0% found this document useful (0 votes)
52 views3 pages

EC3401 Networks and Security IAE2 QP

This document is an internal assessment examination paper for the Fourth Semester of the Department of Electronics and Communication Engineering, focusing on the course EC3401 – Networks & Security. It includes various questions divided into three parts, covering topics such as protocols, ICMP, TCP congestion control, SHA algorithms, and reverse engineering. The exam is designed to assess students' understanding and application of networking and security concepts.

Uploaded by

govindchellam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views3 pages

EC3401 Networks and Security IAE2 QP

This document is an internal assessment examination paper for the Fourth Semester of the Department of Electronics and Communication Engineering, focusing on the course EC3401 – Networks & Security. It includes various questions divided into three parts, covering topics such as protocols, ICMP, TCP congestion control, SHA algorithms, and reverse engineering. The exam is designed to assess students' understanding and application of networking and security concepts.

Uploaded by

govindchellam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Reg.

No:

Question Paper Code : 4234012

INTERNAL ASSESSMENT EXAMINATION-2, MAY 2023


Fourth Semester
Department Of Electronics and Communication Engineering
EC3401 – NETWORKS & SECURITY
(Regulation 2021)
Time : 3 hours Maximum : 100
Marks Answer ALL Questions
Part - A (10 x 2 = 20 Marks)

1 Compare Byte oriented versus Bit oriented protocol. BTL 2 CO1


2. What is difference between p-persistent CSMA and BTL 1 COI
non-persistent CSMA.
3. Define subnetting? BTL 1 CO2
4. Expand ICMP and write the function BTL 3 CO2
5. Write the use of Hyper Text Transfer Protocol BTL 3 CO3
(HTTP)
6. What do you mean by slow start in TCP BTL 1 CO3
congestion?
7. What is AES cipher? BTL 1 CO4
8. Contrast various SHA algorithms. BTL 2 CO4
9. Explain attractive properties of blockchain. BTL 2 CO5
10. What is Evil-maid effect? BTL 1 CO5

Part - B (5 x 13 = 65 Marks)
11. a) Discuss your understanding of Bit Oriented (13) BTL3 CO1
Protocol namely HDLC
OR
b) Discuss the approaches used for error detection (13) BTL2 CO1
in networking.

12. a) Explain the need for ICMP with a suitable (13) BTL2 CO2
example.

OR
b) Define routing and compare distance vector (13) BTL1 CO2
routing and link state routing.

13. a) i) Explain any one TCP congestion avoidance (7) BTL2 CO3
mechanism.

ii) Brief about approaches used for TCP congestion (6) BTL2 CO3
control.
OR
b) Explain in detail about Web service architecture. (13) BTL2 CO3

14. a) With a neat diagram, explain the steps involved (13) BTL1 CO4
in SHA algorithm for encrypting a message with
maximum length of less than 2128 bits and
produces as output a 512-bit message digest

OR
b) i) Describe the various security mechanisms. (7) BTL2 CO4

ii) What are the properties of hasting function in (6) BTL1 CO4
cryptography?

15. a) Explain the categories of reverse engineering. (13) BTL2 CO5

OR
b) i) Elaborate about Hardware Trojans. (13) BTL6 CO5
Part - C (1x15=15)
16. a) Explain the RSA algorithm in detail. For the (8) BTL6 CO4
given values, trace the sequence of calculations in
RSA. P=7, q=13, e=5 and M=10.

b) Compute the shortest path from C to all other (7) BTL 6 CO2
nodes using link state algorithm. Also update
the forwarding table of node C

OR
b) Discuss in detail about HTTP. (15) BTL 2 CO3

Prepared By, Verified By,

M. Sudha, AP Dr. Dinesh Babu, HOD

You might also like