Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
Fall
2015 ASSIGNMENT
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
THIRD
SUBJECT
CODE & NAME MCA3050- ADVANCED COMPUTER NETWORKS
CREDIT 4 BK ID B1650 MAX.
MARKS 60
Question
No 1 Differentiate between Physical addresses and Logical addresses.
Answer
Physical
addresses-
This
address is also known as hardware address, link address or MAC (Medium Access
Control) address. Basically manufacturer of network interface card (NIC) assign
this address and store into its hardware. Usually this address encodes the
manufacturer's registered identification number and may be
Q2.
Describe about DWDM. Explain the components of a basic DWDM system 10
Answer: Dense Wavelength
Division Multiplexing (DWDM): In
previous unit we discussed about WDM (Wavelength Division Multiplexing). It is conceptually
similar to frequency division multiplexing. Only difference is, it is purposefully designed for
fibre-optic cable to support high
data-rate. In the literature, the term dense WDM (DWDM) is often used. This term does not imply a different
technology to that used for WDM. In fact,
the two terms are used
Q3.
Describe about Peak cell rate (PCR) and Sustained cell rate (SCR). 10
Answer: Peak cell rate (PCR): This is the maximum amount of traffic
that can be submitted by a source to an ATM network, and is expressed as
ATM cells per second. Due to the fact the transmission speeds are
expressed in bits per second. It is more convenient to talk about the
peak bit
Q4
Describe the following:
a)
Open Shortest Path First (OSPF) protocol
b)
Broader Gateway Routing Protocol (BGP) 5+5 10
Answer:
a)
Open Shortest Path First (OSPF) protocol
OSPF is a commonly deployed link-state routing protocol. It
views the Internet as a star configuration
Q5
Write short notes on:
a)
Cryptography
b)
Encryption
c)
Decryption
d)
Cryptanalysis
e)
Cryptology 5*2 10
Answer: a) Cryptography
Most initial computer applications had no or at best, very
little security. This continued for a number of years and until the importance
of data is truly realized. Until then, computer data was considered to be
useful, but not something to be protected. When computer applications were
Q6
Differentiate Single server queue and Multi-server queue 5+5 10
Answer:
Single server queue
The important element in a single server queue is the server,
which provides services to packets. Different packets arrive at the system to
be served. If the server is idle at the time of packet arrival, the
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment