NOTE: There are 9 Questions in all.
· Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.
· Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.
· Any required data not explicitly given, may be suitably assumed and stated.
Q.1 Choose the correct or best alternative in the following: (2x10)
a. A ___________ can understand multiple networking protocols.
(A) Repeater (B) Bridge
(C) Router (D) Gateway
b. TCP is concurrent because
(A) It processes multiple requests at the same time
(B) It performs round- robin checks
(C) It processes one request at a time
(D) It performs parallel processing
c. Telnet uses the _________ concept for dealing with character differences
(A) NVT (B) Floating point format
(C) ASCII (D) EBCDIC
d. Active-X control are _______ Applets.
(A) More secure (B) Less secure
(C) Similar in security (D) None of the above
e. HTTP head operation helps in
(A) Secure HTTP transfer (B) Cache management
(C) Both (A) and (B) (D) None of the above
f. An XML parser is used to _______ the contents of the XML document
(A) Display (B) Read but not interpret
(C) Read and interpret (D) None of the above
g. TCP protocol header checksum is of
(A) 8 bits (B) 16 bits
(C) 32 bits (D) 64 bits
h. Which of the following is associated with SNMP
(A) SMI (B) BER
(C) DNS (D) MIB
i. The transport protocol used by TFTP (Trivial File Transfer Protocol) is:
(A) FTP (B) UDP
(C) TCP (D) None of the above
j Digital signature uses
(A) Array (B) Table
(C) Chain (D) Hash
Answer any FIVE Questions out of EIGHT Questions.
Each question carries 16 marks.
Q.2 a. Why is HTTP known as stateless protocol? (7)
b. Explain the technique used in asymmetric key cryptography (9)
Q.3 a. How hierarchical addressing is performed in WAN? (9)
b. What is the advantage of dividing an email address into two parts? (7)
Q.4 Write short notes on the following:
(i) MIME
(ii) SNMP
(iii) IPv6
(iv) Middleware (16)
Q.5 a. While using FTP what is wildcard expansion in file names? (8)
b. Should a browser cache the copy of all bookmarked pages? Why or why not? (8)
Q.6 a. In ARP message exchange can be used to bind addresses, but this is not very efficient. Why? (8)
b. Describe three- way handshake mechanism while opening and closing a connection in TCP. (8)
Q.7 a. Explain Session Initiation Protocol (SIP) and SIP Session. (7)
b. Explain the functionality of RPC and Communication Stubs used in RPC. (9)
Q.8 a. Discuss the phases in procurement process used in E-Commerce. (6)
b. Explain various aspects of network security. (6)
c. Is there any advantage of a static web page? Explain. (4)
Q.9 a. Describe the differences between a non-EDI and fully integrated EDI system. (4)
b. What is WTP? What are reliable and unreliable request provided by WTP? (6)
c. What is Standard Generalized Markup Language (SGML)? Explain. (6)