Академический Документы
Профессиональный Документы
Культура Документы
UNIT-V PART-A 1. Define authentication and name any two authentication protocols 2. List any two types of DNS messages. 3. What is FDDI? 4. State why telnet uses network virtual terminal? 5. How does the user get E-mail from the message transfer agent? 6. What is the importance of cookies? 7. State the goals behind ISDN? 8. What is telnet used for? Discuss. 9. Define security in networking. 10. State Why telnet uses network virtual terminal? 11. What are the elements of WWW? 12. What is the function provided by FTP? 13. Define SMTP? 14. What is the use of DNS? 15. Give example for hierarchy in DNS? 16. Compare plain text and cipher text? 17. What is symmetry key algorithm? 18. What are all the services provided my E-mail? 19. Define HTML? 1. Define Fire walls? 2. Define a network security. 3. What are the potential security threats? 4. What is cryptography? 5. Explain different types of cryptography in detail. 6. Explain the different types of encryption method. 7. Write a short note on i) RSA algorithm ii) Digital signature 8. Explain the desirable properties of secure communication. 9. What is a policy and mechanism? 10. Discuss the communication security goals. 11. What is a passive attack? 12. What is a active attack? 13. Explain the different substitution techniques. 14. Discuss the different cipher modes. 15. What is a cryptanalysis? 16. Explain the different cryptanalytic attacks. 17. List the different types of authentication protocol in detail. 18. What is the secret key signature? 19. What is the key management concept? 20. How the certificates are verified? 21. Compare the symmetric and asymmetric key cryptography.
What are the benefits of IP security? Explain the AH header format. Explain the ESP header format. List the features of SSL. Write note on wireless security. List the various risk faced by messages that are transmitted over the internet.
PART-B 1. i) Explain in detail about the file transfer protocol. ii) Describe the architecture of ISDN. 2. i) Explain in detail about electronic mail. ii) Explain in detail any one ISDN protocol. 3. i) What is HTTP protocol used for? ii) What is the default port number of HTTP protocol? iii) Discuss the features of HTTP and also discuss how HTTP works. 4. Explain the importance of firewalls. 5. Explain in detail the following i) Fault management. ii) Security management.
17. Why transport layer extends host to delivery to process 18. State why telnet uses network virtual terminal? 19. What is the service provided by TCP? 20. Difference between UDP and TCP. 21.What is meant by well known port in TCP ? 22.Give the steps to establish a TCP connection.
PART-B 1. List and discuss the states used in TCP connection management finite state machine. i.Discuss how multiplexing and demultiplexing is done in the transport layer ii. Explain in detail the mechanism in transport layer for controlling congestion. 2. i) Explain choke packets methods of congestion control. 3. i) Explain the connection release process applied at transport layer. ii) Explain window management in TCP. 4. i) Discuss about quality of services. ii) Write short notes on integrated services. Explain about TCP Congestion control technique in detail. Write short notes on queuing disciplines. Explain Four- way handshaking method to terminate a connection in TCP. Explain in detail about any one of the congestion avoidance mechanisms. Explain in detail about source-based congestion avoidance.
5. 6. 7. 8. 9.
14. Define Fragmentation offset 15. Write the difference between bridge routers. 16. Find the error if any the following IP address. a. 111.56.045.78 b. 7 5 . 4 5 . 3 0 1 . 1 4 17. Where the routing table is maintained also state the purpose of maintaining a routing table. 18. What is datagram socket? 19. Write any four routing algorithm. 20. What is an IP address? 21. Explain broadcast routing. 22. Explain flooding and selecting flooding. 23. Explain internetworking. Why it is needed 24. Under what conditions adaptive routing is preferred ? 25. What is significance of internetworking
PART-B What are the limitations of distance vector routing. How are they addressed in link state routing? Explain routing of mobile hosting. Discuss how these routing and link state routing techniques work. State the major difference between Vector Routing and link state routing. What is fragmentation ? Explain how it is supported in IP4 and IP6. What is virtual circuit ? Explain with suitable example subnet and tables for virtual circuit. How virtual circuit changes as a packet sequence ? 8. Explain how mobile IP provides users the freedom to room beyond their home subnet while consistency maintaining their home IP address. 1. 2. 3. 4. 5. 6. 7.
12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22.
Give the significance of termination. What is IEEE 802.4 Standard? Define Syndrome? What are the various ARQ Retransmission strategies? What is media sharing? State types of media sharing State different IEEE 802 protocol. Define throughput. Define collision? What is cyclic Redundancy check? What is FDDI? What is a datagram?
1. 2. 3. 4. 5. 6.
PART-B Explain the frame format for token ring and token bus. Explain the frame format IEEE 803.2 and IEEE 803.5. What is CSMA/CD? Explain. Write short notes on Virtual Circuit Switching. Explain in detail about Spanning Tree Algorithm with an example. Explain in detail about Cell Switching.