M.Sc-M.Sc Computer Science 1st Sem CS - 102 : Advanced Networking(University of Pune, Pune-2013)
M.Sc. (Semester - I)
COMPUTER SCIENCE
SEAT No. :
[Total No. of Pages : 3
CS - 102 : Advanced Networking
(2011 Pattern)
Time :3 Hours] [Max. Marks :80
Instructions to the candidates:
1) Neat diagrams must be drawn wherever necessary.
2) Figures to the right indicate full marks.
3) All questions are compulsory.
Q1) Attempt all of the following : [8 × 2 = 16]
Why CSMA/CD is not used in gigabit ethernet ?
List any two advantages & disadvantages of ECB & CBC mode.
Why does RTP needs the service of another protocol, RTCP, but TCP
does not ?
How timestamps -based authentication works ?
What is DNS spoofing ?
A routing table has 25 entries. It does not receive information about five
routers for 200 sec. How many timers are running at this time ?
In an IP packet, the value of HLEN is 1000 in binary. How many bytes of
options are being carried by this packet ?
Why is anonymous offline electronic money dangerous ?
Q2) Attempt any four of the following : [4 × 4 = 16]
a) When a user wants to send an email to multiple recipients, how PGP
handles the security ?
P.T.O.
b) Give a potential disadvantage when Nagle's algorithm is used on a badly
- congested network ?
In the fig. Show which router (s) sends out router link & network link
LSAs ?
Apply play fair cipher on plain text “University of Pune” & use keyword
as "Systems".
Explain different strategies of transition from IPv4 to IPv6.
Q3) Attempt any four of the following : [4 × 4 = 16]
List the different technologies used to connect two remote devices in
point to point WAN. Explain any one in detail.
Explain AH & ESP Protocols used in IPSec.
Do you think H.323 is actually the same as SIP ? What are the differences?
Make a comparison between the two.
What is attack ? Explain active & passive attacks.
Explain key transformation & expansion permutation process in DES.
Q4) Attempt any four of the following : [4 × 4 = 16]
Explain the working of Kerberos ?
What are the typical contents of a digital certificate ?
Explain how transport layer handles buffer allocation dynamically.
Given two prime numbers P=17 & Q= 29, find out N,E & D in an RSA
encryption process.
Explain how distance vector routing algorithm is used for creating the
routing table for routers in AS.
[4339] - 102 2
Q5) Attempt any four of the following : [4× 4 = 16]
Imagine a generalized n-army problem, in which the agreement of any
two of the blue armies is sufficient for victory. Does a protocol exist that allows blue to win ? Justify.
Application gateway firewall are generally more secure than packet
filters. - Justify.
Explain how 3 - D secure protocol is used to provide security to the credit
card on the Internet.
What is count to infinity problem ? Suggest solutions on that.
Contrast error reporting messages in ICMPv6 with error reporting
messages ICMPv4.
Earning: Approval pending. |