How To Exam?

a knowledge trading engine...


M.Sc-M.Sc Computer Science 1st Sem CS - 102 : Advanced Networking(University of Pune, Pune-2013)

Friday, 28 November 2014 12:51Nitha

                            M.Sc. (Semester - I)

                                    COMPUTER SCIENCE


SEAT No. :

[Total No. of Pages : 3


CS - 102 : Advanced Networking

(2011 Pattern)

Time :3 Hours]                                                                                            [Max. Marks :80

Instructions to the candidates:

1)       Neat diagrams must be drawn wherever necessary.

2)       Figures to the right indicate full marks.

3)       All questions are compulsory.

Q1) Attempt all of the following :                                                              [8 × 2 = 16]

 

Why CSMA/CD is not used in gigabit ethernet ?

List any two advantages & disadvantages of ECB & CBC mode.

Why does RTP needs the service of another protocol, RTCP, but TCP

does not ?

How timestamps -based authentication works ?

What is DNS spoofing ?

A routing table has 25 entries. It does not receive information about five

routers for 200 sec. How many timers are running at this time ?

In an IP packet, the value of HLEN is 1000 in binary. How many bytes of

options are being carried by this packet ?

Why is anonymous offline electronic money dangerous ?


Q2) Attempt any four of the following :                                                  [4 × 4 = 16]

a)       When a user wants to send an email to multiple recipients, how PGP

handles the security ?

P.T.O.

b)       Give a potential disadvantage when Nagle's algorithm is used on a badly

- congested network ?

 

In the fig. Show which router (s) sends out router link & network link

LSAs ?

Apply play fair cipher on plain text “University of Pune” & use keyword

as "Systems".

Explain different strategies of transition from IPv4 to IPv6.


Q3) Attempt any four of the following :                                                  [4 × 4 = 16]

 

List the different technologies used to connect two remote devices in

point to point WAN. Explain any one in detail.

Explain AH & ESP Protocols used in IPSec.

Do you think H.323 is actually the same as SIP ? What are the differences?

Make a comparison between the two.

What is attack ? Explain active & passive attacks.

Explain key transformation & expansion permutation process in DES.


Q4) Attempt any four of the following :                                                  [4 × 4 = 16]

 

Explain the working of Kerberos ?

What are the typical contents of a digital certificate ?

Explain how transport layer handles buffer allocation dynamically.

Given two prime numbers P=17 & Q= 29, find out N,E & D in an RSA

encryption process.

Explain how distance vector routing algorithm is used for creating the

routing table for routers in AS.


[4339] - 102                                                      2


Q5) Attempt any four of the following :                                                   [4× 4 = 16]

 

Imagine a generalized n-army problem, in which the agreement of any

two of the blue armies is sufficient for victory. Does a protocol exist that allows blue to win ? Justify.

Application gateway firewall are generally more secure than packet

filters. - Justify.

Explain how 3 - D secure protocol is used to provide security to the credit

card on the Internet.

What is count to infinity problem ? Suggest solutions on that.

Contrast error reporting messages in ICMPv6 with error reporting

messages ICMPv4.


( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER M.Sc-M.Sc Computer Science 1st Sem CS - 102 : Advanced Networking(University of Pune, Pune-2013)