Você está na página 1de 3

LOVELY PROFESSIONAL UNIVERSITY

MODEL HOME WORK: #4

CSE410: MULTIMEDIA COMMUNICATIONS

School: Department:

Name of the faculty member:

Class: Term: Section: Batch:

Max. Marks: DOA: DOS:

Part-A

Ques1:-Explain the role of a proxy ARP.Hence explain how an IP packet sent by a


host at one site is routed a host at a different site. And also explain how the reply
packet is returned to the host that sent the first packet.

ANS:- Proxy ARP (Address Resolution Protocol) is a technique by which a device on a given network
answers the ARP queries for a network address that is not on that network. The ARP Proxy is aware of
the location of the traffic's destination, and offers its own MAC address in reply, effectively saying, "send it
to me, and I'll get it to where it needs to go." Serving as an ARP Proxy for another host effectively directs
LAN traffic to the Proxy. The "captured" traffic is then typically routed by the Proxy to the intended
destination via another interface or via atunnel.

The process which results in the node responding with its own MAC address to an ARP request for a
different IP address for proxying purposes is sometimes referred to as 'publishing'.AProxy ARP
Simulation visualizes how a router responds to ARP request on behalf of the target host at different
networks. See ARP cache updates at host, router, remote host.
If we were to follow the path that the message "Hello computer 5.6.7.8!" took from our
computer to the computer with IP address 5.6.7.8, it would happen something like this:

Diagram 2
1. The message would start at the top of the protocol stack on your computer and work
it's way downward.
2. If the message to be sent is long, each stack layer that the message passes through
may break the message up into smaller chunks of data. This is because data sent
over the Internet (and most computer networks) are sent in manageable chunks. On
the Internet, these chunks of data are known as packets.
3. The packets would go through the Application Layer and continue to the TCP layer.
Each packet is assigned a port number. Ports will be explained later, but suffice to
say that many programs may be using the TCP/IP stack and sending messages. We
need to know which program on the destination computer needs to receive the
message because it will be listening on a specific port.
4. After going through the TCP layer, the packets proceed to the IP layer. This is where
each packet receives it's destination address, 5.6.7.8.
5. Now that our message packets have a port number and an IP address, they are
ready to be sent over the Internet. The hardware layer takes care of turning our
packets containing the alphabetic text of our message into electronic signals and
transmitting them over the phone line.
6. On the other end of the phone line your ISP has a direct connection to the Internet.
The ISPs routerexamines the destination address in each packet and determines
where to send it. Often, the packet's next stop is another router. More on routers
and Internet infrastructure later.
7. Eventually, the packets reach computer 5.6.7.8. Here, the packets start at the
bottom of the destination computer's TCP/IP stack and work upwards.
8. As the packets go upwards through the stack, all routing data that the sending
computer's stack added (such as IP address and port number) is stripped from the
packets.
9. When the data reaches the top of the stack, the packets have been re-assembled
into their original form, "Hello computer 5.6.7.8!"

Ques 2:-With the aid of an example, explain the meaning of “Absolute URL” and
“relative URL” including the relationship between the two.

Ques3:-Identify the potential security loophole with SSL scheme and state how the
secure electronic transactions (SET) scheme overcomes this.

Ques4:-Explain why large fabrics consist of multiple switching stages each made
up of a number of smaller switching elements interconnected in a regular matrix.

Part-B

Ques5:-Expalin the role of an RF modem including the modulation schemes used


and the bandwidth available with a single 6/8 MHz band. State the additional
applications that these channels are used for.

Ques6:-Explain with diagram describe the operation of the IDEA scheme. Include in
your description the size of the key used and the number and size of sub keys
associated with each encryption stage.
Ques7:-Explain with diagram show the difference between straight, expanded and
compressed or choice Permutation / transposition. Use for example purpose a P-box
with 8 input bits. State the keys used in each case.

Ques8:- Explain why the development of B-ISDN has been postponed. Identify
those networks and networking equipment of that use ATM.

Você também pode gostar