Академический Документы
Профессиональный Документы
Культура Документы
Attempt All Questions. Each Question Carries 10 marks. Mention the references (if any) as
footnotes or at the end after completing the question.
Q#01: The “store-and-forward network” technique has been phased out in general communications ,
Why? Describe its working and compare it with its counterpart techniques. (Marks=10)
ii. If you are working through character mode on TELNET , then how many characters are
sent back and forth between the client and server to copy a file named file121 to another
file named file122 using the command cp file121file122?
iv. Is there any relationship between HTTP and Proxy server? How?
Page 1 of 3
Solution#2 (to be typed here by the student)
Part (i):
Part (ii):
---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Q#3.
In the following figure a virtual connection is established between A and B.
Locate the following two entities:
a) DLCI
b) Corresponding entries in the tables of each switch.
---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Q#4.
A.Calculate the address space in each of the following systems?
Page 2 of 3
ii. A system with 16-bit addresses
iii. A system with 64-bit addresses
Part (i):
Part (ii):
Part (iii):
B.An address space uses the three symbols 0, 1, and 2 to represent addresses. If each address is
made of 10 symbols, how many addresses are available in this system?
---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Q#5.
Cookies cannot harm the PC/Communication device like viruses/Trojans etc. these are just files
in text format that store data directly from any webservers. And helping to track the use of web
to a specific browser of targeted computer.
Most of the internet users are still unaware about these types of activities by the clever websites
that gets information about a user and on the basis of those information they started their
marketing about products/services with the help of cookies and more interestingly they showing
only what the website thinks the user is in need of.
So this phenomena and act is known to be clear breach of privacy and data security. How to
protect our computers from this security breach? And Why a website in interested to get
information from the user?
---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Page 3 of 3