COMPUTER NETWORKS & SECURITY - B.Tech 5th Semester Exam., 2020 (New Course)

2020Semester 2Civil-CAEnd Semester
Aryabhatta Knowledge University
B.Tech 5th Semester Exam., 2020 (New Course)

COMPUTER NETWORKS & SECURITY

Time: 03 HoursCode: 104501Full Marks: 70

Instructions:

  1. The marks are indicated in the right-hand margin.
  2. There are NINE questions in this paper.
  3. Attempt FIVE questions in all.
  4. Question No. 1 is compulsory.
Q.1 Choose the correct option of the following (any seven):[14]
  1. Which transmission media provides the highest transmission speed in a network?

    1. Coaxial cable
    2. Twisted pair cable
    3. Optical fiber
    4. Electrical cable
  2. The data link layer takes the packets from network layer and encapsulates them into frames for transmission.

    1. network layer
    2. physical layer
    3. transport layer
    4. application layer
  3. A 4-byte IP address consists of

    1. only network address
    2. only host address
    3. network address and host address
    4. network address and MAC address
  4. Network layer firewall works as a

    1. frame filter
    2. packet filter
    3. content filter
    4. virus filter
  5. Which of the following is false with respect to TCP?

    1. Connection-oriented
    2. Process-to-process
    3. Transport layer protocol
    4. Unreliable
  6. The header length of an IPv6 datagram is

    1. 10 bytes
    2. 25 bytes
    3. 30 bytes
    4. 40 bytes
  7. Which of the following are transport layer protocols used in networking?

    1. TCP and FTP
    2. UDP and HTTP
    3. TCP and UDP
    4. HTTP and FTP
  8. Which layer of the TCP/IP stack corresponds to the OSI model transport layer?

    1. Host-to-host
    2. Application
    3. Internet
    4. Network access
  9. Public key encryption/decryption is not preferred because

    1. it is slow
    2. it is hardware/software intensive
    3. it has a high computational load
    4. All of the above
  10. Which one of the following is not a public key distribution means?

    1. Public key certificates
    2. Hashing certificates
    3. Publicly available directories
    4. Public-key authorities
Q.2 Solve this question :[14]
  1. Define computer network. Discuss various types of network topologies in computer network. Also discuss various advantages and disadvantages of each topology.

Q.3 Solve this question :[14]
  1. Explain different types of errors in data transmission. Write about redundancy, detection versus correction, forward error correction versus re-transmission and coding.

Q.4 Solve this question :[14]
  1. Discuss the terms 'sub-netting' and 'super-netting'. You are given the IP address of 193.103.20.0/24 and need 50 subnets. How many hosts per network and total networks do you get once subnetted?

Q.5 Solve this question :[14]
  1. Explain RIP in your own words. Take a network graph (group of routers) and explain how routing is performed.

Q.6 Solve this question :[14]
  1. Differentiate between TCP and UDP. Suppose a process in host C has a UDP socket with port number 6789. Suppose both host A and host B, each sends a UDP segment to host C with destination port number 6789. Will both of these segments be directed to the same socket at host C? If so, how will the process at host C know that these two segments originated from two different hosts?

Q.7 Write short notes on the following:[14]
  1. (a) SNMP
    (b) FTP
    (c) SMTP
    (d) WWW

Q.8 Solve this question :[14]
  1. Design a security service that provides data integrity, data confidentiality and non-repudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integrity, confidentiality and non-repudiation are achieved by your solution. (Recommendation : Consider the corresponding threats in your argumentation)

Q.9 Solve this question :[14]
  1. Explain public-key cryptosystem. In a public-key system using RSA, you intercept the ciphertext \( C=10 \) sent to a user whose public key is \( e=5 \), \( n=35 \). What is the plaintext M?