UNIT I: Opportunistic and
Social Networks
1. Explain the architecture and working of
Cognitive Radio Networks (CRN). How do they help in overcoming spectrum
scarcity?
2. What is a Delay Tolerant Network (DTN)?
Discuss its significance and challenges from a security and reliability
standpoint.
3. Describe the routing techniques used in
opportunistic mobile and social networks. How can malicious nodes affect
routing performance?
4. Define Quality of Service (QoS).
Discuss different QoS parameters (network, system, task, and extension) with
respect to secure data transmission.
UNIT II: Internet of Things
(IoT) Networks
1. Explain the key technologies and
architecture of IoT. What are the main security vulnerabilities associated with
IoT devices?
2. Compare IoT and traditional web
architectures. How does this comparison affect data privacy and network
security?
3. Discuss IoT communication protocols
(MQTT, CoAP, XMPP, AMQP) and their security implications.
4. What is the role of Edge computing and
caching in IoT networks? Explain their importance in reducing attack surfaces.
UNIT III: Software Defined
Networks (SDN)
1. What is Software Defined Networking
(SDN)? Explain how SDN improves network control and security compared to
traditional networks.
2. Define Network Function Virtualization
(NFV). Discuss how NFV contributes to network scalability and security in
modern infrastructures.
3. Describe unicast and multicast routing
in SDN. How does SDN handle secure routing and data isolation?
4. Discuss the security implications of
HTTP-based content delivery such as DASH and HLS in SDN environments.
UNIT IV: Content Distribution
and Synchronization
1. Describe different CDN topologies
(Edge-Caching, Hybrid, Satellite, etc.) and analyze their security strengths
and weaknesses.
2. What is the role of computer hosting
and orchestration in network virtualization? Discuss potential cyber threats.
3. Explain the Precision Time Protocol
(PTP) and its importance in synchronization security within SDN.
4. Compare absolute clock synchronization
and difference clock synchronization. What are the security concerns in each?
UNIT V: Emerging Trends and
Future Directions
1. Discuss blockchain applications in
networking. How does blockchain enhance data integrity and trust in distributed
environments?
2. Explain the concept of Quantum
Networking. What are its security benefits and challenges for the future internet?
3. What is Edge Computing? Discuss its
role in secure data processing and real-time threat detection.
4. Define Green Networking. How does
sustainability intersect with cybersecurity and energy-efficient network
design?
0 Comment to "Advanced Computer Networks "
Post a Comment
Note: Only a member of this blog may post a comment.