0% found this document useful (0 votes)
1K views

Computer Networks and Security: Model Question Paper-1 With Effect From 2019-20 (CBCS Scheme)

The document is a model question paper for the Fifth Semester B.E. Degree Examination in Computer Networks and Security. It contains 10 questions divided across 5 modules. Students must answer 5 full questions with at least one from each module. The questions assess different Bloom's Taxonomy levels and course outcomes, ranging from basic recall to higher-order analysis and problem-solving. The paper aims to comprehensively evaluate students' understanding of key topics in computer networks and security.

Uploaded by

study material
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Computer Networks and Security: Model Question Paper-1 With Effect From 2019-20 (CBCS Scheme)

The document is a model question paper for the Fifth Semester B.E. Degree Examination in Computer Networks and Security. It contains 10 questions divided across 5 modules. Students must answer 5 full questions with at least one from each module. The questions assess different Bloom's Taxonomy levels and course outcomes, ranging from basic recall to higher-order analysis and problem-solving. The paper aims to comprehensively evaluate students' understanding of key topics in computer networks and security.

Uploaded by

study material
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

18CS52

Model Question Paper-1 with effect from 2019-20 (CBCS Scheme)


USN

Fifth Semester B.E. Degree Examination


Computer Networks and Security
TIME: 03 Hours Max. Marks: 100

Note: 01. Answer any FIVE full questions, choosing at least ONE question from each MODULE.

Module – 1
Consider an e-commerce site that wants to keep a purchase record for each of its
(a) 10M
customers. Describe how this can be done with cookies.
Q.1 Describe in detail the services provided by DNS and Explain the DNS message
(b) 10M
format.
OR
Suppose Alice, with a Web based E-mail account (such as hotmail or Gmail), and
sends a message to Bob, who accesses his mail from his mail server using POP3.
(a) Discuss how the message gets from Alice’s host to Bob’s Host. (Be sure to list the 07M
series of application layers protocols that are used to move the message between the
Q.2 two hosts.)
(b) What are the advantages and disadvantages of mesh and circular DTH? 08M

(c) Explain in detail the General format of an HTTP request message. 05M
Module – 2
(a) With the help of FSM, describe the two states of the sender side and one state of the 10M
receiver side of rdt2.0.
(b) Suppose that the five measured Sample RTT values are 106ms, 120ms, 140ms, 90ms, 10M
Q.3 and 115ms. Compute :
(i) Estimated RTT after each of these Sample RTT value is obtained. Assume α =
0.125 and estimated RTT is 100ms just before the first of these five samples
were obtained.
(ii) Compute DevRTT. Assume β = 0.25 and DevRTT wasw 5ms just before the
first of these five samples was obtained.
OR
(a) Describe the various fields of UDP segment. Explain how checksum is calculated. 08M

(b) With a neat diagram, explain congestion control frame work for ATM-ABR service. 07M
Q.4
How two TCP connections share a single bottleneck link? Explain. 05M
(c)
Module – 3
Q.5 (a) Explain the implementation of virtual-circuit services in a computer network. 07M
18CS52
Compare and contrast IPv4 and IPv6 header fields. Do they have any fields in 05M
(b)
common. Explain.
(c) Explain Distance vector algorithm using three nodes network. 08M
OR
(a) What are the roles played by the IGMP protocol and wide area Multicast routing 08M
protocol?
Q.6 (b) Illustrate Routing Information Protocol (RIP) with suitable diagram 08M
(c) Explain 4 types of hierarchical OSPF routers 04M

Module – 4
(a) Explain public key cryptography protocols. 10M
Q.7
(b) Assume that in round 4 of a DES process for a message, L4=4de5635d(in Hex), R4 = 10M
3412a90e (in Hex) and K5 = be1142 7e6ac2 (in Hex). Find R5 and L5.
OR
(a) In the Diffie-Hillman key exchange protocol, prove that the two keys k1 and k2 are 10M
equal.
Q.8 Discuss the following: (i) Secure Hash Algorithm (ii) Firewalls 10M
(b)

Module – 5
(a) Explain briefly how DNS redirects a users request to a CDN server 10M
With a neat diagram explain the naïve architecture for audio/video streaming 10M
(b)
Q.9

OR
(a) Write a short notes on (i) Netflix video streaming platform (ii) VoIP with Skype 10M
(b) With a neat diagram explain the RTP header fields 10M
Q.10
18CS52

Table showing the Bloom’s Taxonomy Level, Course Outcome and Programme
Outcome

Question Bloom’s Taxonomy Level Course Programme Outcome


attached Outcome
Q.1 (a) L2 CO1 PO1
(b) L2 CO1 PO1
Q.2 (a) L2 CO1 PO2
(b) L1 CO1 PO1
(c) L1 CO1 PO1
Q.3 (a) L2 CO2 PO1
(b) L3 CO2 PO3
Q.4 (a) L1 CO2 PO2
(b) L2 CO2 PO1
(c) L2 CO2 PO1
Q.5 (a) L2 CO3 PO2
(b) L2 CO3 PO1
(c) L2 CO3 PO1
Q.6 (a) L1 CO3 PO8
(b) L3 CO3 PO8
(c) L2 CO3 PO1
Q.7 (a) L2 CO4 PO8
(b) L3 CO4 PO4,PO8
Q.8 (a) L2 CO4 PO2
(b) L1 CO4 PO1
Q.9 (a) L2 CO5 PO1
(b) L2 CO5 PO1
Q.10 (a) L1 CO5 PO1
(b) L2 CO5 PO1

Lower order thinking skills


Bloom’s Remembering( Understanding Applying (Application):
Taxonomy knowledge):𝐿1 Comprehension): 𝐿2 𝐿3
Levels Higher order thinking skills
Analyzing (Analysis): 𝐿4 Valuating (Evaluation): 𝐿5 Creating (Synthesis): 𝐿6

You might also like