Ns Question Bank
Ns Question Bank
Ns Question Bank
UNIT I
PART A
1.What are the three criteria necessary for an effective and efficient network?
The most important criteria arc performance, reliability and security.
Performance of the network depends on number of users, type of transmission
medium, the capabilities of the connected h/w and the efficiency of the s/w.
Reliability is measured by frequency of failure, the time it takes a link to recover
from the failure and the network’s robustness in a catastrophe. Security issues
include protecting data from unauthorized access and viruses.
2.Group the OSI layers and its function.
The seven layers of the OSI model belonging to three subgroups. Network
support layers: Consisting of Physical, data link and network layers and they deal
with the physical aspects of moving data from one device to another. User support
layers: Consists of Session. Presentation and application layers and they allow
interoperability among unrelated software systems. The transport layer ensures
end-to-end reliable data transmission
3.What are the features provided by layering?
1. It decomposes the problem of building a network into manageable
components. Rather than implementing a monolithic piece of software each
of this solves one part of the problem.
2. It provides more modular design. To add some new service, it is enough to
modify the functionality at one layer, reusing the functions provided at all the
other layers.
4.What are the two interfaces provided by protocols?
1. Service interface-defines the operations that local objects can perform on the
protocol.
2. Peer interface-defines the term and meaning of messages
exchanged between protocol peers to implement the
communication service.
5.What is LAN?
A LAN is a common name used IO describe a group of devices that share a
geographic location.
It is limited to single building or campus.
6.What is flow Control?
Flow control refers to a set of procedures used to restrict the amount of
data. The sender can send before waiting for acknowledgment.
UNIT - II
1.What are the responsibilities of Network Layer?
The Network Layer is responsible for the source-to-destination delivery
of packet possibly across multiple networks (links).Logical addressing and
routing.
2.What is DHCP?
The Dynamic Host Configuration Protocol has been derived to provide
dynamic configuration. DHCP is also needed when a host moves from network
to network or is connected and disconnected from a network.
3..Define ICMP
Internet Control Message Protocol is a collection of error messages that
are sent back to the source host whenever a router or host is unable to process
an IP datagram successfully.
4.What is the need of internetwork?
To exchange data between networks, they need to be connected to make
internetwork.
5.What do you mean by ARP?
ARP stands for Address resolution protocol. ARP is a dynamic mapping
method that finds a physical address for a given a logical address. i.e. mapping
IP address to physical address.
6.What do you mean by RARP?
RARP stands for Reverse Address resolution protocol, maps a MAC
address to an IP address.
7.What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains
synchronization, flag, flow and error control specifications necessary to move
information from one place to another, as well as the physical address of the next
station to receive and route a packet.
8.Define the term medium access control mechanism
The protocol that determines who can transmit on a broadcast channel are
called medium access control (MAC) protocol. The MAC protocols are
implemented in the Mac sub-layer which is the lower sub-layer of the data link
layer.
9.What is bridge?
Bridge is a hardware networking device used to connect two LANs. A
bridge operates at data link layer of the OSI reference model.
10.What is a repeater?
Repeater is a hardware device used to strengthen signals being transmitted
on a network.
11.Define router
A network layer device that connects networks with different physical
media and translates between different network architecture.
12.What is a switch?
A switch is a networking device that manages networked connections
between devices on a star networks.
13.What is mean by Ethernet?
Ethernet is a networking technology developed in 1970 which is
governed by the IEEE 802.3 specifications.
14.What are the advantages of Ethernet?
1.Inexpensive
2.Easy to install
3.Supports various writing technologies.
15.Identify the class and default subnet mask of the IP address 217.65.10.7.
IP Address 217.65.10.7 belongs to Class C. Its subnet mask is
255.255.255.0.
16.What are the limitations of bridges?
1. Scale
2. Heterogeneity
17.Define Bluetooth.
Bluetooth is a wireless technology standard for exchanging data over
short distances (using short-wavelength UHF radio waves in the ISM band from 2.4
to 2.485 GHz) from fixed and mobile devices and building personal area networks
(PANs).
18.What are the 3 levels of hierarchy in IP Addressing?
1. Netid
2. Subnetid
3. Hostid
19.What are the functions of bridge?
1. Connecting networks
2. Filtering information so that network traffic for one portion of
the network does not congest the rest of the network.
14. Elaborate in detail about the transition from IPv4 to IPv6. (13)
UNIT- III
1.What are the fields on which the UDP checksum is calculated? Why?
UDP checksum includes a pseudo header, the UDP header and the data
coming from the application layer.
2.What are the advantages of using UDP over TCP?
UDP does not include the overhead needed to detect reliability
It does not need to maintain the unexpected deception of data flow
UDP requires less processing at the transmitting and receiving of hosts.
It is simple to use for a network
The OS does not need to maintain UDP connection information.
3.What is TCP?
TCP provides a connection oriented, reliable byte stream service. The connection
oriented means the two applications using TCP must establish a TCP connection with
each other before they can exchange data.
4.Define congestion
When too many packets rushing to a node or a part of network, the network
performance degrades. This situation is called as congestion.
5.List the flag used in TCP header.
TCP header contains six flags. They are URG, ACK, PSH, RST, SYN, FIN
6.Give the approaches to improve the QoS.
Fine grained approaches, which provide QoS to individual applications or
flows. Integrated services, QoS architecture developed in the IETE and often associated
with RSVP.
7.What do you mean by QoS?
Quality of Service is used in some organizations to help provide an optimal end
user experience for audio and video communications. QoS is most commonly used on
networks where bandwidth is limited with a large number of network packets
competing for a relatively small amount of available and width.
8.What is multiplexing?
The job of gathering data chunks at the sources host from different sockets,
encapsulating each data chunks with header information to create segments, and
passing the segments to the network layer is called multiplexing.
9.What is de-multiplexing?
The job of delivering the data in a transport layer segment to the correct socket is
called de-multiplexing.
10.What is RTT?
RTT is an acronym for Round Trip Time: it is a measure of the time it takes for
a packet to travel from a computer, across a network to another computer, and back.
11.What is the segment?
Transport layer protocols send data as a sequence of packets. In TCP/IP these
packets are called segments.
12.What is a port?
Applications running on different hosts communicate with TCP with the help of
a concept called as ports. A port is a 16 bit unique number allocated to a particular
application.
13.List the services of end to end services.
Guarantee message delivery.
Delivery messages in the same order they are sent.
Deliver at most one copy of each message.
Support arbitrarily large message.
Support synchronization.
14.What is congestion?
When load on network is greater than its capacity, there is congestion of data Packets.
Congestion occurs because routers and switches have queues or buffers.
15.What are the functions of transport layer?
Breaks messages into packets.
Connection control.
Addressing.
Provide reliability.
16.What are the types of QoS tools?
Congestion avoidance
Shaping/policing
Link efficiency
17.List some ways to deal with congestion
packet elimination
Flow control
Buffer allocation
Choke packets
18.Define network congestion?
When two or more nodes would simultaneously try to transmit packets to one
node there is a high probability that the number of packets would exceed the packet
handling capacity of the network and lead to congestion.
19.List the three types of addresses in TCP/IP.
Three types of addresses are used by systems using the TCP/IP protocol: the
physical address, the internetwork address (IP address), and the port address.
20.What is the flow characteristics related to QoS?
The flow characteristics related to QoS are
Reliability
Delay
Jitter, Bandwidth
PART B & C
11. Write in detail the principle of establishment of QoS through Differentiated services. (13)
A passive attack attempts to learn or make use of information from the system but does not affect system
resources. An active attack attempts to alter system resources or affect their operation.
It makes the problem of making large quantities of random keys. It also makes the problem of key
distribution and protection.
Threat: A Potential violation of security which exists when there is circumstance, capacity, action or event
that could breach security and cause harm .i.e. A threat is a possible danger that might exploit a vulnerability.
Attack: An assault on system security that derives from an intelligent threat: i.e. an intelligent act or
deliberate attempt to evade security services and violate the security policy of the system.
Cryptanalysis is the study of taking encrypted data, and trying to unencrypted it without use of the key.
The other side of cryptography, cryptanalysis is used to break codes by finding weaknesses within it. In addition to
being used by hackers with bad intentions, cryptanalysis is also often used by the military. Cryptanalysis is also
appropriately used by designers of encryption systems to find, and subsequently correct, any weaknesses that may
exist in the system under design. Cryptography the primary goal of cryptography is to conceal data to protect it
against unauthorized third-party access by applying encryption. The more theoretical or mathematical effort is
required for an unauthorized third party to recover data, the stronger is the encryption.
Confidentiality
Integrity
Availability
Write the message in a rectangle row by row and read message off column by column but permute the
order of the columns. The order of the column becomes the key to the algorithm.
If both sender and receiver use the same key, the system is referred to as symmetric, single key, secret
key, or conventional encryption. If the sender and receiver each use a different key, the system is referred to as
asymmetric, two-key, or public-key encryption.
10. What is the difference between a block cipher and a stream cipher?
A block cipher processes the input one block of elements at a time, producing an output block for each
input block. A stream cipher processes the input elements continuously, producing output one element at a time,
as it goes along.
An unconditionally secure cipher is a scheme such that if the cipher text generated by the scheme does not
contain enough information to determine uniquely the corresponding plain text, no matter how much cipher text is
available.
A computationally secure scheme is such that the cost of breaking the cipher exceeds the value of the
encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.
13. Briefly define the Caesar cipher.
The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further
down the alphabet. For example:
Plain: meet me after the toga party
Cipher: PHHW PH DIWHU WKH WRJD SDUWB
A monoalphabetic cipher maps from a plain alphabet to cipher alphabet. Here a single cipher alphabet is
used per message.
The best-known multiple-letter encryption cipher is the playfair, which treats diagrams in the plain text as
single units and translates these units into cipher text diagrams.
Transposition cipher is a cipher, which is achieved by performing some sort of permutation on the
plaintext letters.
Hiding the message into some cover media. It conceals the existence of a message. The process of
hiding a message in image.
In diffusion, the statistical structure of the plain text is dissipated into long-range statistics of the cipher
text. This is achieved by permutation.
In confusion, the relationship between the statistics of the cipher text and the value of the encryption
key is made complex. It is achieved by substitution.
20. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher? (NOV/DEC
2012)
Mono alphabetic cipher: Here a single cipher alphabet is used.
Poly alphabetic cipher: Here a set of related mono alphabetic substitution rules is used.
Passive attack:
Monitoring the message during transmission Eg: Interception
Active attack:
It involves the modification of data stream or creation of false data stream. E.g.: Fabrication,
Modification, and Interruption
Integrity:
Service that ensures that only authorized person able to modify the message.
Nonrepudiation:
This service helps to prove that the person who denies the transaction is true or false.
24. List ways in which secret keys can be distributed to two communicating parties.
• A can select a key and physically deliver it to B.
• A third party can select the key and physically deliver it o A and B
• If A and B have previously and recently used a key, one party can transmit the
new key to the other, encrypted using the old key
• If A and B each has an encrypted connection to a third party C, C can deliver a
key on the encrypted links to A and B
26. Why is the middle portion of 3DES a decryption rather than an encryption?
Decryption requires that the keys be applied in reverse order:
P=Dk1[Ek1[P]]
This results in a dramatic increase in cryptographic strength.The use of DES results in a
mapping that is not equivalent to a single DES encryption.
PART B & C
3. Using play fair cipher algorithm encrypt the message using the key "MONARCHY" and explain.
4. Explain the ceaser cipher and monoalphabetic cipher.
6. Write about any two classical crypto systems (substitution and transposition) with suitable
examples.
Ceaser cipher
Monoalphabetic cipher
Plafair cipher
Transpositional cipher
7. Explain any two classical ciphers and also describe their security Limitations.
8. Describe Linear Feedback Shift Registers Sequences and Finite Fields with their application in
Cryptography.
Unit V
PART – A
1.Define Kerberos.
Kerberos is an authentication service developed as part of project Athena at
MIT.The problem that Kerberos address is, assume an open distributed environment in which users at
work stations wish to access services on servers distributed throughout the network.
18. Give the application of IP security? • Provide secure communication across private & public LAN.
• Secure remote access over the Internet.
• Secure communication to other organization.
22. What do you mean by Security Association? Specify the parameters that
identifies the Security Association?
• An association is a one-way relationship between a sender and receiver that affords security services to the
traffic carried on.
• A key concept that appears in both the authentication and confidentiality mechanism for ip is the security
association (SA). A security Association is uniquely identified by 3 parameters:
• Security Parameter Index (SPI).
• IP Destination Address.
• Security Protocol Identifier.
PART B & C