You are on page 1of 3

m crrch Ia pY ( -262l--

>l

\
Total No. of Questions : 5l
SEAT No. :

P6982 lTotal No. of J


[5865]"[05 4
F.YM.C.A. &

IT : 15 - TECHNOLOGIES L}BRAHY
rn ) (Semester - I)
I
Tinrc: 2h HoursJ IMetx.
Instructions to tlze
1) Ail
2) AA marks.
3) Draw wherever necessary.

Ql) Write option. ll0I


a) oriented nrolocol.
IP
SC
b)
D Networ:k layer layer
iii) Data linklayer layer
c) Trailer is added at
i) Network Transport
iii) Datalink w) Session
d) In modulo -2 ai _operation for both addition
and subtraction.
1) X-OR
: ii) oR
iii) AND iv) None of the mentioned
e) We add'r' to each block to make the length 'z , _
-Itl
( ,.,r
r
L) The resulting 'n' -ffi locks are called
D Data words Block ii)
iiD Code words 1r) None of
0 A simple parity-check code can detect
i) An even number of two iD
iii) No-errors iv) of
g) In modulo-11 arithmetic we use only the range
inclusive.
, 1-10 1

iii) 0-10 lv)


rnentioned
h) .
't,n,.
,
The Ilamming distance between equal co;Je words is
r)1 ii) ,-,'. ,.' n '
iii) o iv)' None of the mentioned
P.TO.
{
$

s LIBRARY
i) Which of the following TP address class 15 muiticast.
'{
r) Class-A ,. ,, ii) Class-B *
iii)Class-C lv) CIass-D
3) Which of the follorving is nollgpp licable for IP.
1) Error ii) Handle addressing conventions
iii)Datagram w) Packethandlingconventions
k) Which of the l uses both TCP and UDP.
i) FTP SMTPO
t, rO DNS
l) The addresses are 32 bits in length.
r)

m)

L 1)

ii)

lv
n) DNS
D Name server records to-address records
iii) Host name aliases All of the mentioned
o) to retrieve the emails.
,) SMTP ii) POP3
iiD SNMP rv) FTP
p) FTP uses -t-l-D
I \_l connections to transfer a file.
1)1 ii) 2 ,,1}
iii) 3
i*i".,'
194
q) Original Message bc.fbre transmission is called as
L , Ciphertext ii) Plaintext
]t{one of
r) Which method is used to establish a server and
client.
r) accept 0 ii)
iii) getlocalHost 19 0
s) How do you implement reliable protocol?
r) by sequencing packages middleware
ttt (i) & (ii) both t}fle bf the mentioned
0 How to get list of IP address thatarc assiglred to a network interface?
1) getlnetAddresses ii) ^getlnterfaceAddresses
iii) (i) & (ii) both iv).r'Non. of the mentioned
Is86sl-10s 2
4

i
LiSR/\f,Y

-(
Q2) a) The received Harnrning code is 1i00 1010101
with even pairy.Find *
error in the received cocle. ,;,....,.,
b) Generate CRC cocle tbr data word i0 1000101 1
tsl
using the divisor I I l0 1 .
"."".
tsl
OR
a) Encode a
:-l l:... ,'

1l'.001 into the even parity harnming code.


Given,
number of 5
b) Therecei tst
is 110010010101I , check if there is error in the
code IS 10101.
tsI
Q3) a) For IP address 172. 168. 14. I and subner mask ZS3.
255.
1
Isl
of subnet.
i,_
b)
tsl
a)
(solve with
tst
iD 20s.3s-66. 14
iii) 172. 14.16. 0B
b)
IsI
84) a) What is HTTP? transaction m detail.
b) What is email? di.#bient email protocols.
,t,l'::.'
- OR
a) Explain RIP in derail, :"1.
t

t b) What is DHCP? Explain DHCP scope resolution tsl


in der'hil. tsl
,". .r
Qs) a) Define threat and attacks. Explain active attack.
b) Write a simple socket program to find out Ip t4t
I6l
OR
a) Write a PCP Server-Socket program which
from client to
ctrpitalize string ancl sending the
of capitalized
sentence block to client. fl1 .
b) t6l
IAt
1-r .

s*+ **
rqJ

[s86sJ-10s 3

You might also like