EC3401 Networks and Security
Important Questions
Unit 1
- In CRC, show the relationship between the following entities. (Here, size means the number of bits):
(i) The size of the dataword and the size of the codeword
(ii) The size of the divisor and the remainder
(iii) The degree of the polynomial generator and the size of the divisor
(iv) The degree of the polynomial generator and the size of the remainder - Explain in detail about the seven layers of the OSI architecture model with neat diagram.
- With neat diagram, illustrate in detail about the seven layers of the OSI -architecture model.
- (i) Exemplify in detail about TCP/IP protocol suite.
Find the minimum Hamming distance for the following cases:
Detection of two errors.
Correction of two errors.
Detection of 3 errors or correction of 2 errors.
Detection of 6 errors or correction of 2 errors.
Unit 2
- Compare and contrast between IPv4 addresses and IPv6 addresses.
- Illustrate IPv6 datagram packet format with neat diagram.
- Enumerate three transition strategies to move from IPv4 to IPv6. Illustrate the difference between tunneling and dual stack strategies during the transition period. When is each strategy used?
- Exemplify in detail about Internet Control Message Protocol (ICMP) error reporting messages.
- Compare and contrast between unicast and multicast routing.
- Compare and contrast between interdomain and intradomain routing protocols.
- An IPv4 datagram has arrived with the following information in the header (in hexadecimal):
O x 45 00 00 54 00 03 58 50 20 06 00 00 7C 4E 03 02 B4 OE OF 02
(i) Is the packet corrupted?
(ii) Is the packet fragmented?
(iii) What is the size of the data?
(iv) How many more routers can the packet travel to?
(v) What is the identification number of the packet?
(vi) What is the type of service?
Unit 3
- Illustrate in detail about congestion control and its avoidance techniques.
- Exemplify in detail about Domain Name System.
- Describe in depth about WWW and HTTP protocol.
- Discuss in detail about User Datagram Protocol (UDP) with neat diagrams.
- Explain in detail about the congestion control and avoidance techniques.
- Describe about HTTP architecture and its functionality.
Unit 4
- Explain in detail about OSI Security Architecture model with diagram.
- Compare AES to DES. For each of the following elements of DES, indicate the comparable element in AES or explain why it is not needed in AES.
XOR of subkey material with the input to the f function XOR of the f function output with the left half of the block Swapping of halves of the block. - Write down the RSA algorithm and illustrate with an example.
- Illustrate the working nature of Secure Hash Algorithm (SHA).
- Explain in detail about RSA algorithm with an example.
- Exemplify in detail about Advanced Encryption Standard (AES).
- Illustrate about hash functions in cryptography.
Unit 5
- Explain in detail about blockchain technology and its features.
- Exemplify in detail about side channel attack in hardware security.
- Illustrate in detail about hardware security best practices and counter measures.
- The RSA-T 100 Trojan is triggered when a 32-bit specific plaintext is applied. Calculate the probability of triggering this Trojan if one uses random patterns as plaintext.
- Exemplify the main idea of side channel analysis. Compare between invasive and noninvasive attacks.
- Illustrate the basic steps to perform a front-side electrical probing attack.
- Discuss in detail about block chain technology and its features.