You are on page 1of 2

1.

ADHOC & SENSOR NETWORKS


1) Discuss the classification of sensor networks. 2) Explain the inherent dynamic nature of WSNs. 3) Discuss about the Security in Ad Hoc networks and brief about the Key Management. 4) Write about the Intrusion Detection system with an example algorithm. 5) Explain in detail Tiny OS. 6) Explain Node-Level Simulators. 7) Explain Sensor Network Hardware.

2.WEB SERVICES
1) Explain the message structure of SOAP with example. 2) Explain the web services life cycle. 3) Explain the role of service discovery in a SOA. 4) Discuss the usage of UDDI in error recovery. 5) Explain the process of publishing information to a UDDI registry. 6) Explain the XML security framework. 7) Explain the guidelines for signing XML documents.

3.INFORMATION SECURITY
1) Write notes on SNMPv3 2) Explain SHA-512 algorithms with neat diagrams. 3) Explain Pretty Good Privacy (PGP). 4) List the three classes of Intruders and explain. 5) Write notes on Application-Level gateway. 6) What is the purpose of access control list and capability ticket? 7) Explain SSL with neat diagram.

4.NETWORK PROGRAMMING
1) Write ping and trace route algorithm. 2) Give a brief description about I/O multiplexing. 3) Write short notes on BSD packet filter, UDP checksum field. 4) Write a program that sends and receives multicast data grams. 5) Explain Syslogd Daemon, Syslog functions, Inetd Daemon. 6) Explain BSD packet filter. 7) Explain SNTP.

5.NETWORK MANAGEMENT SYSTEMS(Elective)


1) Explain SNMPv2 system architecture. 2) Explain about RMON2 3) Explain TMN architecture. 4) Explain Network Management Systems. 5) Explain Web-Based enterprise management. 6) Explain RMON SMI and MIB. 7) What is remote monitoring? Explain a cases study of Internet traffic using RMON.

6.DISTRIBUTED SYSTEMS(Elective) 1) Distinguish between iterative and recursive server controlled navigation
mechanisms for name resolution. 2) What are the problems in synchronizing physical locks? How do the Lamports logical clocks help in overcoming those problems? 3) Explain the Bully algorithm for election of a coordinator. 4) With suitable examples explain the difference between Flat and Nested Distributed Transactions. 5) Briefly explain the active model of replication for fault tolerance. 6) Explain the implementation of Kerberos authentication system. 7) Explain the importance of communication model in MACH system.

You might also like