CS

4

Click here to load reader

Transcript of CS

Page 1: CS

M. TECH II semDISTRIBUTED DATABASES

1. a) What is data fragmentation? What are the types of fragmentation? b) Describe the main features of centralized databases?

2. Give and explain reference architecture for distributed databases.

3. Explain about client server architecture in detail.

4.a) Compare the features of traditional databases with the features of distributed databases. b) Write about the importance of Query optimization in Distributed Databases.

5. Explain briefly a framework for query optimization with suitable illustration.

6.a) Explain about query decomposition b) Write about distributed query optimization algorithms

INFORMATION RETRIEVAL SYSTEMS

1.a) Write briefly about Browse Capabilities of IR Systems ? b) Discuss “Proximity” and “Zoning” in detail?

2.a) Explain the terms “Exhaustivity” and “Specificity” ? b) Explain in detail “Automatic Indexing”?

3. What are the major functions of IRS? Explain.

4.(a) Explain multimedia indexing. (b) What are the processes associated with information extraction? Explain.

5. What is Item clustering? Explain with an example.

6..(a) Explain Text Normalization process. (b) Explain Inverted file structure.

Page 2: CS

ADVANCED COMPUTER NETWORKS

1. a. Discuss various delays and losses in packet switched networks.b. Discuss the router structure.

2. a. Compare the working of TCP/IP with OSI.b. Discuss about various Internet Access Devices.

3. a. Discuss various Multiple Access Protocols.b. Discuss about PPP.

4. a. Write about various least-cost path algorithms.b. Discuss Inter Domain Routing Protocols.

5. a. Contrast IPv4 Addressing with IPv6 Addressing b. Write about the Intradomain Multicast Protocols.

6. a. Write the Node-Level Multicast algorithms.b. Write about Congestion Control at Network Layer.

DISTRIBUTED COMPUTING

1. a. Discuss different forms of computing with example for each.b. Discuss the Distributed Application Architecture.

2. a. Write about Message Passage Paradigm.b. Write about Peer-to-Peer paradigm.

3. a. With an example discuss about RMI-A distributed objects paradigm.b. Write about mobile agent paradigm.

4. a. Discuss about JAVA RMI architecture.b. Write a sample RMI application.

5. a. Compare and contrast message passing vs. distributed objects.b. Explain the working of RPC.

6. Compare RMI with SOCKET API.

Page 3: CS

INFORMATION SECURITY

1. a. List and explain various security attacks and services.b. Write about Internet Standards and RFCs.

2. a. Explain the functioning of ECC.b. List and explain all the conventional encryption principles.

3. With neat diagram explain working of DES.

4. a. With an example do the encryption and decryption using RSA Public Key Algorithm.b. Write the Principles of Public Key Cryptography.

5. Discuss the working of AES.

6. a. Write about Diffie Hellman key exchange algorithm.b. Explain about Possibility of Man in the middle attack in Diffie Hellman key exchange algorithm.