Jump to Year/Set
Instructions:
- The marks are indicated in the right-hand margin.
- There are NINE questions in this paper.
- Attempt FIVE questions in all.
- Question No. 1 is compulsory.
Questions
Choose the correct answer of the following (any seven) :
SHA-1 produces a hash value of (i) 256 bits (ii) 160 bits (iii) 180 bits (iv) 128 bits
Which of the following tasks is not done by data link layer? (i) Framing (ii) Error control (iii) Flow control (iv) Channel coding
Which of the following routing algorithms can be used for network layer design? (i) Shortest path algorithm (ii) Distance vector routing (iii) Link state routing (iv) All of the above
The physical layer translates logical communication requests from the ______ into hardware specific operations. (i) data link layer (ii) network layer (iii) transport layer (iv) application layer
Which of the following is the type of firewall? (i) Packet filtering firewall (ii) Dual-homed gateway firewall (iii) Screened host firewall (iv) Dual-host firewall
In TCP, sending and receiving data are done as (i) stream of bytes (ii) sequence of characters (iii) lines of data (iv) packets
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header? (i) Fragmentation field (ii) Fast-switching (iii) ToS field (iv) Option field
Which of the following are transport layer protocols used in networking? (i) TCP and FTP (ii) UDP and HTTP (iii) TCP and UDP (iv) HTTP and FTP
An ALOHA network uses an 18.2 kbps channel for sending message packets of 100 bits long size. Calculate the maximum throughput. (i) 5999 (ii) 6900 (iii) 6027 (iv) 5027
RSA stands for (i) Rivest-Shamir-Adleman (ii) Roger-Shamir-Adrian (iii) Robert-Shamir-Anthoney (iv) Rivest-Shaw-Adleman
What is TCP/IP model? Explain the functions, protocols and services of each layer. Compare it with OSI model.
What are Hamming distance and Hamming code? Explain with an example.
Differentiate between classful and classless IP addressing. Subnet the IP address 203.10.93.0/24 into 30 subnets. Is 203.10.93.30 a valid host ID after subnetting?
Differentiate between OSPF and RIP protocols with an example.
Discuss flow and error control protocols of transport layer. In the stop-and-wait protocol, show the case in which the receiver receives a duplicate packet (which is also out of order) Hint : Think about a delayed ACK. What is the reaction of the receiver to this event?
Write short notes on the following : (a) HTTP (b) FTP (c) DNS (d) TELNET
HTTP
FTP
DNS
TELNET
How is security provided by SSL? What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record Protocol transmission?
Differentiate between symmetric key crypto-system and asymmetric key cryptosystem. Explain RSA algorithm in detail with an example.