Computer Networks II

   University Question Paper(Jan 2023)

Total No. of Questions: 5]                                                                            SEAT No.:

PA-1024                                                                                         [Total No. of Pages: 2

[5902]-52

T.Y. B.Sc (Computer Science) 

COMPUTER NETWORKS - II

(2019 Pattern) (Semester - V) (CS-352)


Time: 2 Hours]                                                                           [Max. Marks: 35

Instructions to the candidates:

1)Attempt all questions.

2) Neat diagrams must be drawn wherever necessary.

3) Figurers to the right indicate full marks.

4) Assume suitable data if necessary.


Q1) Attempt any EIGHT of the following(out of TEN)                        [8 x 1=8]

a) What is PrimaryServer?

b) Write services provide by, and explain composing message?

c) Define Jitter and Translation. 

d) What is sampling?

e) Define cryptanalysis.

f)What is S-box component of a modern block cipher?

g)g) Write name of steps perform in each round of DES (Data Encryption Standard) Cipher.

h) What is the purpose of IPSec? 

i) Write name of protocols on which IKE (Interner Key Exchange) is based. 

j)A proxy firewall is also called application gateway. Write true or false

and also justify.


Q2) Attempt any FOUR of the following (out of FIVE)                            [4x2=8]

a) What is firewall? Explain with diagram. 

b) What is streaming audio/video? Also write examples.

c)Write information about iterative resolution, with diagram.

d) What is anonymous FTP?

e) What is Digital signature?


03) Attempt any TWO of the following (out of THREE)                           [2 × 4=8]

a) Explain security services for message

b) Explain streaming stored audio/video Third Approach: Using a media server? 

c) Explain any four user agent services. 


Q4) Attempt any TWO of the following (out of THREE)                            [2 x 4 =8]

 a) What is IMAP4? Write it s features, advantages and disadvantages.

b) Explain asymmetric key cryptography with the help of diagram.

c) Explain in detail packet filter firewall, also write it's advantages and disadvantages.


05) Attempt any ONE of the following (out of TWO)                                [1x3=3]

a) Using columnar transposition cipher, convert following plaintextto ciphertext. allthepacketsfromporttenareallowed", KeyCOMPUTER"

b) Write note on Real-Time Transport protocol (RTP)


THANKS!!!



Post a Comment

0 Comments