M.Tech I Year II Semester I-MID Examinations DISTRIBUTED COMPUTING (COMMON TO COMPUTER SCIENCE, COMPUTER SCIENCE & ENGINEERING,SOFTWARE ENGINEERING)

dimerusticΔίκτυα και Επικοινωνίες

23 Οκτ 2013 (πριν από 3 χρόνια και 9 μήνες)

71 εμφανίσεις

M.Tech I

Year II


Semester I
-
MID Examinations


DISTRIBUTED COMPUTING

(COMMON TO COMPUTER SCIENCE, COMPUTER SCIENCE &


ENGINEERING,SOFTWARE ENGINEERING)


1
a) What

is meant by Distributed system, Give some examples.


b) Explain about the architecture of distributed applications.

2. a) Explain various forms of computing.


b) Explain about peer
-
to
-
peer paradigm.

3. a) Explain about RPC Model.


b) Explain ho
w to choose a paradigm for an application.

4

a)Explain the advantages and disadvantages of distributed computing systems.



b) Briefly explain the Operating System concepts relevant to distributed computing.

5. Briefly explain the following Distributed

Objects Paradigms:


a) Object Space Paradigm


b) Mobile Agent Paradigm


c) Network Services Paradigm


d) Groupware Paradigm

6.a) Compare and Contrast between RMI and Remote Procedure Calls (RPC).


b) Explain in details the comparison of RMI

and Socket API.

7.a)Explain about different forms of computing.


b) Explain about strengths & weaknesses of Distributed Computing
.

8.a) Explain operating system concepts relevant to distributed computing.


b) Explain the Client
-
Server paradigm.

9.
Explain the Distributed objects paradigms in detail








DISTRIBUTED DATABASES


5
a) Compare & contrast the features of distributed databases Vs centralizeddatabases?


b) Briefly discuss about
different typ
es of data fragmentations.

6

With the help of neat examples explain how the global queries are translated into

fragment query.

7
.


Elaborate the objectives in query processing optimization

8
.
Discuss in detail the technical aspects of database administration in a distributed environment.

9
.

a) Describe the classification of optimization algorithm.


b) Discuss a model for query optimization.

10.

Explain multi database concurrency contro
l algorithms in detail











ADVANCED COMPUTER ARCHITECTURE




4

a).
Name some most important functional requirements that need to be considered in




designing

a new machine along with features required to take care of the needs.


b) How the performance of computer systems are measured? Describe methodology.

5
. List out the data addressing modes that have been used recently in computers along


with example
instruction, meaning and usage of these instructions


6
.
a) Discuss the challenges faced by the computer architect of ISA.


b) Give a short note on implementation technologies for computer.

7
.a) Explain various data addressing modes.

b) Differentiate
between packed decimal and unpacked decimal.

8
.a) Discuss the implementation of five
-
stage pipeline.


b) Explain advanced optimizations of cache performance









ADVANCED COMPUTER NETWORKS



4

.a) What are the reasons for using layered protocols?


b) List the five key differences between OSI reference model and TCP/IP reference model.

5.

a
) Briefly explain the coaxial cable, optical fiber, twisted pair and their applications.


b) A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial is x
3
+1

show the actual bit string transmitted. Suppose th
e third bit from left is inverted during transmission show

that this error is detected at receiver’s end.


6
.a) Give the HDLC frame format and explain bit stuffing scheme. Also give and explain the control field
format of different types of frames u
sed.


b) Explain in detail about the access method and frame format used in Ethernet









INFORMATION RETRIEVAL SYSTEM











4
. a
) What is the impact on precision and recall in the use of Stop Lists and Stop Algorithms?



b) What is the difference between the concept of a “Digital Library” and an Information Retrieval System?


5

a) What are the similarities and differences b
etween use of fuzzy searches and term masking? What are the
potentials for each to introduce errors?


b) What problems does multimedia information retrieval introduce? What solutions would you recommend
to resolve the problems?


6
. a) What is indexin
g? Explain its objectives.




b) Under what circumstances is manual indexing not required to ensure finding information? Postulate an

example where this is true.


7
. a) What is the impact on precision and recall in the use of stop lists a
nd stop


algorithms?




b) What is difference between the concept of Digital Library and an Information Retrieval Systems?


8

a) What are the similarities and differences between use of fuzzy searches andterm masking?


b) Brief note on Browse Capabilities.


9


a) What are the objectives of an Indexing?




b) Trade off the use of precoordination vs. postcoordination





INFORMATION SECURITY




1.a
) Explain the model for Network Security.

b) What are the different types of Security Attacks? Give the mechanisms to counter them.

2.

a) Explain DES Algorithm, and security of its s
-
boxes.


b) Show that Inverse of DES algorithm is again DES.

3.

a)

Explain the RSA Algorithm Completely.


b) In a public key system using RSA, you intercept the cipher text c=10 sent to a user whose public key is e=5,


n=35. What is the plaintext M?

4
.


a) Explain about various security service
s and attacks in detail?


b) Give a brief note on Buffer overflow & format string vulnerabilities? [6+6]

5
. a) Give a detailed description of various cipher block modes of operation?


b) Discuss in detail SHA algorithm? [6+6]

6
. a) Distinguish betw
een RSA and DSA algorithms?


b) Explain the various fields of X.509 V3 digital certificate, giving its format?