Dear students get fully solved assignments
call us at :- 08263069601
or
mail us at help.mbaassignments@gmail.com
Spring 2013
Masters in Computer
Application (MCA) - Semester 3
MCA3050 –Advanced
Computer Networks– 4 Credits (Book ID: B1650)
(60 Marks)
Answer All the Questions. Each question carries equal marks. (6 x 10 =
60)
1. Explain FDM and TDM with example.
Answer : Fused Deposition Modelling
(FDM) Technology is a powerful Stratus’s-patented additive manufacturing
method.
FDM builds concept models,
functional prototypes and end-use parts in standard, engineering-grade and
high-performance thermoplastics. It’s the only professional 3D printing
technology that uses production-grade thermoplastics, so parts are unrivalled
in mechanical, thermal and chemical strength.
The Invention of FDM Technology
2. Define B-ISDN and explain its services.
Answer : Before B-ISDN, the
original ISDN attempted to substitute the analogy telephone system with a
digital system which was appropriate for both voice and non-voice traffic.
Obtaining worldwide agreement on the basic rate interface standard was expected
to lead to a large user demand for ISDN equipment, hence leading to mass production
and inexpensive ISDN chips. However, the standardization process took years
while computer network technology moved rapidly. Once the ISDN standard was
3. What is symmetric key cryptography? Describe one symmetric key
algorithm.
Answer : An encryption system in
which the sender and receiver of a message share a single, common key that is
used to encrypt and decrypt the message. Contrast this with public-key
cryptology, which utilizes two keys - a public key to encrypt messages and a
private key to decrypt them.
Symmetric-key systems are simpler
and faster, but their main drawback is that the two parties must somehow
exchange the key in a secure way. Public-key encryption avoids this problem
because the public key can be distributed in a non-
4. Explain RSA technique with an example.
Answer : RSA is an Internet
encryption and authentication system that uses an algorithm developed in 1977
by Ron Rivets, Aid Shamir, and Leonard Adelman. The RSA algorithm is the most
commonly used encryption and authentication algorithm and is included as part
of the Web browsers from Microsoft and Netscape. It's also part of Lotus Notes,
Intuit's Quicken, and many other products. The encryption system is owned by
RSA
5. Describe some queue management algorithms.
Answer : In Internet routers,
active queue management (AQM) is a technique that consists in dropping or
explicit congestion notification (ECN) marking packets before a router's queue
is full.
An Internet router typically
maintains a set of queues, one per interface, that hold packets scheduled to go
out on that interface. Historically, such queues use a drop-tail discipline: a
packet is put onto the queue if the queue is shorter than
6. What is packet filtering? What are the advantages of packet filtering?
Also explain various types of proxy.
Answer : Also referred to as
static packet filtering. Controlling access to a network by analyzing the
incoming and outgoing packets and letting them pass or halting them based on
the IP addresses of the source and destination. Packet filtering is one
technique, among many, for implementing security firewalls.
In computing, a firewall is
software or hardware-based network security system that controls the incoming
and outgoing network traffic by analyzing the data packets and determining
whether they should be allowed through or not, based on a rule set. A network's
firewall builds a bridge between the internal network or computer it
Dear students get fully solved assignments
call us at :- 08263069601
or
mail us at help.mbaassignments@gmail.com
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.