Computer Networks-Ii: Instructions To Candidates

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

20929 20929 20929 20929 20929 20929 20929 20929 20929

20929 Roll No.


20929 20929 20929 20929 20929 Total20929
No. of Pages
20929 : 02 20929

Total No. of Questions : 09


B.Tech.(CSE/IT) (2011 Onwards) (Sem.–5)
20929 20929 20929 COMPUTER
20929 20929NETWORKS-II
20929 20929 20929 20929

Subject Code : BTCS-501


Paper ID : [A2097]
20929 Time : 3 Hrs.
20929 20929 20929 20929 20929 Max. Marks
20929 20929 : 60 20929

INSTRUCTIONS TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying T WO marks
20929 20929 20929 20929 20929 20929 20929 20929 20929
each.
2. SECTION-B contains FIVE questions carryi ng FIVE marks each and students
have to attempt any FOUR questions.
3. SECTION-C contains T HREE questions carrying T EN marks each and students
20929 20929 have to 20929 20929
attempt any T 20929
WO questions. 20929 20929 20929 20929

20929 20929 20929 20929 20929


SECTION-A
o m
20929 20929 20929 20929

20929
1.
20929
Write briefly :
20929 20929 20929
.r c 20929 20929

m
20929 20929

p e
a) How many bits are used by IPv4 and IPv6 address?

o
.r c
b) List20929
different IKE20929
phases.
20929 20929

p a 20929 20929

c) What is the use of BTS in cellular network architecture?


20929 20929 20929

20929 20929 d) What


20929

b r
is frequency20929
reuse? 20929 20929

p e 20929 20929 20929

e) Specify four categories of security threats.


a
rp
20929 20929 20929 20929 20929 20929 20929 20929 20929
f) What is intersystem handoff?

20929 20929
g) What is Photuris?
20929 20929 20929

h) List the limitations of wireless systems.


b 20929 20929 20929 20929

20929 20929 i) How secure is a Bluetooth


20929 20929 network?
20929 20929 20929 20929 20929

j) Why CSMA/CA cannot be used in wireless networks?

20929 20929 20929 20929 20929 20929 20929 20929 20929

20929 1 | M-70534
20929 20929 20929 20929 20929 20929 (S2)-2998
20929 20929

20929 20929 20929 20929 20929 20929 20929 20929 20929


20929 20929 20929 20929 20929 20929 20929 20929 20929

SECTION-B
20929 20929 20929 20929 20929 20929 20929 20929 20929

2. What does Encapsulation Security Payload means? Explain.

20929 3.
20929 What is20929
GPRS? Describe
20929 different security
20929 and Handoff
20929 issues in20929
GPRS. 20929 20929

4. List and explain about the routing protocols used in Adhoc Networks.
20929 20929 20929 20929 20929 20929 20929 20929 20929
5. Write a note on simple key management for internet protocols.

6. Write down the differences between 2G and 3G.


20929 20929 20929 20929 20929 20929 20929 20929 20929

SECTION-C
20929 20929 20929 20929 20929 20929 20929 20929 20929

7. a) Describe IPv6 header structure.

20929 20929 b) What are the different


20929 20929 ways to establish
20929

o
WLAN?
m Explain in detail.
20929 20929 20929 20929

20929
8.
20929
cellular systems?
20929 20929 20929
.r c
What is system capacity? What are different ways to improve coverage and capacity in
20929 20929

m
20929 20929

9.
e o
Describe Bluetooth protocol structure in detail. Describe the changes made in latest
standard.
p
a .r c
20929 20929 20929 20929 20929 20929 20929 20929 20929

r p e
20929 20929 20929

b 20929 20929

a
20929

p
20929 20929 20929

rp
20929 20929 20929 20929 20929 20929 20929 20929 20929

20929 20929 20929 20929 20929 b 20929 20929 20929 20929

20929 20929 20929 20929 20929 20929 20929 20929 20929

20929 20929 20929 20929 20929 20929 20929 20929 20929

20929 2 | M-70534
20929 20929 20929 20929 20929 20929 (S2)-2998
20929 20929

20929 20929 20929 20929 20929 20929 20929 20929 20929

You might also like