1) Explain threats and attacks in distributed system in detail.
2) Describe cryptography and the uses of cryptography.
3) Write detailed on:
i) Authentication
ii) Digital signature
4. Describe in detail:
i) certificates
ii) Fire walls
5) Write detailed on:
i) Blocks ciphers
ii) Stream ciphers.
6) Describe the basic model for the management of replicated data.
7) Describe group communication and its services.
8) Describe passive replication model for fault tolerance in detail.
9) Describe active replication model in detail.
10) Describe architectures for replicated transaction in detail.