Вы находитесь на странице: 1из 3

Ans: A) Pure ALOHA or Unslotted ALOHA

The ALOHA network was created at the University of Hawaii in 1970 under the leadership of Norman Abramson . The Aloha protocol is an OSI layer2 protocol for LAN networks with broadcast topology .The first version of the protocol was basic If you have data to send, send the data If the message collides with another transmission, try resending later

B) Slotted ALOHA or Impure ALOHA


An improvement to the original Aloha protocol was Slotted Aloha . It is in 1972, Roberts published a method to double the throughput of an pure ALOHA by uses discrete timeslots. His proposal was to divide the time into discrete slots corresponding to one frame time. This approach requires the users to agree to the frame boundaries. To achieve synchronization one special station emits a pip at the start of each interval similar to a clock. Thus the capacity of slotted ALOHA increased to the maximum throughput of 36.8%.With Slotted Aloha, a centralized clock sent out small clock tick packets to the outlying stations .Outlying stations were only allowed to send their packets immediately after receiving a clock tick. If there is only one station with a packet to send, this guarantees that there will never be a collision for that packet. On the other hand if there are two stations with packets to send, this algorithm guarantees that there will be a collision, and the whole of the slot period up to the next clock tick is wasted. With some mathematics, it is possible to demonstrate that this protocol does improve the overall channel utilization, by reducing the probability of collisions by a half.

3.Discuss the different types of noise?


Ans: Noise is unwanted electrical or electromagnetic energy that degrades the quality of signalsand data. Noise occurs in digital and analog systems, and can affect files and communications ofall types, including text, programs, images, audio, and telemetry. On the broadest scale, noisecan be classified as eitherexternalorinternal. Each category consists of severaldifferent types.Internal NoiseInternal noise represents all thedifferent types that arise inside of the communication systemcomponents.It includes thermal noise, shot noise, and flicker noise. External noise represents all the different types that arise outside of the communication systemcomponents. It includes atmospheric noise,

galactic noise, man-made noise, and interferencefrom other communication sources. Atmospheric Noise Atmospheric noise is produced mostly by lightning discharges in thunderstorms. It is usuallythedominating external noise source in quite locations at frequencies below about 20 MHz or so.

Extraterrestrial Noise It is safe to say that there are almost as many types of space noise as there are sources. Forconvenience, a division into two subgroups will suffice. Galactic Noise Galactic noise is caused by disturbances originating outside the earths atmosphere. The primary sources of galactic noise are the sun, background radiation along the galactic plane, and the many cosmic sourcesdistributed along the galactic plane.

4. What is Non-repudiation? Define cryptanalysis


Non-repudiation Network security problems can be divided roughly into four categories, Non-repudiation is one of them. It deals with signatures. For example how do one prove that the order was placed by the customer. Non repudiation is the assurance that someone cannot deny something. Typically , non repudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. On the Internet, a digital signature is used not only to ensure that a message or document has been electronically signed by the person that purported to sign the document, but also, since a digital signature can only be created by one person, to ensure that a person cannot later deny that they furnished the signature. Cryptanalysis Cryptanalysis refers to the study of ciphers, cipher text, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plain text from the cipher text , without necessarily knowing the key or the algorithm. This is known as breaking the cipher, cipher text, or crypto system .There are numerous techniques for performing cryptanalysis, depending on what access the cryptanalyst has to the plaintext, cipher text, or other aspects of the cryptosystem.1) Known-plaintext analysis2) Chosenplaintext analysis (also known as differential cryptanalysis)3) Cipher text-only analysis4) Man-in-the-middle attack5) Timing/differential power analysis

Explain mask-address pair used in update message. Discuss importance of path attributes
In the update message many addresses are listed and the size of the update message goes on increasing. BGP uses it to store destination address and the associated mask a technique ,where instead of IP 32-bit address and a 32-bit mask compressed mask-address pair, is used to reduce the size of the update message .Here BGP encodes the mask into a single octet that precedes the address .Path Attribute Path attributes are factored to reduce the size of the update message .Importance of pathattributes:1.Path information allows a receiver to check for routing loops . The sender can specify exact path through AS to the destination. If any AS is listed more than once then there is a routingloop.2.Path information allows a receiver to implement policy constraints .A receiver can examine the path so that they should not pass through untrustedAS.3.Path information allows a receiver to know the source of all routes.

Вам также может понравиться