COMPUTER NETWORKS & SECURITY - B.Tech 5th Semester Exam., 2020 (New Course)
COMPUTER NETWORKS & SECURITY
Instructions:
- The marks are indicated in the right-hand margin.
- There are NINE questions in this paper.
- Attempt FIVE questions in all.
- Question No. 1 is compulsory.
-
Which transmission media provides the highest transmission speed in a network?
-
The data link layer takes the packets from network layer and encapsulates them into frames for transmission.
-
A 4-byte IP address consists of
-
Network layer firewall works as a
-
Which of the following is false with respect to TCP?
-
The header length of an IPv6 datagram is
-
Which of the following are transport layer protocols used in networking?
-
Which layer of the TCP/IP stack corresponds to the OSI model transport layer?
-
Public key encryption/decryption is not preferred because
-
Which one of the following is not a public key distribution means?
-
Define computer network. Discuss various types of network topologies in computer network. Also discuss various advantages and disadvantages of each topology.
-
Explain different types of errors in data transmission. Write about redundancy, detection versus correction, forward error correction versus re-transmission and coding.
-
Discuss the terms 'sub-netting' and 'super-netting'. You are given the IP address of 193.103.20.0/24 and need 50 subnets. How many hosts per network and total networks do you get once subnetted?
-
Explain RIP in your own words. Take a network graph (group of routers) and explain how routing is performed.
-
Differentiate between TCP and UDP. Suppose a process in host C has a UDP socket with port number 6789. Suppose both host A and host B, each sends a UDP segment to host C with destination port number 6789. Will both of these segments be directed to the same socket at host C? If so, how will the process at host C know that these two segments originated from two different hosts?
-
(a) SNMP
(b) FTP
(c) SMTP
(d) WWW
-
Design a security service that provides data integrity, data confidentiality and non-repudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integrity, confidentiality and non-repudiation are achieved by your solution. (Recommendation : Consider the corresponding threats in your argumentation)
-
Explain public-key cryptosystem. In a public-key system using RSA, you intercept the ciphertext \( C=10 \) sent to a user whose public key is \( e=5 \), \( n=35 \). What is the plaintext M?