Flowchart: Alternate Process: DECEMBER 2007
Code: AT15                                                         Subject: INTERNET & WEB TECHNOLOGY

Time: 3 Hours                                                                                                     Max. Marks: 100

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or best alternative in the following:                                         (2x10)

 

a.         HTTP is known as a _____________ protocol. 

 

(A)     Stateless                                           (B) State-full

(C)  State-aware                                      (D) Connection-Oriented

 

b.        Generally a ___________ is used to divide a network into segments

 

(A) Repeater                                           (B) Bridge                                                        

(C) Router                                               (D) Gateway

 

             c.    ARP lies in the

 

(A) Physical Layer                                   (B) Application Layer

(C) Transport Layer                                 (D) Network Layer

 

             d.    The MTU of ________________ is the highest

 

(A) Token Ring                                        (B) Ethernet

(C) X.25                                                 (D) PPP

 

             e.    CORBA stands for

 

(A)    Common Object Request Broker Architecture                                                                      

(B) Common Object Required Based Architecture

(C) Complex Optional Registry Based Architecture                                                          

(D) Complex Optional Removable Binary Architecture

 

             f.     UDP is iterative because

 

(A) It processes multiple requests at the same time                                                                       

(B) It performs round- robin checks

(C) It processes one request at a time     

(D) It performs parallel processing

 

g.        TFTP is an example of

 

(A) Application layer protocol                  (B) Network layer protocol

(C) Transport layer protocol                    (D) Physical layer protocol


 

h.        The __________ protocols used to retrieve emails from a remote server:

 

(A) POP                                                  (B) IP

(C) SMTP                                               (D) FTP

 

i.          Digital envelope contains symmetric key encrypted with the

 

(A) Sender’s Private key                          (B) Sender’s Public key

(C) Receiver’s Private key                       (D) Receiver’s Public key

 

             j      The language used in Wireless Application Environment (WAE) of WAP is  

 

(A) Java Language                                   (B) WML

(C) HTML                                              (D) C Language

            

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

 

  Q.2     a.   What is Colon Hexadecimal Notation of addresses in IPv6? Briefly explain unicast, multicast and anycast types of IPv6 addresses.                      (8)

       

             b.    How does a bridge know that to which segment the destination host is attached? (8)

 

 

  Q.3     a.   How does ICMP software on a host know to which other host it should send an error message?                                                               (8)

 

             b.   Explain the role played by the repeater at the physical layer.                                (8)          

 

 

  Q.4     a.   What makes TCP reliable? Explain.                                                                    (8)

       

             b.   When a DNS server receives a request, what are the possible actions it can take?              (8)

 

       

  Q.5           Write short notes on the following:

(i)   SGML

(ii)  Digital signature

(iii) CIDR

(iv) WAP                                                                                                        (16)

       

  Q.6     a.   What capabilities are required to run multiple clients and servers at the same time on a single computer?                                                                 (8)

 

             b.   How can a network system detect more errors without increasing the additional information in each packet?                                                           (8)

       


  Q.7     a.   Explain the architecture of EDI (Electronics Data Interchange) and its application.               (8)   

 

             b.   Give applications of JSP.  Explain life-cycle of JSP with a block diagram.  Give an example.                                                                      (8)

 

 

  Q.8     a.   Differentiate between FTP and TFTP.  (6)

 

             b.   What role do forms play in making a web page dynamic?                                    (6)

 

             c.   What are the advantages of Public key cryptographic system?                             (4)

 

 

  Q.9     a.   How can EDI and the Internet possibly be integrated?                                        (5)

 

             b.   In what ways are DTD and Schema similar to /different from each other for any XML document?                                                              (6)

 

             c.   Explain various types of E-Commerce and E-Commerce procurement models.                   (5)