Roll No. . . . .' ......' ..o .....o .
Total No. of Questions : 081 [Total No. of Pages: 02
M.Tech. (Sem. - lu)
NETWORKSECURITY
SUB.IECTCODE : CS - 503
PaperID : [80683]
[Notc : Pleasc fill subject codc and papcr ID on OMR]
Time : 03 Hours Maximum Marks : 100
Instructionto Candidates:
1) AtternptanyFive qucstions.
m
2) All questionscarryequalmarks.
co
u.
QI) Define the following termsandexplaineachof them.
(a) Adhoc networks
yo
s4
(b) TransportLayer.
(c) RouteDiscoveryAlgorithms.
ct
(d) ComparisonbetweenTCP/IP and OSI model.
je
ub
82) Privacy o[ personneldocumentsand transactionsis major areaof concernin
all the applications.I{ow digital Signaturesand digital certificateshelp in
lls
reducingthe privacy concerns.How thesetechnologieswork. Takean example
to makeyour casc.
.a
w
Q3) (a) Define anddifferentiatebetweenRepeater,Bridge,RouterandGateway.
(b) DiscussTunnelittg,AgentDiscoveryandNameserversin detail.
w
w
Q4) Dtfferentiate Between.
(a) protocols between High speedLANs and protocols between wireless
LANs.
(b) Gigabit EthernetandwirelessEthernet.
R-822 P,T.O.
QS) (a) Mobility in the nodes createsa lot of issuesin the network under
consideration.List variousissuescausedby mobility of nodes.How the
problemscan be overcome.
(b) How the securityproblemsaretackledin mobile uetworks.Discussrecent
developmentsfor increasingthe securityof mobile applications.
Q6) How TCP/IP hasevolved.Give the historicalbackground.What arethe TCP
extensionsfor high speednetworks?How TCP/IP has beenrestructuredfor
latestapplications.Use properdiagramsand examples.
m
co
QT) Discussthe following in relationto Ipv6
(a) Neighbordiscovery.
u.
(b) Attto configuration.
yo
(c) Applicationprogramrninginterfacefor ipv6.
(d) Routing.
s4
ct
QS) Writedetailednoteon thefollowing.
je
(a) SSL
ub
(b) ADSL.
(c) Authentication
header.
lls
(d) MobileIp
.a
w
w
XXXX
w
R-822 2