Enterprise Networking (May – 2019) [Choice Based | Question Paper]



NOTES – 
(1) All Question are Compulsory.
(2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labeled Diagrams Wherever Necessary.
(6) Use of Non – Programmable Calculator is allowed.

Q.1. Attempt Any Three Questions: (15 Marks)
(A) Explain in details Architectures for the enterprise.
(B) Discuss the PPDIOO phases in details.
(C) Explain different layers of hierarchical Network design.
(D) What are the different redundancy techniques? Discuss in details.
(E) Explain HSRP, VRRP and GLBP.
(F) Explain in details different Network Audit Tools.

Q.2. Attempt Any Three Questions: (15 Marks)
(A) Compare and Contrast between Switches, Routers and Layer 3 switches.
(B) What are data center foundation components?
(C) What are different types of Virtualizations?
(D) Explain Spanning Tree Protocol.
(E) What is campus LAN Design? What are the Best Practices for the same?
(F) Discuss different strategies for load balancing in the Data Center.

Q.3. Attempt Any Three Questions: (15 Marks)
(A) Write a short note on different WLAN Standards.
(B) Write in details WLAN Controller Components.
(C) Write a Short notes on:
      (1) Frame Relay
      (2) Metro Ethernet
(D) Discuss WAN and Edge design Methodologies.
(E) What are the different methodologies for Optimizing Bandwidth Using QoS? Explain.
(F) Explain various DMZ Connectivity implementation techniques?

Q.4. Attempt Any Three Questions: (15 Marks)
(A) Explain IPV4 header structure.
(B) Write short notes on:
      (1) BOOTP
      (2) DHCP
(C) Explain IPV6 Unicast Address, Anycast Address and Multicast Address.
(D) Discuss IPV6 Address-Assignment Strategies.
(E) What are the techniques for IPV4-to-IPV6 Transition Mechanisms?
(F) What are routing Protocol Metrics and Loop Prevention techniques?

Q.5. Attempt Any Three Questions: (15 Marks)
(A) What are different Network security threats?
(B) Explain Security Risks.
(C) Write short note on Risk assessment.
(D) Write short notes on:
      (1) RMON
      (2) NetFlow
(E) What are the techniques for Detecting and Mitigation Threats?
(F) Compare and contrast IPS and IDS.

Question Paper

1 Comments

  1. 다파벳 다파벳 planet win 365 planet win 365 betway login betway login dafabet dafabet 카지노사이트 카지노사이트 betway login betway login カジノ シークレット カジノ シークレット 532

    ReplyDelete