Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
questiona in route-optimized communication a mobile node sends packets to a correspondent using the home address present in the destination option
question 1 a what is a nmsquestion 2 explain about structure of management informationquestion 3 ain which udp port number does a protocol entity
question 1 a explain briefly the advantages wireless communication systems b what is a cellular
question 1 write a note on a internet layer b strict source routingquestion 2 explain the routing table of solaris systemquestion 3 explain following
question 1 explain classification of computer network by rangequestion 2 explain three major problems of transmission linesquestion 3 what is the
question 1 discuss the architecture of new generation networksquestion 2 explain the functioning of datagram packet switching and virtual circuit
question 1 explain gsm digital cellular system modelquestion 2 explain cellular digital packet datacdpd system with the help of cdpd network
questiona describe the following biometric techniques- i retina scan ii fingerprint iii iris scan your answer should consider the following the data
question 1 explain fdm and tdm with examplequestion 2 define b-isdn and explain its servicesquestion 3 what is symmetric key cryptography describe
questiona what are the various options to mitigate risks in an information security management system isms for each option specify an instance where
questionai explain what is meant by discretionary access control and mandatory access controlii which method would be the most effective to ensure
questiona explain briefly the pci control objectives which enterprises must meet to be compliant with the payment card industry data security
questiona do you agree with the following statements specify your reasons to support your answer for each-i policies are the foundation for the
question 1a how is the four-way exchange employed for mutual authentication in wparsnb elaborate on how inquiry attacks and traffic monitoring
questiona in a wireless network where wep is enforced as security mechanism what procedure would the network manager adopt for changing wep default
question a what does association refer to in ieee 80211b state the fundamental principles of 3gpp securityc explain the term binding in mobile
questiona distinguish between flow control and congestion controlb explain clearly how a url is resolved by a computerc list one application that
question a several techniques are now available for users to connect to the interneti a modem is commonly used to dial up to the internet why is a
questiona explain how a token ring networks allows sharing of bandwidth access controlb i csmacd is not appropriate for wireless communication
questiona i distinguish between physical topology and logical topologyii explain the following statement with the help of a diagram a star topology
questiona describe fully with example the two access control methods available to implement database securityb discuss why database statistics meta
questiona give 2 benefits of using ipsecb ipsec uses two protocol for security authentication header protocol ah and the encapsulated security
question a there are two approaches for providing confidentiality for packets in a network using symmetric encryption end-to-end encryption and link
questiona what do you meant by the term diffusion and confusion explain how diffusion and confusion can be implementedb distinguish between
questiona distinguish between steganograhy and cryptographyb playfair cipher is more secure than monoalphabetic cipher justify this statementc