You are on page 1of 12

B4.

5-R3: INTERNET TECHNOLOGIES AND


TOOLS
Previous Question Papers
• January, 2006
• July 2006
• July, 2005
• January, 2005
• July, 2004
• January, 2004

JANUARY 2006
NOTE:
1. Answer question 1 and any FOUR questions from 2 to 7.
2. Parts of the same question should be answered together and in the same
sequence.

Time: 3 Hours Total Marks: 100

1.a) What is TCP/IP? Discuss the layers of TCP/IP.

b) What is IP Host address? Discuss in detail.

c) What is virtual reality? Describe its applications.

d) What is a Proxy Server? What are its functions?

e) What is file compression? How is it achieved?

f) What is Domain Name System? Explain.

g) What are digital certificates? Explain their role in Internet Security.

(7x4)

2.a) What is Internet? Describe the Architecture of Internet. Explain how a router works.

b) What are Cookies? How are they different from Microsoft Passports?

c) What is email Spam? Explain, how, it can be blocked?


(6+6+6)

3.a) What is Client/Server architecture? Explain the advantages and disadvantages of two-tier
and three-tier architecture in detail.

b) What is multimedia? What are the requirements multimedia? Explain standardized data
formats for Multimedia-based programming.

(9+9)

4.a) What are Firewalls? How do they work?

b) What are Viruses? What are the different types of viruses? Explain, how viruses work on
Internet?

c) Write short notes on:

i) Smurf Attacks

ii) CGI Scripts

([2+2]+[2+2+4]+[3+3])

For more questions papers visit www.DoeaccOnline.com, www.IgnouOnline.com

5.a) Explain briefly, the new features in Ipv6 as compared to Ipv4.

b) Explain briefly, how Ipv6 handles multiple headers? What is the purpose of multiple
headers? Explain Ipv6 addressing.

(6+[4+4+4])

6.a) Explain, how graphic images are embedded in a web page?

b) Explain the browser architecture.

c) Explain caching in web browsers.

d) What is Telnet?

(4+5+5+4)
7.a) What the different aspects of Network Security? What do you mean by Accountability and
Authorization?

b) Discuss the following techniques to ensure the data against accidental damage:

i) parity bits

ii) checksum

iii) Cyclic redundancy Checks

c) What is Internet Multicast Protocol? Explain Internet Group Management Protocol.

(6+6+6)

july 2006
B4.5-R3: INTERNET TECHNOLOGIES AND TOOLS

NOTE:
1. Answer question 1 and any FOUR questions from 2 to 7.
2. Parts of the same question should be answered together and in the same
sequence.

Time: 3 Hours Total Marks: 100

1.
a) Describe in brief one method by which web servers can create pages dynamically on
demand.
b) Why is XML used to publish and exchange database contents?
c) What is FTP? How it can be used?
d) How can IPv4 address be converted to an equivalent IPv6 address?
e) What layer protocol is the ICMP? How the ICMP data is passed to the data link layer.
f) Which transport technique is most appropriate for multimedia service: packet switching,
circuit switching or ATM cell switching. Why?
g) What is the difference between plain text and cipher text. Explain stream cipher.
(7x4)

2.
a) Describe the role of IPv6 in real time services?
b) What is VOIP? What are the motivations for transmitting voice over IP?
c) Explain in brief the important components (title, prologue and links) of the head section of
an HTML document.
(6+6+6)

3.
a) Discuss two protocols used for transmitting data securely over the World Wide Web.
b) What do you understand by Java applets?
c) Explain the differences between authentication methods and encryption methods. Give
examples of each.
(6+6+6)
4.
a) With respect to multicasting scenario, answer the following:
i) What should be the MAC address that can be used to send IP packet to a group?
ii) How do the hosts get registered to a multicast group?
b) What does DNS stand for? What is its main purpose?
c) What is working of IRC?
(8+6+4)

5.
a) Describe the concept of VPN. Why is security a concern when using VPN?
b) What is a firewall? What are the typical tasks of a firewall?
c) How is Java strongly associated with Internet?
(6+6+6)

6.
a) Explain the following terms:
i) URL
ii) Router
iii) Telnet
iv) Virus scanning software
v) RARP
b) What is TCP? What are the features, which makes TCP a reliable protocol?
c) What is xDSL technology?
(10+4+4)

7.
a) What is static routing? How it differs from dynamic routing.
b) Discuss Simple Mail Transfer Protocol.
c) Discuss differences between GET and POST commands of (HTML) web technology?
(6+6+6)

July, 2005
Note:

1. Answer question 1 and any FOUR questions from 2 to 7.


2. Parts of the same question should be answered together and in the same sequence.
Time: 3 Hours Total Marks:100

1.
1. Write down four main features of mobiles IP?
2. Expand and briefly explain the acronyms PCR SCR MCR and CVDT in
terms of Quality of standards parameters.
3. Briefly explain that how can you use TELNET for remote terminal
emulation?
4. Write any three features of intranet that differences it largely from
Internet.
5. What is a packet filter that is often used to protect an organization's
computer from unwanted Internet traffic called? Describe the concept in
brief?
6. What media can be used for noise resistance? Briefly state its other
advantages
7. What is a malicious code? By which name are they popularly known.

(7x4)

2.
1. Comment on the following statement making special reference to
differences between JPEG and MPEG standards. "There is a perceptible
need for data compression as per certain standards as the amount and type
of data to be transferred over a network increases".
2. Explain the difference of functioning between Bridges and Routers.
3. Write a short note on baseband technology and broadband technology,
with a special reference to advantages and the latest status of broadband in
India.

(6+6+6)

3. State the difference between any three of the following in brief:


1. Multicasting and broadcasting.
2. Ipv4 and Ipv6.
3. Digital signature and digital certificate.
4. File-server architecture and client/Server Architecture.

(3x6)

4. Expand and explain in detail any three of the following acronyms:


1. VPN.
2. ISDN
3. TCP/IP Protocol
4. OSPF

(3x6)
5.
1. Giving suitable examples explain three kinds of classes of an Internet
addressing, with special emphasis on the range spanned by each class?
2. Explain how the naming scheme (DNS) on the Internet works?

(9+9)

6.
1. In Context of e-mail explain e-mail gateway.
2. Explain the POP3 Component and its role in E-Mail Delivery?

(9+9)

7.
1. With reference to various applications of Internet in our daily life, explain,
how Internet has revolution the area of Learning?
2. Suppose a network uses distance vector routing. What happens if the
router sends a distance vector with all 0's(Zero)?
3. Why does BGP not exchange routing information periodically as RIP
does?

(8+5+5)

January, 2005
Note:

1. Answer question 1 and any FOUR questions from 2 to 7.


2. Parts of the same question should be answered together and in the same sequence.

Time: 3 Hours Total Marks:100

1. Answer the following: (Attempt any 7 parts)


1. What do you mean by URL? Explain its three fields.
2. Explain the difference between HTTP and HTML
3. What is a Proxy Server? Why it is used?
4. What is a Firewall? At what layer do they work? What is the main
drawback of a firewall?
5. Name some packets that are used by SNMP for information transactions
6. What is ICMP? Write at least four functions of ICMP?
7. Explain MPEG-1 and MPEG-2 as two audio coding standards.
8. What are optical fibers? Write at least four advantages of fibers over
conventional metal wires.
(7x4)

2.
1. What design features of IPv4 are retained in IPv6? What are the new
featuers that are introduced in IPv6?
2. Write and Explain the procedure for translating a domain name into an
equivalent IP address. What are two performance optimizations techniques
used by DNS server?

(9+9)

3.
1. What is MIME? What are its advantages?
2. What is the difference between E-mail server and POP server? What are
the versions of POP server currently available?
3. Explain the differences between Routing and Switching?

(6+6+6)

4.
1. Describe the concept of Virtual Private Network(VPN). Why is security a
concern when using VPN?
2. Subnet the class C network address 198.69.25.0 into eight subnets.
3. What is WWW? What is the contribution of JAVA to WWW?

(6+6+6)

5.
1. One function of a routing protocol is to determine the 'best path' between
the sending and the receiving nodes. What is considered as 'best path'?
2. OSPF is considered to be a distributed routing protocol since routers
periodically exchange information with each of their neighbours. Is it
possible to have routing protocol that is centralized in nature? How do you
think centralized routing protocol would work? Will there be some
inherent problems?
3. Write the difference between SNMP manager and SNMP agent

(6+6+6)

6.
1. Explain the difference between authentication methods and encryption
methods. Give examples of each as a part of your explanation.
2. 'DHCP' permits completely automated address assignment'. Justify the
statement.
3. Home based Internet services can be established using analog modems,
IDSN, cable modems, ADSL and hi-speed wireless links. Compare their
advantages and disadvantages

(6+4+8)

7.
1. What is XML and how does XML compare to SGML and HTML?
2. Describe how cookies can be used to store information about a user?
3. Describe the Common Gateway Interface and server extensions as
approaches for integrating databases on the web

(6+6+6)

July, 2004
Note:

1. Answer question 1 and any FOUR questions from 2 to 6.


2. Parts of the same question should be answered together and in the same sequence.

Time: 3 Hours Total Marks:100

1.
1. Write short note on Cookies.
2. Explain, how Multicast IP broadcasts travel along the Mbone.
3. Briefly describe the structure of a Web URL and how they help retrieve
Web documents.
4. Explain the hierarchy of Usenet Newsgroup.
5. Write a note on how Domain Name System (DNS) Servers work.
6. What are Imagemaps and Interactive forms? How do they work?
7. How does Real Player streaming audio work over the Internet?

(7x4)

2.
1. How can you use FTP to download and upload files from your computer
to another computer on the Internet? Explain in detail how an FTP session
works.
2. Write the steps involved in Pile Compression.
3. What are the different classifications of an Internet addressing? Explain
the addressing scheme with respect of Internet hosts and networks.
(8+5+5)

3.
1. Explain in brief how three most important programming tools associated
with Web technologies viz. Java, JavaScript and ActiveX work on the
World Wide Web.
2. What are the essential functions that the router must perform to achieve
internetworking among dissimilar subnetworks?
3. What is a common Gateway Interface Scripts?

(9+6+3)

4. Explain any three of the following:


i) How do Firewalls safeguard the Internet?
ii) How do Smurf Attacks cripple Internet Service Providers?
iii) How do Viruses work?
iv) How do Digital certificates ensure Internet Security?

(3x6)

5. Explain any three of the following:


i) How is Email delivered over the Internet?
ii) How is Email Spam sent and how can it be blocked?
iii) What is working of IRC?
iv) How does Internet Telephony work?

(3x6)

6. Write short notes on any three of the following:


i) Virtual Reality
ii) Working of Proxy Servers
iii) Working of Client/Server architecture
iv) Digital Subscriber lines
v) Internet Search Engines

(3x6)

January, 2004
Note:

1. Answer question 1 and any FOUR questions from 2 to 7.


2. Parts of the same question should be answered together and in the same sequence.
Time: 3 Hours Total Marks:100

1. Answer the following: (Attempt any 7 parts)


1. What do you think is the role of a network manager?
2. Using a network analyzer how can physical address of a computer be
found?
3. “MIME is only an extension of SMTP” – Justify.
4. How does ARP handle IP address resolution?
5. Explain briefly about the new technology that combines the advantages of
both private network and public network?
6. Explain ‘Server Push technology’.
7. When is multicasting more useful over broadcasting?
8. How can a web page contain non-textual information (such as images,
photographs or signatures)? Which HTML tag is used and how it is used?

(7 x 4)

2.
1. Explain Satellite technology for communication across large distances.
2. State the advantages and disadvantages of satellite microwave and optical
fiber transmission.

(8+10)

3. “IP divides host addresses into three primary classes”


1. What are classes?
2. Identify the range of Ipv4 addresses spanned by the Primary Classes.
3. Justify the address class/purpose of following addresses:
 128.211.6.115
 192.5.48.3
 0.0.0.0
 1.1.1.1
 127.0.0.1

(2+6+[2x5])

4.
1. There is a new version of Internet Protocol (IP) that has been proposed by
IETF, to replace the current version. Explain its new important features
with special reference to the limitations in the old version.

(18)

5. Differentiate between any 3 of the following pairs:


o Private key and Public Key.
o Client side Scripts and Server side Scripts.
o Cookies and Passports
o Java Applets and Java Scripts.

(6+6+6)

6. In context of e-mail explain:


0.
1. E-mail gateway
2. POP Server.

(9+9)

7. Explain how Domain Names are allocated with special reference to special
domain names.

(18)

You might also like