Pune University Previous Question Papers Computer Network and Security

Pune University Previous Question Papers Computer Network and

Security

B.E. (Electronics) COMPUTER NETWORK & SECURITY (2008 Pattern) (Sem. – II)

Time :3 Hours]                                                                                              [Max. Marks :100

Instructions to the candidates:

1)            Answer 3 questions from section -1 and 3 questions from section – II.

2)            Answers to the two sections should be written in separate answer books.

3)             Neat diagrams must be drawn wherever necessary.

4)             Pigures to the right indicate full marks.

5)             Use of logarithmic tables, slide rule, Mollier charts, electronic pocket calculator and steam tables is allowed.

6)            Assume suitable data, if necessary.

SECTION – I

QI) a) How do the layers of the TCP/IP Model correlate to layers of OSI Model.

[8]

b) Explain Service primitives and relationship of services to Protocols. [8]

OR

Q2) a) Draw Explain Different types of topologies in brief.                                         [8]

b)            Explain in brief physical address, network address 8 port number. [4]

c)            Explain:                                                                                                                [4] i) Frame relay ii) ATM

Q3) a) Explain Telnet 8 FTP in detail with respect to client sever communication.[8]

b)            List the advantages 8 disadvantages of HTML.                                            [4]

c)            How does streaming live audio/video differ from streaming stored audio/ video.       [4]

 

Q4) a) What is a socket? Explain.                                                                   [4]

b)            Explain p2p file sharing.                                                                                   [4]

c)            Explain:                                                                [8] i) TFTP. ii) BOOTP.

i)  RPC.  iv) DNS in detail.

1)                               a) Compare connection oriented Vs connectionless service? Compare TCP Vs UDP.                                                                                                                               [6]

b)            Explain Shortest path routing along with example.                                     [6]

c)            Compare IPv4 vs IPv6.                                                                                     [6]

OR

Q6) a) Write short note on                                                                                [9]

i)    DHCP           ii) ICMP

i)        IGMP

b)            Explain the two categories of congestion control in detail.                        [6]

c)            Explain different QOS parameters in brief.                                                  [3]

SECTION – II

Q7) a) Explain ALOHA, CSMA/CD 8 CSMA/CA in brief.                      [9]

b) Explain different Multiple access techniques.                                                   [9]

OR

Q8) a) Draw and Explain Physical layer of 802.11 Wireless Networks in detail. [9]

b)            Explain Fast Ethernet 8 Gigabit Ethernet communication.                        [5]

c)            A noiseless 6kHz channel is sampled every 1ms. What is the maximum data rate.     [4]

Q9) a) Compare LEO Vs MEO Vs GEO.                                                      [8]

b)            Compare circuit switching, packet switching.                                              [4]

c)            What is DSL? Explain.                                                                                     [4]

 

Q10)a) Explain Transmission media in detail.                                             [8]

b) Draw 8 Explain functional block diagram of modem. Explain in brief various modem standards.                                                                                                   [8]

QII) a) Compare public key 8 private key security algorithm. Explain RSA algorithm in detail.                                                                                                               [8]

b) Explain in brief a model for network security.                                                  [8]

OR

Q12)a) Using the RSA public key cryptosystem, with a = I, b = 2, etc.,

i)             If p = 7 and q = II, list five legal values for d.

ii)           If p = 13, q = 31 and d = 7, find e.                                                          [8]

b) What is Symmetric-Key Algorithm? Explain DES algorithm in detail. [8]

Leave a Comment