MCA3050 –Advanced Computer Networks

 

 

 

Dear students get fully solved assignments

call us at :- 08263069601 

            or

mail us at  help.mbaassignments@gmail.com

 

Spring 2013

Masters in Computer Application (MCA) – Semester 3

MCA3050 –Advanced Computer Networks– 4 Credits (Book ID: B1650)

(60 Marks)

Answer All the Questions. Each question carries equal marks. (6 x 10 = 60)

 

1. Explain FDM and TDM with example.

Answer : Fused Deposition Modelling (FDM) Technology is a powerful Stratus’s-patented additive manufacturing method.

FDM builds concept models, functional prototypes and end-use parts in standard, engineering-grade and high-performance thermoplastics. It’s the only professional 3D printing technology that uses production-grade thermoplastics, so parts are unrivalled in mechanical, thermal and chemical strength.

The Invention of FDM Technology

 

2. Define B-ISDN and explain its services.

Answer : Before B-ISDN, the original ISDN attempted to substitute the analogy telephone system with a digital system which was appropriate for both voice and non-voice traffic. Obtaining worldwide agreement on the basic rate interface standard was expected to lead to a large user demand for ISDN equipment, hence leading to mass production and inexpensive ISDN chips. However, the standardization process took years while computer network technology moved rapidly. Once the ISDN standard was

 

 

 

3. What is symmetric key cryptography? Describe one symmetric key algorithm.

Answer : An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. Contrast this with public-key cryptology, which utilizes two keys – a public key to encrypt messages and a private key to decrypt them.

Symmetric-key systems are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. Public-key encryption avoids this problem because the public key can be distributed in a non-

 

 

4. Explain RSA technique with an example.

Answer : RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivets, Aid Shamir, and Leonard Adelman. The RSA algorithm is the most commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape. It’s also part of Lotus Notes, Intuit’s Quicken, and many other products. The encryption system is owned by RSA

 

 

5. Describe some queue management algorithms.

Answer : In Internet routers, active queue management (AQM) is a technique that consists in dropping or explicit congestion notification (ECN) marking packets before a router’s queue is full.

An Internet router typically maintains a set of queues, one per interface, that hold packets scheduled to go out on that interface. Historically, such queues use a drop-tail discipline: a packet is put onto the queue if the queue is shorter than

 

 

 

6. What is packet filtering? What are the advantages of packet filtering? Also explain various types of proxy.

Answer : Also referred to as static packet filtering. Controlling access to a network by analyzing the incoming and outgoing packets and letting them pass or halting them based on the IP addresses of the source and destination. Packet filtering is one technique, among many, for implementing security firewalls.

In computing, a firewall is software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set. A network’s firewall builds a bridge between the internal network or computer it

 

 

 

 

 

Dear students get fully solved assignments

call us at :- 08263069601 

            or

mail us at  help.mbaassignments@gmail.com

 

Leave a Reply