Feb-2021 (2)

You might also like

Download as pdf
Download as pdf
You are on page 1of 2
Save trees use e-Question Paper Go green DOWNLOAD THIS FREE AT www.viuresource.com 363 Scale ox T TTT] ] sz Fifth Semester B.E. Degree Examination, Jan./Feb. 2021 Computer Networks and Security e ‘Time: 3 brs 100 Note: Answer any FIVE full questions, choosing ONE ful q due, Modute-1 1s. Whatare the diferent transport services available o appigifens (ora) Explain HTTP request and response message format. (osntars) ©. Writea note on FIP and discuss about FTP command dre (0sntais) OR 2. What are the steps involved betweon client and seRgia ger to fetch 10 JPEG images, which are residing in the same server by ui i HTTP connection, The URL for base HTML file is his; /worxy.edepartmti base index. (07 Mark . With a acat diagram and explain, explain server will interact to various DNS server hierarchicelly. (05 Marks) . Mlustate how user! ean send maj Mad how user2 receives the mail by using SMTP. (osatanks 3 a, How multiplexing snd transport layer? 'b. Describe the various € & connectiontess oriented will be performed at (06 Marks) fement and also explain about UDP checksum with an 2. Any evealngofisenifcatn, apes fo saluorani for cquntonewiten cg, 28 30, wile Deed a mlprstion tapi Nee: 1. Qa coining your anewey,compularly dcr dlagoos ott inc on th ening a page, example (07 Marks) c. Explain how TCP figyideWlow control service by using different variables, (07 Marks) oR 4a Bol Loffective repeat protocol. (06 Marks) b. Explain id WH TCP segment. (o7 Marks) &, How TGR c management is done for three way handshake by the client and server for estblithing aftfclosing a connection. Explain. (o7 Marks) 5 9g Fxplain distance vector algorithm with an example. (08 ptarks) igghe three switching techniques ina router. (0s 400k) ‘g datagram format, mention the significance of each fields. (06 Marks oR ain link state algorithm with an example. (08 Marks) ». Deseribe the intre-AS routing protocol : RIP in detail, (06 tasks) ©. Discuss about uncontrolled flooding and controlled flooding in broadeast routing algorithm (Os Nark) 10f2 BRANCHES | ALL SEMESTERS | NOTES | QUESTON PAPERS | LAB MANUALS A Vturesource Go Green initiative Save trees use e-Question Paper Go green DOWNLOAD THIS FREE AT www.viuresource.com 18C! Modute-4 7 8. Classify the different network attacks and explain denial of service attack. 9) . What are the two different techniques used to protect network fom attacks? Explain, a (rnin & Wile step invove nat nop dad (DES ong wit dig . | OR 8s, Explain key generation, encryption and deeryption phases in R cage Muswate with an example. (7 Marks) 'b. Explain the technique involved in Hash fiction for aut with a diogram, “ . (7 Maris) ‘©. Discuss about packet filtering and proxy server with (Go Mart Module-5, 9 a, Whatare the classification in multimedia network plain. (09 Maxis) b. What are the two types of loss anticipation schemes Maria) ‘€. What do you mean by a Jiter and how to Jitter atthe receiver for audio by fixed and adaptive play out delay? (0s Marks 10a. Explain the working of CDN. (osmtans) Explain about HTTP streaming in caf sregMing stored video. (or Marts) «Discuss about the properties neg in multimedia networking, ——_(®5 Marks) w~ 2o0f2 BRANCHES | ALL SEMESTERS | NOTES | QUESTON PAPERS | LAB MANUALS A Vturesource Go Green initiative

You might also like