SlideShare a Scribd company logo
1 of 4
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3050- ADVANCED COMPUTER NETWORKS
CREDIT 4
BK ID B1650
MAX. MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
1. Describe OSI Model. List and explain its seven layers.
Answer : The OSI, or Open System Interconnection, model defines a networking framework to
implement protocols in seven layers. Control is passed from one layer to the next, starting at the
application layer in one station, and proceeding to the bottom layer, over the channel to the next
station and back up the hierarchy.
There'sreallynothingtothe OSImodel.Infact,it's not eventangible. The OSI model doesn't do any
functions in the networking process, It is a conceptual framework so we can better understand
complex interactions that are happening. The OSI model takes the task of internetworking and
divides that up into what is referred to as a vertical stack
Q. 2. Describe about DWDM. Explain the components of a basic DWDM system
Answer:Shortfor Dense Wavelength Division Multiplexing, an optical technology used to increase
bandwidth over existing fiber optic backbones.
DWDM works by combining and transmitting multiple signals simultaneously at different
wavelengthsonthe same fiber.Ineffect,one fiber is transformed into multiple virtual fibers. So, if
youwere to multiplex eightOC-48signalsintoone fiber,youwouldincrease the carrying capacity of
that fiber from 2.5 Gb/s to 20 Gb/s. Currently, because of DWDM, single fibers have been able to
transmit data at speeds up to 400Gb/s.
Q. 3. Describe about Peak cell rate (PCR) and Sustained cell rate (SCR).
Answer: If a service (or application) wishes to use a broadband network (an ATM network in
particular) to transport a particular kind of traffic, it must first inform the network about what kind
of traffic is to be transported, and the performance requirements of that traffic. The application
presents this information to the network in the form a traffic contract.
An example of trafficthatrequiresthistype of service categoryare variable rate, compressed video
streams.Sourcesthatuse rt-VBR connectionsare expectedtotransmitata rate that varieswithtime
(forexample,trafficthatcan be consideredbursty).Real-time VBRconnectionscanbe characterized
by a Peak Cell Rate (PCR), Sustained Cell Rate (SCR), and
Q. 4. Describe the following:
a) Open Shortest Path First (OSPF) protocol
Answer:OpenShortestPath First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It
uses a link state routing algorithm and falls into the group of interior routing protocols, operating
withinasingle autonomoussystem (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4.
The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 (2008).
OSPF is perhaps the most widely used interior
b) Broader Gateway Routing Protocol (BGP)
Answer: Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to
exchange routingandreachabilityinformationbetween autonomous systems (AS) on the Internet.
The protocol is oftenclassifiedasapath vectorprotocol but is sometimesalsoclassed as a distance-
vector routing protocol. The Border Gateway Protocol makes routing decisions based on paths,
networkpolicies,orrule-setsconfiguredby a network administrator and is involved in making core
routing decisions.
Q. 5. Write short notes on:
a) Cryptography: Cryptography prior to the modern age was effectively synonymous with
encryption, the conversion of information from a readable state to apparent nonsense. The
originatorof an encrypted message shared the decoding technique needed to recover the original
information only with intended recipients,
b) Encryption:In cryptography, encryption is the process of encoding messages or information in
such a way that only authorized parties can read it. Encryption does not of itself prevent
interception,butdenies the message content to the interceptor.:374 In an encryption scheme, the
message or information, referred to as plaintext, is encrypted using an encryption algorithm,
generating ciphertext
c) Decryption:Decryptionisthe reverse process to Encryption. Frequently, the same Cipher is used
for both Encryption and Decryption. While Encryption creates a Ciphertext from a Plaintext,
Decryption creates a Plaintext from a Ciphertext. The process of decoding data that has been
encrypted into a secret format. Decryption requires a secret key or password. Decryption is the
process of converting
d) Cryptanalysis:Cryptanalysisreferstothe studyof ciphers,ciphertext,orcryptosystems(thatis,to
secret code systems) with a view to finding weaknesses in them that will permit retrieval of the
plaintextfromthe ciphertext,withoutnecessarilyknowingthe keyorthe algorithm.Thisisknown as
breaking the cipher, ciphertext, or cryptosystem.
Cryptanalysis is the study of
e) Cryptology:Cryptology is the mathematics, such as number theory, and the application of
formulas and algorithms, that underpin cryptography and cryptanalysis. Since the cryptanalysis
concepts are highly specialized and complex, we concentrate here only on some of the key
mathematical concepts behind
Q. 6. Differentiate between Single server queue and Multi-server queue
Answer: Queueingtheoryisthe mathematical study of waitinglines, or queues. In queueing theory
a model isconstructedsothat queue lengthsandwaitingtime can be predicted.Queueing theory is
generally considered a branch of operations research because the results are often used when
makingbusinessdecisionsaboutthe resourcesneededtoprovideaservice. Queueing theory has its
origins in research by Agner Krarup Erlang when
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601

More Related Content

What's hot

A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
Mumbai Academisc
 
Bt0072, computer networks
Bt0072, computer networksBt0072, computer networks
Bt0072, computer networks
smumbahelp
 
3 packet-hiding methods for preventing selective
3   packet-hiding methods for preventing selective3   packet-hiding methods for preventing selective
3 packet-hiding methods for preventing selective
11W91D5809
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
IJNSA Journal
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 

What's hot (18)

A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Bt0072, computer networks
Bt0072, computer networksBt0072, computer networks
Bt0072, computer networks
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection EngineDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
C241721
C241721C241721
C241721
 
Chapter 8 v6.0
Chapter 8 v6.0Chapter 8 v6.0
Chapter 8 v6.0
 
Ip
IpIp
Ip
 
4 5 marks importnt question dcn
4 5 marks importnt question dcn4 5 marks importnt question dcn
4 5 marks importnt question dcn
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
 
3 packet-hiding methods for preventing selective
3   packet-hiding methods for preventing selective3   packet-hiding methods for preventing selective
3 packet-hiding methods for preventing selective
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 

Viewers also liked (11)

Mondragon_marco_kwt_project1
Mondragon_marco_kwt_project1Mondragon_marco_kwt_project1
Mondragon_marco_kwt_project1
 
Cv mohsen .ibrahim
Cv mohsen .ibrahimCv mohsen .ibrahim
Cv mohsen .ibrahim
 
1 s2.0-0022199679900175-main
1 s2.0-0022199679900175-main1 s2.0-0022199679900175-main
1 s2.0-0022199679900175-main
 
Section a
Section aSection a
Section a
 
Vintage langes rotes ein schulter empire abendkleider
Vintage langes rotes ein schulter empire abendkleiderVintage langes rotes ein schulter empire abendkleider
Vintage langes rotes ein schulter empire abendkleider
 
3 tractormtnpic
3 tractormtnpic3 tractormtnpic
3 tractormtnpic
 
19. shingai shoniwa
19. shingai shoniwa19. shingai shoniwa
19. shingai shoniwa
 
Jhon fredy reto #1 antioquia digital
Jhon fredy reto #1 antioquia digitalJhon fredy reto #1 antioquia digital
Jhon fredy reto #1 antioquia digital
 
MSF Paper Final Draft_MIrvin_Oct14
MSF Paper Final Draft_MIrvin_Oct14MSF Paper Final Draft_MIrvin_Oct14
MSF Paper Final Draft_MIrvin_Oct14
 
Books Journal LM draft1
Books Journal LM draft1Books Journal LM draft1
Books Journal LM draft1
 
PineStreetSocietyHill_2pp
PineStreetSocietyHill_2ppPineStreetSocietyHill_2pp
PineStreetSocietyHill_2pp
 

Similar to Mca3050 advanced computer networks

Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
ssuser774ad41
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
smumbahelp
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 

Similar to Mca3050 advanced computer networks (20)

Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
OSI Model
OSI ModelOSI Model
OSI Model
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networks
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networks
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networks
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
Nt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayNt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis Essay
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio Presenation
 
Bca 4010 computer networking
Bca 4010 computer networkingBca 4010 computer networking
Bca 4010 computer networking
 
Bca 4010 computer networking
Bca 4010 computer networkingBca 4010 computer networking
Bca 4010 computer networking
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Mca3050 advanced computer networks

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601 ASSIGNMENT PROGRAM MCA(REVISED FALL 2012) SEMESTER THIRD SUBJECT CODE & NAME MCA3050- ADVANCED COMPUTER NETWORKS CREDIT 4 BK ID B1650 MAX. MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. 1. Describe OSI Model. List and explain its seven layers. Answer : The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. There'sreallynothingtothe OSImodel.Infact,it's not eventangible. The OSI model doesn't do any functions in the networking process, It is a conceptual framework so we can better understand complex interactions that are happening. The OSI model takes the task of internetworking and divides that up into what is referred to as a vertical stack Q. 2. Describe about DWDM. Explain the components of a basic DWDM system Answer:Shortfor Dense Wavelength Division Multiplexing, an optical technology used to increase bandwidth over existing fiber optic backbones. DWDM works by combining and transmitting multiple signals simultaneously at different wavelengthsonthe same fiber.Ineffect,one fiber is transformed into multiple virtual fibers. So, if youwere to multiplex eightOC-48signalsintoone fiber,youwouldincrease the carrying capacity of that fiber from 2.5 Gb/s to 20 Gb/s. Currently, because of DWDM, single fibers have been able to transmit data at speeds up to 400Gb/s.
  • 2. Q. 3. Describe about Peak cell rate (PCR) and Sustained cell rate (SCR). Answer: If a service (or application) wishes to use a broadband network (an ATM network in particular) to transport a particular kind of traffic, it must first inform the network about what kind of traffic is to be transported, and the performance requirements of that traffic. The application presents this information to the network in the form a traffic contract. An example of trafficthatrequiresthistype of service categoryare variable rate, compressed video streams.Sourcesthatuse rt-VBR connectionsare expectedtotransmitata rate that varieswithtime (forexample,trafficthatcan be consideredbursty).Real-time VBRconnectionscanbe characterized by a Peak Cell Rate (PCR), Sustained Cell Rate (SCR), and Q. 4. Describe the following: a) Open Shortest Path First (OSPF) protocol Answer:OpenShortestPath First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating withinasingle autonomoussystem (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 (2008). OSPF is perhaps the most widely used interior b) Broader Gateway Routing Protocol (BGP) Answer: Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routingandreachabilityinformationbetween autonomous systems (AS) on the Internet. The protocol is oftenclassifiedasapath vectorprotocol but is sometimesalsoclassed as a distance- vector routing protocol. The Border Gateway Protocol makes routing decisions based on paths, networkpolicies,orrule-setsconfiguredby a network administrator and is involved in making core routing decisions. Q. 5. Write short notes on: a) Cryptography: Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The
  • 3. originatorof an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, b) Encryption:In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception,butdenies the message content to the interceptor.:374 In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext c) Decryption:Decryptionisthe reverse process to Encryption. Frequently, the same Cipher is used for both Encryption and Decryption. While Encryption creates a Ciphertext from a Plaintext, Decryption creates a Plaintext from a Ciphertext. The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password. Decryption is the process of converting d) Cryptanalysis:Cryptanalysisreferstothe studyof ciphers,ciphertext,orcryptosystems(thatis,to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plaintextfromthe ciphertext,withoutnecessarilyknowingthe keyorthe algorithm.Thisisknown as breaking the cipher, ciphertext, or cryptosystem. Cryptanalysis is the study of e) Cryptology:Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis. Since the cryptanalysis concepts are highly specialized and complex, we concentrate here only on some of the key mathematical concepts behind Q. 6. Differentiate between Single server queue and Multi-server queue Answer: Queueingtheoryisthe mathematical study of waitinglines, or queues. In queueing theory a model isconstructedsothat queue lengthsandwaitingtime can be predicted.Queueing theory is generally considered a branch of operations research because the results are often used when makingbusinessdecisionsaboutthe resourcesneededtoprovideaservice. Queueing theory has its origins in research by Agner Krarup Erlang when Dear students get fully solved assignments
  • 4. Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601