Professional Documents
Culture Documents
Model QP 21AML153 PDF
Model QP 21AML153 PDF
21AML153
2
B.N.M. Institute of Technology
An Autonomous Institution under VTU
Model Question Paper
Figth Semester BE, 2021-22 Scheme
Computer Networks and Security- 21AML153
Duration: 3 Hour Max. Marks: 100
Note: 1. Answer one full question from each Module 1,2,3,4,5 (5Q x 20M=100 Marks)
Module 1
Bloom’s
Q.No Marks COs POs/PS Cognitive
Os Levels
5(a) Find the class of following IP addresses a) 130.35.54.12 b) 10 CO3 1,2,3,4, Apply
200.36.2.3 c.)245.24.2.8 d) 172.89.9.21 e)127.45.21.11 5/1
Distinguish unicast, multicast and broadcast addresses. Define the CO3 1,2,3,4, Apply
5 (b) 10
type of following destination addresses. 5/1
i) 4A:30:10:21:1A
ii) 47:20:1B:2E:08:EE
iii) FF:FF:FF:FF:FF:FF
OR
USN:
21AML153
Distinguish between datagram packet switch and Virtual-Circuit 10 C03 2 1,2,3,4, Apply
6 (a) Approach for Connection-Oriented Service. Explain with an 5/1
example how virtual-circuit approach works?
10 CO3 1,2,3,4, Apply
6(b) Distinguish NAT and DHCP? Explain in Detail working of DHCP
5/1
Module 4
7 (a) Outline stop and wait protocol with neat diagram. 1,2,3,4,5/
8M CO3 Understand
1
Distinguish between the Transport Layer Protocol and User Datagram CO3 1,2,3,4,5/
7 (b) 6M Apply
Protocol. 1
CO3 1,2,3,4,5/
7 (c) Explain Domain Name Server. 6M Understand
1
OR
CO3 1,2,3,4,5/
8 (a) Illustrate the three way handshake protocol. 8M Understand
1
CO3 1,2,3,4,5/
8 (b) Outline User datagram services of User Datagram Protocol. 6M Understand
1
CO3 1,2,3,4,5/
8 (c) Differentiate Hyper Text Transfer Protocol and File Transfer 6M Apply
Protocol. 1
Module 5
9 (a) 1,2,3,4,5/
Identify the different types of attacks with an example of each. 10 CO4 Understand
1
OR
List and explain the X.800 security services. Also specify different 1,2,3,4,5/
10(a) 10 CO4 Understand
hashing mechanisms. 1
Apply RSA to encrypt and decrypt the plain text P=15 by
10(b) 1,2,3,4,5/
assuming two prime numbers p=7 and q=11. Write the detailed 10 CO4 Apply
1
process of encryption, decryption and key generation.