17E00406 Data Communication & Network Analysis1
17E00406 Data Communication & Network Analysis1
17E00406 Data Communication & Network Analysis1
(b) Comparecircuitswitchingandpacketswitching. 5M
Explanation of any five points---Each carry 1M
Circuit Switching Packet Switching
4.The delay between data units in circuit switching The delay between data units in
is uniform. packet switching is not uniform.
10.Congestion can occur during the connection Congestion can occur during the data
establishment phase because there might be a case transfer phase, a large number of
where a request is being made for a channel but the packets comes in no time.
channel is already occupied.
OR
2 ExplainaboutOSIarchitectureindetail. 10M
Need of OSI Architecture: ---3M
1. Security Needs:
OSI Architecture caters to the security needs of an organization.
Safety and security are ensured by OSI Architecture to prevent risk and
threats.
2. Systematic Arrangement:
OSI Architecture gives a systematic approach to the security
requirements of an organization.
Security policies are well maintained through OSI Architecture.
3. Centralised Processing:
OSI Architecture maintains a central processing environment.
LAN and WAN help in the Centralised Processing of OSI
Architecture.
Benefits of OSI Architecture: ---3M
1. Providing Security:
OSI Architecture in an organization provides the needed security and
safety, preventing potential threats and risks.
Managers can easily take care of the security and there is hassle-free
security maintenance done through OSI Architecture.
2. Organising Task:
Managers get the opportunity to organize tasks in an organization
effectively.
A well-planned standard architecture for security features enhances
performance.
3. Meets International Standards:
Security services are defined and recognized internationally meeting
international standards.
The standard definition of requirements defined using OSI
Architecture is globally accepted.
Explanation of the image carry 4M
1. Route Tags
2. Variable subnetting support
3. Immediate next hop for shorter paths
4. Multicasting to reduce load on hosts
5. Authentication for routing update security
6. Configuration switches for RIP Version 1 and RIP Version 2 packets
7. Supernetting support
IGMProutingprotocols
The Internet Group Management Protocol (IGMP) is a protocol that allows
several devices to share one IP address so they can all receive the same data.
IGMP is a network layer protocol used to set up multicasting on networks that use
the Internet Protocol version 4 (IPv4). -----2M
Applications:---3M
1. Streaming – Multicast routing protocol are used for audio and video
streaming over the network i.e., either one-to-many or many-to-many.
2. Gaming – Internet group management protocol is often used in simulation
games which has multiple users over the network such as online games.
3. Web Conferencing tools – Video conferencing is a new method to meet
people from your own convenience and IGMP connects to the users for
conferencing and transfers the message/data packets efficiently.
OR
4 (a) Explainanyfiveresponsibilitiesofdatalinklayerininternetmodel. 5M
1. Framing
2. Addressing
3. Synchronization
4. Error Control
5. Flow Control
6. Multi-Access
Flow control: It uses the method of sliding window protocol which is accomplished
by the receiver by sending a window back to the sender informing the size of data it
can receive. ---2M
Protocols of Transport Layer: ----5M
Explanation of Diagram---3M
OR
6 List and explain the services offered by session layer. 10M
Personal Documents: Driving License and Personal Bank Statements for the
recent 3 months
OR
8 Explain digital signatures in detail. 10M
Meaning of digitalsignatures –2M
1. First is the key generation that helps in getting the private key from the
possible values. It gives the private key and corresponding public key as
well.
2. Second is the signing algorithm that helps in the signature generation for the
corresponding message and private key.
3. The third is the signature verifying algorithm that is used to accept or
decline the authenticity of a document or message for the corresponding
public key and signature.
9 Explainanytwoapplicationlayerprotocolsthatenableinternetworking. 10M
OR
10 Explainhowaddressresolutionisperformedinapplicationlayer. 10M
Meaning of address resolution ---2 M
Explanation of Digram-4M
SECTION– B
(Compulsoryquestion, 01X10=10Marks)
Case Study/Problem:
A. Find the checksum for the following bit sequences. Assume 8-bit segment size.
1001001110010011
1001100001001101
Solution-
Solution-
A. . p=17, q=19
n=p*q=323
Φ(n)=(p-1)*(q-1)=288
d(private key) should be chosen such that d and Φ(n) have no common factors(they are
relatively prime)
n=p*q=77
Φ(n)=(p-1)*(q-1)=60
E*13=1 MOD 60