CN-End-Semester 2023
CN-End-Semester 2023
CN-End-Semester 2023
(f) What is the system designed to prevent unauthorized access to or from a private network called.
I. Computer scan
II. Digital scan
III. Biotech
IV. Firewall
(g ) Which of this is not a network edge device?
I. Switch
II. PC
III. Smartphones
V. Servers
(b) In GB3(Go-back-N), if every 5th packet that is being transmitted is lost and if we have
to send 10 packets then.
i) How many transmissions required.
ii) Which packets are being re-transmitted. [7]
Q.4 (a) Differentiate between symmetric key cryptosystem and asymmetric key cryptosystem. [7]
(b) Differentiate between active and passive attack with example [7]
(b) Find out the actual bit string transmitted using the standard CRC method for,
Q.7 (a) What is classful addressing? Explain all the classes of networks? [7]
(b) What is Hamming distance and Hamming code with example. [7]
Q.8 (a) Explain how SSL provide security, and what services are provided by the SSL record Protocol. [7]
(b) Explain Hash Key Encryption algorithm. How it is used in message authentication. [7]