Friday 29 January 2016

mca3050 smu mca Fall 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Fall 2015 ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3050- ADVANCED COMPUTER NETWORKS
CREDIT 4 BK ID B1650 MAX. MARKS 60
Question No 1 Differentiate between Physical addresses and Logical addresses.
Answer  
Physical addresses-

This address is also known as hardware address, link address or MAC (Medium Access Control) address. Basically manufacturer of network interface card (NIC) assign this address and store into its hardware. Usually this address encodes the manufacturer's registered identification number and may be

Q2. Describe about DWDM. Explain the components of a basic DWDM system 10
Answer: Dense Wavelength Division Multiplexing (DWDM): In previous unit we discussed about WDM (Wavelength Division Multiplexing). It is conceptually similar to frequency division multiplexing. Only difference is, it is purposefully designed for fibre-optic cable to support high data-rate. In the literature, the term dense WDM (DWDM) is often used. This term does not imply a different technology to that used for WDM. In fact, the two terms are used


Q3. Describe about Peak cell rate (PCR) and Sustained cell rate (SCR). 10
Answer: Peak cell rate (PCR): This is the maximum amount of traffic that can be submitted by a source to an ATM network, and is expressed as ATM cells per second. Due to the fact the transmission speeds are expressed in bits per second. It is more convenient to talk about the peak bit

Q4 Describe the following:
a) Open Shortest Path First (OSPF) protocol
b) Broader Gateway Routing Protocol (BGP) 5+5 10
Answer: a)
Open Shortest Path First (OSPF) protocol
OSPF is a commonly deployed link-state routing protocol. It views the Internet as a star configuration

Q5 Write short notes on:
a) Cryptography
b) Encryption
c) Decryption
d) Cryptanalysis
e) Cryptology 5*2 10
Answer: a) Cryptography
Most initial computer applications had no or at best, very little security. This continued for a number of years and until the importance of data is truly realized. Until then, computer data was considered to be useful, but not something to be protected. When computer applications were

Q6 Differentiate Single server queue and Multi-server queue 5+5 10
Answer:
Single server queue
The important element in a single server queue is the server, which provides services to packets. Different packets arrive at the system to be served. If the server is idle at the time of packet arrival, the


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment