DECEMBER 2006

 

Code: T-15                                                          Subject: INTERNET & WEB TECHNOLOGY

Time: 3 Hours                                                                                                     Max. Marks: 100

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or best alternative in the following:                                         (2x10)

       

a.       A character oriented I/O device that is damaged might set the first two bits of every character to zero.  Such errors are called 

 

                   (A)  Vertical errors.                             (B)  Burst errors.

(C)    I/O errors.                                   (D)  None of these.

       

b.      Distance limitation in LAN arises because an electrical signal becomes weaker as it travels along a wire.  To overcome such limitations device used is known as

 

(A)    Bridge.                                         (B)  Gateways.

(C)  Repeaters.                                    (D)  None of these.

            

             c.   Class D is reserved for   

                  

(A)     Broadcasting.                              (B)  Multicasting.

(C)  Future use.                                   (D)  None of these.

 

             d.   A web document that does not exist in predefined form is called

 

(A)    Static.                                         (B)  Dynamic.

(C)  Active.                                        (D)  None of these.           

 

             e.   Function invoked by an Applet to update the information displayed in an applet window is  

                  

(A)     update().                                      (B)  paint().

(C)  repaint().                                      (D)  None of these.

 

             f.    Data integrity refers to

 

(A)     protection from change.               

(B)     protection against disruption of services.

(C)     protection against unauthorized access.          

(D)    None of these.


 

             g.   SIP operates at

 

(A)     Application layer.                         (B)  Session layer.

(C)  Transport layer.                            (D)  Network layer.          

 

             h.   What does XSL stand for? 

 

(A)    Extensible Style Listing.                (B) Extensible Style Language.

(C) Extensible Style Sheet.                   (D) Extra Style Sheet.

 

             i.    IPv6 is

 

(A)   Connection-less.                           (B) Connection-oriented.

(C) Both (A) & (B).                            (D) None of these.

 

             j.    A class in JAVA having default access in a package can not be accessed by  

 

(A)  any class of the same package.

(B)  any class of other packages.

(C)  any public class of the same package.

(D)  any private class of the same package.

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

  Q.2     a.   Ethernet standards specify a minimum and maximum frame size.  Why a minimum size is needed?                                                               (6)

       

             b.   Illustrate with the help of an example how checksum fails to detect transmission errors.                   (6)

 

             c.   What is a loop-back address?  When is it used?                                                 (4)

 

  Q.3     a.   During data transmission what is the technology used to eliminate duplicate packets?                       (6)

 

             b.   Does the use of wire center have any influence on the performance of a token ring?             (6)       

 

             c.   Why is TCP called end-to-end protocol?                                                           (4)

 

  Q.4           Write short notes on the following:       

 

(i)                  Tunneling.

(ii)                Frame Filtering.

(iii)               SNMP.

(iv)              IP Telephony.                                                                     (4  4)

 

            

  Q.5     a.   Does a numeric mailbox identifier have any advantage over mnemonic identifier?                 (7)

       

             b.   How does a network analyser work?  Explain in brief.                                        (5)

 

             c.   What are the advantages / disadvantages of bus topology over star?                    (4)          

 

  Q.6     a.   How is a network interface programmed to accept some multicast packets and reject others?                                                                    (8)

 

             b.   How can an IP address be divided at an arbitrary boundary?                              (8)

       

  Q.7     a.   Can you pass environment variable to a CGI program?  Explain with a proper example.                  (8)   

 

             b.   How locality of principal is followed in DNS?  Explain.                                       (8)

 

  Q.8     a.   Create an HTML document showing how the link to a specific section of a document is created.                                                                (7)

 

             b.   What is finally block in Java?  When and how is it used?  Give a suitable example.              (9)

 

  Q.9     a.   What is XML (Extensible Markup Language)?  Explain.                                     (4)

 

             b.   Is WAP necessary with higher bandwidth 3G networks? Discuss.                       (6)

 

             c.   Discuss the advantages and disadvantages of EDI?                                             (6)