0% found this document useful (0 votes)
213 views2 pages

Be - Computer Engineering - Semester 5 - 2022 - November - Computer Network and Security Cns Pattern 2019

The document is a question paper for the subject Computer Networks and Security. It contains 8 questions with 3 parts each. Students have to attempt any 4 questions out of the 8 questions. The questions cover topics like path vector routing, mobile IP, MPLS, IPV4 header format, OSPF, difference between TCP and UDP, RTP protocol, UDP hexadecimal dump, SCTP protocol, transport layer services, socket types and functions, DHCP, FTP, HTTP, TELNET, webmail, IPSec, symmetric and asymmetric key cryptography, firewalls, network security model, SSL, and network attacks. The document provides guidance to students on the exam and evaluates their knowledge of various computer networking and security concepts.

Uploaded by

Kshitij Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
213 views2 pages

Be - Computer Engineering - Semester 5 - 2022 - November - Computer Network and Security Cns Pattern 2019

The document is a question paper for the subject Computer Networks and Security. It contains 8 questions with 3 parts each. Students have to attempt any 4 questions out of the 8 questions. The questions cover topics like path vector routing, mobile IP, MPLS, IPV4 header format, OSPF, difference between TCP and UDP, RTP protocol, UDP hexadecimal dump, SCTP protocol, transport layer services, socket types and functions, DHCP, FTP, HTTP, TELNET, webmail, IPSec, symmetric and asymmetric key cryptography, firewalls, network security model, SSL, and network attacks. The document provides guidance to students on the exam and evaluates their knowledge of various computer networking and security concepts.

Uploaded by

Kshitij Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 8] SEAT No.

8
23
PA-1444 [Total No. of Pages : 2

ic-
[5926]-60

tat
T.E. (Computer Engineering)

5s
COMPUTER NETWORKS AND SECURITY

2:0
02 91
(2019 Pattern) (Semester-I) (310244)

3:3
0
31
Time : 2½ Hours] 8/0 13 [Max. Marks : 70
0
Instructions to the candidates:
1/2
.23 GP

1) Attempt Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.


2) Neat diagrams must be drawn wherever necessary.
E
81

8
3) Figures to the right side indicate full marks.
C

23
4) Assume suitable data, if necessary.

ic-
16

tat
Q1) a) Explain Path vector routing. [6]
8.2

5s
b) Give short note on: [6]
.24

2:0
i) Mobile IP
91
49

3:3
ii) MPLS
30

c) 192.168.5.131/26 for given address find out the [6]


31

i) Subnet mask?
01
02

ii) What is first is first ip address for given series?


1/2
GP

iii) What is last ip address for given series?


8/0

OR
CE
81

8
Q2) a) Draw and explain Header format of IPV4. [6]

23
.23

ic-
b) Give short note on OSPF. [6]
16

tat
c) List and explain functions of Network Layer. [6]
8.2

5s
.24

2:0

Q3) a) Give the difference between TCP and UDP. [6]


91
49

3:3

b) Explain RTP protocol in detail. [6]


30

c) 06 32 000D 001C E2 17 using this UDP hexadecimal dump find out [6]
31

i) Source port no
01
02

ii) Destination port no


1/2
GP

iii) Total length of user datagram.


8/0

OR
CE
81

Q4) a) Explain SCTP protocol in detail. [6]


.23

b) List and explain transport layer services. [6]


16

c) What is socket? What are different types of socket? Explain socket


8.2

functions used in connection oriented services with diagram. [6]


.24

P.T.O.
49
Q5) a) What is DHCP? Explain DHCP working with client state diagram. [9]

8
23
b) Write short notes on FTP and MIME. [8]

ic-
tat
OR

5s
Q6) a) What is HTTP? Explain HTTP request and reply messages. [9]

2:0
02 91
b) Write short notes on TELNET and Webmail. [8]

3:3
0
31
8/0 13
Q7) a) Explain IPSec in detail. [6]
0
1/2
.23 GP

b) Differentiate between Symmetric and Asymmetric Key Cryptography.[6]


E

c) Give short note on Firewalls. [5]


81

8
C

23
OR

ic-
16

tat
Q8) a) Explain model for network security. [6]
8.2

5s
b) Explain SSL in detail. [6]
.24

2:0
91
49

3:3
c) Explain Types of Network Attacks. [5]
30
31
01
02


1/2
GP
8/0
CE
81

8
23
.23

ic-
16

tat
8.2

5s
.24

2:0
91
49

3:3
30
31
01
02
1/2
GP
8/0
CE
81
.23
16
8.2
.24

[5926]-60 2
49

You might also like