ggsipu 8 sem lesson plan

17
END TERM EXAMINATION (Please write your Exam Roll No.) CjS 0i1 Exam Roll No...•.................. (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (3) (4) (5) (3.5) (4) (6) (a) (b) (c) (d) (e) (f) (g) (h) (i)· What is the turing test for AI? What are the limitations of expert system? What is "Horn clauses" in AI? What is Agents? What are different typftS of Blind Search? Explain. Explain Plateaux. What is Context-free Grammer? What is LISP, WAP in LISP to append a list? Perform resolution on the set of clauses. A:PVQVR B:=-PVR C:=-Q D:=-R What is Fuzzy Set? Where CD (Conceptual Dependency) used in AI? What are Research Areas in NLP? Define Artificial Intelligence as a Science? How it was introduced? Explain Production System. What is meaning of f(n), gIn), h(n)? What is heuristic function? Explain hill climbing problem. OR Differentiate between conventional programming and AI programming. Solve the problem for finding shortest path' from A to Z using A* algorithm. ~ >.) ~o @ 3" r~~):!o<: G> -,' c./ <?-( (1'--.. / 'v...'t' \, "<rr c ~-~. ~,.;;:; " I~ '\ '" & /\:.::/ (:tL.......®~ I;; "{"'/7 ~ 10/" .<.'~,~--/ ," f. I)" 9 ~t.0,/(/t @ ,., \:; ,(, Where Breadth first search is better than Best first Search? Explain with the help of example. (2.5) Why Game playing is part of AI? (3) Design Semantic Networks and frames for the banking system. (6) How to interpret the frames in Knowledge Representation? (3.5) OR Explain Alpha-Beta cutoff in Min-Max Algo with the help of an example. (6) Consider the following statement:- (6.5) "Mary likes all kinds of food. Pizza is a kind of food. Apple is a food. Anything anyone eats is a food. John does not eat chicken. Ana eats everything Mary eats." Convert these statements into predicate logic. Answer questions given below using Resolution Algorithm. (i)What food does Ana eat? (ii) Is Mary like chicken? (iii)Pizza is liked by Mary or not? Q4 (a) Differentiate between deterministic versus non-deterministic Parsers. (4) (b) Define Fuzzy inference. What are the main steps in fuzzy inference process? (8.5) OR (a) What is NLP? Explain Pragmatic Processing. (5) (b) How does a rule-based expert system propagate uncertainties? (7.5) Q5 (a) Draw and explain the architecture diagram of Rule-based expert system. (6) (b) What is learning in AI? (4) (c) Where forward chaining is better than backward chaining? (2.5) OR (a) What are the fundamental characteristics of Expert system and why we need an' expert system? (4.5) (b) What are the difference between expert system and artificial neural networks? (5) (c) "Robotics is a branch of AI". Comment. (3) Ql (j) (k) (1) ~ Q2 (a) (b) (c) (d) (e) (f) Q3 (a) (b) e (c) (a) (b) .•. ++..•. ""' .•....•. "" .•+++ www.niecdelhi.ac.in

Upload: vibgyor31

Post on 21-Oct-2015

43 views

Category:

Documents


2 download

DESCRIPTION

lesson plan term wise

TRANSCRIPT

Page 1: ggsipu 8 sem lesson plan

END TERM EXAMINATION(Please write your Exam Roll No.)

CjS 0i1Exam Roll No...•....•..............

(2)(2)(2)(2)(2)(2)(2)(2)(2)

(2)(2)(3)

(4)(5)

(3.5)(4)(6)

(a)(b)(c)(d)(e)(f)(g)(h)(i)·

What is the turing test for AI?What are the limitations of expert system?What is "Horn clauses" in AI?What is Agents?What are different typftS of Blind Search? Explain.Explain Plateaux.What is Context-free Grammer?What is LISP, WAP in LISP to append a list?Perform resolution on the set of clauses.A:PVQVRB:=-PVRC:=-QD:=-RWhat is Fuzzy Set?Where CD (Conceptual Dependency) used in AI?What are Research Areas in NLP?

Define Artificial Intelligence as a Science? How it was introduced?Explain Production System. What is meaning of f(n), gIn), h(n)?What is heuristic function? Explain hill climbing problem.

ORDifferentiate between conventional programming and AI programming.Solve the problem for finding shortest path' from A to Z using A* algorithm.

~

>.) ~o @ 3" r~~):!o<:G> -,' c./ <?-( (1'--.. /'v...'t' \, "<rr c ~-~. ~,.;;:;

" I·~ '\ '" & /\:.::/

(:tL.......®~ I;; "{"'/7

~ 10/".<.'~,~--/ ," f .I)"

9 ~t.0,/(/t@ ,., \:; ,(,

Where Breadth first search is better than Best first Search? Explain with the help ofexample. (2.5)

Why Game playing is part of AI? (3)Design Semantic Networks and frames for the banking system. (6)How to interpret the frames in Knowledge Representation? (3.5)

ORExplain Alpha-Beta cutoff in Min-Max Algo with the help of an example. (6)Consider the following statement:- (6.5)"Mary likes all kinds of food. Pizza is a kind of food. Apple is a food. Anythinganyone eats is a food. John does not eat chicken. Ana eats everything Mary eats."Convert these statements into predicate logic. Answer questions given below usingResolution Algorithm.(i)What food does Ana eat? (ii) Is Mary like chicken? (iii)Pizza is liked by Mary or not?

Q4 (a) Differentiate between deterministic versus non-deterministic Parsers. (4)(b) Define Fuzzy inference. What are the main steps in fuzzy inference process? (8.5)

OR(a) What is NLP? Explain Pragmatic Processing. (5)(b) How does a rule-based expert system propagate uncertainties? (7.5)

Q5 (a) Draw and explain the architecture diagram of Rule-based expert system. (6)(b) What is learning in AI? (4)(c) Where forward chaining is better than backward chaining? (2.5)

OR(a) What are the fundamental characteristics of Expert system and why we need an'

expert system? (4.5)(b) What are the difference between expert system and artificial neural networks? (5)(c) "Robotics is a branch of AI". Comment. (3)

Ql

(j)(k)(1)

~ Q2 (a)(b)(c)

(d)(e)

(f)

Q3 (a)(b)

e (c)

(a)(b)

.•.++..•.""'.•....•."".•+++

www.niec

delhi

.ac.in

Page 2: ggsipu 8 sem lesson plan

END TERM EXAMINATIONEIGHTH SEMESTER [B.TECH. MAy-JUNE 2012

Paper Code: ETCS404 . Subject: Software ~stii!iJTime: 3 Hours Maximum Marks :75

Note: Attempt any five questions including Q.no.1 which is compulsory. Select on~" question from each unit.

(Please write your Exam Roll No.) Exam Roll No .•.....................

Ql (a) What are the factors that limit the complete testing of software? (5)(b)How do you use connection' matrix to calculate the cyclomatic

complexity? (5)(c) What is the purpose of regression testing? (4)(d) Does -mutation testing help in improving the quality of test data?

Explain. (5)(e) Differentiate between the following:- (6)

(i) Testing and debugging (ii)Alpha and beta testing

UNIT-IQ2 (a) Discuss software ~sting as a process. What are its various phases? (7.5)

(b)Diff~renti~te,~ei~~~.n,JRjf~e_~tiv~.~1.'~. i~~.r~nc!ion," testing aug, sYl~a1J1fg. .".>".c,~.~"':t•.t.·t,. _"',:::, ~ __" _._"_ {~} •. '_A'_¥~~_

''I(JI'-- ../.,., ••. ". ,.•.•...

Q3 There are too many possible paths through the program to test.Demonstrate the fact using some example. (12.5)

UNIT-IIQ4 Consider the program to find the greatest number:

#inc1ude<stdio. h>main 0{

int num, small;int i,j,sizelist, list[lO]'pos,temp;

printf("\Enter the size of the list:");scanf("%d", &sizelist);for(i=O;i<sizelist;i++)

{

}

{

printf("enter the number");scanf("%d", &list[i];

for(i=O;i<sizelist; i++)

small =list[i1;pos=i;

forO=i+1;j<sizelist;j++){

if(small> list[j]{

sm,a1l=:list[j};pos=j;

}}

www.niec

delhi

.ac.in

Page 3: ggsipu 8 sem lesson plan

I <

temp=list[i];list[i]=list[pos];list[pos]=temp;

}printf("\nList of the numbers in ascending order:");for (i=O;i<sizelist;i++)printf("\n%d" ,list[i));getchO;}(a) Draw the DD graph for the program. (12.5)(b) Calculate the cyc10matic complexity of the program using all methods.(c) List all independent paths.(d) Design all test cases from these independents paths.

Q5 A university is admitting students in a professional course subject to thefollowing conditions:(a) Marks in Java>=70(b) Marksiri C++>=60

. ~.... .. ,(c)Marks in OOAD>=60 .

~~~:~e:~~e:r~~b~~=;~~~l~~:i;~~:V~~d~::~2=4~Ohe will~ be eligible for scholarship course, otherwise he will be eligible for normal

course. The program reads the marks in the three subjects and generatesthe following outputs:-(i) Not eligible(ii)Eligible for scholarship course(iii}Eligiblefor normal course.Design the test cases for this software using decision table based testing.(12.5)

UNIT-IIIQ6 (a) How does regression testing helps in producing quality software? (6)

(b) How do you perform test case prioritization using program slicing? (6.5)

Q7 (a) Explain the path based integration testing method.(b) Differentiate between Recovery and security testing.

(6.5)(6)

UNIT-IV ;".Q8 (a) What are the issues in testing a QUI based software? (6.5)

(b)What are the integration testing levels of object oriented software? (6),

Q9 What are the guidelines for selecting testing tools? Explain varIOUSdynamic testing tools. (12.5)

************www.niec

delhi

.ac.in

Page 4: ggsipu 8 sem lesson plan

END TERM EXAMINATIONEIGHTH SEMESTER11,l:.!E5l!L-!~E - 20J~ _

IPap.er_~~cI-~:._~!'T410 ._____ __ _ .___. __.. .. 5.!!..'?jec.!:.E-Commerce_~_E~ JTime: 3 Hours Maximum Marks :75[_~=_:=~_= Note:.9.No.!..!s comp'ulsory. Attempt one question from each unit. . ,

Exam Roll No .(Please write your Exam Roil No.)

Q1. (a)

(b)

(c)

(d)

(e)

What are the different electronic payment methods? (5)

How Cryptography helps in securing online transactions, (5)

Are Digicash & Ecash same? Discuss: (5)

Discuss the role of client-Server Architecture in e-commerce systems. (5)

Discuss the important components of an ERP-Systems. (5)

Q2._ Unit-I

Discuss different models for online commercial transactions. (12.5)

- Q3: What are the different electronic payment methods _araitable.security issues also.

Discuss their(12.5)

-Unit-IIQ4. Discuss various security protocols for transferring of information over internet. (12.5)

Q5. - What is the Electronic Data Interchange. Discuss its architectl,lre. What is avirtual payment system? . (12.5)

Unit-III

Q6. What is MIS.warehouse.

How it is different from a DBMS. Also compare it with a(12.5)

Q7. Discuss dynamic data management in complex global scanario. (12.5)

Unit-IVQ8 What is OLAP. How is it different from OLTP? (12.5)

09. Write notes on:(a) SCM(b) Knowledge based system(c) EDP(d) -Online Resources(e) Digicash

************

www.niec

delhi

.ac.in

Page 5: ggsipu 8 sem lesson plan

END TERM EXAMINATIONEIGHTH SEMESTER B.TECH. MAy-JUNE 2012

Paper Code: ETIT412 Subject: Network Security and_ControlTime: 3 Hours Maximum Marks :75Note: Attempt any five questions. Q.no.1 is compulsory. Select one question from

each unit.

(Please write your Exam Roll No.) Exam Roll No.•...•..•......•..••.••

Q 1 (al Describe a different Block Ciphers modes of Operation. (5x5=25)

(b) Give characteristics of Advanced Symmetrical Block Cipher.

(c) W?at is Mono-Alphabetic Cipher? Why it is easy to break?

(dlWhat are advantages and disadvantages of the output feedback mode

of operation?

(e) What are requirements of Public key cryptography?

UNIT-IQ2 Distinguish between Stream Cipher and Block Cipher. Use suitable

examples and diagrams to illustrate your answers. (12.5)

Q3 Explain the Encryption and Decryption technique of DES. (12.5)

UNIT-IIQ4 Explain Diffie-Hellman algorithm. Show the use of algorithm for

exchanging the session key. (12.5)

Q5 Discuss the difference between Digital Signature and Digital Certificate.Also, explain why Digital Signature are used in Public Key EncIYption? (12.5)

UNIT-IIIQ6 What are various Digital Signature Standard? Describe anyone

algorithm of same. (12.5)

Q7 Illustrate the mechanism of Secure Socket Layer and Transport LayerSecurity using suitable diagrams/examples wherever necessary. (12.5)

UNIT-IVQ8 State and explain Management Information Model.

Q9 Describe TMN Information Model.

************

(12.5)

(12.5)

www.niec

delhi

.ac.in

Page 6: ggsipu 8 sem lesson plan

END TERM EXAMINATIONEIGHTH SEMESTER [B.TECHI JUNE - 2012 __

[~ipf!_L~;i;;;ETiiC4i4------=------ ~ubject: Mobile Commurifcatio~uTime: 3 Hours Maximum Marks :75

[-.. -.----- Note: Q.No~1is compulsory. Attempt one question from each unit. :J

(Please write your Exam Roll No.) Exant Roll No..•....................

01. (a)

(b)(c)(d)(e)(f)(g)(h)

02. (a)

(b)

03. (a)

(b)

Q4. (a)

(b)

05. (a)

(b)•

06. (a)

(b)

What is frequency reuse distance? Explain how this term governs the cellular~~m. ~Write a short note on foliage loss. (3)Explain the concept of cell sectoring. (3)Differentiate between soft handoff and hold handoff. (3)Write a short note on concatenated codes. (3)Discuss in short about Rayleigh fading channel. (3)Write a short note on Vocoders. (3)Differentiate between TDMA and CDMA technology. (3)

Unit-IExplain basic cellular system with architecture diagram. What are thefunctionalities of MJSO in cellular system. (6.5)Explain the following interference problems that occur in Mobile cellular systemand how these interferences can be minimized. (6)(i) Adjacent channel interference (ii) Co-channel Interference.Explain the concept of cell splitting and how it enhances the capacity of a cellularsystem. (6.5)Differentiate first generation and second generation mobile communicationsystems. Give examples in each case. (6)

Unit-IICalculate the radiation resistance of an antenna, which is drawing 12 Ampcurrent and radiating 4.5KW. If antenna efficiency is 90% and power gain is 20,find out the loss resistance and directivity of the antenna. (6.5)Discuss about the various antenna structures and their radiation patterns used in'Mobile cellular coverage. (6)Explain how frequency management and channel assignment done in mobilecellular systems. Differentiate fixed channel assignment and dynamic channelassignment. (8.5)With the help of diagram state what are ground incident angle and groundelevation angle. (4)

Unit-IIIExplain Digital transmitter and receiver operation using OPSK Modulation andOPSK Demodulation. Draw the constellation diagram of OP8K signal. (6)Explain how convolutional codes differ from Block codes. Explain the coding anddecoding in convolutiol'lal code. (6.5)

Q7. Write short notes on the following:(a) OFDM(b) Turbo Coding

(6.5+6)

08. (a)

(b)

. Unit-IVExplain how many types of channels are there in GSM. ·Write brief note onframing structure of G8M. (8.5)Describe a typical call how far a mobile termina~ed call in G8M with diagram. (4)

Q9. Write brief notes on the following:(a) IS-95 System(b) Voice Signal processing and coding

************

(6.5+6)

www.niec

delhi

.ac.in

Page 7: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 8: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 9: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 10: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 11: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 12: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 13: ggsipu 8 sem lesson plan

Northern India Engineering College, New Delhi

Page 14: ggsipu 8 sem lesson plan

(Please write your Exam Roll No.) Exam Roll No.•.....................

END TERM EXAMINATIONEIGIlTHSEMESTER H.TEell; MAY-2010

Stlbject: AdificiallntelligenceTime: 3Hours, Maximum Marks :75

Note: Q.1 is compulsory. Attempt one question from each unit. Internal choice is indicated. I

Ql Give a short answer:- (3x5=15)(a) Classify the following search algorithm as intelligent/non intelligent.. Give reason of your answer: Depth first search, best first search,

branch and bound search.(b)How can you classify the knowledge? What is an inference engine?(c)What are the merits/ demerits of semantic net over semantic frames?(d)What are the different steps for natural processing?(e) List various application areas where Neural network is used.

UNIT-IQ2 (a) Compare depth first search and Hill Climbing search-procedures. (3)

(b)Explain the advantages of Best first search over Hill Climbing withsuitable example. (5)

(c)What are the steps to solve constraint satisfaction problem? Explainthem with help of crypt arithmetical problem. (7)

ORQ3 (a) Explain the process to reach goal state of a search tree which is

AND/OR graph. Give an example of application whose search tree isAND/OR graph. (8)

(b) Explain the Means end analysis algorithm. Give an example of anapplication where it is applied. (7)

UNIT-IIQ4 (a) Explain the rules to unify two predicates. (3)

(b)Represent following facts as predicates and convert them to clauseform, explaining the steps of conversion:- (5)(i) Any student who is intelligent or hard working will pass the exam

in good marks.(ii)Anyone who is passed with good marks get a job.

(c)Assume that "Shiva is neither hard working nor intelligent". Usingresolution prove that Shiva does not get a job. (7)

ORQ5 (a)What kind of knowledge is represented by the semantic nets? Give an

example of knowledge base represented by semantic nets and explainhow inferences are done in semantic Nets? (8)

(b)Give an example of a game Tree. What is the purpose of Minimaxprocedure in game tree? What are Alpha Beta cutoff? (7)

UNIT-IIIQ6 (a) Consider the following sentences: (5)

Most birds fly unless they have broken wingsPenguins and Ostrich do not fly.Crow is a birdUse Non monotonic reasoning to answer "Does Crow Fly"?

(b)Write short notes on handling uncertainty using probabilisticreasoning. (5)

P.T.O.

Northern India Engineering College, New Delhi

Page 15: ggsipu 8 sem lesson plan

(Please write your Exam Roll No.) Exam Roll No .

END TERM EXAMINATIONEIGHTH SEMESTER B.TECH. MA y-2010

~e_e_~~O_de: ETEC414/ET!!~Q~___ Subject: Mobile CommunicationTime: 3 Hours ---~- - ·-----------iVlaximum Marks :75

r- --- - --_-_-_ ..-.. -_.-_·-.-_--_-N-_o-te-.-·a:1--is-c-o-m-p-u-'s-o--r-y-.-'-n-te···-rnal·choice is.!._n_d'_·c_a_te_d_. ._JQl (a) Mention various frequency reuse schemes. (5x5=25)

(b) Prove that for a hexagonal geometry, the co-channel reuse ratio is given by

Q = .J3N, where N::.:: i2 + ij + / .(c) What could be the impact of Foliage loss in calculating GOS?(d) Define umbrella pattern effect. Also, mention its benefits.(e) Discuss difference of fixed channel assignment and non-fixed channel assignment.

(6)(2.5)

UNIT-IQ2 (a) Verify the statement that as long as the cell size is fixed, CII is independent of the

transmitted power of each cell. (4.5)(b) What is paging control? (2)(c) Suppose there are 1001 radio channels and each has an area of 12km2 and the

entire system covers an area of 4200km2• (6)(i) Calculate system capacity if cluster size is 7.(ii) How many times would the cluster of size 4 have to be replicated in order to

approximately cover the entire cellular area?(iii)Calculate the system capacity if the cluster size is 4.(iv) Does decreasing the cluster size increase the system capacity?

ORQ3 (a) Define co-channel Interference for seven-cell cluster pattern. Also, find CCI for the

case when mobile is at cell boundary. (6.5)(b) Define Trunking efficiency and Grade of service. (2)(c) State cell splitting. If each cell is allocated 60 channels regardless of cell size. Find

the number of channels contained in a 3x3km2 area without cell splitting i.e.R=lkm and with cell splitting. (4)

UNIT-II(a) How can you obtain point to point model (Lee Model)?(b) What are the limitations of GPRS?

Q4

(6)(6.5)

(2.5)(5)(5)

OR(a) Define spectrum efficiency.(b) Compare AMPS and digital cellular system with respect to various parameters.(c) Why location update is required in cellular system.

************

I(e) Derive pee spac~ equation i.e. P,. ~ P,. ( 4;)' ' whe.e P,"transmitted f.ee powe.

Pr=Received power, A. is wavelength, r is distance between Tx and Rx. (4)OR

Q5 (a) What are the merits of Two hand-off-level algorithm? Analyse it. (4)(b) What do you understand by Dropped Call Rate? Discuss various methods to

improve it. (4)(c) Define Two Ray Model for propagation in open area. Also, find out incident angle for

a mobile communication if cell site antenna height is 100m and mobile antennaheight is 2m and communication path is 10m. (4.5)

UNIT-IIIQ6 (a) What are the different channels used in GSM system? Describe all set up channels

in detail and why they are required? (6.5)(b) Write in detail about OFDM transmitter and Receiver. (6)

ORQ7 (a) Draw diagram of Turbo Encoder, why turbo coding is important in cellular mobile

system? (6)(b) Mention differences between FDD (Frequency Division Duplexing) and TDD (Time

Division Duplexing). (6.5)

UNIT-IV(a) What are various security levels provided in GSM?(b) Discuss salient features of IS-95.

Q8

Q9

Northern India Engineering College, New Delhi

Page 16: ggsipu 8 sem lesson plan

(Please write your Exam Roll No.) Exam Roll No ..••.•...•...•••••....•

END TERM EXAMINATIONPaper Code: ETCS404Time: 3Hours

ISubject: Software Testing

Maximum Marks :75Note: Q.1 is compulsory. Internal choice is indicated. I

Q1 (a) What is a software failure? Discuss the conditions of a failure. Mere presence offaults may not lead to failures. Explain with the help of an example. (2)

(b) Differentiate between the following:- (8x2=16)(i) Stub and driver (ii) Static and dynamic testing tools(iii) Program and software (iv)Test, Test case and Test Suite(v) Performance and Functional testing (vi)Black box and White box testing(vii)Verification and validation (viii) Positive and negative testing

(c) What is the relationship of V-shaped software life cycle model with waterfall model?How is acceptance testing related to requirement analysis and specification phase? (4)

(d) What is risk? What is the use of risk analysis? (3)

Q2 (a) Will exhaustive testing (even if possible for a very small program) guarantee that theprogram is 100% correct? (4)

(b) Testing is not a single phase in the software development life cycle. Explain andcomment. (4.5)

(c) There are two limitations in software testing:- (4)(i) Input domain is too large to test (ii)Too many paths in the programJustify these limitations with the help of suitable examples.

OR(a) Discuss the advantages of testing with reference to the software product. (4)(b) Verification and validation are used interchangeably many times. Define these terms

and establish their relationship with testing. (4)(c) Define a test case. What are the objectives of test case design? Discuss the various

steps involved. (4.5)

gIven eow:Average marks Grade

90-100 Exemplary Performance75-89 Distinction60-74 First division50-59 Second Division0-49 Fail

Q3 (a) Consider an example of grading a student in a university. The grading is done as. b I

The marks of any three subjects are considered for the calculation of average marks.Generate boundary value analysis test cases and robust test cases. Also, createequivalence classes and generate test cases. (8.5)

(b) What are the limitations of boundary value analysis technique? Discuss thesituations in which it is not effective. (4)

OR(a) A telephone company charges its customer using the following calling rates:- (3)

Call Rates0-75 RS.50076-200 Rs. 500+Rs. 0.80per call excess of 75201-500 Rs. 500+Rs. 1.00per call excess of 200>500 Rs. 500+Rs. 1.20 per unit excess of 500

Identify the equivalence class test cases for output domain.(b) Show with the help of an example that a very high level of statement coverage does

not mean that program is defect free. (3)(c) Consider a program given below. Find all du-paths and identify those du-paths that

are definition clear. {'-5' \/*Program to calculate total telephone bill amount to be paid \..: J

by an customer /

#include<stdio.h>#include<conio.h>

P.T.O.

Northern India Engineering College, New Delhi

Page 17: ggsipu 8 sem lesson plan

(Plectsewrite your Exam Roll No.) EXalll Roll No.....................•.

END TERM EXAMINATION______________ EIGHTH SEMESTER (U:fECII.1 MAY-:~OlO _

~P~-'"Code: ETlT412 . " ~__" "__ " . Subject: Network Security JTime: 3 Hours Maximum Marks :75

[ ~_------N-o-te-:-Q--.-·1-1-·s-c·o·-m-p-u-/s-o-r-y-.A-tt-e-m-p-to-;;equiSiion "iiuiii-each Unit. =:J

Ql ~(a) Compare and contrast the hash algorithms used in PGP and SIMIME(b) Explain how does tunnel mode provide protection to the IF Packets(c) Find greatest cormuon divisor of 161 and 28 by using Extended Euclidean

Algorithm.(d) Derme the followings

(i) Codes ( ii ) Ciphers (iii) Confusion (iv) Diffusion\Jl\', ~

Q2. a) Explain Hill Cipher Technique by taking a suitable example.Discuss any two disadvantages of Hill Cipher Technique

b) Briefly discuss Differential Cryptanalysis Attack in DES

Q3. a) Give a detail description of single round of DES algorithmb) Explain the steps in Playfair Cipher technique

UNIT-II

(3)(3)

(3)

(1.5 x4)

(10)(5)

(10)( 5)

Q4.a) Explain Diffie Hellman key exchange and explain how does it sufferfrom Man-in-Middle attack. ( 10)

b) Explain Time Domain and Frequency Domain Scramblers. (5)

Q5.a) Perform the eilcryption anu decryption of the plain text, M= 8,where recipientsRSA'public key are (n=77,e =17). (10)

b) Briefly explain Elliptic cUrve cryptography (5)

UNIT-III

Q6. a) Explain the Digital Signature Standard (DSS) approach to digital signatures (10)b) What are some weaknesses of a Packet - filtering router (5)

Q7. a) Explain the various steps involved in the Secured Socket Layer(SSL) Record Protocol transmission. (10)

b) Discuss, Oakley Key Determination Protocol in IPSec. (5)UNIT-IV

Q7.· Explain in detail the TMN Architecture (15)8. a)Briefly explain TMN management service architecture (10)

b) Discuss some implementation issues ofTMN (5)

************

Northern India Engineering College, New Delhi