decryption.
- The public key can be shared openly, but the private key is kept secret by the owner.
- Verification: PGP certificates are verified through a "web of trust," where users sign each
other's certificates to establish authenticity.
- Usage: Commonly used for secure communication over email, file encryption, and digital
signatures to verify the authenticity and integrity of messages.
b) Using columnar transposition cipher convert the given plain text to cipher text.
- Plaintext: COMMUNICATIONMUSTBESECURE
- Key: FASTER
Answer:
- Steps:
1. Write down the key "FASTER" and assign column numbers based on alphabetical order of
letters in the key:
- F = 2, A = 1, S = 5, T = 6, E = 3, R = 4
2. Write the plaintext under these columns in rows:
F A S T E R
C O M M U N
I C A T I O
N M U S T B
E S E C U R
E
3. Fill the last row with extra letters (e.g., X's) if needed to complete it as a full row.
4. Read down the columns in the order of the numbered key: 1, 2, 3, 4, 5, 6.
- Cipher Text (after arranging in columns by key order):
"OCAEMSNIURMTUECSTIBUEMCR"
c) What is Electronic Code Book (ECB), write its advantages and disadvantages.
Answer:
- Definition: ECB (Electronic Code Book) is a simple mode of encryption where each block of
plaintext is encrypted separately with the same key, producing a corresponding block of ciphertext.
- Process:
- Plaintext is divided into fixed-size blocks (e.g., 64 or 128 bits).
- Each block is encrypted independently, resulting in a block of ciphertext for each plaintext
block.
- Advantages:
- Simplicity: ECB is easy to understand and implement.
- Parallel Processing: Since each block is independent, ECB allows for parallel encryption of
blocks, making it faster for some applications.
- Disadvantages:
- Pattern Leaks: Identical plaintext blocks produce identical ciphertext blocks, which can
reveal patterns in the data and make it less secure.
- Not Suitable for Large Data: ECB is insecure for encrypting large amounts of data or data
with repeating patterns (like images), as patterns can be recognized even after encryption.
Q4) Attempt any Two of the following (out of Three) [2 × 4 = 8]
a) Write difference between flat name space and hierarchical name space.
Answer:
b) Explain symmetric key cryptography.
Answer:
- Definition: Symmetric key cryptography is a type of encryption where the same key is used for
both encrypting and decrypting data.
- Process:
- The sender uses the key to encrypt the message.
- The receiver, who also has the same key, uses it to decrypt the message.
- Example: The AES (Advanced Encryption Standard) and DES (Data Encryption Standard)
algorithms.
- Advantages:
- Speed: Symmetric key cryptography is generally faster than asymmetric key cryptography.
- Efficiency: Suitable for encrypting large amounts of data.
- Disadvantages:
- Key Distribution: The key must be securely shared between the sender and receiver, which
can be challenging.
- Less Secure for Communication with Multiple Parties: Each pair of parties needs a unique
key, increasing the risk of key management issues.
c) Explain Streaming Stored Audio/Video first approach: using a web server, with
advantages and disadvantages.
Answer:
- Definition: This approach to streaming stored audio/video involves using a standard web server
to deliver media files (audio or video) to the client.
- Process:
1. The client requests the media file from the web server.
2. The web server sends the file to the client in small segments or blocks.
3. The client begins playback as soon as it receives enough of the file to ensure smooth
streaming.
- Advantages:
- Simplicity: Web servers are easy to set up and maintain, with no special streaming server
required.
- Compatibility: Works well with standard HTTP/HTTPS protocols, making it compatible with
most browsers and devices.
- Low Cost: Using a web server is often cheaper than dedicated streaming solutions.
- Disadvantages:
- Buffering Issues: Playback can be interrupted if the client’s network is slow or unstable.
- Limited Features: Does not support advanced streaming features, like adaptive bitrate, which
adjusts quality based on connection speed.
- Bandwidth Demand: Can consume a lot of bandwidth, potentially causing delays or quality
issues, especially during high traffic times.
Q5) Attempt any One of the following (out of Two) [1 × 3 = 3]
a) Explain Real-Time Interactive Audio / Video with diagram.
Answer:
- Definition: Real-Time Interactive Audio/Video is a type of communication where audio and
video are sent and received in real-time, enabling users to interact instantly. It’s commonly used in
video calls, online meetings, and live conferencing.
- Components:
- Audio/Video Capture: Microphone and camera capture the audio and video.
- Encoding and Compression: Audio and video are encoded and compressed to reduce data
size.
- Transmission: Data is sent over the network using protocols like RTP (Real-Time Protocol).
- Decoding and Playback: At the receiving end, data is decompressed and decoded for
playback on the user’s device.
- Protocols Used:
- RTP (Real-Time Protocol): Ensures data is sent in a format suitable for real-time
transmission.
- RTCP (Real-Time Control Protocol): Monitors data delivery and provides quality feedback.
- SIP (Session Initiation Protocol): Sets up, manages, and terminates the audio/video sessions.
- Challenges:
- Latency: Minimizing delay between transmission and playback to maintain real-time
interaction.
- Jitter: Handling variations in data arrival time to ensure smooth playback.
- Packet Loss: Reducing the loss of data packets to avoid interruptions.
Diagram
b) Explain SSL services in detail.
Answer:
- Definition: SSL (Secure Sockets Layer) is a protocol that provides security for data transmitted
over the internet by encrypting it. It ensures secure communication between a client (like a web
browser) and a server (like a website).
- Key SSL Services:
- Authentication: Verifies the identity of the server to prevent “man-in-the-middle” attacks,
where a malicious party might intercept communication.
- Data Confidentiality: Encrypts data so only the intended receiver can decode it, keeping the
data private during transmission.
- Data Integrity: Ensures data is not altered during transmission by using checksums or digital
signatures.
- SSL Handshake Process:
1. Client Hello: The client (browser) requests a secure connection, sending supported
encryption methods to the server.
2. Server Hello: The server responds with its certificate and chooses the encryption method.
3. Key Exchange: The client and server generate session keys for encryption.
4. Encryption Starts: The data is encrypted and transmitted securely.
- Encryption Types:
- Symmetric Encryption: For faster data transmission, used after the handshake.
- Asymmetric Encryption: For securely exchanging keys during the handshake.
- Advantages of SSL:
- Enhanced Security: Prevents data interception and tampering.
- Trustworthiness: SSL certificates indicate a secure site, building user trust.
PA-1024
Q1) Attempt any EIGHT of the following (out of TEN) [8 × 1 = 8]
a) What is Primary Server?
Answer: A Primary Server is the main DNS server that holds the original copy of a zone’s data and is
responsible for updating and distributing DNS records.
b) Write services provided by user agents, and explain composing message.
Answer: Services provided by user agents include reading, composing, sending, and organizing
messages.
- Composing Message: This service allows users to create a new email message, including entering
recipients, writing the subject, and typing the message body.
c) Define Jitter and Translation.
Answer: - Jitter: Variation in packet arrival time in a network, which can lead to uneven playback in
real-time applications.
- Translation: Converting one format or protocol into another, such as from IPv4 to IPv6.
d) What is sampling?
Answer: Sampling is the process of converting an analog signal into a digital signal by measuring its
amplitude at regular intervals.
e) Define cryptanalysis.
Answer: Cryptanalysis is the study of analyzing and breaking cryptographic codes and ciphers to
retrieve the original message without knowing the key.
f) What is S-box component of a modern block cipher?
Answer: An S-box (Substitution box) is a component in block ciphers used to perform substitution in
the encryption process, enhancing security by adding confusion to the data.
g) Write name of steps performed in each round of DES (Data Encryption Standard) Cipher.
Answer: The steps in each round of DES are Expansion, Key Mixing, Substitution (using S-boxes),
and Permutation.
h) What is the purpose of IPSec?
Answer: The purpose of IPSec is to secure internet communications by encrypting and authenticating
IP packets to ensure data confidentiality, integrity, and authenticity.
i) Write name of protocols on which IKE (Internet Key Exchange) is based.
Answer: IKE is based on ISAKMP (Internet Security Association and Key Management Protocol) and
Oakley.
j) A proxy firewall is also called application gateway. Write true or false and also justify.
Answer: True. A proxy firewall is also called an application gateway because it operates at the
application layer, filtering traffic and acting as an intermediary between users and the internet.
Q2) Attempt any FOUR of the following (out of FIVE) [4 × 2 = 8]
a) What is firewall? Explain with diagram.
Answer:
- Definition: A firewall is a security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules.
- Purpose: It acts as a barrier between a trusted internal network and untrusted external networks,
such as the internet, to prevent unauthorized access and cyber threats.
- Types: There are hardware and software firewalls, and common types include packet-filtering,
proxy, and stateful firewalls.
- Diagram:
b) What is streaming audio/video? Also write examples.
Answer:
- Definition: Streaming audio/video is a method of delivering media content over the internet in real-
time, allowing users to listen or watch as the data is transmitted without waiting for the entire file to
download.
- How it Works: The media is divided into small data packets that are played as they are received,
which reduces buffering and allows immediate playback.
- Examples: Popular streaming services include Netflix (video streaming), Spotify (audio streaming),
and YouTube Live (live audio and video streaming).
c) Write information about iterative resolution, with diagram.
Answer:
- Definition: Iterative resolution is a process in the Domain Name System (DNS) where a DNS server,
upon receiving a query, responds with the best answer it can provide without querying other servers.
- Process:
1. The DNS server checks if it has the answer; if not, it directs the client to a different DNS server
that might know the answer.
2. The client continues querying other DNS servers iteratively until it finds the IP address it’s
looking for.
- Diagram:
d) What is anonymous FTP?
Answer:
- Definition: Anonymous FTP (File Transfer Protocol) allows users to access files on a server without
needing a username or password.
- Usage: Commonly used to allow public access to files, such as software downloads or public
datasets.
- Security: The user often logs in with "anonymous" as the username and a generic password (like an
email address). Security is limited, so access is typically restricted to public files only.
e) What is Digital Signature?
Answer:
- Definition: A digital signature is an electronic, encrypted stamp of authentication on digital data,
confirming the identity of the sender and ensuring data integrity.
- How it Works:
- The sender uses a private key to encrypt the digital signature.
- The receiver uses the sender’s public key to decrypt and verify the signature.
- Purpose: Ensures that the message was sent by the claimed sender and has not been tampered with
during transmission.
Q3) Attempt any TWO of the following (out of THREE) [2 × 4 = 8]
a) Explain security services for message.
Answer:
- Confidentiality: Ensures that the message is accessible only to the intended recipient by encrypting
the data, which keeps unauthorized users from reading it.
- Integrity: Protects the message from being altered during transmission. Hashing and message
digests help detect any changes in the message content.
- Authentication: Verifies the identity of the sender and receiver, ensuring both parties are who they
claim to be. Digital certificates and signatures are often used for this purpose.
- Non-repudiation: Prevents the sender from denying they sent the message, which is achieved
through digital signatures, ensuring accountability.
- Access Control: Restricts access to sensitive information based on permissions, allowing only
authorized users to read or modify the message.
b) Explain streaming stored audio/video Third Approach: Using a media server.
Answer:
- Definition: This approach uses a dedicated media server to manage and deliver stored audio and
video files to clients efficiently, especially when streaming to large audiences.
- Process:
1. Client Request: The client requests a media file.
2. Media Server: The media server manages the request, handles buffering, and streams the content,
ensuring optimal performance.
3. Streaming Protocols: Protocols like RTSP (Real-Time Streaming Protocol) are used to control
playback and quality, enabling features like play, pause, and resume.
- Advantages:
- Improved Quality: The media server is optimized for streaming, providing better quality, reduced
buffering, and adaptive bitrate based on network speed.
- Scalability: Can handle large numbers of users and offers features like load balancing for efficient
content delivery.
- Disadvantages:
- Cost: Requires dedicated server resources, which can be more costly than simple web servers.
- Complex Setup: Media servers are more complex to set up and maintain compared to web servers.
c) Explain any four user agent services.
Answer:
- Composing Messages: Allows users to create new messages, entering recipients, subject lines, and
message content. This service typically includes options to format the text and add attachments.
- Reading Messages: Provides the ability to view received messages, including the sender, subject,
and timestamp. User agents often include features for organizing and filtering incoming emails.
- Replying and Forwarding: Enables users to respond to received messages directly or forward them
to other recipients, saving time in communication.
- Organizing and Storing Messages: Offers tools for organizing messages into folders, marking
messages as important, and storing them for future reference, helping users manage their inbox
efficiently.
Q4) Attempt any TWO of the following (out of THREE) [2 × 4 = 8]
a) What is IMAP4? Write its features, advantages, and disadvantages.
Answer:
- Definition: IMAP4 (Internet Message Access Protocol, version 4) is a protocol used by email clients
to retrieve messages from a mail server. It allows users to access their email from multiple devices
while keeping messages stored on the server.
Features:
1. Remote Access: Allows users to access and manage their emails from any device.
2. Email Synchronization: Emails are synchronized across devices (e.g., read/unread status, folders,
and flags are updated on all devices).
3. Server-Side Storage: Messages remain on the server, allowing users to organize emails into folders
without downloading them to the client.
4. Multiple Folder Support: Users can create and manage multiple folders for organizing emails.
Advantages:
1. Access from Multiple Devices: IMAP4 allows seamless access and management of emails across
different devices.
2. Efficient Organization: Since emails remain on the server, users can easily organize messages into
folders.
3. Better Email Management: Supports synchronization of email states (read, unread, flagged) across
all devices.
4. Reduced Local Storage: Email storage is centralized on the server, which reduces the need for
local storage.
Disadvantages:
1. Server Dependency: Requires constant access to the internet and an active server connection.
2. Slower Access: May be slower than other protocols like POP3 since emails are retrieved from the
server each time.
3. Requires More Bandwidth: Frequent synchronization and downloading of headers and content can
use more bandwidth.
4. Server Storage Limits: If the server has limited storage, users may need to delete old emails or
increase storage.
b) Explain asymmetric key cryptography with the help of diagram.
Answer:
- Definition: Asymmetric key cryptography (also called public key cryptography) uses two different
keys: one public key for encryption and a private key for decryption. This system enables secure
communication without needing to share the decryption key.
How It Works:
1. Public Key: Shared openly and used to encrypt messages.
2. Private Key: Kept secret by the receiver and used to decrypt the encrypted message.
3. The sender encrypts the message with the recipient's public key.
4. The recipient decrypts the message using their private key.
Diagram:
Example:
- RSA Algorithm is a widely used asymmetric encryption method where the encryption key
is public and the decryption key is private.
Advantages:
- Secure Key Exchange: Enables secure communication without needing to share the
decryption key.
- Digital Signatures: Provides a method for verifying sender identity using digital signatures.
Disadvantages:
- Slower Speed: Slower compared to symmetric encryption due to the complex
mathematical operations involved.
- Key Management: Requires careful management of public and private keys, especially in
large systems.
c) Explain in detail packet filter firewall, also write its advantages and disadvantages.
Answer:
- Definition: A packet filter firewall works by inspecting packets of data being transmitted
across a network. It allows or blocks traffic based on predefined rules (e.g., source IP address,
destination IP address, port number, and protocol).
How It Works:
1. The firewall checks each incoming or outgoing packet.
2. It compares the packet's header information against predefined rules.
3. Based on these rules, the firewall either allows the packet to pass or blocks it.
4. The packet filter firewall operates at the network layer (Layer 3) of the OSI model and
can also filter based on transport layer (Layer 4) information like TCP/UDP ports.
Example: A rule might specify that all packets from IP address `192.168.1.10` to port 80
(HTTP) are allowed, while others are denied.
Advantages:
1. Speed: Packet filtering is fast because it only checks packet headers, not the content.
2. Simplicity: Easy to configure and manage with clear rules for allowing or blocking traffic.
3. Low Overhead: Operates at the network layer, which reduces the processing load on
systems.
Disadvantages:
1. Limited Security: Only inspects the packet headers, not the content, so it cannot detect
attacks hidden within the data payload.
2. No Stateful Inspection: It doesn’t track the state of active connections, so it can’t
distinguish between legitimate requests and malicious ones within the same session.
3. Static Rules: Rules are typically static and might not be able to adapt to sophisticated
attacks (e.g., IP spoofing, DoS attacks).
Q5) Attempt any ONE of the following (out of TWO) [1 × 3 = 3]
a) Using columnar transposition cipher, convert the following plaintext to ciphertext.
'allthepacketsfromporttenareallowed', key='COMPUTER'.
Answer:
- Step 1: Write the plaintext in rows according to the key length.
- The length of the key "COMPUTER" is 8, so we write the plaintext in a grid with 8
columns. If necessary, we add extra filler characters (like 'X') to make the number of
characters a multiple of 8.
Plaintext: allthepacketsfromporttenareallowed
Grid (8 columns):
C O M P U T E R
-
a l l t h e p a
c k e t s f r o
m p o r t t e n
a r e a l l o w
e d X X X X X X
- Step 2: Read the grid by columns (according to the key order).
- The columns are arranged based on the alphabetical order of the key "COMPUTER".
C = 1, O = 2, M = 3, P = 4, U = 5, T = 6, E = 7, R = 8.
- Now read the columns in order 1-8:
Column 1: a, c, m, a, e
Column 2: l, k, p, r, d
Column 3: l, e, o, e, X
Column 4: t, t, r, a, X
Column 5: h, s, t, l, X
Column 6: e, f, t, l, X
Column 7: p, r, e, o, X
Column 8: a, o, n, w, X
- Step 3: Combine the columns to form the ciphertext.
- Combining the letters column by column, the ciphertext is:
acmae lkp rd tte lsnxl X
Ciphertext: `acmaelkp rd tte lsnxl`
b) Write note on Real-Time Transport Protocol (RTP).
Answer:
- Definition: The Real-Time Transport Protocol (RTP) is a protocol used for delivering audio
and video over networks in real-time. It is commonly used in applications like video
conferencing, IP telephony, and streaming media.
- Key Features:
1. Real-Time Data: RTP is designed for real-time data, meaning it can handle streaming
media like audio and video with minimal delay.
2. Packetization: RTP works by dividing data (audio/video) into small packets, which are
sent over the network in real-time.
3. Sequence Numbering: RTP packets contain sequence numbers that help the receiver
reassemble the packets in the correct order, even if they arrive out of sequence.
4. Timestamping: Each RTP packet includes a timestamp, which is used to synchronize the
playback of audio and video at the receiver’s end.
5. Payload Type: RTP identifies the type of data (e.g., audio codec or video codec) through
a payload type field, enabling the receiver to understand the format.
- How RTP Works:
1. Sender: The sender divides the media (audio/video) into packets, adds sequence numbers,
timestamps, and payload information, then transmits the packets.
2. Receiver: The receiver processes the packets, reorders them if necessary, and uses the
timestamps to ensure media is played back at the correct time.
- RTP Control Protocol (RTCP):
- RTCP works alongside RTP to provide feedback on the quality of the transmission. It
monitors packet delivery, measures jitter, packet loss, and delays, and helps adjust the
transmission to improve quality.
- Advantages:
1. Supports Real-Time Communication: RTP is designed specifically for real-time
applications like voice calls and video streaming.
2. Synchronization: The protocol helps synchronize audio and video streams, making it
suitable for multimedia communications.
- Disadvantages:
1. No Error Recovery: RTP does not provide mechanisms for error correction or
retransmission of lost packets, which means it relies on upper-layer protocols like UDP or
higher to handle errors.
2. Limited QoS Support: While RTP helps with synchronization and sequencing, it does not
guarantee Quality of Service (QoS), which can be a challenge in poor network conditions.
P1301
Q1) Attempt any Eight of the following. [8 × 1 =8]
a) What is FQDN ?
Ans: FQDN stands for Fully Qualified Domain Name. It is the complete domain name for a
specific computer, or host, on the internet, which includes both the hostname and the domain
name. An example is www.example.com.
b) Where does MIME header appear?
Ans: MIME (Multipurpose Internet Mail Extensions) headers appear in the headers of
internet email messages and HTTP messages. They specify the nature of the data in the
message body, such as text, images, or attachments.
c) What is an anonymous FTP?
Ans: Anonymous FTP allows users without having account on server. Some sites have a set
of files available for public access, to enable anonymous FTP.
d) Give purpose of RTCP.
Ans: RTCP ( Real-time Transport Control Protocol) is used to provide control and statistical
information about an RTP media streaming session.
e) What is playback buffer?
Ans: A playback buffer is a temporary storage area used in streaming and media applications
to hold data before it is played. This buffer helps to smooth out any delays in data delivery,
providing a continuous playback experience.
f) What is Cipher key?
Ans: A cipher key is used in cryptography to transform plaintext into ciphertext (encryption)
and back into plaintext (decryption). It is an essential part of the encryption algorithm,
ensuring data security.
g) Does SSL mean HTTPS?
Ans: SSL (Secure Sockets Layer) does not mean HTTPS, but it is closely related. HTTPS
(HyperText Transfer Protocol Secure) is a secure version of HTTP that uses SSL (or its
successor, TLS—Transport Layer Security) to encrypt the data transmitted between the client
and the server.
h) What does a VPN do for?
Ans: A VPN (Virtual Private Network) provides a secure, encrypted connection over a less
secure network, such as the internet. It allows users to access network resources remotely and
securely, masking their IP address and encrypting data to enhance privacy and security.
i) Define firewall.
Ans: A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predefined security rules.
j) What is the root server in DNS?
Ans: A root server is a fundamental part of the Domain Name System (DNS). OR
Root servers are DNS name servers that operate in the root zone.
Q2) Attempt any Four of the following. [4 × 2 =8]
a) Explain Working of POP3.
Ans: POP3 (Post Office Protocol version 3) is a protocol used by email clients to retrieve emails
from a mail server. The working of POP3 involves:
Connection Establishment: The email client connects to the mail server using port 110
(or 995 for secure connections).
Authentication: The client sends a username and password to authenticate with the
server.
Email Retrieval: Emails are downloaded from the server to the client. By default, they
are removed from the server after retrieval, though some configurations allow them to be
retained.
Session Termination: The connection is closed after the emails are downloaded.
b) Discuss Streaming Live Audio/Video and Give Its Examples.
Ans: Streaming live audio/video involves transmitting media content in real-time over the
internet. This technology allows users to watch or listen to content without downloading it. The
key components include:
Encoder: Converts raw audio/video into a streamable format.
Media Server: Distributes the stream to viewers.
Player: Receives and plays the stream on the viewer's device.
Examples:
YouTube Live: Enables live video broadcasting to audiences worldwide.
Spotify Live: Provides live streaming of audio content such as music and podcasts.
Twitch: Popular for live streaming video games and other content
c) What is Meant by Transposition Cipher? Give Example
Ans: A transposition cipher is an encryption method that rearranges the characters of the
plaintext according to a certain system to form the ciphertext. Unlike substitution ciphers,
transposition ciphers do not alter the actual characters.
Example:
Plaintext: "HELLO WORLD"
Using a simple columnar transposition with a key of 3:
HLOW
ELRD
LO
Ciphertext: "HLO WEL RDLO"
d) Explain Working of TLS
Ans: TLS (Transport Layer Security) is a cryptographic protocol designed to provide secure
communication over a computer network. The working of TLS involves:
Handshake Protocol: Establishes a secure connection by negotiating encryption
algorithms, exchanging certificates, and generating session keys.
Record Protocol: Encrypts and transmits data using the session keys, ensuring data
integrity and confidentiality.
Alert Protocol: Manages error messages and alerts, maintaining the integrity of the
communication channel.
Change Cipher Spec Protocol: Notifies both parties about changes in encryption
methods during a session.
e) What is PGP? Write Its Purpose
Ans: PGP (Pretty Good Privacy) is an encryption program used for securing emails and files. It
combines symmetric-key and public-key cryptography, ensuring confidentiality and authentication.
Purpose:
Encryption: Encrypts data to prevent unauthorized access.
Digital Signatures: Authenticates the identity of the sender and ensures the integrity of
the message.
Key Management: Manages cryptographic keys securely, facilitating the exchange of
encrypted information.
Q3) Attempt any Two of the following. [2 × 4 =8]
a) Advantages and Disadvantages of Recursive DNS
Ans: Advantages:
1. Efficiency: Recursive DNS servers cache the responses they receive. This reduces the
lookup time for frequently accessed domains, speeding up the browsing experience.
2. User Convenience: Provides a seamless user experience by handling the entire DNS
lookup process, including querying multiple DNS servers if necessary.
3. Improved Performance: Reduces the load on authoritative DNS servers by caching
responses, which can result in better overall performance and less network congestion.
Disadvantages:
1. Security Risks: Recursive DNS servers can be vulnerable to various attacks, such as
DNS spoofing or cache poisoning, which can redirect users to malicious sites.
2. Privacy Concerns: Since recursive DNS servers log all the DNS queries they handle,
they can potentially track user browsing habits and expose private information.
3. Increased Latency: If the recursive DNS server is far from the user's location, the initial
lookup can take longer, causing a delay in accessing the desired resource.
b) Short Note on SIP
Ans: SIP (Session Initiation Protocol) is a signaling protocol used for initiating, maintaining,
and terminating real-time communication sessions in IP networks. These sessions can include
voice, video, messaging, and other multimedia communications. SIP is a critical component in
VoIP (Voice over IP) technology and is widely used for internet telephony.
Key Features of SIP:
Establishing Connections: SIP helps in setting up and tearing down calls and
multimedia sessions between two or more participants.
Location Service: Determines the location of endpoints to initiate a session.
Capability Negotiation: Ensures that the communication endpoints agree on the media
format and other session parameters.
Handling Call Features: Supports advanced call handling features like call forwarding,
call transfer, and call hold.
c) Steps Used in DES (Data Encryption Standard)
Ans: DES (Data Encryption Standard) is a symmetric-key algorithm used for the encryption of
data. Here are the steps involved in DES:
1. Key Generation:
o DES uses a 56-bit key for encryption. The key is initially 64 bits, but 8 bits are
used for parity checking and discarded.
2. Initial Permutation (IP):
o The plaintext block (64 bits) undergoes an initial permutation to rearrange the
bits.
3. Round Function (16 Rounds):
o The permuted block is split into two halves, left (L) and right (R).
o Each round involves:
Expansion: Expanding the 32-bit right half to 48 bits.
Key Mixing: XORing the expanded right half with a 48-bit subkey
derived from the original key.
Substitution: Using S-boxes to substitute the 48-bit result to 32 bits.
Permutation: Permuting the substituted 32-bit result.
XORing: XORing this result with the left half and swapping halves for
the next round.
4. Final Permutation (FP):
o After 16 rounds, the final permutation is applied to produce the ciphertext.
5. Decryption:
o Decryption uses the same process as encryption but applies the subkeys in
reverse order.
Q4) Attempt any Two of the following. [2 × 4 =8]
a) What is MAC? HMAC? Give one difference.
Ans: MAC (Message Authentication Code):
A MAC is a short piece of information used to authenticate a message and ensure its integrity.
It is created by applying a secret key to the message using a cryptographic algorithm.
The MAC is then appended to the message.
When the message is received, the recipient can use the same secret key to verify the MAC
and ensure that the message has not been altered.
HMAC (Hash-based Message Authentication Code):
HMAC is a specific type of MAC that uses a cryptographic hash function (like SHA-256)
along with a secret key to produce the MAC.
HMAC provides better security by combining the hashing process with a secret key, making it
more resistant to certain types of cryptographic attacks.
One Difference:
MAC uses a symmetric key algorithm for message authentication, while HMAC uses a
combination of a hash function and a secret key. This makes HMAC generally more secure
and efficient for verifying data integrity and authenticity.
b) Discuss Various IPSec Services
Ans: IPSec (Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP)
communications by authenticating and encrypting each IP packet in a data stream. Here are the main
IPSec services:
1. Authentication Header (AH):
o Provides data integrity and authentication of IP packets. It ensures that the data has
not been tampered with and verifies the source of the data. However, it does not
provide encryption, so the data remains visible.
2. Encapsulating Security Payload (ESP):
o Provides confidentiality, data integrity, and authentication. ESP encrypts the payload
of the IP packet to ensure data privacy. It also offers integrity and authentication
services, similar to AH.
3. Security Associations (SA):
o Defines the parameters for securing communications between two network entities.
Each SA specifies the cryptographic algorithms and keys used, the mode of IPSec
operation, and other settings.
4. Key Management:
o IPSec uses protocols such as Internet Key Exchange (IKE) to manage and exchange
cryptographic keys securely. IKE automates the process of creating, distributing, and
managing encryption keys.
5. Transport and Tunnel Modes:
o Transport Mode: Encrypts only the payload of the IP packet, leaving the original IP
header intact. Used for end-to-end communication between hosts.
o Tunnel Mode: Encrypts the entire IP packet, including the header. The
encrypted packet is then encapsulated within a new IP packet with a new header.
Used for network-to-network communications, such as VPNs.
o
c) What is Firewall? What Are Its Types?
Ans: Firewall:
A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules. Its primary function
is to act as a barrier between a trusted internal network and untrusted external networks,
preventing unauthorized access and protecting the network from threats.
Types of Firewalls:
1. Packet-Filtering Firewalls:
o Inspect packets at the network layer and filter them based on source and
destination IP addresses, ports, and protocols. They are simple and fast but offer
limited protection.
2. Stateful Inspection Firewalls:
o Monitor the state of active connections and make decisions based on the context
of the traffic. They keep track of the state of network connections, offering more
robust security than packet-filtering firewalls.
3. Proxy Firewalls:
o Act as intermediaries between users and the internet. They inspect all traffic and
can provide additional security features, such as content filtering and anonymity.
However, they can introduce latency and require more processing power.
4. Next-Generation Firewalls (NGFW):
o Combine traditional firewall functions with advanced features, such as
application-level inspection, intrusion prevention, and deep packet inspection.
NGFWs offer comprehensive security but can be complex to configure and
manage.
5. Unified Threat Management (UTM) Firewalls:
o Integrate multiple security functions, such as firewall, antivirus, intrusion
detection, and content filtering, into a single device. UTMs provide a centralized
security solution but may have performance limitations due to the integration of
multiple features.
o
Q5) Attempt any One of the following. [1 × 3 =8]
a) How Do Digital Signatures Work?
Ans: Digital Signatures are cryptographic mechanisms used to verify the authenticity and
integrity of digital messages or documents. They work through the use of public and private key
pairs in public-key cryptography.
Process:
1. Key Generation: A user generates a pair of keys—a private key (kept secret) and a
public key (shared with others).
2. Signing:
o The sender creates a digital signature using their private key.
o Typically, the document or message is hashed using a cryptographic hash
function.
o The resulting hash value is then encrypted with the sender's private key, creating
the digital signature.
3. Verification:
o The recipient, who has the sender's public key, can verify the digital signature.
o They decrypt the signature using the sender's public key, which should produce
the original hash value.
o The recipient then hashes the received document or message independently.
o If the two hash values match, the signature is verified, confirming the document's
integrity and the sender's authenticity.
Digital signatures ensure that the document has not been altered and verify the identity of the
sender.
b) RSA Cryptosystem: Finding the Private Key
Ans: In RSA, given two prime numbers p=13p = 13 and q=17q = 17, and the public exponent
e=35e = 35, let's find the private key dd.
Steps:
1. Calculate n: n=p×q=13×17=221
2. Compute Euler's Totient ϕ(n): ϕ(n)=(p−1)×(q−1)=(13−1)×(17−1)=12×16=192
3. Find the modular inverse of e (public exponent) modulo ϕ(n): The modular inverse d
is such that:
e×d≡1 (mod ϕ(n))
35×d≡1 (mod 192)
We need to solve for d: Using the Extended Euclidean Algorithm, we find that the modular
inverse of 35 modulo 192 is:
d=11
Thus, the private key d is 11.
P-6391
Q1) Attempt any EIGHT of the following (Out of TEN). [8 × 1 = 8]
a) What is Jitter?
Ans:- Jitter is the variation in the time delay of data packets over a network, which can cause
problems in real-time applications like video calls or streaming.
b) Name the two parts of Email.
Ans:- The two parts are the Username and Domain name (e.g., in
[email protected],
"example" is the username, and "domain.com" is the domain name).
c) Why is the MIME protocol required?
Ans:- MIME (Multipurpose Internet Mail Extensions) is required to allow emails to include
multimedia content, such as images, audio, video, and text in various character sets.
d) List the types of MPEG frames.
Ans:- The types are I-frames (Intra-coded frames), P-frames (Predictive frames), and B-frames
(Bidirectional frames).
e) What is frequency masking?
Ans:- Frequency masking is a technique used to filter or hide certain frequencies in audio
processing, often to make certain sounds clearer or reduce unwanted noise.
f) What do you mean by Proxy firewall?
Ans:- A Proxy firewall is a type of firewall that acts as an intermediary between users and the
internet, filtering and monitoring network traffic to enhance security.
g) What do you mean by cryptography and cryptoanalysis?
Ans:- Cryptography is the practice of securing information by converting it into unreadable code
(encryption). Cryptanalysis is the process of analyzing and breaking encrypted codes to retrieve
the original data.
h) List the PGP services.
Ans:- PGP (Pretty Good Privacy) services include Authentication, Confidentiality, Integrity, and
Non-repudiation.
i) What is the difference between plaintext and ciphertext?
Ans:- Plaintext is the original, readable message, while ciphertext is the encrypted, unreadable
form of that message.
j) List the services of a user agent.
Ans:- Composition (creating messages), Reading (viewing messages), Replying (responding to
messages), Forwarding, and Attachment handling.
Q2) Attempt any FOUR of the following (Out of FIVE). [4 × 2 = 8]
a) Explain VPN in detail with example.
Ans:- VPN (Virtual Private Network) is a technology that allows secure connections over public
networks by creating an encrypted "tunnel" between devices.
- It masks the user’s IP address, ensuring privacy and preventing unauthorized access.
- Example: A remote employee can use a VPN to securely access a company's network and
resources from anywhere in the world, as if they were directly connected to the internal network.
b) Distinguish between message integrity and message authentication.
Ans:- Message Integrity: Ensures that the data sent has not been altered during transmission. It
verifies the data's correctness upon arrival.
- Message Authentication: Confirms the sender's identity to ensure that the message came from a
legitimate source.
- Difference: Integrity focuses on data reliability, while authentication focuses on verifying the
sender’s identity.
c) What is firewall? Explain its types.
Ans:- A firewall is a network security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules.
- Types of Firewalls:
- Packet Filtering Firewall: Filters packets based on IP address, port, and protocol. It is simple
but less secure.
- Stateful Inspection Firewall: Tracks the state of active connections and makes decisions based
on connection state and context.
- Proxy Firewall: Acts as an intermediary for requests between users and the internet, providing
an additional layer of security by hiding user identities.
d) Write a short note on message access agent: IMAP & POP.
Ans:- IMAP (Internet Message Access Protocol): Allows users to read and manage emails directly
from the mail server without downloading them. It enables synchronization across multiple
devices.
- POP (Post Office Protocol): Downloads emails from the server to a single device and removes
them from the server. It does not support synchronization across devices.
- Difference: IMAP is suitable for accessing email on multiple devices, while POP is typically
used for accessing email on a single device.
e) Explain in detail use of FTP and HTTP.
Ans:- FTP (File Transfer Protocol): Used to transfer files between a client and a server over a
network. It supports downloading, uploading, and managing files on remote servers.
- Example Use: Website developers use FTP to upload website files to a hosting server.
- HTTP (Hypertext Transfer Protocol): Used for transferring web pages and multimedia files over
the internet. It enables communication between web browsers and servers.
- Example Use: When a user visits a website, their browser uses HTTP to request pages from the
server, which are then displayed to the user.
Q3) Attempt any TWO of the following (Out of THREE). [2 × 4 = 8]
a) Write a short note on DNS (Domain Name System).
Ans:- Domain Name System (DNS) is a system that translates human-readable domain names
(like www.example.com) into IP addresses (like 192.0.2.1), which computers use to identify each
other on the network.
- Structure: DNS is a hierarchical system, consisting of different levels: root, top-level domains
(TLDs, like .com or .org), second-level domains, and so on.
- Components:
- DNS Resolver: A client-side application that sends requests to DNS servers to get IP addresses.
- DNS Server: Responds to queries and provides the IP address associated with the requested
domain name.
- Types of DNS Records:
- A Record: Maps a domain to an IPv4 address.
- AAAA Record: Maps a domain to an IPv6 address.
- MX Record: Used for mail exchange servers.
- CNAME Record: Provides aliases for a domain.
- Importance: DNS allows users to access websites using easy-to-remember domain names instead
of IP addresses, making navigation more user-friendly.
b) Explain the header format of the Authentication Header in transport mode.
Ans:- Authentication Header (AH) is a protocol within IPsec that provides data integrity, data
origin authentication, and optional anti-replay protection, but does not provide confidentiality
(encryption).
- Transport Mode: In transport mode, only the data (payload) of the IP packet is authenticated and
protected, not the IP header itself. This mode is typically used for end-to-end communication
between devices.
- Header Format of AH:
- Next Header (8 bits): Indicates the type of the next header (e.g., TCP, UDP) following the AH.
- Payload Length (8 bits): Specifies the length of the AH in 32-bit words minus 2.
- Reserved (16 bits): Reserved for future use; currently set to 0.
- Security Parameters Index (SPI) (32 bits): A unique identifier used to select the security
association (SA) for the packet.
- Sequence Number (32 bits): Used to prevent replay attacks by assigning a unique sequence
number to each packet.
- Authentication Data (variable length): Contains the Integrity Check Value (ICV), a
cryptographic hash of the packet content used for authentication.
- Purpose of AH in Transport Mode: It verifies that the data has not been tampered with and
authenticates the sender's identity, ensuring secure communication without encryption.
c) Explain the concept of key rings in PGP (Pretty Good Privacy).
Ans:- PGP (Pretty Good Privacy) is an encryption program that provides cryptographic privacy
and authentication for data communication, often used for securing emails.
- Key Rings: In PGP, each user maintains two types of key rings to manage public and private
keys:
- Public Key Ring: Contains the public keys of the user and other individuals they communicate
with. This allows others to encrypt messages intended for the user.
- Private Key Ring: Contains the user's private keys, which are kept secure and used to decrypt
incoming messages and sign outgoing messages.
- Purpose of Key Rings:
- Simplifies key management by organizing keys in an accessible format.
- Allows users to verify the identities of others and manage the trustworthiness of public keys.
- Key Trust Model: PGP uses a "web of trust" where users can sign each other’s keys to indicate
trust. This is different from centralized models like Certificate Authorities (CAs).
- Importance: Key rings enable secure and authenticated communication in PGP, allowing users to
encrypt messages with confidence that they can only be read by intended recipients.
Q4) Attempt any TWO of the following (Out of THREE). [2 × 4 = 8]
a) Explain in detail RTCP-Message types.
Ans:- RTCP (Real-Time Control Protocol) works alongside RTP (Real-Time Protocol) to provide
feedback on the quality of data distribution for multimedia transmissions.
- Main RTCP Message Types:
1. Sender Report (SR):
- Sent by active RTP senders to provide information about transmission and reception statistics.
- Includes timestamp, packet count, and other data to help measure performance metrics, like
delay.
2. Receiver Report (RR):
- Sent by RTP receivers to report quality of service (QoS) metrics to the sender.
- Contains details about packet loss, jitter, delay, and other network performance indicators.
3. Source Description (SDES):
- Provides information about the source of the data, such as the user’s name, email, or identifier.
- Helps identify who is sending the media in a multi-user session.
4. Bye Message:
- Used by a participant to indicate they are leaving the session.
- Notifies others in the session about the departure, allowing them to update the participant list.
5. Application-Defined (APP) Message:
- Allows applications to send custom information within the session.
- Used for application-specific functions that are not covered by standard RTCP messages.
- Purpose of RTCP: These message types help monitor and control the quality of service in
multimedia communication, providing feedback to adjust parameters if needed.
b) Explain substitution cipher with example.
Ans:- Substitution Cipher: A method of encryption in which each letter in the plaintext is
replaced with another letter or symbol.
- Types of Substitution Ciphers:
1. Simple Substitution Cipher: Each letter is mapped to a different letter consistently
throughout the message.
2. Caesar Cipher: A specific type of substitution cipher where each letter is shifted a fixed
number of places (e.g., shift by 3).
- Example of Caesar Cipher:
- Plaintext: "HELLO"
- Shift by 3: H becomes K, E becomes H, etc.
- Ciphertext: "KHOOR"
3. Monoalphabetic Cipher: Uses a single alphabet substitution, where each letter corresponds
to a unique letter in the cipher.
4. Polyalphabetic Cipher: Uses multiple substitution alphabets to enhance security.
- Advantages: Simple to implement and understand.
- Disadvantages: Vulnerable to frequency analysis because each letter consistently maps to
the same substitute, making it easier to break with analysis tools.
c) Explain how a packet filter firewall filters packets.
Ans:- Packet Filter Firewall: A security device that monitors and controls network traffic
based on predefined security rules.
- Filtering Process:
- Inspects Packet Headers: Checks the packet’s IP address, port number, protocol, and other
header information.
- Rule-Based Filtering: Uses rules to determine if a packet should be allowed or blocked.
- Source IP/Port Rules: Allows or blocks packets based on the IP address or port of the
sender.
- Destination IP/Port Rules: Allows or blocks packets based on the destination IP or port.
- Protocol Rules: Filters based on protocol types (e.g., TCP, UDP, ICMP).
- Action: Once the rules are checked, the packet filter either:
- Allows (Accepts) the packet if it meets the criteria.
- Drops (Rejects) the packet if it does not meet the criteria.
- Stateless vs. Stateful Filtering:
- Stateless Filtering: Treats each packet independently, without keeping track of previous
packets.
- Stateful Filtering: Tracks the state of connections to make more informed filtering
decisions.
- Advantages of Packet Filter Firewalls:
- Efficiency: Low processing overhead due to simple inspection at the network layer.
- Cost-Effective: Basic firewalls are relatively inexpensive and easy to deploy.
- Limitations: Limited by lack of inspection at higher layers, making it less effective against
complex attacks.
Q5) Attempt any ONE of the following (Out of TWO). [1 × 3 = 3]
a) Write a short note on Real-time interactive audio/video.
Ans:- Real-time Interactive Audio/Video refers to audio and video communication
that happens in real-time over a network, allowing for immediate interaction between
users. This technology is commonly used in applications like video conferencing, live
streaming, online gaming, and VoIP (Voice over Internet Protocol).
- Key Features:
- Low Latency: Essential for smooth, immediate interaction, typically with delays
under 200 milliseconds.
- High-Quality Audio and Video: Compression algorithms (like H.264 for video and
AAC for audio) are used to maintain quality while reducing bandwidth.
- Adaptive Streaming: Adjusts video quality in real-time based on network speed and
conditions to avoid lag.
- Synchronization: Ensures that audio and video remain in sync, which is critical for
natural conversation and interaction.
- Protocols Used:
- RTP (Real-time Transport Protocol): Used to deliver audio and video over IP
networks.
- RTCP (Real-time Control Protocol): Works with RTP to provide feedback on
transmission quality and adjust parameters as needed.
- WebRTC: A technology that enables real-time communication through browsers
without additional plugins.
- Challenges:
- Network Congestion: Can cause lag, jitter, and packet loss.
- Bandwidth Requirements: High-definition video requires substantial bandwidth.
- Compatibility: Ensuring compatibility across devices and networks can be
challenging.
Real-time interactive audio/video is essential for applications requiring live
interaction, making it a cornerstone of modern communication technology.
b)Using columnar transposition convert the ciphertext
“STMTCRCCOVUSITEEYPEHCILDIIOAAE” to plaintext. The key is
CIPHER.
Ans:To decode the ciphertext using the Columnar Transposition Cipher with the key
CIPHER:
1. Determine the Column Order Using the Key:
Assign numbers to each letter in "CIPHER" based on alphabetical order:
C I P H E R
1 4 5 3 2 6
2. Determine the Column Count and Rows:
Since "CIPHER" has 6 letters, there will be 6 columns. The ciphertext has 30 letters,
so we’ll have 5 rows (30 ÷ 6).
3. Write the Ciphertext in the Transposed Order:
- Arrange the ciphertext vertically based on column order:
Column Order:
C E H I P R
1 2 3 4 5 6
- Write the letters in column order across 5 rows:
S T M T C R
C C O V U S
I T E E Y P
H C I L D I
O A A E - -
4. Reorder Columns as per Original Key:
Use the key CIPHER to read the text by rows:
- Row-wise plaintext conversion based on key order -