User:Yogeshlikhar


 * 1) ComputerNetworkAndNetworkSecurity01

Summer 2008 a.	Write about network software and network hardware. b.	What is OSI reference model? Explain. c.	Write a brief note on Transmission media. d.	What is ISDN? Explain the architecture of ISDN. Summer 2009 a.	What is the principle of data communication? Explain QoS (Quality of Service) with respect to connection-oriented and connectionless communication services. b.	What are the different types of transmission impairments? What is the different between balanced and unbalanced transmission? c.	Explain ISDN system architecture. What is the difference between narrowband ISDN and broadband ISDN? d.	What are the different types of multiplexing techniques? What is Delta Modulation? Summer 2010 a.	Explain the different types of networking architectures. b.	Explain the OSI Reference Model. c.	What is the difference between Analog and Digital Transmission? d.	What are the different types of switching techniques? Summer 2011 a.	Explain wireless data transmission techniques. What are the different types of transmission line impairments? b.	Explain connection-oriented and connectionless service. c.	Explain the OSI Reference Model in detail. d.	What are the different types of fibre optics transmission techniques?


 * 1) ComputerNetworkAndNetworkSecurity02

Summer 2008 a.	What are the design issues in Data Link Layer? b.	What is sliding window protocol? Explain in detail. c.	What is congestion control? Explain dead lock avoidance technique. d.	What is internetworking? Explain the principles of internetworking. Summer 2009 a.	What are the different models used for protocol specification and verification? b.	Explain the functions of Data Link Layer. c.	What is the difference between Distance Vector Routing and Link State Routing Algorithms? d.	Explain the working of Network Layer in the internet. Summer 2010 a.	Explain the Sliding Window Protocol. What is piggybacking? b.	What are the methods used for protocol specification and verification? c.	Explain in brief the different congestion control algorithms. d.	Explain the network layer of the internet. Summer 2011 a.	What is internetworking? Explain the principles of internetworking. b.	What is reachability analysis? Explain how this technique is useful in determining the correctness of a protocol. c.	What is congestion control? Explain Deadlock avoidance technique. d.	What is sliding window protocol? Explain in detail.


 * 1) ComputerNetworkAndNetworkSecurity03

Summer 2008 a.	What are TCP and UDP? Explain the TCP connection management. b.	What is a virtual terminal and how is it used in remote access? c.	Describe design issues of session layer. d.	Discuss different data compression techniques. Summer 2009 a.	Explain the procedure of connection management in the transport layer. b.	How is the remote procedure call executed in the session layer?

c.	What are the different types of services provided by the presentation layer? d.	What are the different components of the SNMP (Simple Network Management Protocol) model? Summer 2010 a.	Explain the remote procedure call concept. b.	What are the different data compression methods? c.	What are the design issues of the transport layer? d.	What are virtual terminals? Explain File Access and File Management methods. Summer 2011 a.	What are elements of a transport protocol? Explain in detail. b.	Describe the design issue of session layer. c.	What is a virtual terminal and how is it used in remote access? d.	Explain the working of remote procedure call.


 * 1) ComputerNetworkAndNetworkSecurity04

Summer 2008 a.	Explain classification of security services. b.	Write a note on security attacks. c.	Explain Cipher block modes of operation. d.	Where the encryption devices are located? Explain in detail. Summer 2009 a.	What are the sources of External Threats? What is the role of security audits? b.	Explain the working of DES. What are the limitations of DES? c.	Explain the two fundamental cryptographic principles. d.	How authentication is achieved using a key distribution centre (KDC)? Summer 2010 a.	Explain classification of security services. b.	Explain the different encryption types. c.	Explain IDEA Algorithm. d.	Explain in brief about the encryption devices and their location. Summer 2011 a.	Explain the classification of security services. b.	Explain the basic concept of International Data Encryption Algorithm. c.	Explain Cipher block mode of operation. d.	What is the relationship between security services and security mechanisms?


 * 1) ComputerNetworkAndNetworkSecurity05

Summer 2008 a.	Write steps of SHA-1. Explain its processing of a single S12-Bit Block. b.	What is Pretty Good Privacy? Explain principal services provided by it. c.	Discuss the monitoring and management of Email security. d.	Discuss different authentication procedures. Summer 2009 a.	What is Packet filtering? How is the network monitored and managed for network security? b.	What is the difference between Single Key Encryption Schemes and Two Key Encryption Schemes? c.	How Message Integrity is ensured using Message Digest Algorithms and Checksums? d.	What is the utility of PKI (Public Key Infrastructures)? Which are the commercial Certificate Authorities? Summer 2010 a.	What is the utility of Message Digests and Checksums? b.	What is the use of Hash functions in encryption? c.	What is packet filtering? Explain the use of packet filtering. d.	Write short notes on (i) Certificates (ii) Firewalls Summer 2011 a.	Discuss different authentication procedures. b.	What are the design principles and design goals of firewall? c.	What is Pretty Good Privacy? Explain the principal services provided by it. d.	What are the basic arithmetic and logical functions used in Secure Hash Algorithm?