Você está na página 1de 17

ENDTERM EXAMINATION

(Please write your Exam Roll No.)


CjS 0i1
Exam Roll No.....................
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(2)
(3)
(4)
(5)
( 3. 5)
(4)
(6)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
What is the turing test for AI?
What are the limitations of expert system?
What is "Horn clauses" inAI?
What isAgents?
What are different typftSof Blind Search? Explain.
Explain Plateaux.
What is Context-free Grammer?
What is LISP, WAPin LISPto append alist?
Performresolution onthe set of clauses.
A:PVQVR
B:=-PVR
C:=-Q
D:=-R
What is Fuzzy Set?
Where CD(Conceptual Dependency) used inAI?
What are Research Areas inNLP?
Define Artificial Intelligence as aScience? Howit was introduced?
Explain Production System. What ismeaning of f(n), gIn), h(n)?
What is heuristic function? Explain hill climbing problem.
OR
Differentiate between conventional programming and AI programming.
Solvethe problem for finding shortest path' fromA to Zusing A*algorithm.
~
>.) ~o @3" r~~):!o<:
G> -,' c./ <? -( (1'--.. /
'v...'t' \, "<rr c ~-~. ~,.;;:;
" I~ '\ '" & /\:.::/
(:tL.......~ I;; "{"'/7
~ 10/"
.<.'~,~--/ ," f .I)"
9 ~t.0,/(/t
@,., \:; ,(,
Where Breadth first search is better than Best first Search? Explain with the help of
example. (2.5)
Why Game playing is part of AI? (3)
Design Semantic Networks and frames for the banking system. (6)
Howto interpret the frames inKnowledge Representation? (3.5)
OR
Explain Alpha-Beta cutoff inMin-Max Algowith the help of an example. (6)
Consider the following statement:- (6.5)
"Mary likes all kinds of food. Pizza is a kind of food. Apple is a food. Anything
anyone eats is afood. John does not eat chicken. Ana eats everything Mary eats."
Convert these statements into predicate logic. Answer questions given below using
Resolution Algorithm.
(i)What fooddoes Anaeat? (ii) Is Mary likechicken? (iii)Pizzaisliked by Mary or not?
Q4 (a) Differentiate between deterministic versus non-deterministic Parsers. (4)
(b) Define Fuzzy inference. What are the main steps infuzzy inference process? (8.5)
OR
(a) What is NLP?Explain Pragmatic Processing. (5)
(b) Howdoes arule-based expert system propagate uncertainties? (7.5)
Q5 (a) Drawand explain the architecture diagram of Rule-based expert system. (6)
(b) What is learning inAI? (4)
(c) Where forward chaining is better than backward chaining? (2.5)
OR
(a) What are the fundamental characteristics of Expert system and why we need an'
expert system? (4.5)
(b) What are the difference between expert system and artificial neural networks? (5)
(c) "Robotics is abranch of AI". Comment. (3)
Ql
(j)
(k)
(1)
~ Q2 (a)
(b)
(c)
(d)
(e)
(f)
Q3 (a)
(b)
e
(c)
(a)
(b)
.. ++... ""' ...... "".+++
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
END TERMEXAMINATION
EIGHTH SEMESTER [B.TECH. MAy-J UNE 2012
Paper Code: ETCS404 . Subject: Software ~stii! iJ
Time: 3Hours Maximum Marks :75
Note: Attempt any five questions including Q.no.1 which is compulsory. Select on~
" question from each unit.
(Please write your Exam Roll No.) Exam Roll No......................
Ql (a) What arethefactors that limit thecomplete testing of software? (5)
(b) How do you use connection' matrix to calculate the cyclomatic
complexity? (5)
(c) What isthe purpose ofregression testing? (4)
(d) Does -mutation testing help in improving the quality of test data?
Explain. (5)
(e) Differentiate between thefollowing:- (6)
(i) Testing and debugging (ii)Alphaand beta testing
UNIT-I
Q2 (a) Discuss software ~sting as aprocess. What areits various phases? (7.5)
(b)Diff~renti~te,~ei~~~.n,JRjf~e_~tiv~.~1.'~. i~~.r~nc!ion,
" testing aug, sYl~a1J1fg. .".>".c,~.~"':t .t.t,. _"',:::, ~__" _._"_ {~} . '_A'_~~_
''I(JI'-- ../.,.,. ". ,.....
Q3 There are too many possible paths through the program to test.
Demonstrate thefact using someexample. (12.5)
UNIT-II
Q4 Consider theprogramtofindthegreatest number:
#inc1ude<stdio. h>
main 0
{
int num, small;
int i,j,sizelist, list[lO]'pos,temp;
printf("\Enter the sizeof the list:");
scanf("%d", &sizelist);
for(i=O;i<sizelist;i++)
{
}
{
printf("enter thenumber");
scanf("%d", &list[i];
for(i=O;i<sizelist; i++)
small =list[i 1;
pos=i;
forO=i+1;j<sizelist;j++)
{
if(small>list[j]
{
sm,a1l=:list[j};
pos=j;
}
}
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
I <
temp=list[i];
list[i]=list[pos];
list[pos]=temp;
}
printf("\nList of thenumbers inascending order:");
for (i=O;i<sizelist;i++)
printf("\n%d" ,list[i));
getchO;
}
(a) DrawtheDDgraph fortheprogram. (12.5)
(b) Calculate thecyc10maticcomplexity of theprogramusing all methods.
(c) List all independent paths.
(d) Designall test cases fromthese independents paths.
Q5 Auniversity is admitting students inaprofessional course subject tothe
followingconditions:
(a) Marks inJava>=70
(b) Marksiri C++>=60
.~.... .. ,(c)Marks inOOAD>=60 .
~~~:~e:~~e:r~~b~~=;~~~l~~:i;~ ~:V~~d~::~2=4~Ohewill
~ beeligiblefor scholarship course, otherwise hewill beeligiblefor normal
course. Theprogramreads themarks inthethree subjects and generates
thefollowingoutputs:-
(i) Noteligible
(ii) Eligiblefor scholarship course
(iii}Eligiblefor normal course.
Designthe test cases forthis softwareusing decision table based testing.(12.5)
UNIT-III
Q6 (a) Howdoes regression testing helps inproducing quality software? (6)
(b) Howdoyouperformtest caseprioritization using program slicing? (6.5)
Q7 (a) Explain thepath based integration testing method.
(b) Differentiate between Recovery and security testing.
(6.5)
(6)
UNIT-IV ;".
Q8 (a) What aretheissues intesting aQUI based software? (6.5)
(b) What aretheintegration testing levelsof object oriented software? (6)
,
Q9 What are the guidelines for selecting testing tools? Explain varIOUS
dynamic testing tools. (12.5)
************
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
END TERM EXAMINATION
EIGHTHSEMESTER11,l:.!E5l!L-!~E - 20J~ _
IPap.er_~~cI-~:._~!'T 410 ._____ __ _ .___. __.. .. 5.!!..'?jec.!:. E-Commerce_~_E~ J
Time: 3Hours Maximum Marks :75
[_~=_:=~_=Note:.9.No.!..!s comp'ulsory. Attempt one question from each unit. . ,
Exam Roll No . (Please write your Exam Roil No.)
Q1. (a)
(b)
(c)
(d)
(e)
What are the different electronic payment methods? (5)
How Cryptography helps in securing online transactions, (5)
Are Digicash & Ecash same? Discuss: (5)
Discuss the role of client-Server Architecture in e-commerce systems. (5)
Discuss the important components of an ERP-Systems. (5)
Q2.
_ Unit-I
Discuss different models for online commercial transactions. (12.5)
- Q3: What are the different electronic payment methods _araitable.
security issues also.
Discuss their
(12.5)
-Unit-II
Q4. Discuss various security protocols for transferring of information over internet. (12.5)
Q5. - What is the Electronic Data Interchange. Discuss its architectl,lre. What is a
virtual payment system? . (12.5)
Unit-III
Q6. What is MIS.
warehouse.
How it is different from a DBMS. Also compare it with a
(12.5)
Q7. Discuss dynamic data management in complex global scanario. (12.5)
Unit-IV
Q8 What is OLAP. How is it different from OLTP? (12.5)
09. Write notes on:
(a) SCM
(b) Knowledge based system
(c) EDP
(d) -Online Resources
(e) Digicash
* * * * * * * * * * * *
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
END TERM EXAMINATION
EIGHTH SEMESTER B.TECH. MAy-JUNE 2012
Paper Code: ETIT412 Subject: Network Security and_Control
Time: 3Hours Maximum Marks :75
Note: Attempt any five questions. Q.no.1 is compulsory. Select one question from
each unit.
(Please write your Exam Roll No.) Exam Roll No...............
Q1 (al Describeadifferent BlockCiphers modes of Operation. (5x5=25)
(b) Givecharacteristics ofAdvanced Symmetrical Block Cipher.
(c) W?at isMono-Alphabetic Cipher? Whyit iseasy tobreak?
(dl What are advantages and disadvantages of the output feedback mode
of operation?
(e) What arerequirements of Public keycryptography?
UNIT-I
Q2 Distinguish between Stream Cipher and Block Cipher. Use suitable
examples and diagrams toillustrate your answers. (12.5)
Q3 Explain the Encryption and Decryption technique of DES. (12.5)
UNIT-II
Q4 Explain Diffie-Hellman algorithm. Show the use of algorithm for
exchanging the session key. (12.5)
Q5 Discuss the difference between Digital Signature and Digital Certificate.
Also, explain why Digital Signature areused inPublic KeyEncIYption? (12.5)
UNIT-III
Q6 What are various Digital Signature Standard? Describe anyone
algorithmof same. (12.5)
Q7 Illustrate the mechanism of Secure Socket Layer and Transport Layer
Security using suitable diagrams/examples wherever necessary. (12.5)
UNIT-IV
Q8 State and explain Management Information Model.
Q9 DescribeTMNInformation Model.
* * * * * * * * * * * *
(12.5)
(12.5)
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
END TERM EXAMINATION
EIGHTH SEMESTER [B.TECHI J UNE - 2012 __
[ ~ipf!_L~; i; ; ; ETiiC4 i4 ------= ------ ~ubject: Mobile Commurifcatio~u
Time: 3Hours MaximumMarks :75
[ -.. -.----- Note: Q.No~1is compulsory. Attempt onequestion from each unit. :J
(Please write your Exam Roll No.)
Exant Roll No......................
01. (a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
02. (a)
(b)
03. (a)
(b)
Q4. (a)
(b)
05. (a)
(b)

06. (a)
(b)
What is frequency reuse distance? Explain how this term governs the cellular
~~m. ~
Write a short note on foliage loss. (3)
Explain the concept of cell sectoring. (3)
Differentiate between soft handoff and hold handoff. (3)
Write ashort note on concatenated codes. (3)
Discuss in short about Rayleigh fading channel. (3)
Write a short note on Vocoders. (3)
Differentiate between TDMA and CDMA technology. (3)
Unit-I
Explain basic cellular system with architecture diagram. What are the
functionalities of MJ SO in cellular system. (6.5)
Explain the following interference problems that occur in Mobile cellular system
and how these interferences can be minimized. (6)
(i) Adjacent channel interference (ii) Co-channel Interference.
Explain the concept of cell splitting and how it enhances the capacity of a cellular
system. (6.5)
Differentiate first generation and second generation mobile communication
systems. Give examples ineach case. (6)
Unit-II
Calculate the radiation resistance of an antenna, which is drawing 12 Amp
current and radiating 4.5KW. If antenna efficiency is 90% and power gain is 20,
find out the loss resistance and directivity of the antenna. (6.5)
Discuss about the various antenna structures and their radiation patterns used in'
Mobile cellular coverage. (6)
Explain how frequency management and channel assignment done in mobile
cellular systems. Differentiate fixed channel assignment and dynamic channel
assignment. (8.5)
With the help of diagram state what are ground incident angle and ground
elevation angle. (4)
Unit-III
Explain Digital transmitter and receiver operation using OPSK Modulation and
OPSK Demodulation. Drawthe constellation diagram of OP8K signal. (6)
Explain how convolutional codes differ from Block codes. Explain the coding and
decoding inconvolutiol'lal code. (6.5)
Q7. Write short notes on the following:
(a) OFDM
(b) Turbo Coding
(6.5+6)
08. (a)
(b)
. Unit-IV
Explain how many types of channels are there in GSM. Write brief note on
framing structure of G8M. (8.5)
Describe a typical call howfar a mobile termina~ed call in G8M with diagram. (4)
Q9. Write brief notes on the following:
(a) IS-95 System
(b) Voice Signal processing and coding
************
(6.5+6)
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
(Please write your Exam Roll No.) Exam Roll No......................
END TERM EXAMINATION
EIGIlTHSEMESTER H.TEell; MAY -2010
Stlbject: Adificiallntelligence
Time: 3Hours, Maximum Marks :75
Note: Q.1 is compulsory. Attempt one question from each unit. Internal choice is indicated. I
Ql Giveashort answer:- (3x5=15)
(a)Classify the followingsearch algorithm as intelligent/non intelligent.
. Give reason of your answer: Depth first search, best first search,
branch and bound search.
(b)Howcan youclassify the knowledge? What isaninference engine?
(c)What are the merits/ demerits of semantic net over semantic frames?
(d)What are the different steps for natural processing?
( e ) Listvarious application areas where Neural network isused.
UNIT-I
Q2 (a)Compare depth first search and Hill Climbingsearch-procedures. (3)
(b)Explain the advantages of Best first search over Hill Climbing with
suitable example. (5)
(c)What are the steps to solve constraint satisfaction problem? Explain
themwithhelp of crypt arithmetical problem. (7)
OR
Q3 (a)Explain the process to reach goal state of a search tree which is
AND/OR graph. Give an example of application whose search tree is
AND/OR graph. (8)
(b)Explain the Means end analysis algorithm. Give an example of an
application where it isapplied. (7)
UNIT-II
Q4 (a)Explain the rules tounify twopredicates. (3)
(b)Represent followingfacts as predicates and convert them to clause
form, explaining the steps of conversion:- (5)
(i) Anystudent who is intelligent or hard working will pass the exam
ingoodmarks.
(ii)Anyone whoispassed withgoodmarks get ajob.
(c)Assume that "Shiva is neither hard working nor intelligent". Using
resolution prove that Shivadoes not get ajob. (7)
OR
Q5 (a)What kind of knowledge isrepresented bythe semantic nets? Givean
example of knowledge base represented bysemantic nets and explain
howinferences are done insemantic Nets? (8)
(b)Give an example of a game Tree. What is the purpose of Minimax
procedure ingame tree? What are AlphaBetacutoff? (7)
UNIT-III
Q6 (a)Consider the followingsentences: (5)
Most birds flyunless they have broken wings
Penguins and Ostrich donot fly.
Crowisabird
Use Nonmonotonic reasoning toanswer "DoesCrowFly"?
(b)Write short notes on handling uncertainty using probabilistic
reasoning. (5)
P.T.O.
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
(Please write your Exam Roll No.) Exam Roll No .
END TERM EXAMINATION
EIGHTHSEMESTER B.TECH. MA y-2010
~e_e_~~O_de: ETEC414/ET!!~Q~___ Subject: M obile Communication
Time: 3 Hours ---~- - -----------iVlaximum Marks :75
r- --- - --_ -_ -_ ..-.. -_.-_-.-_--_-N-_o-te-.- a:1--is-c-o-m-p-u-'s-o--r-y-.-'-n-te-rnal choice is.!._n_d'_c_a_te_d_. ._J
Ql (a) Mention various frequency reuse schemes. (5x5=25)
(b) Prove that for a hexagonal geometry, the co-channel reuse ratio is given by
Q =.J 3N, where N::.:: i
2
+ij +/ .
(c) What could be the impact of Foliageloss incalculating GOS?
(d) Define umbrella pattern effect. Also, mention its benefits.
(e) Discuss difference of fixedchannel assignment and non-fixed channel assignment.
(6)
(2.5)
UNIT-I
Q2 (a) Verifythe statement that as longas the cell size is fixed, CII is independent of the
transmitted power of eachcell. (4.5)
(b) What ispaging control? (2)
(c) Suppose there are 1001 radio channels and each has an area of 12km
2
and the
entire system covers an areaof 4200km
2
(6)
(i) Calculate systemcapacity if cluster size is7.
(ii) Howmany times would the cluster of size 4 have to be replicated in order to
approximately cover the entire cellular area?
(iii)Calculate the systemcapacity if the cluster sizeis 4.
(iv)Doesdecreasing the cluster sizeincrease the systemcapacity?
OR
Q3 (a) Define co-channel Interference for seven-cell cluster pattern. Also, find CCI for the
case whenmobile isat cell boundary. (6.5)
(b) Define Trunking efficiencyand Grade of service. (2)
(c) State cell splitting. If each cell is allocated 60 channels regardless of cell size. Find
the number of channels contained in a 3x3km
2
area without cell splitting i.e.
R=lkmand with cell splitting. (4)
UNIT-II
(a) Howcanyou obtain point topoint model (LeeModel)?
(b) What are the limitations of GPRS?
Q4
(6)
( 6. 5)
( 2 . 5)
(5)
(5)
OR
(a) Define spectrum efficiency.
(b) Compare AMPSand digital cellular systemwithrespect tovarious parameters.
(c) Whylocation update isrequired incellular system.
* * * * * * * * * * * *
I
(e) Derive pee spac~equation i.e. P,. ~ P,. ( 4;)' ' whe.e P,"transmitted f.ee powe.
Pr=Receivedpower, A . iswavelength, r isdistance between T
x
and R
x
. (4)
OR
Q5 (a) What are the merits of Twohand-off-level algorithm? Analyse it. (4)
(b) What do you understand by Dropped Call Rate? Discuss various methods to
improve it. (4)
(c) Define TwoRayModel for propagation inopen area. Also, findout incident angle for
a mobile communication if cell site antenna height is 100mand mobile antenna
height is2mand communication path is 10m. (4.5)
UNIT-III
Q6 (a) What are the different channels used inGSM system? Describe all set up channels
indetail and whythey are required? (6.5)
(b) Write indetail about OFDMtransmitter and Receiver. (6)
OR
Q7 (a) Drawdiagram of Turbo Encoder, why turbo coding is important in cellular mobile
system? (6)
(b) Mention differences between FDD(Frequency Division Duplexing) and TDD(Time
DivisionDuplexing). (6.5)
UNIT-IV
(a) What are various security levelsprovidedinGSM?
(b) Discuss salient features of IS-95.
Q8
Q9
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
( Ple ase write your Exam Roll No.) Exam Roll No.............
END TERM EXAMINATION
Pape r Code : ETCS404
Time : 3Hours
I
Subje ct: Software Te sting
Maximum Marks :75
Note : Q.1 is compulsory. Inte rnal choice is indicate d. I
Q1 (a) What is a software failure? Discuss the conditions of a failure. Mere presence of
faults may not lead tofailures. Explain with the help of an example. (2)
(b) Differentiate between the following:- (8x2=16)
(i) Stub and driver (ii)Static and dynamic testing tools
(iii)Program and software (iv)Test, Test case and Test Suite
(v) Performance and Functional testing (vi)Black box and White box testing
(vii)Verification and validation (viii)Positive and negative testing
(c) What is the relationship of V-shaped software life cycle model with waterfall model?
Howis acceptance testing related torequirement analysis and specification phase? (4)
(d) What is risk? What is the use of risk analysis? (3)
Q2 (a) Will exhaustive testing (evenif possible for avery small program) guarantee that the
program is 100%correct? (4)
(b) Testing is not a single phase in the software development life cycle. Explain and
comment. (4.5)
(c) There are two limitations insoftware testing:- (4)
(i) Input domain is too large totest (ii)Toomany paths inthe program
Justify these limitations with the help of suitable examples.
OR
(a) Discuss the advantages of testing with reference to the software product. (4)
(b) Verification and validation are used interchangeably many times. Define these terms
and establish their relationship with testing. (4)
(c) Define atest case. What are the objectives of test case design? Discuss the various
steps involved. (4.5)
gIven eow:
Average marks Grade
90-100 Exemplary Performance
75-89 Distinction
60-74 First division
50-59 Second Division
0-49 Fail
Q3 (a) Consider an example of grading a student in a university. The grading is done as
. b I
The marks of any three subjects are considered for the calculation of average marks.
Generate boundary value analysis test cases and robust test cases. Also, create
equivalence classes and generate test cases. (8.5)
(b) What are the limitations of boundary value analysis technique? Discuss the
situations inwhich it is not effective. (4)
OR
(a) A telephone company charges its customer using the following calling rates:- (3)
Call Rates
0-75 RS.500
76-200 Rs. 500+Rs. 0.80per call excess of 75
201-500 Rs. 500+Rs. 1.00per call excess of 200
>500 Rs. 500+Rs. 1.20 per unit excess of 500
Identify the equivalence class test cases for output domain.
(b) Showwith the help of an example that avery high level of statement coverage does
not mean that program isdefect free. (3)
(c) Consider aprogram given below. Find all du-paths and identify those du-paths that
are definition clear. {'-5' \
/*Program tocalculate total telephone bill amount tobe paid \ ..: J
by an customer /
#include<stdio.h>
#include<conio.h>
P.T.O.
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i
(Plectsewrite your Exam Roll No.) EXalll Roll No......................
END TERM EXAMINATION
_ _ _ _ _ _ _ _ _ _ _ _ _ _ EIGHTH SEMESTER (U:fECII.1 MAY -:~OlO _
~P~-'"Code: ETlT412 . " ~__" "__ " . Subject: Network Security J
Time: 3Hours M aximum M arks :75
[ ~_ ------N-o-te-:-Q--.-1-1-s-co-m-p-u-/s-o-r-y-. A-tt-e-m-p-t o-;;equiSiion "iiuiii-each Unit. =:J
Ql ~
(a) Compare and contrast the hash algorithms used inPGP and SIMIME
(b) Explain howdoes tunnel mode provide protection to the IF Packets
(c) Find greatest cormuon divisor of 161 and28by using Extended Euclidean
Algorithm.
(d) Derme the followings
(i) Codes ( ii ) Ciphers (iii) Confusion (iv) Diffusion
\ Jl\ ', ~
Q2. a) Explain Hill Cipher Technique by taking asuitable example.
Discuss any two disadvantages of Hill Cipher Technique
b) Briefly discuss Differential Cryptanalysis Attack inDES
Q3. a) Give adetail description of single round of DES algorithm
b) Explain the steps inPlayfair Cipher technique
UNIT-II
(3)
(3)
(3)
( 1.5 x4)
(10)
(5)
(10)
( 5)
Q4.a) Explain Diffie Hellman key exchange andexplain how does it suffer
fromMan-in-Middle attack. ( 10)
b) Explain Time Domain andFrequency Domain Scramblers. (5)
Q5.a) Performthe eilcryption anu decryption of the plain text, M=8,where recipients
RSA'public key are (n=77,e =17). (10)
b) Briefly explain Elliptic cUrve cryptography (5)
UNIT-III
Q6. a) Explain the Digital Signature Standard (DSS) approach todigital signatures (10)
b) What are some weaknesses of a Packet - filtering router (5)
Q7. a) Explain the various steps involved inthe Secured Socket Layer
(SSL) Record Protocol transmission. (10)
b) Discuss, Oakley Key Determination Protocol inIPSec. (5)
UNIT-IV
Q7. Explain indetail the TMN Architecture (15)
8. a)Briefly explain TMN management service architecture (10)
b) Discuss some implementation issues ofTMN (5)
************
N
o
r
t
h
e
r
n

I
n
d
i
a

E
n
g
i
n
e
e
r
i
n
g

C
o
l
l
e
g
e
,

N
e
w

D
e
l
h
i

Você também pode gostar