0% found this document useful (0 votes)
15 views

Model QP 21AML153 PDF

An Autonomous Institution under VTU| Model Question Paper|Fifth Semester BE, |2021-22|Scheme| Computer Networks and Security||
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Model QP 21AML153 PDF

An Autonomous Institution under VTU| Model Question Paper|Fifth Semester BE, |2021-22|Scheme| Computer Networks and Security||
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

USN:

21AML153
2
B.N.M. Institute of Technology
An Autonomous Institution under VTU
Model Question Paper
Figth Semester BE, 2021-22 Scheme
Computer Networks and Security- 21AML153
Duration: 3 Hour Max. Marks: 100
Note: 1. Answer one full question from each Module 1,2,3,4,5 (5Q x 20M=100 Marks)

Module 1
Bloom’s
Q.No Marks COs POs/PS Cognitive
Os Levels

1 (a) What is Data Communication? Explain the following w.r.t data 10


communications: 1,2,3,4,5/
CO1 Understand
a) Fundamental characteristics of Data Communication, 1
b) Components of Data Communications.
1 (b)
Explain the following. 10
1. LAN, WAN and MAN 1,2,3,4,5/
CO1 Apply
2. Simplex, Half Duplex and Full Duplex 1
3. Point-to-point and Multipoint connections
OR
Explain the functions of each layer in the TCP/IP protocol suit 1,2,3,4,5/
2 (a) 10 CO1 Understand
1
Illustrate different topologies of computer networks with its pros 1,2,3,4,5/
2 (b) 10 CO1 Apply
and cons. 1
Module 2
What are the sub layers of Data link Layer Explain in detail the 10 CO2 1,2,3,4, Understand
services of data link Layer. 5/1
3 (a)
Explain ARP packet format with an example CO2 1,2,3,4, Understand
3 (b) 10
5/1
OR
4(a) What is framing in data link layer, explain different techniques to 10 CO2 1,2,3,4, Understand
identify frame boundaries 5/1
4(c) Explain with neat diagram stop and wait protocol. 10 CO2 1,2,3,4, Understand
5/1
Module 3

5(a) Find the class of following IP addresses a) 130.35.54.12 b) 10 CO3 1,2,3,4, Apply
200.36.2.3 c.)245.24.2.8 d) 172.89.9.21 e)127.45.21.11 5/1
Distinguish unicast, multicast and broadcast addresses. Define the CO3 1,2,3,4, Apply
5 (b) 10
type of following destination addresses. 5/1
i) 4A:30:10:21:1A
ii) 47:20:1B:2E:08:EE
iii) FF:FF:FF:FF:FF:FF
OR
USN:

21AML153
Distinguish between datagram packet switch and Virtual-Circuit 10 C03 2 1,2,3,4, Apply
6 (a) Approach for Connection-Oriented Service. Explain with an 5/1
example how virtual-circuit approach works?
10 CO3 1,2,3,4, Apply
6(b) Distinguish NAT and DHCP? Explain in Detail working of DHCP
5/1
Module 4
7 (a) Outline stop and wait protocol with neat diagram. 1,2,3,4,5/
8M CO3 Understand
1
Distinguish between the Transport Layer Protocol and User Datagram CO3 1,2,3,4,5/
7 (b) 6M Apply
Protocol. 1
CO3 1,2,3,4,5/
7 (c) Explain Domain Name Server. 6M Understand
1
OR
CO3 1,2,3,4,5/
8 (a) Illustrate the three way handshake protocol. 8M Understand
1
CO3 1,2,3,4,5/
8 (b) Outline User datagram services of User Datagram Protocol. 6M Understand
1
CO3 1,2,3,4,5/
8 (c) Differentiate Hyper Text Transfer Protocol and File Transfer 6M Apply
Protocol. 1
Module 5
9 (a) 1,2,3,4,5/
Identify the different types of attacks with an example of each. 10 CO4 Understand
1

9 (b) Define Cryptography. General Depiction of DES Encryption 1,2,3,4,5/


10 CO4 Understand
Algorithm. Differentiate it with AES. 1

OR
List and explain the X.800 security services. Also specify different 1,2,3,4,5/
10(a) 10 CO4 Understand
hashing mechanisms. 1
Apply RSA to encrypt and decrypt the plain text P=15 by
10(b) 1,2,3,4,5/
assuming two prime numbers p=7 and q=11. Write the detailed 10 CO4 Apply
1
process of encryption, decryption and key generation.

You might also like