You are on page 1of 2

B.E/B.

Tech DEGREE EXAMINATION, NOVEMEBR/DECEMBER 2008


Seventh Semester
Information technology

IF452 – Network Design Security and Management

PART –A
1. List any two Networking protocols.
2. Why is it necessary to consider accounting as part of initial design process?
3. Mention the advantages of flat WAN structure.
4. Differentiate classless and classful routing protocols.
5. What is Steganography?
6. Briefly explain the Avalanche effect of DES.
7. List the benefits of IP Security.
8. What is S/MIME?
9. What does SNMP MIB’s provide?
10. Bring out the importance of Configuration control in Network management.

PART – B

11. (a) Explain the basic steps involved in the Network design process. Also with a
Flow chart.
Or
(b) Describe the fundamental principles of Network design in detail.

12. (a) Discuss the design options and challenges of running IP over a frame relay
WAN.
Or
(b) (i) What is Subnet planning? Give an example.
(ii) Explain dynamic routing over ISDN.

13. (a) Perform encryption and decryption using RSA Algorithm for the following
values n=33,encryption key =7,plaintext=5. Also describe the steps involved in the
RSA Algorithm.
Or
(b) Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive
root alpha =2.
(i) Show that 2 is a Primitive root of 11.
(ii) If User A has Public Key = 9, what is his private key?
(iii)If User B has Public key = 3, what is the shared secret key?

14. (a) Draw the architecture of secure sockets layer(SSL) and explain its
components in detail.
Or
(b) How does PGP provide confidentiality and authentication service for e-mail and
file storage applications? Draw the block diagram and explain its components.

15. (a) Discuss the security issues associated with SNMP protocol in detail.
Or
(b) Write short notes on the following:
(i) Fault monitoring.
(ii) Performance monitoring.