Saturday 30 March 2013

Kerala University B.Tech 2003 Scheme Eigth Semester Internet Technology Previous Questions


INTERNET TECHNOLOGY
MODULE 1
> Explain the connection establishment between a client and server during data transmission.
> Explain in details how does a client interacts with a server in an internet connection.
> What is the function of ISO 7 layer reference model for a multiple protocol configuration?
> Explain Meta languages and socket programming
> Briefly explain the architecture and services of an Email system.
> Give a description of the internet email system and its key components.
> Explain the role of SMTP in email(20)

> Illustrate the different scheduling mechanisms in multimedia networking(20)
> Explain various scheduling and policing mechanisms with the point o view of multimedia networking(20)
> Discuss in detail the features of RTP for a Real Time interactive application.
> Each internet host has atleast one local name server and one authoritative name server. What role does each of these servers have in DNS? Explain
> Describe the role of DNS in content distribution network.
> What is DNS? Explain how DNS works?
> What are the five layers in Internet Protocol stack? What are the principal responsibilities of each of these layers?
> What is the difference between Persistent HTTP with pipelining and Persistent HTTP without pipelining? Which of the two is used by HTTP 1.1?
> Explain in detail the persistent and nonpersistent connections in HTTP(20).
> Describe how web cache can reduce the delay in receiving a requested object.
> What is meant by interactivity for streaming stored audio/video? How it is different from interactivity for real time interactive audio/video? Explain.
MODULE 2
> What is transport mode and tunnel mode operation connected with encapsulating security payload?(15)
> Explain the services provided by SSL and transport layer protocols for security assurance.
> Explain SSL and Transport layer security addressing and issues involved(20)
> What are the services provided by the SSL record protocol? What steps are involved in the SSL record protocol transmission
> What are the differences between SSL connection and an SSL senion?
> With a neat diagram, explain the IP security architecture with benefits and applications of IP security(20)
> Explain the various techniques used by firewalls to control access and enforce security policy.
> Explain the key management techniques used for network security(20)
> Explain how IPsec protocols provide security for a packet at the network layer(20)
> What is the difference between Transport mode and Tunnel mode.
> What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?
> What are the services provided by IP sec? Explain
> Why is the segmentation and reassembly function needed in PGP?
> Which are the five principal services provided by PGP? Explain.(20)
> Why does ESP include a padding field?
MODULE 3
> What are the assumptions and requirements of mobile IP?
> What is meant by mobile IP? Explain(20)
> Name the requirements of a mobile IP and justify them.
> Describe IP packet delivery in mobile network using an example network(20)
> Describe minimal encapsulation and generic routing encapsulation.
> Discuss the mobile TCP and their advantages for mobility.
> Explain the wireless application protocol pointing out the advantages and disadvantages.
> Illustrate the concepts involved in wireless telephony applications(20)
> What are direct routing and indirect routing in mobile modes? Using a typical network explain the routing algorithm(20)
> Explain the Agent Discovery and Agent advertisement in the mobile modes.
> Explain fundamental differences between WML and HTML. How do WAP and WML interlinked?(12)
> Write short notes on WAP protocols.
> Describe the components and interfaces of WAP architecture with relevant figures.
> Explain how tunneling works in general and especially for mobile IP using Ip-in-IP, minimal and generic routing encapsulation respectively. Discuss the advantages and disadvantages of these three methods also(20)
> Explain Tunneling and Encapsulation mechanisms used for forwarding packets between the home agent and the Care – of address in mobile network layer(15)
> Discuss the approach mobile TCP and its advantages
> Explain DHCP
> What are the advantages and disadvantages of Snooping TCP?

No comments:

Post a Comment