Computer Networks and Security: Model Question Paper-1 With Effect From 2019-20 (CBCS Scheme)
Computer Networks and Security: Model Question Paper-1 With Effect From 2019-20 (CBCS Scheme)
Note: 01. Answer any FIVE full questions, choosing at least ONE question from each MODULE.
Module – 1
Consider an e-commerce site that wants to keep a purchase record for each of its
(a) 10M
customers. Describe how this can be done with cookies.
Q.1 Describe in detail the services provided by DNS and Explain the DNS message
(b) 10M
format.
OR
Suppose Alice, with a Web based E-mail account (such as hotmail or Gmail), and
sends a message to Bob, who accesses his mail from his mail server using POP3.
(a) Discuss how the message gets from Alice’s host to Bob’s Host. (Be sure to list the 07M
series of application layers protocols that are used to move the message between the
Q.2 two hosts.)
(b) What are the advantages and disadvantages of mesh and circular DTH? 08M
(c) Explain in detail the General format of an HTTP request message. 05M
Module – 2
(a) With the help of FSM, describe the two states of the sender side and one state of the 10M
receiver side of rdt2.0.
(b) Suppose that the five measured Sample RTT values are 106ms, 120ms, 140ms, 90ms, 10M
Q.3 and 115ms. Compute :
(i) Estimated RTT after each of these Sample RTT value is obtained. Assume α =
0.125 and estimated RTT is 100ms just before the first of these five samples
were obtained.
(ii) Compute DevRTT. Assume β = 0.25 and DevRTT wasw 5ms just before the
first of these five samples was obtained.
OR
(a) Describe the various fields of UDP segment. Explain how checksum is calculated. 08M
(b) With a neat diagram, explain congestion control frame work for ATM-ABR service. 07M
Q.4
How two TCP connections share a single bottleneck link? Explain. 05M
(c)
Module – 3
Q.5 (a) Explain the implementation of virtual-circuit services in a computer network. 07M
18CS52
Compare and contrast IPv4 and IPv6 header fields. Do they have any fields in 05M
(b)
common. Explain.
(c) Explain Distance vector algorithm using three nodes network. 08M
OR
(a) What are the roles played by the IGMP protocol and wide area Multicast routing 08M
protocol?
Q.6 (b) Illustrate Routing Information Protocol (RIP) with suitable diagram 08M
(c) Explain 4 types of hierarchical OSPF routers 04M
Module – 4
(a) Explain public key cryptography protocols. 10M
Q.7
(b) Assume that in round 4 of a DES process for a message, L4=4de5635d(in Hex), R4 = 10M
3412a90e (in Hex) and K5 = be1142 7e6ac2 (in Hex). Find R5 and L5.
OR
(a) In the Diffie-Hillman key exchange protocol, prove that the two keys k1 and k2 are 10M
equal.
Q.8 Discuss the following: (i) Secure Hash Algorithm (ii) Firewalls 10M
(b)
Module – 5
(a) Explain briefly how DNS redirects a users request to a CDN server 10M
With a neat diagram explain the naïve architecture for audio/video streaming 10M
(b)
Q.9
OR
(a) Write a short notes on (i) Netflix video streaming platform (ii) VoIP with Skype 10M
(b) With a neat diagram explain the RTP header fields 10M
Q.10
18CS52
Table showing the Bloom’s Taxonomy Level, Course Outcome and Programme
Outcome