des algorithms

advertisement
M.Tech I –Year II – Semester I-MID Examinations
DISTRIBUTED COMPUTING
(COMMON TO COMPUTER SCIENCE, COMPUTER SCIENCE &
ENGINEERING,SOFTWARE ENGINEERING)
1 a) What is meant by Distributed system, Give some examples.
b) Explain about the architecture of distributed applications.
2. a) Explain various forms of computing.
b) Explain about peer-to-peer paradigm.
3. a) Explain about RPC Model.
b) Explain how to choose a paradigm for an application.
4 a)Explain the advantages and disadvantages of distributed computing systems.
b) Briefly explain the Operating System concepts relevant to distributed computing.
5. Briefly explain the following Distributed Objects Paradigms:
a) Object Space Paradigm
b) Mobile Agent Paradigm
c) Network Services Paradigm
d) Groupware Paradigm
6.a) Compare and Contrast between RMI and Remote Procedure Calls (RPC).
b) Explain in details the comparison of RMI and Socket API.
7.a)Explain about different forms of computing.
b) Explain about strengths & weaknesses of Distributed Computing.
8.a) Explain operating system concepts relevant to distributed computing.
b) Explain the Client-Server paradigm.
9. Explain the Distributed objects paradigms in detail
DISTRIBUTED DATABASES
5 a) Compare & contrast the features of distributed databases Vs centralizeddatabases?
b) Briefly discuss about different types of data fragmentations.
6
With the help of neat examples explain how the global queries are translated into fragment query.
7.
Elaborate the objectives in query processing optimization
8 . Discuss in detail the technical aspects of database administration in a distributed environment.
9. a) Describe the classification of optimization algorithm.
b) Discuss a model for query optimization.
10. Explain multi database concurrency control algorithms in detail
ADVANCED COMPUTER ARCHITECTURE
4 a).Name some most important functional requirements that need to be considered in
designing a new machine along with features required to take care of the needs.
b) How the performance of computer systems are measured? Describe methodology.
5. List out the data addressing modes that have been used recently in computers along
with example instruction, meaning and usage of these instructions
6.a) Discuss the challenges faced by the computer architect of ISA.
b) Give a short note on implementation technologies for computer.
7.a) Explain various data addressing modes.
b) Differentiate between packed decimal and unpacked decimal.
8.a) Discuss the implementation of five-stage pipeline.
b) Explain advanced optimizations of cache performance
ADVANCED COMPUTER NETWORKS
4 .a) What are the reasons for using layered protocols?
b) List the five key differences between OSI reference model and TCP/IP reference model.
5. a) Briefly explain the coaxial cable, optical fiber, twisted pair and their applications.
3
b) A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial is x +1
show the actual bit string transmitted. Suppose the third bit from left is inverted during transmission show
that this error is detected at receiver’s end.
6.a) Give the HDLC frame format and explain bit stuffing scheme. Also give and explain the control field
format of different types of frames used.
b) Explain in detail about the access method and frame format used in Ethernet
INFORMATION RETRIEVAL SYSTEM
4. a) What is the impact on precision and recall in the use of Stop Lists and Stop Algorithms?
b) What is the difference between the concept of a “Digital Library” and an Information Retrieval System?
5 a) What are the similarities and differences between use of fuzzy searches and term masking? What are the
potentials for each to introduce errors?
b) What problems does multimedia information retrieval introduce? What solutions would you recommend
to resolve the problems?
6 . a) What is indexing? Explain its objectives.
b) Under what circumstances is manual indexing not required to ensure finding information? Postulate an
example where this is true.
7 . a) What is the impact on precision and recall in the use of stop lists and stop
algorithms?
b) What is difference between the concept of Digital Library and an Information Retrieval Systems?
8 a) What are the similarities and differences between use of fuzzy searches andterm masking?
b) Brief note on Browse Capabilities.
9 a) What are the objectives of an Indexing?
b) Trade off the use of precoordination vs. postcoordination
INFORMATION SECURITY
1.a) Explain the model for Network Security.
b) What are the different types of Security Attacks? Give the mechanisms to counter them.
2. a) Explain DES Algorithm, and security of its s-boxes.
b) Show that Inverse of DES algorithm is again DES.
3. a) Explain the RSA Algorithm Completely.
b) In a public key system using RSA, you intercept the cipher text c=10 sent to a user whose public key is e=5,
n=35. What is the plaintext M?
4. a) Explain about various security services and attacks in detail?
b) Give a brief note on Buffer overflow & format string vulnerabilities? [6+6]
5. a) Give a detailed description of various cipher block modes of operation?
b) Discuss in detail SHA algorithm? [6+6]
6. a) Distinguish between RSA and DSA algorithms?
b) Explain the various fields of X.509 V3 digital certificate, giving its format?
Download