Wednesday, 2 September 2015

MSCIT - SEMESTER - 4 - SUMMER - 2015

PROGRAM  - Master of Science in Information Technology(MSc IT)
SEMESTER  4
SUBJECT CODE & NAME - MIT401– Data Warehousing and Data Mining


1.  Explain the Top-Down and Bottom-up Data Warehouse development Methodologies.

Despite  the  fact  that  Data  Warehouses  can  be  designed  in  a  number  of different  ways,  they  all  share  a  number  of  important  characteristics.  Most Data  Warehouses  are  Subject  Oriented.  This  means  that  the  information that  is  in  the  Data  Warehouse  is  stored  in  a  way  that  allows  it  to  be connected to objects or event, which occur in reality.

Another characteristic that is frequently seen in Data Warehouses is called Time  Variant.  A  time  variant  Data  Warehouse  will  allow  changes  in  the information to be monitored and recorded  over time. All  the programs that are used by a particular institution will be stored in                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Explain the Functionalities and advantages of Data Warehouses.


Functionality of Data Warehouses

Data  Warehouses  exist  to  facilitate  complex,  data-intensive  and  frequent adhoc  queries.  Data  Warehouses  must  provide  far  greater  and  more efficient query support than is demanded of transactional databases. Data Warehouses provide the following functionality:

Roll-up: Data is summarized with increased generalization.

Drill-down: Increasing levels of detail are revealed.

Pivot: Cross tabulation that is, rotation is performed.

Slice and Dice: Performing projection operations on the dimensions.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Describe about Hyper Cube and Multicube. 

Multidimensional  databases  can  present  their  data  to  an  application  using two types of cubes:  hypercubes and multicubes. The Hypercube is the cube with  four  Dimensions.  In  the  hypercube  model,  as  shown  in  the  following illustration,  all  data  appears  logically  as  a  single  cube.  This  intuitive representation  is  a  hypercube,  a  representation  that  accommodates  more than three dimensions.  At a lower level of simplification, a Hypercube                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List and explain the Strategies for data reduction. 

Data  reduction  techniques  can  be  applied  to  obtain  a  reduced representation  of  the  data  set  that  is  much  smaller  in  volume,  yet  closely maintains the integrity of the original data. That is, mining on the reduced data set should be more efficient yet produce the same (or almost the same) analytical results.


Strategies for data reduction include the following:
1)  Date  cube  aggregation
2)  Dimension reduction
3)  Data  compression
4)  Numerosity  reduction
5)  Discretization  and  concept  hierarchy  generation

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Describe  K-means  method  for  clustering.  List  its  advantages  and drawbacks.

K-means

K-means  (MacQueen,  1967)  is  one  of  the  simplest  unsupervised  learning algorithms  that  solve  the  well  known  clustering  problem.  The  procedure follows a simple and easy way to classify a given data set through a certain number  of  clusters  (assume k  clusters) fixed  a  priori. The  main  idea  is to define k centroids, one for each cluster.

The  basic  step  of  k-means  clustering  is  simple.  In  the  beginning  we determine  number  of  cluster  K  and  we  assume  the  centroid  or  center  of these clusters. We can take any random                   


                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe about Multilevel Databases and Web Query Systems.

The  database  approaches  to  Web  mining  have  generally  focused  on techniques  for  integrating  and  organizing  the  heterogeneous  and  semistructured data on the Web into more structured and high-level collections of resources,  such  as  in  relational  databases,  and  using  standard  database querying  mechanisms  and  data  mining  techniques  to  access  and  analyze this information.

1)  Multilevel Databases

Several researchers have proposed a multilevel  database  approach to organizing  Web-based  information.  The  main  idea  behind  these proposals  is  that  the  lowest  level  of  the                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  - Master of Science in Information Technology(MSc IT)
SEMESTER  4
SUBJECT CODE & NAME - MIT4022- Network Security

1.  Describe  the  stream  and  block  encryption  with  their advantages and disadvantages.

Block based  encryption system  is classified as  stream  and block encryption system.  Stream  encryption  algorithm  convert  one  symbol  of  plaintext immediately  into  a  symbol  of  ciphertext.  (The  exception  is  the  columnar transposition cipher.) The transformation depends only on the symbol, the key, and the control information of the encipherment algorithm. A model of stream enciphering is shown in below figure

Some  kinds  of  errors,  such  as  skipping  a  character  in  the  key  during encryption,  affect  the  encryption  of  all  future  characters.  However,  such errors  can  sometimes  be  recognized  during                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




2.  Compare DES and AES algorithms.

Comparison of DES and AES


DES
AES
Date
1976
1999
Block size
64 bits
128 bits
Key length
56 bits (effective length)
128, 192, 256 (and possibly more) bits
Encryption primitives
Substitution, permutation
Substitution, shift, bit mixing
                                           
                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Explain Developmental Controls and Administrative Controls. 

Developmental Controls

Software  development  is  often  considered  a  solitary  effort;  a  programmer sits with a specification or design and grinds out line after line of code. But in fact,  software  development  is  a  collaborative  effort,  involving  people  with different  skill  sets  who  combine  their  expertise  to  produce  a  working product. Development requires people who can

·         specify  the system, by capturing the requirements and building a model of how the system should work from the users' point of view
·         design  the system, by proposing a solution to the problem described by the requirements and building a model of the solution
·         implement  the system, by using the design as a blueprint for building a working solution
test  the  system,  to  ensure  that  it  meets  the  requirements  and implements the solution as                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  List all the models of security and explain any two models.

In  security  and  elsewhere,  models  are  often  used  to  describe,  study,  or  analyze  a  particular  situation  or relationship. In particular,  security  models  are  used  to  document  a  policy,  help  conceptualize  and  design  an implementation,  test  a  particular  policy  for  completeness  and  consistency,  check whether an implementation meets its requirements. We assume that some access control policy dictates whether a given user  can  access  a  particular  object.  We  also  assume  that  this  policy  is  established outside any model.
That  is,  a  policy  decision  determines  whether  a  specific  user should  have  access  to  a  specific                                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Define and explain IP security. Explain IP security architecture.

IPSec  provides connectionless, best-effort delivery of datagrams through a network  by  protecting  it  from  snooping  or  modification.  IPSec  protects  IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect packets  between  hosts,  between  network  security  gateways,  or  between hosts  and  security  gateways.  Since  an  IPSec-protected  datagram  is  itself just another IP packet it is possible to nest security services and provide, for example,  end-to-end  authentication  between  hosts  and  send  that                                                                                 
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Describe guard and personal firewalls.

Guard

A guard is a sophisticated firewall. Like a proxy firewall, it receives protocol data  units,  interprets  them,  and  passes  through  the  same  or  different protocol data units that achieve either the same result or  a modified result.
The  guard  decides  what  services  to  perform  on  the  user's  behalf  in accordance  with  its  available  knowledge,  such  as  whatever  it  can  reliably know of the (outside) user's identity, previous interactions, and so forth. The degree of control a guard can provide is limited only by what is computable. But  guards  and  proxy  firewalls  are  similar  enough  that  the  distinction between  them  is  sometimes  fuzzy.  That  is,  we  can  add  functionality  to  a proxy firewall until it starts to look a lot                                                                           
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


                   PROGRAM  Master of Science in Information Technology
                     SUBJECT CODE &  NAME MIT4032– Cloud Computing



1.  List and explain the services of cloud computing 
How Cloud Computing Might Move
Cloud  computing  takes  its  knocks  from  opponents  who  see  it  as  an overused phrase with no real meaning. On the other  side of the coin, there  are plenty of professionals who see the cloud as not only a useful thing, but  also  an  evolving  beast.  We  are  on  the  verge  of  Cloud  2.0.  As  cloud  computing  changes,  so  must  your  relationship  with  it.  In  this  section  we’ll  look into  our crystal balls and see where it might go. We’ll also look at the  opinions  of  researchers  who  get  paid  lots  of  money  to  make  the  right  predictions. Researchers  love  to  tell  us  what’s  going  to  happen  next  with  cloud
computing. Are they right? We don’t know, but it’s worth sharing their views.  Gartner has been especially diligent in figuring out what’s going to happen  with  cloud computing.  Salesforce.com—                                                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2. List the areas of the organization which has the effect of cloud computing and explain any two.
Sensational Feeling about Organization
The  services  which  are  provided  by  the  cloud  will  influence  your  organization either directly or indirectly. And this impact is not only for the IT  department  but  to  the  whole  company.  Cloud  computing  is  an  advance  technology which represents transformation of our entire organization  which  includes  people,  system  and  processes.  We may  have  different questions  like; the service provided by the cloud will be fit into your overall corporate  and  IT  strategy.  Whether  the  cloud                                                                          
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Explain the different Software clients. 
Software clients
Now  we  move  on  to  the  software  side,  we  find  that  software  clients  in  general can be put in one of three groups.  These different types  include (in  order from more desktop-related to more web-related):
Rich or Fat Client
Desktop  applications  connected  to  the  Internet  or  Fat  Clients  are  applications  that  make  use  of  network  support,  but  also  run  offline,  sometimes  with  limited  functionality.  Examples  are  the  e-mail  clientMicrosoft Outlook or the media player iTunes. These applications need to be  installed on the user's machine.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4. Explain the different types of data controls in cloud.
different types of data controls are given below:
  Access controls:  To  guarantee  that only those who are authorized to  access  the  data  can  do  so.  Sensitive  data  must  also  be  protected  in  storage and transfer. Encrypting the data can help to do this.
  Input validation controls:  To  confirm  that all data input to any system  or application are whole, correct, and realistic.
  Output reconciliation controls:  To ensure that data can  be reconciled from input to output.
  File controls:  To make certain that data are operated accurately in any  type of file (structured and            
                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



5.  Explain (a) Open Cloud Consortium (OCC) (b) Open Grid Forum (OGF).
Open Cloud Consortium (OCC)
The OCC (www.opencloudconsortium.org) was formed in 2008. One of its goals is to support the development of standards for cloud computing and  frameworks for interoperating between clouds. Members include Cisco and  Yahoo  as  well  as  a  number  of  universities  including  North  western.  The
OCC  has  a  number  of  working  groups.  Two  in  particular  deal  with  cloud  standards:
Working Group  on  Standards  and  Interoperability  for  Clouds  that  Provide On-Demand Computing Capacity: The focus for this group is on developing  standards  for  interoperating                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  What are the most popular cloud applications? 
most popular cloud applications out there.
Apple  Mobile  Me  (http://www.me.com/)  this  service  synchronizes  emails, photos,  and  contacts  among  multiple  devices. Your  computer,  laptop, and  mobile devices can remain in sync as long as they have access to Apple’s  cloud servers. Google  Docs  (http://docs.google.com/)  providing  an  intuitive  interface,
Google  Docs  provides  applications  that  you  normally  associate  with  the  desktop  a  word  processor,  spreadsheet,  and  presentation  designer.
Documents  can  be  saved  to  the  cloud  or  locally.  Multiple  users  can  collaborate  on the  same  document from  different computers  with  changes  taking effect instantly.
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



MSCIT - SEMESTER - 3 - SUMMER - 2015

PROGRAM  Master of Science in Information Technology(MSc IT)
SUBJECT CODE & NAME MIT301– Object Oriented Analysis and Design(OOAD)

1.  List the advantages of object oriented software development and explain.  [3 +7]  10

The advantages of object oriented software development are:
·        Reduced maintenance
·        Code reusability
·        Real world modeling
·        Improved reliability and flexibility.
Let us now analyze these benefits of object oriented software development.

Reduced maintenance – Object-oriented system development ensures that the  system  will  enjoy  a  longer  life  with  smaller  maintenance  costs.  Since most                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Explain the process of software development.  10  10

Prototyping

The system characteristics are  clearly  explained in object-oriented analysisand design,  but  constructing a prototype for the  key  elements is very much essential after the products are chosen.

Prototyping is an approach to the development of a system where software simulates  the  aspects  of  an  actual  processing  system.  In  simple  words, prototyping can be called as a shorter version of a working system. Iterative approaches  are  followed  here  to  implement  prototypes.  Prototypes  help                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  List and explain the four phases of the object modeling technique.  [2 +8]  10

The four  phases  of  the object modeling technique  that  can  be repetitively executed are:

1)  Analysis 
2)  System design
3)  Objects design
4)  Application  

1)  Analysis  –  The  analysis  phase  starts  when  a  user  creates  a  problem statement which may be incomplete. Analysis phase helps us to define a problem.  Analysis  helps  the  system  architect  to  develop  a  solution  for the problem. Deliverables in this phase are the object model, dynamic model and functional model.

2)  System design – In this phase the system architect organizes the target systems  on  the  basis  of  the  analyzed  structure  and  the  planned architecture.      

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4.  Explain the different states of activity diagram.  10  10


Activity diagrams

Activity  diagrams  are  special  cases  of  state  chart  diagrams.  An  activity diagram  has  actions  as  states.  It  can  be  considered  as  some  kind  of elaborate  flow  diagram  and  has  therefore  some  graphical  structures  for handling  conditions like a diamond shaped box for conditionals and plates for merging control flow. Activity diagrams may contain the following states. Activity                                                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  List and explain the basic categories of program errors.   [2 +8]  10

Ans- Types of errors

Debugging  is  a  process  of  finding  errors  in  the  code  which  cause unexpected  results  and  eliminating  them.  The  process  of  testing  and  identifying bugs is a balance of science, art and luck.

There are three basic categories of program errors:
1)  Syntax errors
2)  Run-time errors
3)   Logical errors
In the first two cases when an error occurs, the  computer displays an 'Error  Message',  which  describes  the  error,  and  its  cause.  Unfortunately,  error  messages are often difficult to interpret, and are sometimes misleading. In  the final case, the program will not show an error message but it will not do
what the programmer wanted it to do.

Syntax errors

 These are the easiest to find because they are highlighted by the compiler  and  error messages are given. This type of error is caused by the failure of  the programmer to use the correct grammatical rules                                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  What are the rules for developing usability testing?  10  10

Collecting information about usability requires many methods to be followed. Fresh ideas can be  generated  by participating in  focus  groups rather than depending  on  the  use  cases.  A  mediator  can  oversee  the  discussion  and assign tasks. Everyone must be allowed to voice their ideas We have to conduct                                              
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  - MSCIT
SEMESTER  - 3
SUBJECT CODE & NAME - MIT302-WEB TECHNOLOGIES

1. Differentiate between TCP and UDP.

Answer:

TCP (Transmission Control Protocol)

The TCP corresponds to the transport layer of OSI reference model, The TCP  is  known  as  a  connection-oriented  protocol,  which  means  that  a connection is established and maintained until such ti me as the message or messages to be exchanged by the application programs at each end have been  exchanged.  TCP  makes  sure  data  gets  to  the  destination  without errors. It is also responsible for disassembling and assembling the data.  It divides large messages into smaller packets of at the most 15KB size. Each of this                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2  Describe the features of XML. What are the important rules to keep in mind about the XML declaration?

Answer:

Features of XML:

XML is popular for many features and few of them are listed here:

Easy Data Exchange:  In XML, data and markup are stored as text that we  can  configure.  If  we  like,  we  can  use  XML  editors  to  create  XML documents  but  if  something  goes  wrong we can examine and modify document directly because it’s all just text.XML provides a very efficient way  of  storing  most  data.  In  addition,  when  we  standardize  markup languages, many different people can use them.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  List and explain the Components of XML processor.

Answer:

Components of XML processor

a) Parser

Every  XML  processor  has  a  parser.  An  XML  parser  converts  an  XML  document into an XML DOM object - which can then be manipulated with a  JavaScript.  The  parser's  job  is  to  translate  XML markup and data into a  stream  of bite-sized nuggets, called tokens, to be used for processing. A  token  may  be  an  element  start  tag,  a   string  of  character  content,  the  beginning  delimiter  of  a  processing  instruction,  or  some  other  piece  of markup that indicates a change between regions of the document.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4. Describe the procedure of fetching data from XML to HTML. Give an example.

Answer:

Loading XML Data into an HTML Page

The  process of fetching data from an XML files  to be filled in an HTML table, using  DSO  (Data  Source  Object)   and  JavaScript.  DSO  is  an object that operates like a database on the client side. It will accept information that is organized  in  a  certain  way  and  will  manipulate  it  with  its  own  database engine.

DSO allows data binding to HTML table elements. When a table element is bound there is no need to write out the code for individual rows for each record in the recordset. The DSO will automatically do this for each record.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Describe five different categories of PHP Operators.

Answer:

PHP – Operators

In all programming languages, operators are used to manipulate or perform operations on variables and values. There are many operators used in PHP, so we have separated them into the following categories to make it easier to learn them all.

·         Assignment Operators
·         Arithmetic Operators
·         Comparison Operators
·         String Operators
·         The Concatenation Operator

Assignment operators  are used to set a variable equal to a value or set a variable to another variable's value. Such an assignment of value is done with the "=", or equal character. Example: $my_data = 2;   $another_data = $my_data

                                               


                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6  Describe about ASP.

Answer:

Introduction of  ASP

Active  Serve r  Pages  (ASPs)  are  Web  pages  that  contain  server-side  scripts  in addition to the usual mixture of text and HTML (Hypertext Markup  Language) tags. Server-side  scripts  are  special  code that is put in Web Pages and that code is processed before it is sent to  the Web browser of someone  who's  visiting  your  Web  site.  When  we  type  a  URL  in  the Addressbox or click a link on a Web page it means we are  asking a Web server to send a file to the Web browser on   our computer. If that file is a normal  HTML  file,  it  looks  exactly  the  same  when  your  Web  browser
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


 PROGRAM  Master of Science in Information Technology(MSc IT)Revised Fall 2011
SUBJECT CODE & NAME MIT3031– High Speed Networks

1.  Write a note on Frame Relay Networks.

Ans-  Frame Relay Networks

The traditional approach to packet switching (X.25), used in-band signaling, and includes end-to-end and well as per-hop flow control and error control.

This  approach  results  in  considerable  overhead.  Frame  relay  is  a  packetmode transmission service that exploits characteristics of modern networks  by minimizing the amount  of error detection and recovery performed inside  the network.  Frame relay is an efficient network interface standard that gets
its name from its method of operation  – the relaying of frames of information  through  a  network. 

Thus,  by  streamlining  the  communications  process,  lower delay and higher throughput is achieved. Frame relay offers features  that make it ideal to interconnect LANs using a Wide Area Network (WAN).
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  List and explain the advantages of virtual path connection (VPC) [2+8]  10
A  virtual  path  connection  (VPC)  is  a  bunch  of  VCCs  share  the  same endpoints where all the cells flowing over all the VCCs in a single VPC are switched  together.  Grouping  connections  that  share  a  common  path  over the network reduces the control  costs. There  are many advantages  of  VPC some of them are mentioned below which are as follows:

                                           

                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3. What are issues that  we need to resolve while using a mixed ATM LAN architecture? Explain.

We  need  to  resolve  the  following  issues  while  using  a  mixed  ATM  LAN architecture:

•  Difference in protocols 
•  Difference in addressing 
•  Difficulty  in  multicasting  or  broadcasting 
•  Interoperability 

•                                                    Difference in protocols  –  In connectionless protocols like Ethernet, a  station can send data packets to another station without establishing or terminating  a  connection.  But  connection-oriented  protocols  like  ATM must first establish a connection and then terminate the connection once all the cells                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM




4.  List and explain the types of congestion.

Ans- Congestion

The  situation  wherein  network resources  are  constantly  overloaded  or  the overall demand of a resource exceeds its capacity is termed as congestion.  Congestion in a network occurs when the load on the network or the number  of  packets  transmitted  to  the  network  is  more  than  the  capacity  of  the  network,  i.e., the number of packets a network can handle. Congestion in a  network  or  internetwork  happens  as  the  routers  and  switches  include  queues-buffers  that  contain  the  packets  prior  to  and  after  processing.  It  damages the quality of service and also results in delays, missing data.

Congestion occurs due to several factors. When streams of packets  quickly  start coming on three or four input lines and if all require the same output  line,  then  a  queue  is  formed.  The  packet  is  lost  if                                                                                         
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5. What  are  the  seven  timers  that  TCP  maintains  for  every  connection?
Explain any three.

There  are  seven  timers  that  TCP  maintains  for  every connection and they are:
·        SYNACK timer
·        Retransmit timer
·        Delayed ACK timer
·        Keep alive timer
·        Probe timer
·        FinWait2 timer
·        TWKill timer

SYNACK  timer  –  This  timer  is  utilized  when  a  TCP  instance  changes  its state from LISTEN to SYN_RECV.  At first, the server’s TCP instance stops for three                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6. What  are  the  advantages  and  disadvantages  of  Routing  Information  Protocol (RIP)?

Ans- Advantages of RIP

The advantages of RIP are:

  It is easy to deploy. It can be implemented in a network just by enabling the protocol on every router of the network.

  It  is  suitable  for  networks  that  change  often  and  for  remote  networks  whose topology is not known.
  Many  common  devices  can  listen  to  RIP  advertisements  and  identify possible gateways.

Disadvantages of RIP

RIP is a simple protocol suitable for small internets. But it has the following disadvantages:

  The growth in the internets has made destinations to need a metric of more than 15.

  Its  suboptimal  routing  tables  result  in  packets  being  transmitted  over slower or costlier links even when better paths are available.

                                           


                                                                            
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


  
PROGRAM  Master of Science in Information Technology(MSc IT)
SUBJECT CODE &  NAME MIT3043– Graphics and Multimedia Systems


1.  Explain the following
(a)  Image enhancement.
(b)  Pattern detection and recognition.
(c)  Scene analysis and computer.
(d)  Visualization.
Image Processing as Picture Analysis
The  computer  graphics  is  a  collection,  contribution  and  representation  of  real or imaginary objects from their computer-based models. Thus we can  say  that  computer  graphics  concerns  the  pictorial  synthesis  of  real  or  imaginary  objects.  However,  the  related  field  image  processing  or  sometimes called picture analysis concerns the analysis of scenes, or the  reconstruction  of  models  of  2D  or  3D  objects  from  their  picture.  This  is  exactly the reverse process. The image processing can be classified as
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  Write a note on digitizers. [10]  10
Digitizers
Digitizer is a device used to convert an image  into a series of dots that can be  read,  stored  and  manipulated  by  the  computer.  It  converts  analog  or  physical  input  into  digital  images.  Significance  of  digitizers  is  carrying  out  important work in computer-aided design, graphics design and engineering.
They also help convert hand-drawn images into textures and animation in  video  games  and  movie  CGI.  Modern  digitizers  appear  as  flat  scanning  surfaces or tablets that connect to a computer workstation. The surface is  touch-sensitive, sending signals to the software, which translates them into                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



3.  Explain 3D viewing.  [10]  10
3D Viewing
Viewing a scene in 3D is much more complicated than 2D viewing, where in the  latter  the  viewing  plane  on  which  a  scene  is  projected  from  WCs  is  basically  the  screen,  except  for  its  dimensions.  In  3D,  we  can  choose  different viewing planes, directions to view from and positions to view from.
We  also  have  a  choice  in  how  we  project  from  the  WC  scene  onto  the  viewing plane. In the process of viewing a 3D scene, we set up a coordinate  system  for  viewing,  which  holds  the  viewing                                                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  Explain different types of coherence. 
Types of coherence:
1. Object Coherence: Visibility  of  an  object  can  often  be  decided  by  examining  a  circumscribing solid (which may be of simple form, eg. A sphere or a polyhedron.)
2. Face Coherence: Surface  properties  computed  for  one  part  of  a  face  can  be  applied  to  adjacent parts after small  incremental modification. (eg. If the face is small,  we sometimes can assume if one part of the face is  invisible to the viewer,  the entire face is also invisible).
                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  What is multimedia? Explain briefly the uses of multimedia  [3+7]  10
Uses of Multimedia
Multimedia has found large applications in various areas including, but not limited  to,  advertisements,  art,  education,  entertainment,  engineering,  medicine,  mathematics,  business,  scientific  research  and  spatial  temporal  applications. Some examples are as follows: Entertainment:  Multimedia  is  heavily  used  in  the  entertainment  industry,  especially  to  develop  special  effects  in  movies  and  animations.  Computer  games are also one of the main applications of multimedia because of the
high amount of interactivity involved. Education:  In  Education,  multimedia  is  used  to  produce  computer-based  training  courses  (popularly  called  CBTs)  and  reference  books  like  encyclopedia  and  manuals.  A  CBT  lets  the  user  go  through  a  series  of  presentations,  text  about  a  particular                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Explain the following
(a)  Full animation
(b)  Limited animation
(c)  Rotoscoping
Full  animation  refers to the process of producing high-quality traditionally animated  films,  which  regularly  use  detailed  drawings  and  possible  movement.  Fully  animated  films  can  be  done  in  a  variety  of  styles,  from  more  realistically  animated  works  such  as  those  produced  by  the  Walt                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


Limited animation  is a process of making  animated cartoons  that does not  redraw  entire  frames  but  variably  reuses  common  parts  between  frames.  One of its major trademarks is the stylized design in all  forms and shapes,  which in the early days was referred to as modern design.  Pioneered by                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


Rotoscoping  is an animation technique in which animators trace  over liveaction film movement, frame by frame, for use in animated films. Originally,  recorded live-action film images were projected onto a frosted glass panel  and  re-drawn  by  an  animator.  This  projection  equipment  is  called  a
rotoscope, although this device has been replaced by computers in recent  years.  In  the  visual  effects                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM