Description
SESSION FEB/MAR 2022
PROGRAM MCA
SEMESTER II
COURSE CODE & NAME DCA6204 & ADVANCED COMPUTER NETWORKS
SET-I
1. Explain the data transfer steps of Frame Relay call control. Explain TCP retransmission
strategy.
Ans: Frame Relay is a relatively new technology far better suited for the transmission of the
bursty traffic typical for computer networks in comparison to X.25 networks. At first, the Frame
Relay technology was standardized by CCITT as one of the Integrated Service Digital Network
(ISDN) services. As you know the ISDN technology was first designed for implementing a
2. Compare Circuit and Packet Switching with example. Describe some SONET/SDH
devices.
Ans: Circuit switching assures dedicated communication link between two stations. Usually this
types of networks consists a set of switches connected by a sequence of links. On each physical
link, a logical channel is dedicated to the connections. And each link is divided into n channels
3. What are the differences between dynamic routes and static routes, explain with
example? Explain the functioning of the Open Shortest Path First (OSPF) protocol.
Ans:
Key Static Routing Dynamic Routing
Routing
pattern
In static routing, user-defined routes are
used in the routing table.
In dynamic routing, routes are updated as
per the changes in network.
SET-II
4. Discuss the problems of symmetric key cryptography, discuss with suitable example.
Explain RSA technique with an example.
Ans:
 Few problems of symmetric key cryptography are Key agreement or key distribution key
maintenance. To overcome those problems asymmetric key cryptography has been
introduced. The most important example of asymmetric key cryptography is RSA
6. Explain in detail, the Secure Socket layer. Describe the four types of protocol of SSL.
Ans: SSL is a security protocol that was developed by Netscape Communications Corporation,
along with RSA Data Security, Inc. The primary goal of the SSL protocol is to provide a private
channel between communicating applications, which ensures privacy of data, authentication of
nd its level.
Reviews
There are no reviews yet.