NS ND23
NS ND23
NS ND23
Fourth Semester
(Regulations 2021)
Time: Three hours Maximum: 100 marks
2. If the data link layer can detect errors between hops, why do you think we
need another checking mechanism at the transport layer?
3. Find the error, if any, in the following IPv4 addresses.
(a) 111.56.045.78
(b) 75.45.301.14
8
Why is the Caesar cipher substitution technique vulnerable to a brute-force
cryptanalvsis?
11. (a) With neat diagram, illustrate in detail about the seven layers of the OST
architecture model.
Or
(b) () Exempify in detail about TCP/P protocol suite. (7)
(11) Find the minimum Hamming distance for the following cases
Detection of two errors.
Correction of twoerrors.
Detection of 3 errorsor correction of 2 errors.
Detectionof 6 errors or correction of 2 errors. (6)
12. (a) (i) Compare and contrast between IPy4 addresses and IPv6 addresses.
(6)
(iü) Illustrate IPv6 datagram packet format with neat diagram. (7)
Or
(b) (i) Enumerate three transition strategies to move from IPv4 to IPv6.
Illustrate the difference between tunneling and dual stack
strategies during the transition period. When is each strategy used?
(7)
(ii) Exemplify in detail about Internet Control Message Protocol
(ICMP) error reporting messages. (6)
13. (a) Discuss in detail about User Datagram Protocol (UDP) with neat
diagrams.
Or
(b) (i) Explain in detail about the congestion control and avoidance
techniques. (7)
(11) Describe about HTTP architecture and its functionality. (6)
14. (a) i) Explain in detail about OSI Security Architecture model with
diagram. (6)
(ii) Compare AES to DES. For each of the following elements of DES,
indicate the comparable element in AES or explain why it is not
needed in AES.
XOR of subkey material with the input to the f function
XOR of the f function output with the left half of the block
Swapping of halves of the block. (7)
Or
(b) () Write down the RSA algorithm and illustrate with an example. (7)
(ii) Illustrate the working nature of Secure Hash Algorithm (SHA). (6)
20928
15. (a) (i) The RS.A-T 100 Trojan is triggered when a 32-bit specific plaintext
1S applhed. Calculate the probability of triggering this Trojan if one
uses random patterns as plaintext. (7)
Or
(b) (i) Illustrate the basic steps to perform a front-side electrical probing
attack. (6)
Or
(b) A client uses TCP to send data to a server. The data are 16 bytes.
(i) Calculate the efficiency of this transmission at the TCP level (ratio of
useful bytes to total bytes). (iü) Calculate the efficiency of transmission at
the IP level. [Note: Assume no options for the P header]. (üi) Calculate
the efficiency of transmission at the data link layer. [Note : Assume no
options for the IF header and use Ethernet at the data link layer].
3 20928