Manipal University Jaipur
Department of Computer Science and Engineering
Tutorial Sheet No.: 4
Academic Session 2023-24 Semester V
Course Code and Name CS-3104 and Computer Network
Question 1: Explain the key differences between HTTP and HTTPS. How does HTTPS enhance the security
of web communication?
Solution 1: HTTP (Hypertext Transfer Protocol) is a standard protocol for transmitting data over the
internet, while HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption
to protect data during transmission. HTTPS is secured using SSL/TLS protocols, providing confidentiality
and integrity.
Question 2: Describe the functioning of FTP (File Transfer Protocol) and its modes. How does FTP differ
from HTTP in terms of file transfer?
Solution 2: FTP is a protocol used for transferring files between computers on a network. It operates in
two modes: active and passive. In active mode, the client opens a random port for data transfer, while in
passive mode, the server opens a port. FTP differs from HTTP in that it establishes two separate channels
for control and data, making it more efficient for large file transfers.
Question 3: Explain the role of DNS (Domain Name System) in the application layer. How does DNS resolve
domain names to IP addresses?
Solution 3: DNS is responsible for translating human-readable domain names into IP addresses. The
process involves the client sending a DNS query to a DNS server, which then recursively or iteratively
resolves the domain to an IP address. This IP address is returned to the client, allowing it to establish a
connection with the desired server.
Question 4: Compare and contrast SMTP (Simple Mail Transfer Protocol) and IMAP (Internet Message
Access Protocol). How do these protocols contribute to email communication?
Solution 4: SMTP is used for sending emails, while IMAP is used for retrieving emails from a mail server.
SMTP is a push protocol, whereas IMAP is a pull protocol. SMTP transfers emails from the client to the
server, while IMAP allows clients to access and manage emails stored on the server.
Question 5: Discuss the importance of SSL/TLS in securing communication at the application layer. How
does SSL/TLS provide confidentiality and integrity?
Solution 5: SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols are used to secure
communication over a computer network. They provide encryption for data in transit, ensuring
confidentiality, and use cryptographic algorithms to verify the integrity of the transmitted data. SSL/TLS is
commonly used in HTTPS to secure web.
Manipal University Jaipur
Department of Computer Science and Engineering
Tutorial Sheet No.: 4
Question 6. Explain the purpose of the Domain Name System (DNS) and its role in computer networks.
Solution 6: The Domain Name System (DNS) is a distributed naming system that translates human-
readable domain names into IP addresses. It plays a crucial role in simplifying the way users access
resources on the internet by providing a hierarchical and decentralized mechanism for mapping domain
names to IP addresses.
Question 7: Describe the DNS resolution process. Include the steps involved when a user types a domain
name into a web browser.
Solution 7:
1. Local DNS Cache Check: The local DNS cache is checked for a previous resolution of the domain
name.
2. Recursive Query to Resolver: If not found locally, the client sends a recursive query to its DNS
resolver.
3. Root DNS Server: The resolver queries the root DNS server to find the authoritative DNS server
for the top-level domain (TLD).
4. TLD DNS Server: The TLD DNS server provides information on the authoritative DNS server for the
second-level domain.
5. Authoritative DNS Server: The resolver queries the authoritative DNS server for the specific
domain to obtain the IP address.
6. Response to Client: The IP address is returned to the client, and the information is cached for
future use.
Question 8: Explain the differences between POP3 (Post Office Protocol 3) and IMAP (Internet Message
Access Protocol) in the context of email communication.
Solution 8:
• POP3: It is a protocol for retrieving emails from a mail server to a client device. It typically
downloads emails to the client, and messages are often deleted from the server after retrieval.
• IMAP: It allows multiple devices to access the same mailbox. Emails are kept on the server, and
changes (read/unread, delete) are synchronized across all devices.
Question 9: Identify and explain the three fundamental security goals in information security. Provide
examples or scenarios illustrating each goal.
Solution 9:
Three Fundamental Security Goals:
Manipal University Jaipur
Department of Computer Science and Engineering
Tutorial Sheet No.: 4
1. Confidentiality:
• Explanation: Confidentiality ensures that information is accessible only to those who have
the authorized permission to access it. It aims to prevent unauthorized access, disclosure,
or exposure of sensitive data.
• Example Scenario: Encrypting sensitive customer data in a database so that even if an
unauthorized person gains access to the database, they cannot understand or use the
confidential information.
2. Integrity:
• Explanation: Integrity ensures that data remains accurate, unaltered, and consistent
throughout its lifecycle. It protects against unauthorized or accidental modifications,
deletions, or insertions.
• Example Scenario: Using checksums or digital signatures to verify the integrity of a
downloaded software file. If the file is tampered with during download, the checksum
won't match, indicating a potential integrity breach.
3. Availability:
• Explanation: Availability ensures that authorized users have timely and uninterrupted
access to information and resources when needed. It protects against disruptions or
attacks that could lead to service downtime.
• Example Scenario: Implementing redundancy and failover mechanisms in a web server
infrastructure to ensure continuous availability. If one server fails, another takes over to
prevent service interruption.
Importance of the Three Security Goals:
• Holistic Security: Achieving all three goals collectively provides a holistic approach to information
security. Confidentiality protects against unauthorized access, integrity safeguards against
unauthorized modifications, and availability ensures uninterrupted access to resources.
• Risk Mitigation: Addressing these goals helps organizations mitigate risks associated with data
breaches, unauthorized access, data corruption, and service disruptions, which can have severe
consequences for business operations and reputation. Explain the purpose of a firewall in a
computer network.
Question 10: What is firewall. Describe the types of firewalls.
Solution 10:
Firewall Purpose: A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules. The primary purpose of a firewall is
to establish a barrier between a secure internal network and untrusted external networks, such as the
internet, to prevent unauthorized access and ensure the security of the network.
Manipal University Jaipur
Department of Computer Science and Engineering
Tutorial Sheet No.: 4
Types of Firewalls:
• Packet Filtering Firewalls:
Description: Examines packets of data and makes decisions based on predefined rules, such as
allowing or blocking packets based on source and destination IP addresses, ports, and protocols.
• Stateful Inspection Firewalls:
Description: Keeps track of the state of active connections and makes decisions based on the
context of the traffic. It allows or blocks packets based on the state of the connection.
• Proxy Firewalls:
Description: Acts as an intermediary between internal and external systems. It intercepts and
forwards requests on behalf of clients, providing an additional layer of security by hiding the
internal network structure.
• Application Layer Firewalls:
Description: Operate at the application layer of the OSI model, examining data at the application
level. They can understand and control specific applications or services, providing granular control
over network traffic.