Roll no. Total no. of pages: 02 Total no. of questions: 08
M.TECH(PE) (Sem.
3rd)
INTERNETWORKING
AND INTERNET PROTOCOLS
Subject code: PE-522
Paper ID: [E0579]
Time: 3 Hrs. Max
Marks: 100
INSTRUCTIONS
TO CANDIDATE:
1.
Attempt any five question of
eight questions
2.
Each questions carry TWRNTY marks
Q1.
a)
Lllustrtate the key element
that comprise the internet. Given a suitable diagram depicting the basic
Operation of the internet.
b)
TCP/IP protocol architecture
provides a framework for standradization. What are the three key Element of
standradization reqired at each layer of
TCP/IP?
Q2.
a)
Element is the name given to
a populer packet-switched LAN technology. Distinguish Between (1) Thin wire and twisted –pair Element: (2)
Fast and Gigabit Element.
b)
Discribe the basic working of
dual counter rotating ring (also called FDDI rings ) in oderto provide
autometic recovery from data failures.
Q3.
a)
The IPV4 address space was
originally divided into five classes. Given a brief account ofclass full
addressing structing with example data.
b)
A block of IPV4 addresses is
granted to a group organization. If this group has 128 customers, such
requiring 64 Addresses, then how many
address would need to be allocated by
the ISP? If this first address is
190.100.128.0/26, than what would be the last
address.
Q4.
a)
A company is allocated the
site address 181.56.0.0.The company need 1000 subnets. Desin the subnets
b)
List three major drawbacks
of RARP.
Darw the format of a BOOTP massage format which is used to overcome some
of these drawbacks.
Q5.
a)
ICMP messages requires two
levelsof encapsulation. Why Show the format of ICMP acho request and reply
message.
b)
Argue that IP fragments should have small,
nonstandard headers, Diffrentiate
between transparent and non-transparent
fragmentation.
Q6. How should a firewall e implemented?
Lllustrate a firewall arrangement implemented withtwo routers and a
bastion host.
Q7.
a)
“Geteway –to Geteway protocol
(GGP) provides a concrete example of distance-vector routing.” Justify this
statement with sufficient reasons.
b)
Some organizations use firewalls
to isolate groups of users internally. Given different example of way that
intarnal firewalls can improve as well as degrade. Network performance.
Q8. Write short an the following :
a)
Diffrence between X.25 and
internet layering.
b)
Intrusion detection systems.
0 comments:
Post a Comment
North India Campus