All CSE model
All CSE model
Fifth Semester
COMPUTER AND SCIENCE ENGINEERING
CS3591 – COMPUTER NETWORKS
MODEL EXAMINATION
Time: 3:00 Hours Marks: 100
Answer All the Questions
11. a) Explain in detail how data is transmitted as data units from source to destination in a
layered approach using the TCP/IP protocol suite.
OR
b) Briefly Explain the necessary protocols for a message to transfer from [email protected] to
[email protected] .
13. a) Explain with suitable network topology, the working mechanism of any one uni-cast
routing protocol adopted in computer networks.
OR
b) Discuss the mechanism involved in IPV6 addressing .Also compare IPV4 with IPV6.
14. a) Consider the network shown below. Show the operation of Dijkstra’s (link state)
algorithm for computing the least cost path from router F to all destinations. Explain the
process.
15. a) Elaborate on the CSMA protocols. What is the main downfall of the Carrier Sense
Multiple Access (CSMA) method? How does Collision Detection (CD) methods will help to
alleviate this problem?
OR
b) Discuss in detail about wireless LAN (802.11).
(ii) Consider the Cyclic redundancy check (CRC) based detecting scheme having the generator
polynomial X3 + X + 1. Suppose the message 11000 is to be transmitted. Find the Codeword.
OR
b) Suppose you open a startup company “foo” and want to set up your company network, your network
has the following servers:
(ii) What resources records (RRs) do you need to provide to the upper- level “.com” Registrar? (3)
(iii) What RRs do you need to put in your company’s DNS server? (4)
VANDAYAR ENGINEERING COLLEGE
Fifth Semester
COMPUTER AND SCIENCE ENGINEERING
DISTRIBUTED COMPUTING (CS3551)
MODEL EXAMINATION
Time: 3:00 Hours Marks: 100
Answer All the Questions
11. a) Explain message passing systems and discuss the message-oriented middleware and its types.
Also explain their functionality in distributed computing.
OR
12. a) What is a snapshot and what are the needs of taking snapshot in distributed systems? Outline
Chandy- Lamport algorithm for snapshot and illustrate the algorithms.
OR
b) Describe the physical clock synchronization and logical clock synchronization and explain the
framework of a system of logical clock.
13. a) State the Lamport’s algorithm and its use and the limitations and benefits. Compare this with
any two token-based algorithms.
OR
14. a) Explain the facts associated with agreement in failure-free systems of both synchronous &
asynchronous systems.
b) What is agreement in a failure free system? Explain how agreement is reached in message-
passing synchronous system with failures.
15. a) Explain the types of cloud computing deployment models with their relative advantages &
disadvantages.
OR
b) Explain the different cloud services and the platform that support these services. Give an
example of application services adapted by any organization.
PART – C (1 *1 5 = 15 MARKS)
16. a) Consider an ABC IT company that wanted to provide services like scientific converters, data
converter, currency converters and some of the business logic as a server-side component to the
developer to tailor make the application. Explain the various adaptable technologies to
implement in a distributed environment. State its merits and demerits.
OR
b) Outline the Koo and Toueg coordinated check pointing and recovery technique and apply this
algorithm to a specific case study to demonstrate how this algorithm avoids the domino effect
and live lock problems during the recovery.
VANDAYAR ENGINEERING COLLEGE
Fifth Semester
COMPUTER AND SCIENCE ENGINEERING
CRYPTOGRAPHY AND CYBER SECURITY (CB3491)
MODEL EXAMINATION
Time: 3:00 Hours Marks: 100
Answer All the Questions
11. a) (i) Describe OSI security architecture and derive a relativity matrix between Security,
Attacks, Services and Mechanisms. (8)
(ii) Using Play Fair Cipher algorithm encrypt the plaintext = ATTACK POSTPONED using the
key = EMERGENCY. (5)
OR
b) Explain any three types of Substitution techniques with proper examples.
12. a) (i) Solve the following using RC4 stream cipher algorithm. Assume the state vector is 8bits
Key: [1 0 0 2] (8)
Plaintext: [6 1 5 4]
(ii) Illustrate any one pseudo random number generator algorithm. (5)
OR
b) Explain block cipher mode of operation: Electronic Code Book, Cipher Block chaining and
Counter mode with neat sketch.
13. a) Determine the plaintext text from the cipher text C= 106, N= 143, e= 11 using RSA
algorithm.
Prepared by Verified by HOD sign
OR
14. a) Write brief notes about the MAC on message authentication with confidentiality process.
Also discuss the security aspects of MAC.
OR
15. a) Describe how spyware functions and its impact on privacy and data security. What steps can
individuals & organizations take to detect and prevent spyware infections?
OR
b) Discuss the security risks associated with public wi-fi networks & the best practices for
ensuring wireless security on personal devices.
PART – C (1 *1 5 = 15 MARKS)
16. a) Write Diffie Hellman algorithm. Find the secret key shared between user A & user B using
Diffie-Hellman algorithm for the following q= 673, α= 5; Xa = 418 & Xb = 59.
OR
b) Your company is implementing Network Access Control (NAC) to improve network security.
Outline the implementation process, including policy development, authentication techniques
& enforcement.
VANDAYAR ENGINEERING COLLEGE
Third Semester
COMPUTER AND SCIENCE ENGINEERING
CS3301 – DATA STRUCTURES
MODEL EXAMINATION
Time: 3:00 Hours Marks: 100
Answer All the Questions
12. a) Outline the algorithm for evaluating a post-fix expression using stack data structure with an
example.
Prepared by Verified by HOD sign
OR
b) Write c function for the following conversions
i) Infix to post-fix expression.
ii) Evaluate the post-fix expression. (6+7)
13. a) Identify the types of Priority Queue. Explain about Min Heap insertion and deletion
Operations.
OR
b) State the BST property & Outline the algorithm to search a binary search tree with an
example.
15. a) Distinguish between Prim’s & Kruskal’s? Using Prim’s algorithm starting with vertex “A”,
list the vertices of the graph given in fig 3. in the order they are added to maximum spanning
tree.
15. a) Outline the algorithm to perform linear search on an array of ‘N’ numbers. Illustrate each
step of the algorithm with an example.
OR
b) Outline the algorithm to sort an array of ‘N’ number using bubble sort. Illustrate each step of
the algorithm with an example.
16. a) What are the basic heap operation? Show how heap sort processes the input 142, 543, 123, 65,
453, 879, 572, 434, 111, 242, 811, 102.
OR
b) Write the functions for the following operations on doubly linked list.
Sum up the values stored in the nodes of a list.
Count the even numbers in the list.
Delete the node with an Element X.