Vous êtes sur la page 1sur 7

Name: Hilal Rauf Subject: Advance Computer Networks Subject Code: BSIT - 62 PART: TB

Kuvempu University Assignments for B.Sc.(IT) & M.Sc.(IT) Courses Subject: Advanced Computer Networks Subject Code: BSIT - 63 Assignment : TB (Compulsory) PART - A Answer all questions: 1. Explain Domain Name System (DNS). Ans- DNS stand for Domain Name System. It translates the domain name into IP address and also maps the domain name into Common Generic Name. Working of DNS:- Whenever an application program calls a library procedure called Resolver with its domain name as parameter. The Resolver sends an UDP packet to the local DNS server. The DNS server searches its table and returns the IP address which matches the domain name. Now, the program can establish a connection or send UDP packets. 2. Explain Post Office Protocol (POP). Ans- POP3 stands for Post Office Protocol version 3. It begins when a user starts the mail reader. The mail reader calls up the ISP and establishes a TCP connection with the message transfer agent at port 110.Once the connection has been established, the POP3 protocol goes through three stages in sequence: Authorization:- This state deals with the user log in Transactions:- This state deals with the user collecting e-mail messages and marking them for deletion from the mailbox. Update:- The update state causes the e-mail messages to be deleted. During the authorization state, at times, when the server is set for three passwords trials, if you give the wrong password thrice, your mail box will get locked.

3. List out the advantages and disadvantages of WLAN. Ans- Advantages:- i) WLANs are more flexible. With in radio coverage, nodes can communicate without further restriction. ii) Wireless network allow communication without previous planning. iii) Wireless networks can survive in disasters. Disadvantages:- i) WLANs offer lower quality due to less bandwidth than wired networks. ii) WLAN adapter are very costly. Ex- PC-Card is available in the range from 100 pounds. iii) WLANs are limited to low power senders and certain license-free frequency bands. iv) Using radio waves for data transmission might interfere with other high-tech equipment. 4. Explain conventional encryption model. Ans5. Compare direct and indirect forms of routing. Ans- Direct Routing: - It occurs when the source and destination of the packet are on same physical network. In direct routing the final destination of the packet is a host connected to the same physical network. In direct routing, the sender extracts the network address of the destination packet and compares this address with the addresses of the network to which it is connected. If match is found, then packet is delivered directly. The sender uses the destination IP address to find the destination physical address. ARP maps the address of final destination to its corresponding physical address. Indirect Routing: - In an indirect delivery, the data packet goes from router to router until it reaches to its final destination connected to the same physical network. In an indirect routing, the sender uses the destination IP address and a routing table to find the IP address of the next router to which the packet should be delivered. ARP protocol is also used to find the physical address of next router. ARP maps the address of the next router and the physical address of the next router

PART - B Ans- Streaming Server:A server technology designed by Apple Computer to send streaming QuickTime media files over the internet. It is built on RTP and RTSP standard internet protocols and it can set up a QuickTime streaming media Web broadcasting station capable of streaming digital videos and music files to the users over the network. Process of Audio Streaming: In audio streaming, clients request compressed audio files that reside on servers. Upon client request, the server directs an audio file to the client by sending file into socket. Before sending the files to the network, the file is segmented and encapsulated (by RTP) with special headers appropriate for audio traffic. b) Discuss the features of real time protocol. Ans- The features of Real Time Protocol (RTP) are: i)RTP provides end-to-end delivery services for data with real-time characteristics such as interactive audio and video. However, it does not provide any mechanism to timely delivery. It needs support from the lower layers of OSI model that actually have control over resources in switches and routers. ii) RTP provides timestamps, sequence numbers as hooks for adding reliability, flow, and congestion control for packet delivery, but implementation is totally left to the application. iii) RTP is a protocol framework that is deliberately not complete. It is open to new payload formats and new multimedia software. By adding new profile and payload format specifications, one can tailor RTP to new data formats and new applications. iv) The flow and congestion control information of RTP is provided by Real-Time Control Protocol (RTCP) sender and receiver reports. v) RTP provides functionality and control mechanisms for carrying real-time content. 5. a) What is cryptography ? Explain one cryptographic algorithm. Ans- Cryptography:- Cryptography is the science of using mathematics to encrypt and decrypt data. It enables us to store sensitive information or transmit it across insecure network so that it cannot be read by anyone except the intended recipient. Cryptography is the science of securing data. Different cryptographic algorithms are:

Substitution cipher, Monoalphabetic cipher, Playfair cipher, Hill cipher, & Transposition cipher.

6. a) Explain internet security model. Ans- When two parties exchanging their information through internet. They need security so that no one could access their information or messages. To accomplish it, a security model will designed to protect the information transmission form an opponent who may present a threat to confidentiality. This technique has two components:-- i) A securityrelated transformation on the information to be sent. ii) Some secret information shared by the two principals and it is hoped, unknown to the opponent. A third party is needed to achieve secure transmission Or a third party is needed to arbitrate dispute the two principals concerning the authenticity of a message transmission. Designing of Internet Security Model include following:-- i) Design an algorithm for performing the security-related transformation. ii) Generate secrete information to be used with the algorithm. iii) Develop methods for the distribution and sharing of the secret information. iv) Specify a protocol to be used by the two principals that makes use of the security algorithm and the secret information to achieve a particular security service. b) What is steganography ? Explain. Ans- Steganography:-This is technique that hides the message in other messages. The sender writes an innocuous message and then conceals on the same piece of paper. Some methods of stenography are: Character marking:- Selected letters of printed written text are over written in pencil. These marks are ordinarily not visible unless the paper is held at an angle to bright light.

Invisible inks:- A number of substances can be used for writing but leave no visible trace until heat or some chemical is applied to the paper. Pin punctures:-Small pin punctures on selected letters are ordinarily not visible unless the paper is held up in front of a light. Typewriter correction ribbon:- It is used between lines typed with a black ribbon, the results of typing with the correction tape are visible only under a strong light. The advantage of steganography is that the parties can employ the stenographer to reveal the secrecy of the message. It main disadvantage is that it requires a lot of overhead to hide few bits of information and once the system is discovered, it becomes useless without maintaining the secrecy. 7. Compare IEEE 802.11a, 802.11b, 802.11g WLAN architectures and blue tooth. AnsFeatures Data Rate Frequency Modulation Channels Bandwidth Power 802.11a 54-72mbps 5Ghz OFDM 12/8 300 40-800mW 802.11b 11mbps 2.4Ghz DSSS/CCK 11/3 83.5 100mW 802.11g 54mbps 2.4Ghz DSSS/PBCC 11/3 83.5 (22Mhz per channel) 100mW Bluetooth 721-56kbps 2.4Ghz FHSS 79(1Mhz wide) 83.5 100mW

8. Write short note on : a) Time out timer Ans- Time out timer is used to help purge invalid routes from a RIP node. Routes that are not refreshed for a given period of time are likely to be invalid because of some change in the network. Thus, RIP maintains a timeout timer for each known route. When a route's timeout timer expires, the route is marked invalid but is retained in the table until the route-flush timer expires. b) CSMA/CA mechanism Ans- CSMA/CA is a network contention protocol that listens to a network in order to avoid collisions, unlike CSMA/CD that deals with network transmissions once collisions have been detected. The basic mechanism is shown in following figure:

If the mechanism is sensed idle for at least the duration of DIFS, a node can access the medium at once. This allows for short access delay under light load. If the medium is busy, nodes have to wait for the duration of DIFS, entering a contention phase afterwards. Each node now chooses a random back off time with a contention window and additionally delays medium access for this random amount of time. The additionally waiting time is measured in multiples of slots. Slots time is derived from the medium propagation delay, transmitter delay and other PHY dependent parameters. c) Best effort service. Ans- best effort service by which we can make several design decisions and employ a few tricks to improve the user-perceived quality of a multimedia networking application. Limitations of the best effort service are:
Packet loss,

Excessive end-to-end delay Packet jitter

Vous aimerez peut-être aussi