Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
ASSIGNMENT
PROGRAM
|
MCA(REVISED FALL 2012)
|
SEMESTER
|
THIRD
|
SUBJECT CODE & NAME
|
MCA3050- ADVANCED COMPUTER NETWORKS
|
CREDIT
|
4
|
BK ID
|
B1650
|
MAX. MARKS
|
60
|
Note: Answer all questions. Kindly note
that answers for 10 marks questions should be approximately of 400 words. Each
question is followed by evaluation scheme.
1. Describe OSI Model. List and explain its
seven layers.
Answer : The OSI, or Open System
Interconnection, model defines a networking framework to implement protocols in
seven layers. Control is passed from one layer to the next, starting at the
application layer in one station, and proceeding to the bottom layer, over the
channel to the next station and back up the hierarchy.
There's really nothing to the OSI
model. In fact, it's not even tangible. The OSI model doesn't do any functions
in the networking process, It is a conceptual framework so we can better
understand complex interactions that are happening. The OSI model takes the
task of internetworking and divides that up into what is referred to as a
vertical stack
Q. 2. Describe about DWDM. Explain the
components of a basic DWDM system
Answer:Short for Dense Wavelength
Division Multiplexing, an optical technology used to increase bandwidth over
existing fiber optic backbones.
DWDM
works by combining and transmitting multiple signals simultaneously at
different wavelengths on the same fiber. In effect, one fiber is transformed
into multiple virtual fibers. So, if you were to multiplex eight OC-48 signals
into one fiber, you would increase the carrying capacity of that fiber from 2.5
Gb/s to 20 Gb/s. Currently, because of DWDM, single fibers have been able to
transmit data at speeds up to 400Gb/s.
Q. 3. Describe about Peak cell rate (PCR)
and Sustained cell rate (SCR).
Answer: If a service (or application)
wishes to use a broadband network (an ATM network in particular) to transport a
particular kind of traffic, it must first inform the network about what kind of
traffic is to be transported, and the performance requirements of that traffic.
The application presents this information to the network in the form a traffic
contract.
An
example of traffic that requires this type of service category are variable
rate, compressed video streams. Sources that use rt-VBR connections are
expected to transmit at a rate that varies with time (for example, traffic that
can be considered bursty). Real-time VBR connections can be characterized by a
Peak Cell Rate (PCR), Sustained Cell Rate (SCR), and
Q. 4. Describe the following:
a) Open Shortest Path First (OSPF) protocol
Answer:Open Shortest Path First (OSPF)
is a routing protocol for Internet Protocol (IP) networks. It uses a link state
routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS). It is defined as OSPF Version
2 in RFC 2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF
Version 3 in RFC 5340 (2008).
OSPF
is perhaps the most widely used interior
b) Broader Gateway Routing Protocol (BGP)
Answer: Border Gateway Protocol (BGP)
is a standardized exterior gateway protocol designed to exchange routing and
reachability information between autonomous systems (AS) on the Internet. The
protocol is often classified as a path vector protocol but is sometimes also
classed as a distance-vector routing protocol. The Border Gateway Protocol
makes routing decisions based on paths, network policies, or rule-sets
configured by a network administrator and is involved in making core routing
decisions.
Q. 5. Write short notes on:
a) Cryptography: Cryptography prior to
the modern age was effectively synonymous with encryption, the conversion of
information from a readable state to apparent nonsense. The originator of an
encrypted message shared the decoding technique needed to recover the original
information only with intended recipients,
b) Encryption:In cryptography,
encryption is the process of encoding messages or information in such a way
that only authorized parties can read it. Encryption does not of itself prevent
interception, but denies the message content to the interceptor.:374 In an
encryption scheme, the message or information, referred to as plaintext, is
encrypted using an encryption algorithm, generating ciphertext
c) Decryption:Decryption is the reverse
process to Encryption. Frequently, the same Cipher is used for both Encryption
and Decryption. While Encryption creates a Ciphertext from a Plaintext,
Decryption creates a Plaintext from a Ciphertext. The process of decoding data
that has been encrypted into a secret format. Decryption requires a secret key
or password. Decryption is the process of converting
d) Cryptanalysis: Cryptanalysis refers
to the study of ciphers, ciphertext, or cryptosystems (that is, to secret code
systems) with a view to finding weaknesses in them that will permit retrieval
of the plaintext from the ciphertext, without necessarily knowing the key or
the algorithm. This is known as breaking the cipher, ciphertext, or
cryptosystem.
Cryptanalysis
is the study of
e) Cryptology:Cryptology is the
mathematics, such as number theory, and the application of formulas and
algorithms, that underpin cryptography and cryptanalysis. Since the
cryptanalysis concepts are highly specialized and complex, we concentrate here
only on some of the key mathematical concepts behind
Q. 6. Differentiate between Single server
queue and Multi-server queue
Answer: Queueing theory is the
mathematical study of waiting lines, or queues. In queueing theory a model is
constructed so that queue lengths and waiting time can be predicted.Queueing
theory is generally considered a branch of operations research because the
results are often used when making business decisions about the resources
needed to provide a service. Queueing theory has its origins in research by
Agner Krarup Erlang when
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.