Professional Documents
Culture Documents
a. Programming methodologies
The Visual Studio .NET programming methodology allows for mixedlanguage programming. This is established through a Common Type
System (CTS) that is defined for all the languages that .NET Framework
supports. All these languages compile into an intermediate language
before they compile in native code. Therefore, the .NET developer has the
independence to code one module of an application in one language and
the other module of the same application in another language.
b. Platform technologies
c. Code execution
The .NET Framework 2.0 BCL supports backward compatibility with the
earlier versions. .NET supports C++ because of backward compatibility.
To run a C++ code on .Net Framework, you need to include the following
line at the beginning of the code:
#using <mscorlib.dll>
Server: Stores data The business logic can either be integrated with the
client (fat client) or with the server (fat server).
easier to create with .NET. ASP. NET 2.0 includes various features that
enable you to easily develop Web applications having a consistent layout
and appearance.
and interface for programming in .NET. Visual Studio .NET provides all
the programming advantages mentioned so far. This development
environment has an extensive set of ready-to use-controls, good
debugging facilities, easy and simple programming features, and a vast
set of .NET base classes. All these features enable you to develop high
performance applications in a short period of time.
The Visual Studio .NET IDE provides you with a common interface for
developing various kinds of projects for the .NET Framework. The IDE
provides you with a centralized location for designing the user interface
for the application, writing code, and compiling and debugging the
application. The Visual Studio .NET IDE is available to all the
programmers who use the languages in the Visual Studio .NET suite.
5. What is Whidbey?
Whidbey is the code name of Visual Studio 2005, which was released in
November 2005.
class TestForeach
n goto statement
n return statement
n throw statement
The checked and unchecked statements are used to control the overflow
checking for integer type arithmetic operations and conversions. The
checked statement causes all expressions in the checked block to be
evaluated in a checked context, and the unchecked statement causes all
int x = Int32.MaxValue;
Console.WriteLine(x + 1);
// Overflow
checked {
unchecked {
In the above example, the checked keyword allows you to report the
overflow at runtime.
A a = ;
lock(a) {
a.P = a.P + 1;
r.Func();
In the above code snippet, resources are obtained with the using
statement.
5. What are the functionalities of CLR? Give the steps involved in the
managed execution process.The CLR has the following functionalities:n
The CLR uses metadata to locate and load classes, lay out instances in
memory, resolve method invocations, generate native code, enforce
security, and set runtime context boundaries.
n The CLR automatically handles object layout and manages references
to objects, releasing them when they are no longer being used. Automatic
memory management eliminates memory leaks as well as some other
common programming errors.
saved on disk before execution. They can be saved on the disk after they
have been executed
When we compile our code into a PE file, the metadata is inserted into
one portion of the PE file, while the code is converted to IL and inserted
into another portion of the PE file. Every type member that are defined or
1. What is BCL?
The code that targets the functionalities of the CLR is known as the
managed code. C#, VB.NET, and Jscript.NET code is managed by default.
However, C++ code is not managed by default.
Managed data refers to the data that is allocated and deallocated by the
garbage collection feature of the CLR.
Value types
Reference types
The following diagram illustrates type classification.
Value types directly store data in the variable. Value types can be built-in
type, user-defined types, or enumerations. Reference types store a
reference to the datas memory address. Reference types can be selfdescribing types, pointer types, or interface types. Self-describing types
are further split into arrays and class types. The class types are userdefined classes, boxed value types, and delegates.
class fibSeries
int x=0;
int y=1;
int z=x+y;
Console.WriteLine(x);
Console.WriteLine(y);
Console.WriteLine(z);
while(z!=21)
x=y;
y=z;
z=x+y;
Console.WriteLine(z);
Console.ReadLine();
using System;
namespace ConsoleApplication1
class PalEx
int n,num,digit,sum=0,rev=0;
string s;
s=Console.ReadLine();
num=Int32.Parse(s);
n=num;
do
digit=num%10;
sum+=digit;
rev=rev*10+digit;
num/=10;
}while(num!=0);
if(n==rev)
else
Console.Read();
A .dll runs in the same memory process as the container. This means
that if the .dll is corrupted, it will cause the parent application to crash.
An .exe on the other hand runs in a different memory process. This
means that even if the .exe gets corrupted, the parent application will not
be harmed. However, execution of an .exe is slower as compared to .dll.
6. In which file are the assembly details like assembly name and version
number stored?
AssemblyInfo.cs
Sample C# Programs
using System;
namespace ConsoleApplication1
class Add
string s1 =Console.ReadLine();
num1=int.Parse(s1);
string s2 =Console.ReadLine();
num2=int.Parse(s2);
sum=num1+num2;
Console.Read()
10. It is told that if we learn any one .NET language, then working with
other .NET languages will be easy. How? Explain with an appropriate
example.It can be told that if you have learned any one .NET language,
then working with other .NET languages will be easy. This is because all
the .NET languages rely on the same managed classes of BCL for the
same services. The same classes, methods, parameters, and types are
used for all the system services regardless of any .NET language.Let us
look at the following code that writes to and then reads from a file:
// Program in C#
using System;
using System.IO;
sw1.WriteLine(tempstring);
sw1.Close();
string filestring=sr1.ReadToEnd();
sr1.Close();
Console.WriteLine(filestring);
// Program in VB.NET
sw1.WriteLine(tempstring)
sw.Close()
sr1.Close()
Console.WriteLine(filestring)
end sub
If we see, both versions of the above program are nearly identical. The
syntax and use of StreamReader, StreamWriter, and the Console class
are identical, same methods, and identical parameters.
class Welcome
Console.Read();
Input and output: The WriteLine function displays the string on the
standard output device.
csc Welcome.cs
Welcome
You can use the using statement with multiple objects by nesting using
statements, as shown in the following code snippet:
using (object1);
using (object2);
The above code snippet illustrates the use of nested using statements.
Namespaces and types always have unique names. If there are two
classes with the same name but present in different namespaces, then
both the objects will have unique fully qualified names. Consider the
following code snippet:
namespace ABC
// ABC
class Class1
// ABC.Class1
Here the ABC.Class1 and XYZ.Class1 are two different types, even if the
class name is same.
n The bool type in C#: There is no conversion between the bool type and
int.
n The long type: In C#, the long data type is 64 bits, while in C++, it is 32
bits.
n The struct type: In C#, classes and structs are semantically different. A
struct is a value type,
n The switch statement: Unlike the C++ switch statement, C# does not
support fall through from
and secure.
n The Main method is declared differently from the main function in C++.
The usage of th
10. How are structures different from classes in C#?Structures are value
types and classes are reference type. A variable of a structure type
directly contains the data of the structure, whereas a variable of a class
type contains a reference to the object. You can inherit classes but you
cannot inherit structures.11. What are interfaces? Give an example.
Interfaces are used to define a contract; a class or struct that implements
the interface must obey to this contract. Interfaces can contain methods,
properties, indexers, and events as members. They cannot contain
constants, fields (private data members), constructors, and destructors,
or any type of static member. All the members of an interface are public
by definition.
interface IExample
event EventHandler E;
Jump Statements
Jump statements allow you to easily transfer control from one branch of
the program to another. Following are some of the jump statements:
class BreakEx
if (ctr == 6)
break;
Console.WriteLine(ctr);
using System;
class ContinueEx
if (ctr < 9)
continue;
Console.WriteLine(ctr);
2. Has C# got its own class library?C# has not got its own class library. It
uses the class library of the .NET Framework.3. How will you compile
Test1.cs to produce NewFile.exe?
You need to type the following command to implement this task:
Value types: Variables of the value types directly contain their data. With
value types, the variables have their own copy of the data.
2. What are variables? How many categories of variables are there in C#?
Define each.
Local variables: A local variable is declared within a block, like a forstatement, a switch-statement, or a using-statement. A local variable is
not automatically initialized and thus has no default value.
5. What are empty statement and labeled statements? Why are they
used?
while (WaitForAnEvent())
An empty statement can also be used to declare a label just before the
closing } of a block:
void Func()
exit: ;
A label can be referenced from goto statements within the scope of the
label. Labels and other identifiers can have the same name.
if (abc >= 0)
goto abc;
abc = -abc;
}The above example uses the name abc as both a parameter and a label.
Namespaces
They are delimited with their members with the . operator. For example,
in System.Console, System is a namespace and Console is a class.
You can create aliases for the namespaces with the using keyword. For
example, the following code snippet declares an alias to provide a faster
way of referencing a namespace:
using ex = Project.Example.Names
Interface
An interface can inherit from one or more base interfaces. The following
code snippet illustrates this:
//Method declarations
using System;
get {
if (first == null)
else
first = first.Next;
return temp;
class Node
Next = next;
Value = value;
namespace Example.Namespace1{
NmEx
public class
{ public string Display()
} }}
}}
class Test
System.Console.WriteLine(Test.F);
dele();
Red,
Blue,
Green
class Shape
switch(color)
case Color.Red:
Console.WriteLine(RED);
break;
case Color.Blue:
Console.WriteLine(BLUE);
break;
case Color.Green:
Console.WriteLine(GREEN);
break;
default:
break;
Console.Read();
The above program shows a color enum and a method that uses this
enum.
if(x=5)
using System;
namespace ConsoleApplication1
class increment
int x, y, z;
x=5;
y=++x;
z=x++;
Console.WriteLine(x);
Console.WriteLine(y);
Console.WriteLine(z);
Console.Read();
}Ans:7 6 6
3. Give any two new features of ADO.NET 2.0.Some of the new features of
ADO.NET 2.0 are:n Multiple Active Result Sets (MARS): In the earlier
versions of SQL Server, database applications could not maintain
multiple active statements on a connection. When using SQL Server
default result sets, the applications had to process or cancel all result
sets from one batch before it could execute any other batch on that
connection. MARS is a new feature supported by Visual Studio 2005 that
allows you to:
Implement multiple batches on a single connection.
Have more than one pending request under a given SQL Server
connection.
n Batch updates: In the earlier versions of ADO.NET, a DataAdapter
could send only one SQL statement at a time to the server. This hindered
faster updates to the database. To address this issue, ADO.NET 2.0 now
supports batch updates. Batch support in ADO.NET 2.0 allows a
DataAdapter to group insert, update, or delete operations from a DataSet
or DataTable to the server, instead of sending one operation at a time. A
significant benefit of batch updates is that there are fewer round trips to
the database server if you have a large number of rows to update. Batch
updates are supported for the .NET data providers for SQL Server
(SqlClient) and Oracle (OracleClient).
When you need to work with a large number of tables, you should use a
data reader. If the number of tables is less, you should use a dataset. If
multiple users use the database and the database needs to be updated
frequently, you should use a data reader.
service. The method performs some action on the arguments and returns
the r esults to
and the WSDL document for the Web service. Client applications can
then locate the Web service by using the UDDI Directory.The following
diagram depicts the relation between the various enabling Web service
technologies.
The following table displays some of the commonly used HTML controls
with the corresponding HTML tags.
are now able to program our Web page in C# also. Nice thing about this
is it allows separation of the
design; the HTML is used for any type of Web page, and for the serverside code any .NET languages.
The text boxes for Password and Confirm Password fields need to display
asterisks (*) when a user enters a value. To enable this, set the TextMode
property of these two text boxes to Password in the Properties window.
Add three RequiredFieldValidator controls to the WebForm1.aspx form by
using the Web Forms tab of the Toolbox.
Add one CompareValidator control to the WebForm1.aspx form by using
the Web Forms tab of the Toolbox.
Double-click the WebForm1.aspx form to open the code-behind file with
a .cs extension. In the Load event of the page, enter the following lines of
code:
ddlcountry.Items.Add(Bangladesh);
ddlcountry.Items.Add(Bhutan);
ddlcountry.Items.Add(India);
ddlcountry.Items.Add(Nepal);
ddlcountry.Items.Add(Pakistan);
ddlcountry.Items.Add(Sri Lanka);
CompareValidator1.ControlToValidate=txtcpassword;
CompareValidator1.ControlToCompare=txtpassword;
RequiredFieldValidator1.ControlToValidate=txtuname;
RequiredFieldValidator2.ControlToValidate=txtpassword;
RequiredFieldValidator3.ControlToValidate=txtcpassword;
ASP.NET has been designed to work seamlessly with What You See Is
What You Get (WYSIWYG) HTML editors and other programming tools,
including Microsoft Visual Studio .NET. Not only it makes Web
development easier, but it also provides all the benefits that tools offer,
including a GUI that developers can use to drop server controls onto a
Web page and fully integrated debugging support.
<html>
<head>
<title>WebForm1</title>
<meta name=vs_targetSchema
content=http://schemas.microsoft.com/intellisense/ie5>
</head>
<body MS_POSITIONING=GridLayout>
<%for(int i=0;i<8;i++){%>
<%}%>
</form>
</body>
</html>
1. Where does the Web page belong in the .NET Framework class
hierarchy?
System.Web.UI
needs to have a virtual directory and the virtual directory might contain
subdirectories within it.
5. What is a Master page?A Master page sets the standard layout and
required content that you want to appear on all the pages. A Master page
includes named regions or content placeholders for which Content pages
provide custom content. A Content page is an .aspx file. It identifies only
its Master Page and the necessary content to fill the placeholders
specified in the Master Page.A Web application should have a consistent
layout and appearance. The structure of the various pages of the
application should not be different. However, if the application is large
and multiple people contribute to its development and maintenance, this
consistency is difficult to ensure. ASP.NET 2.0 now provides a solution to
this by giving developers an option to create Master pages.
1. What
n ASP.NET based Web services can only be accessed over HTTP, whereas
the .NET Remoting can be used across any protocol.
process, invokes the server object, and returns the return value to the
client proxy, which returns the result
to the client. Remote calls must be conveyed in some way between the
client and the server process. If we were
client proxy. This will provide the results to the user.The communication
between server and client is done by using a channel. A channel carries
the data stream, makes a package related to a particular protocol, and
sends the package to a different computer. In remoting architecture, the
process of remoting is designed considering the security factor.
using System;
namespace RemoteTest
public TestLoader()
System.Console.WriteLine(Hello World);
string stc=Client;
return stc;
2.
SampleObject.
7. using System;
8. using System.Runtime.Remoting;
9. using System.Runtime.Remoting.Channels;
10. using System.Runtime.Remoting.Channels.Tcp;
11. namespace Remoting
12. {
13. // Sample server
14. public class SampleServer
15. {
16. public static int Main(string [] args)
17. {
18. // Create an instance of a channel
19. TcpChannel channel = new TcpChannel(8080);
20. ChannelServices.RegisterChannel(channel);
21. // Register with the name HelloWorld
22. RemotingConfiguration.RegisterWellKnownServiceType(
23. typeof(SampleObject), HelloWorld,
WellKnownObjectMode.SingleCall );
24. System.Console.WriteLine(Press the enter to exit);
25. System.Console.ReadLine();
26. return 0;
27. }
28. }
}
30.
Once we have created all the above code and successfully compiled each
of them, we are ready to
run it. Assuming we chose a free TCP/IP port for the service, start the
server executable. After the
The server is listening so we are now ready to run the client. Executing
the client should result in Hello
using System;
using System.Runtime.Remoting;
using System.Runtime.Remoting.Channels;
using System.Runtime.Remoting.Channels.Tcp;
namespace Remoting
// Sample client
4. What is activation?
n Server activation: When the activation process occurs from the server
then the activation is said to be server activation.
n Client activation: When the activation process is from the client side
then the activation is said to be client activation.
n Remote object activation: When the client activates the object that
resides on the server then the activation is said to be remote object
activation.
5. What is MTS?
typeof(Remoting.SampleObject),tcp://localhost:8080/HelloWorld );
if( obj.Equals(null) )
else
Console.WriteLine(obj.HelloWorld());
return 0;
n HTTP channel: The HTTP channel uses the SOAP protocol to transport
messages. The messages that are passed through the SOAP formatter are
converted into XML, and serialized. The necessary SOAP headers are
included in the stream. The HTTP channel can also be configured with
the help of binary formatter. HTTP channel that uses binary formatter
are not the same as TCP channel due to the difference between
underlined protocols.
By using the TCP protocol, the stream is transported to the URI target.
The channel provides communication through TCP sockets.
To initialize a server channel at port 9932, and then register the channel
with the channel services, you would need to use the following code
snippet:
You can see commerce all around you in millions of different forms. If
you buy something or go to work each day for a company that produces a
product or a service, you are participating in a commercial activity.
n Buyers: These are the people who want to purchase goods and
services.
n Sellers: These are the people who offer goods and services to buyers.
Sellers are generally recognized in two different forms, retailers who sell
directly to the consumers and wholesalers or distributors who sell to the
retailers and other businesses.
n Producers: These are the people who create the products and services
that sellers offer to buyers.
Ans: This revolutionized the scenario of trading and commerce and can
be called the beginning of e-commerce.The matters improved further,
with the concept of the world wide web and the internet, the number of
users on the web increased manifold and the cost of getting connected
crashed. This, coupled with several changes in banking and other
systems, made the entire set of e-commerce operations available even to
the individual and small time users, apart from the large companies and
organizations. Definitely, the key element of e-commerce is information
processing. Given a suitable scenario and infrastructure, every stage of
commerce, except of course production of goods and their physical
delivery can be automated. The tasks that can be automated include
information gathering, processing, manipulation and information
distribution.
Q. What are the categories of operations under e-commerce? Explain
(ii.) Transactions with the trading partners or between the officer of the
company located at different locations.
i.
2. Home shopping
3. Home entertainment
v. Updating of his pass books etc. Indeed most of these can be done
through telephone with suitable passwords etc, except round the clock
banking. The concept of Automated Teller Machines is to allow the
customer to draw money from his account at any part of the day (or
night). In fact, ATMs are to day thought to be one single concept that
changes the way banks functioned. The customer need not go to the
bank at all for his most important service. In other words, both the bank
and the customer became faceless to each other. But it helped the
customer by ensuring that he need not modify his working schedule to
visit the bank. At the same time, the banks need not resort to concept
like split hours, opening on holidays etc. to project themselves as
customer friendly.
(i) A minimal size of the place:Obviously for any such place to thrive there
is a critical size, below which it is not profitable to operate. This minimal
number of buyers and sellers characterises the profitability of the place.
(iii) Scope for designing new products : The customer need not buy only
what is available. He can ask for modifications, upgradations etc. The
supplier must be able to accept these and produce made to order items.
3). Interface and support services, will provide interfaces for electronic
commerce applications such as interactive catalogs and will support
directory services functions necessary for information search and
access.
Q. Explain the architecture of www ???Explain the three stages of ecommerce architecture on web ?
l Critical mass of buyers and sellers. The trick is getting a critical mass of
corporations and consumers to use electronic mechanisms. In other
words, the electronic marketplace should be the first place customers go
to find the products and services they need.
Pre-purchase Preparation
From the consumers perspective, any major purchase can be assumed
to involve so me amount of pre-purchase deliberation, the extent of which
is likely to vary across individuals, products, and purchase situations.
Purchase deliberation is defined as the elapsed time between a
consumers first thinking about buying and the actual purchase itself.
Information search should constitute the major part of the duration, but
comparison of alternatives and price negotiation would be included in
the continually evolving information search and deliberation process.
Purchase Consummation
After identifying the products to be purchased, the buyer and seller must
interact in some way to actually carry out the mercantile transaction. A
mercantile transaction is defined as the exchange of information between
the buyer and seller followed by the necessary payment.
A single mercantile model will not be sufficient to meet the needs of every
one. In very general terms, a simple mercantile protocol would require
the following transactions. Although there may be many variants of this
protocol, the basic flow remains the same.
7. Billing service gives the vendor the green light to deliver product and
sends a standardized message giving details of transaction.
9. On receiving the goods, the buyer signs and delivers receipt. Vendor
then tells billing service to complete the transaction.
10.At the end of the billing cycle, buyer receives a list of transactions.
Buyer can then either deny certain transactions or complain about over
billing. Suitable audit or customer service actions are then initiated
depending on the payment scheme.
Postpurchase Interaction
Order Receipt and Entry- After an acceptable price quote, the customer
enters the order receipt and entry phase of OMC.
Order Fulfillment and Delivery- During the order fulfillment and delivery
phase the actual provision of the product or service is made.
Order Billing and Account / Payment Management:- After the order has
been fulfilled and delivered, billing is typically handled by the finance
staff, who view their job as getting the bill out efficiently and collecting
quickly.
Q. What are the three type electronic Digital token? Explain. OR Explain
Electronic Token.
By supplying all customers (buyers and sellers) with its public key, a
bank enables customers to decode any message (or currency) encoded
with the banks private key. If decoding by a customer yields a
recognizable message, the customer can be fairly confident that only the
bank could have encoded it. These digital signatures are as secure as the
mathematics involved and have proved over the past two decades to be
more resistant to forgery than hand written signatures.
The controversial aspects of e-cash are those that relate to the other role,
as a store of value. Human needs tend to require that money take a
tangible form and be widely accepted, or legal tender. If ecash had to be
convertible into legal tender on demand, then for every unit there would
have to be a unit of cash reserved in the real economy. This creates
problems, because in an efficient system, if each ecash unit represents a
unit of real cash, then positive balances of e-cash will earn no interest;
for the interest they might earn would be offset by the interest foregone
on the real cash that is backing them. The enormous currency
fluctuations in international finance pose another problem. Unless, we
have one central bank offering one type of electronic currency, it is very
difficult to see e-cash being very prominent except in narrow application
domains.
the transfer of account balances from the account against which the
check was drawn to the account to which the check was deposited.
Electronic purses, which replace money, are also known as debit cards
and electronic money.
selected accounts.
We can break credit card payment on on-line networks into three basic
categories:
accept. However, customers might feel that all this record keeping is an
invasion of privacy.
The electronic payment system must ensure and maintain privacy. Every
time one purchases goods using a credit card, subscribes to a magazine
or accesses a server, that information goes into a database somewhere.
This violates one the unspoken laws of doing business: that the privacy
of customers should be protected as much as possible.
The users must be assured that they cannot be easily duped, swindled,
or falsely implicated in a fraudulent transaction. This protection must
apply throughout the whole transaction protocol.
Despite cost and efficiency gains, many hurdles remain to the spread of
electronic payment systems.These include several factors, many nontechnical in nature, that must be addressed before any newpayment
method can be successful.
The EDI standards and application level, although separate, are closely
intertwined. The EDI transport layer corresponds closely with the
nonelectronic activity of sending a business form from one company A to
company B. Physical layer of EDI documents are more structured than email and typically are manipulated or processed more that e-mail
messages by the sending and receiving software
VANs bill in various ways for services rendered. Typically, customers can
pick and choose from an array of VAN service and be billed accordingly.,
These sevices may include EDI translation software and support, EDI to
fax support, email capability, inter-VAN connectivity, and, most
commonly, transmission of X.12 documents. Account Start-UP Costs
EDI implementation :
l Common EDI standards dictate syntax and standardize on the business
language. EDI standards basically specify transaction sets complete
sets of business documents.
l Translation software sends messages between trading partners,
integrates data into and from
The first step in the EDI process creates a document in this case, an
invoice in a software application. This software application then sends
the document to an EDI translator, which automatically reformats the
invoice into the agreed- on EDI standard. If these two pieces of software
are from different vendors, it is very important that the document
preparation application seamlessly integrate with the EDI translation
software. If both the EDI translator and business application are on the
same type of computer, the data will move faster and more easily from
one to another. The translator creates and wraps the document in an
electronic envelope EDI package that has a mailbox ID for the
companys trading partners. The EDI wrapper software can be a module
to the translator, a programming tool to write a different communications
protocols, or a separate application.
Opening an account with a VAN incurs start-up costs as well as other
variable costs such as mailbox/ network fees. The network usage fee is a
flat monthly rate that applies, whether or not the services are used. The
network usage fee can also include a mailbox fee for maintaining an
account and a password. Each account has a mailbox through which
companies exchange EDI data.
The overall start-up costs vary depending on the EDI readiness of the
organization and the tradingpartner, the number of trading partners, line
attachment options(asynchronous), and software application options.
VAN Usage or Variable Costs VANs charge session fees based on the of
their services. Unlike the postal service, which charges only to send a
letter, most VANs charge to both send and receive data. If a user agrees to
cover all of thetransaction costs, the VAN can charge twice for each
transaction:
1) when the user sends or receives, and 2) when a trading partner sends
or receives. The customer pays according to volume of usage. Usage is
defined as the number of transactions sent and received by the customer
or the trading partner. Transaction fee assessment is not consistent or
straightforward. Some VANs allow users to bundle several transaction
sets into a single envelope, as though sending several invoices in one
paper envelope. Other VANs open the interchange and charge for each
transaction set in the envelope. Other support and software costs are
hidden. The session fee is a variable cost related to envelope/message fee
delivery of functionally similar EDI documents. Support fee generally
applies to updates to the software and telephone support for the VANs
that provide software.
Some VANs provide free software that works only with its sponsoring
VAN. Other VANs provide customized software that may or may not
operate with other VANs.
Interconnect Costs
A company that exchanges EDI data with a trading partner that
subscribes to a different VAN will mpay a VAN interconnect fee. Most
VANs offer interconnects, but they often charge monthly fees for using
them and may have other charges as well. If no transactions are sent,
there is only the monthly charge for the mailbox and interconnect fee.
Since most VANs offer volume discounts, the variable costs per
transaction will decrease as the number of transactions sent increases.
There has been considerable debate concerning the legal status of EDI
messages and electronic
The economic advantages of EDI are widely recognized, but until recently,
companies have been able to improve only discrete processes such as
automating the accounts payable function or the funds transfer process.
Companies are realizing that to truly improve their productivity they
need to automate their external processes as well as their internal
processes. This is the thrust of new directions in EDI. New EDI services
for electronic commerce are seen as the future bridge that automates
external and internal business processes, enabling companies to improve
their productivity on a scale never before possible. They present
information management solutions that allow companies to link their
trading community electronically. Another goal of new EDI services is to
reduce the cost of setting up an EDI relationship. These costs are still
very high because of the need for a detailed bilateral agreement between
the involved business partners and for the necessary technical
agreements. Therefore most successful EDI implementations are either in
long-term partnerships or among a limited number of partners. With the
advent of interorganizational commerce, several new types of EDI are
emerging that can be broadly categorized as traditional EDI and open
EDI.
Traditional EDI
Traditional EDI replaces the paper forms with almost strict one-to-one
mappings between parts of a paper form to fields of electronic forms
called transaction sets. Traditional EDI covers two basic business areas:
INTERNET-BASED EDI
Consumer demand and expectations are forecasted to drive made-toorder or customized products with rapidly shrinking lead times. Products
will come configured as customers want them and provide a high level of
reliability, excellent quality, and longer life spans. Customization focuses
on two issues: time to market and flexible operations: Time-to-market
depends largely on gathering the specific consumer preferences and
of how products and services flow from one departments to another, and
eventually, to the customer is apparent. the horizontal organization is
processed at eh local level by process teams. Team members are typically
from the respective functions working in the process. Process teams can
resolve problems quickly, and in this way permit the company to operate
with flexibility and responsiveness in a continuously changing business
environment.
Naturally, virtual enterprises run risks of their own. For example, the
firms with limited loyalty to the core firm are constantly exploring
opportunities in other networks or markets. On the other hand, the core
firm with a stable network of cooperating and committed partners must
avoid becoming passive due to its strong relationships with its partners.
Once we accept the premise that the future organizational structure will
be an internal marketplace populated by specialized brokerages,
questions surface about the structure of this market place. We chose the
notion of brokerage to describe the internal marketplace because in the
real world, brokerages are widespread (realtors, stockbrokers, tax
accountants) an play an important role in facilitating efficient markets.
Our working definition of an electronic brokerage is: multiple services
provided by a single interface with a single point of accountability on an
order-by-order basis. Brokerage service providers are intimately involved
Impostures
Email snooping
Sniffing
Spoofing
Async attacks
Trojan horses
Back doors
* If a hacker has gained access to a host, the hacker may set up sniffing
programs to observe traffic storing information (IDs/passwords)that can
be used to compromise other systems.
* While programs are idle in host memory, a hacker may have the
opportunity to access the programs data.
Ans: - There are basic security strategies that can be utilized to combat
the threats discussed so for: access to control, integrity, confidentiality,
and authentication. However, before defenses can be deployed, a security
policy must be developed by an organization.Policy guidelines When a
system administrator sets security policies, he or she is developing a plan
for how to deal with computer security one way to approach this task is
to do the following.
SECURITY TOOLS
The internet uses the transport control protocol / Internet protocol
(TCP/IP) as the primary network protocol engine. Each IP packet
contains the data that is to be sent to some endpoint destination. The IP
packet consists of a 32 bit source and destination address (in IPv4),
optional bit flags, a header checksum, and the data itself. There is
guarantee at the network layer that the IP protocol data units will be
received, and even if they are received, they may not be received in any
particular order. There is also no guarantee that the packet was sent
from the supplied source address; therefore, you cannot solely rely on the
source address to validate the identity of the user who sent the packet.
TCP provided retransmission of lost or corrupted protocol data units into
their original order of transmission. Each packet contains a sequence
number which is what TCP uses to sort the protocol data units. The
acknowledgement number is the sequence number of the last packet
transmitted. The two most prominent secure transmission protocols for
secure Web communication are l Secure sockets Layer l Secure HTTP (SHTTP)
1. Packet filters
3. Proxy servers
Packet filtering:- Packet filtering at the network layer can be use as a first
defense. Basic filtering comes as part of most routers software. Each
packet is either forwarded or dropped based on its source address
destination address, or a defined (TCP) port. Configuring a filter involves
some determination of what services/addresses should and should not
be permitted to access the network or server.
As noted in the mechanisms section, passwords are the most widely used
security measure in existence today. Passwords and password
information files are often the target for many attackers. Once an
attacker has obtained a password, there is little or no controlling what
damage may be done or what proprietary information could be leaked
out. Passwords should be changed regularly. The more often a password
is changed the more secure the account becomes. As a general rule,
passwords should not be written down; if a password is to be written
down, it should not be located anywhere near where it could to log in
(this apply to internal security threats). Login attempts should be limited
to three or less tries. Password security is only as good as the password
The best solution for the threat of viruses is prevention: do not allow a
virus to get into the system inthe first place. In general, this goal is
Q. What are the basic types of Physical data security and threats to
data?
Threats.
Passive threats.
Active Threats
PROTECTING RESOURCES
The secure sockets layer systems from Netscape communications and the
secure hypertext transfer protocol form commerce net offer secure means
of transferring information through the Internet and the WWW. SSL and
S-HTTP allow the client and servers to execute all encryption and
decryption of Web transactions automatically and transparently to the
end user. SSL works at the transport layer and it is simpler than S-HTTP
which works at the application layer and supports more services (such as
firewalls and generation and validation of electronic signature.
S-HTTP
S-HTTP is a secure extension of HTTP developed by the commerce Net
consortium. S-HTTP offers security techniques and encryption with RSA
methods, along with other payment protocols. For secure transport, SHTTP supports end-to-end secure transactions by incorporating
cryptographic enhancements to be used for data transfer at the
application level. This is in contrast to existing HTTP authorization
mechanisms, which required the client to attempt access and be denied
before the security mechanism is employed. S-HTTP incorporates publickey cryptography from RSA Data security in addition to supporting
traditional shared secret password and Kerberos based security systems.
The RSA data security ciphers used by S-HTTP utilize two keys; files
encrypted by one can only be decrypted by application of the other key. A
company generates a pair of these keys, publishes one and retains the
other. When another company wishes to send a file to the first company,
it encrypts the file with the published key of the intended recipient. The
recipient decrypts it with the private key. S-HTTP allows Internet users to
access a merchants Website and supply their credit card numbers to
their web browsers; S-HTTP encrypts the card numbers, and the
encrypted files are then sent to the merchant. Then, S-HTTP decrypts the
files and relays back to the users browsers to authenticate the shoppers
SEPP is the electronic equivalent of the paper charge slip, signature, and
submission process. SEPP takes input from the negotiation process and
causes the payment to happen via a three-way communication among
the cardholder, merchant, and acquirer. SEPP only addresses the
payment process; privacy of nonfinancial data is not addressed in the
SEPP protocol-hence, it is suggested that all SEPP communication be
SEPP PROCESS
l The number of payment card purchases made through this medium will
grow as Internet-based on-line ordering systems are created.
l Many banks are planning to support this new form of electronic
commerce by offering card authorizations directly over the Internet.
l Several trials with electronic currency and digital cash are already
underway Role of payment systems Payment systems and their financial
institutions will play a significant role by establishing open specifications
for payment card transactions that:
l Provide for confidential transmission,
l Authenticate the parties involved,
l Ensure the integrity of payment instructions for goods and services
order data, and
l Authenticate the identity of the cardholder and the merchant to each
other.
Purpose of Secure Electronic Transaction(SET)
S-HTTP
S-HTTP is a secure extension of HTTP developed by the commerce Net
consortium. S-HTTP offers
OBJECTIVES
Motivation
Market acceptance
security techniques and encryption with RSA methods, along with other
payment protocols. For secure transport, S-HTTP supports end-to-end
secure transactions by incorporating cryptographic enhancements to be
used for data transfer at the application level. This is in contrast to
existing HTTP authorization mechanisms, which required the client to
attempt access and be denied before the security mechanism is
employed. S-HTTP incorporates public-key cryptography from RSA Data
security in addition to supporting traditional shared secret password and
Kerberos based security systems. The RSA data security ciphers used by
S-HTTP utilize two keys; files encrypted by one can only be decrypted by
application of the other key. A company generates a pair of these keys,
publishes one and retains the other. When another company wishes to
send a file to the first company, it encrypts the file with the published key
of the intended recipient. The recipient decrypts it with the private key.
S-HTTP allows Internet users to access a merchants Website and supply
their credit card numbers to their web browsers; S-HTTP encrypts the
card numbers, and the encrypted files are then sent to the merchant.
Then, S-HTTP decrypts the files and relays back to the users browsers to
authenticate the shoppers digital signatures. The transaction proceeds
as soon as the signatures are verified.
Payment System Participants
Interaction of participants
SET changes the way that participants in the payment system interact.
In a face-to-face retail transaction or a mail order transaction, the
electronic processing of the transaction begins with the merchant or the
Acquirer. However, in an SET transaction, the electronic processing of the
transaction begins with the cardholder.
Cardholder
Issuer
Merchant
Acquirer
An Acquirer is the financial institution that establishes an account with
a merchant and processes payment card authorizations and payments.
Payment gateway
Brand
Third parties
CRYPTOGRAPHY
message. There are two primary encryption methods in use today: secretkey cryptography and publickey cryptography. SET uses both methods in
its encryption process.
Encryption
The recipient of the digital signature can be sure that the message really
came from the sender. And, because changing even one character in the
message changes the message digest in an unpredictable way, the
recipient can be sure that the message was not changed after the
message digest was generated.
SET authentication
The means that a financial institution uses to authenticate a card holder
or merchant is not defined by
PAYMENT PROCESSING
Transactions described
l Cardholder registration
l Merchant registration
l Purchase request
l Payment authorization
l Payment capture
Other transactions
l Certificate query
l Purchase inquiry
l Purchase notification
l Sale transaction
l Authorization reversal
l Capture reversal
l Credit
l Credit reversal
obtain the randomly generated symmetric key and then uses the
symmetric key to unlock the original message.
these specifications. Each payment card brand and financial institution
will select an appropriate method.Introduction of dual signature
SET introduces a new application of digital signatures, namely the
concept of dual signatures. To understand the need for this new concept,
consider the following scenario: Bob wants to send Alice an offer to
purchase a piece of property and an authorization to his bank to transfer
the money if Alice accepts the offer, but Bob does not want the bank to
see the terms of the offer nor does he want Alice to see his account
information. Further, Bob wants link the offer to the transfer so that the
money is only transferred if Alice accepts his offer. He accomplishes all of
this by digitally signing both messages with a single signature operation
that creates a dual signature.
If Alice accepts Bobs offer, she can send a message to the bank
indicating her acceptance and including the message digest of the offer.
The bank can verify the authenticity the same offer by using its digest of
the authorization and the message digest presented by Alice of the offer
to validate the dual signature. Thus the bank can check the authenticity
of the offer against the dual signature, but the bank can not see the
terms of the offer.
Although the notion of software agents sounds very seductive, it will take
a while to solve the problems of inter-agent communication, interoperable
agents, and other headaches that come with distributed computing and
networking.
A new threat has arisen in the past few years to cause concern among
data processing an data
communications managers: the virus and its relative, the worm. These
entities range from the harmless to the destructive. A virus is a program
that can affect other programs by modifying hem; the modified program
includes a copy of the virus program, which can then go on to infect
other programs. A warm is a program that makes use of networking
software to replicate itself and move from system to system. The worm
performs some activity on each system it gains access to, such as
consuming processor resources or depositing viruses. What is worrisome
to the manager responsible for security is the prevalence of these
computer contagions. What was once rare has reached epidemic
proportions, disrupting operations, destroying data, and raising
disturbing questions about the vulnerability of information systems
Telnet
KINDS OF SHOPPING
Variety of experiences
There are many ways that cardholders will shop. This section describes
two ways. The SET protocol supports each of these shopping experiences
and should support others as they are defined.
On-line catalogues
Electronic catalogues
Once the cardholder approves the order and chooses to use a payment
card, an electronic message using the SET protocol can be sent to the
merchant with the order and payment instructions. This message can be
delivered on-line, such as to the merchants Web page, or sent via a
store-and-forward mechanism, such as electronic mail.
MASQUERADE
5. Ensure the use of the best security practices and system design
techniques to protect all legitimate parties of an electronic commerce
transaction.
Integrity of data
Q. What is standardization?What is the need for standardization?AnsThe biggest barrier to electronic trade is having all the pieces work
together so that information can flow seamlessly from one source to
another. This requires standardization.
Define commerce? Name two areas which are reasons of worry in ecommerce.?
what is legal in one country may not be so in another. There is also the
concepts of taxation and state controls that needs to be solved
ii. Transactions with the trading partners or between the officer of the
company located at different locations.
handled by the browser), hence it is easy to use: the shoppers enter their
credit card numbers, SSL encrypts them and sends the encrypted files to
the merchant; the transmission proceeds as soon as SSL decrypts the
files.
SSL requires the merchant to use the netscape server software and the
buyer to use the Netscape browser software. As SSL becomes more widely
deployed and implemented, this restriction should go away. Mastercard
and Visa, as well as many other large corporations, have endorsed SSL
for financial transactions. There was recently a successful attack against
SSL by two graduate students at Berkeley; Netscape has since distributed
a patch for this key generation. Netscape has also developed secure
courier, which uses SSL to allow financial data to be transmitted in a
secure digital envelope. Information is encrypted at the time it leaves the
users computer and remains so until it reaches the financial institution.
This ensures that only the financial institution had access to the
inputted financial information . Secure courier also can verify the
authenticity of inputted financial account information. Before the
development of secure courier, a dishonest business could steal credit
information just as easily as a hacker.e secure socket layer (SSL) protocol
developed by Netscape communications is a security protocol
2. What is DNS?
1. What is FTP?
2. What is IMAP?
9. What is WWW?
Catching
Whenever the DNS server gets a query for a name resolution, which is
not in its domain, it searches its databases for server IP address and it is
cached.Whenever a similar query is encountered, it firstcheck the cache
and return the answer. This increases the speed. TTL is a number in sec
( time in sec)
for which the server can cache the information). After this time the
information is invalid and any query should be sent again to
authoritative server.
The purpose of the route timeout timer is to help purge invalid routes
from a RIP node. Routes that are not refreshed for a given period of time
are likely to be invalid because of some change in the network. Thus, RIP
maintains a timeout timer for each known route. When a routes timeout
timer expires, the route is marked invalid but is retained in the table
until the route-flush timer expires.
5.What is email? What are the functions of the user agent in the e-mail
architecture?An email function support five basic function?Ans.
Electronic mail is the most widely used tool in the present world for fast
and reliable communication.It is based on RFC 822. It has two
components from architectural point of view
In the e-mail architecture, the user agent helps users to interact with the
e-mail systems. The functions of the user agent in e-mail architecture
are:
n Composition: It refers to writing the mail. Here users type the message
that they want to convey. The users have to mention the recipients email address.
insertion
of address after extraction from the original message during replying etc.
When the sender clicks send, the machine establishes a connection with
the SMTP server by using port 25.
An SMTP configured e-mail daemon/process uses this port. This
daemon/process accepts incoming connections and sends the mails to
its appropriate domain. For example if you send the mail from yahoo.com
to hotmail.com, the mail goes to the yahoo SMTP server, and then the
SMTP server sends it to the POP3 server of hotmail.com.
The e-mail client connects to the POP3 server by using port 110. The
POP3 server requires an account name and a password.
After providing a valid username and password, the user gets verified by
the POP3 server.
If the username and password are valid, the POP3 server opens your text
file and allows you to access it.
11. Explain the client side and server side events when a user clicks on a
URL.The client side events when a user clicks on a URL are as follows:
1.The browser locates the URL.
2.The browser asks DNS for the IP address.
3.DNS replies with the IP address.
4.The browser makes the Transmission Control Protocol 5.(TCP)
connection to Port 80 on the machine with the above IP address.
6.The browser sends a request for the specific file.
7.The server sends the required file.
8.The TCP connection is closed.
9.The browser displays all text information.
10.The browser displays all images.
When a user clicks on a URL, the server side events are as follows:
Audio: It deals with only voice. For example, a song or a lecture on any
university site.
Video: It has got both voice and live image, such as a movie, a song, or a
clipping of a lecture.
POP3 begins when the user starts the mail client. The mail client
establishes a TCP connection with the message transfer agent at port
110. Once the connection has been established, the POP3 protocol goes
through three states in sequence:
1.
Authorization.
2.
Transactions.
3.
Update.
When one server in the farm fails, another can step in as a backup.
Combining servers and processing power into a single entity has been
relatively common for many years in research and academic institutions.
Today, more and more companies are utilizing server farms as a way of
handling the enormous amount of computerization of tasks and services
that they require.
Server farm, or web farm, refers to either a web site that runs on more
than one server or an Internet Service Provider (ISP) that provides web
hosting services by using multiple servers.
Server compute farms are making their way into large manufacturing
environments for electronic design automation, and to accelerate
processes and complete tasks. A server farm accomplishes this by
harnessing computing power from multiple machines and combining
that power.
causes the metric to be infinity (that is, 16), the network destination is
considered unreachable.
Split horizons: This feature prevents routing loops within the network.
The architecture of WWW is two tiered. It consists of the client and the
server. The client (web browser) requests for a web page. This page is
retrieved from the server. The architecture depends on three key
standards: HTML for encoding document content, Uniform Resource
Locator (URL) for naming remote information objects in a global
namespace, and HTTP for staging the transfer. The following figure shows
the two-tiered architecture of WWW.
If the web pages are interacting with the database, then the architecture
becomes three-tiered, as shown in the following figure.
When users check their e-mail, the e-mail client connects to the POP3
server by using port 110. The POP3 server requires an account name and
a password.The POP3 server issues a series of commands to bring copies
of user e-mail messages to users local machine. Generally, it will then
delete the messages from the server (unless the user chooses the not to
option in the e-mail client).
Once the connection has been established, the POP3 protocol goes
through three stages in sequence:
deletion from the mailbox. The update state causes the e-mail messages
to be deleted. During the authorization state, at times, when the server is
set for three passwords trials, if you give the wrong password thrice, your
mail box will get locked.
n There is no folder structure for sorting e-mail messages that are saved
on the POP3 server. The server has only one folder for incoming mails,
which is the inbox.
n No rules can be set at the POP3 server. All rules are set at the client
end only. If a users machine crashes, e-mail messages can only be
recovered if a copy of them is left on the server.
n then they can view their mails on the e-mail client software. User
cannot see mails first and then download the
required mails. If there are spam e-mail messages in the inbox that can
be dangerous for the computer, these will also get downloaded and the
user has to delete them
5. Which two capabilities are supported by RIP2 but are not supported by
RIP1?
Two capabilities, which are supported by RIP2 but not by RIP1, are:
(i)
(ii)
(iii)
(iv)
(v)
Host-specific routing
In host-specific routing, the host address is given in the routing table.
The idea of host-specific routing is the inverse of network-specific
routing. Here efficiency is sacrificed for other advantages:
Although it is not efficient to put the host address in the routing table,
there are occasions in which the administrator wants to have more
control over routing. Host-specific routing is a good choice for certain
purposes such as checking the route or providing security measure.
Default routing
network with two routers. Router R1 is used to route the packets to hosts
connected to network N2.
entire Internet, host A can just have one entry called the default (network
address 0.0.0.0).
5. What is BW?
n Easy to use: The wireless networks are easy to set-up and use. Just
plug-in a base station and equip your laptops with WLAN cards.
n Speed: Data speeds drop as the user moves further away from the
access point.
point and the user such as walls, glass, water, trees and leaves can also
determine the distance of operation.
n Safety and security: Using radio waves for data transmission might
interfere with other high-tech equipment. Additionally, the open radio
interface makes eavesdropping much easier in WLANs than in the case of
fiber optics.
n
6. What is the maximum network diameter of a RIP network?The
maximum network diameter of a RIP network is 15 hops.7. When using
OSPF, can you have two areas attached to each other where only one
autonomous system (AS) has an interface in Area 0?
Yes, you can. This describes the use of a virtual path. One area has an
interface in Area 0 (legal), and the other AS is brought up and attached
off an ABR in Area 1, so you can call it Area 2. Area 2 has no interface in
Area 0, so it must have a virtual path to Area 0 through Area 1. When
this is in place, Area2 looks like it is directly connected to Area 0. When
Area 1 wants to send packets to Area 2, it must send them to Area 0,
which in turn redirects them back through Area 1 by using the virtual
path to Area 2.
failure.
The main difference between RIP and OSPF is that RIP only keeps track
of the closest router for each destination address whereas OSPF keeps
track of a complete topological database of all connections in the local
network.
The Internet has some drawbacks with regard to multimedia data. For
example, the media player does not communicate with the streaming
server directly. This delay, before play-out begins, is typically
unacceptable for audio/video clips of moderate length. For this reason,
audio/video streaming implementations typically have the server send
the audio/video file directly to the media player process. In other words,
a direct socket connection is made between the server process and the
media player process
On UNIX system
The full range of frequencies from radio waves to gamma rays that
characterizes light is called electromagnetic spectrum.
8. Area 0 contains five routers (A, B, C, D, and E). Area 1 contains three
routers (R, S, and T). What router does router T knows? Router S is the
ABR.
The next-hop information from EBGP is carried into IBGP. If IBGP does
not have a route to reach the next hop, then the route will be discarded.
Typically, an IGP needs to be used to exchange routes to the next hop,
but this can be achieved by using static routes on all the routers running
IBGP. So, the answer is yes if you want to use and maintain static routes.
Otherwise, you can not use IBGP in place of IGP.11. Can BGP be used by
Internet service providers only?
No. BGP can also be used to scale large enterprise networks. A large
network can be divided into segments, with each segment running an
IGP. Routing information between segments could then be exchanged by
using BGP
encapsulates the packet in a UDP segment, and then hands the segment
to IP. The receiving side extracts the RTP packet from the UDP segment,
then extracts the media chunk from the RTP packet, and then passes the
chunk to the media player for decoding and rendering.
Q. What is Audio & Video? List and explain the drawback of the current
internet to drive the multimedia data.Ans: Audio: The process of flow of
stream of the sound like speech and enjoyable music is known as Audio.
Sound makes the multimedia program and presentation more exciting
and enjoyable.Video:A video is a sequence of frames, with frames
typically being displayed at a constant rate, for example at 24 or 30
frames per second. An uncompressed, digitally encoded image consists of
an array of pixels, with each pixel encode into a number of bits to
represent luminance and color.
Drawbacks of the current Internet to drive the multimedia data
hence delay and jitter are minimal. Due to the lack of any special effort
to deliver packets in a timely manner, it is an extremely challenging
problem to develop successful multimedia networking application for the
Internet.
2. What is modulation?
1. What is UDP?
The User Datagram Protocol (UDP) is one of the core protocols of the
Internet protocol suite. By using UDP, programs on networked computers
can send short messages known as datagrams to one another. However,
UDP does not provide the reliability and ordering guarantees that TCP
provides.
ciphers:
Ans: The timeout timer is used to help purge invalid routes from a RIP
node. Route that arent refreshed for a given period of time are likely
invalid because of some change in the network. Thus, RIP maintains a
timeout timer for each known route. When a routes timeout timer
expires, the route is marked invalid but is retained in the table until the
route-flush timer expires.
Ans: Yes and no. Remember that the next-hop information from EBGP is
carried into IBGP. If IBGP does not have a route to reach the next hop,
then the route will be discarded. An IGP needs to be used to exchange
routes to the next hop, but this can be achieved by using static routes on
all the routes running IBGP. So, the answer is yes if you want to use and
maintain static routes. Otherwise, the answer is no.
10. Assume that a BGP router is learning the same route from two
different EBGP peers. The AS_path information from peer 1 is {2345, 86,
51}, and the AS_path information from peer 2 is {2346, 51}. What BGP
attributes could be adjusted to force the router to prefer the route
advertised by peer 1? Weight and local preference are two BGP attributes
that make adjustments to force the router to prefer the route advertised
by peer 1. Both have a higher preference than AS_path length. Weight
and local preference. Both have a higher preference than AS_path length.
The local preference (LOCAL_PREF) attribute is a well-known
With only 25 possible keys, the Caesar cipher is far from secure. A
sequential increase in the key space can be achieved by allowing an
arbitrary substation. The cipher line can be any permutation of the 26
alphabetic characters, then there are 26! Or greater than 41026
possible keys. This is 10 orders of magnitude greater than the key space
for DES and would seem to eliminate brute force techniques to
cryptanalysis.
Plain: m e e t m e t o m o r r o w
There are delays inherent in the overall system. These delays are
contributed by the encode/decode delay, transfer delay, buffer delay,
modem delay, sound card delay, and other delays. As long as the delays
are kept constant, then the audio will be delivered uninterrupted.
n Access points
The wireless end station can be any device that can communicate using
the 802.11 standard. These devices include laptops, workstations, and
PDAs, as well as printers and scanners.
3. What is wavelength?
1>Caesar Cipher
2>Monoalphabetic Ciphers
3>Playfair Cipher
layers (application, TCP, IP) look the same for the wireless node as for the
wired node. The IEEE 802.11 standard only covers the physical layer
(PHY) and medium access layer (MAC) like the other 802.x LANs do. The
physical layer is sub divided into the Physical Layer Convergence Protocol
(PLCP) and the Physical Medium Dependent Sub Layer.The basic tasks of
the MAC layer comprise medium access, fragmentation of user data, and
encryption. The PLCP sublayer provides a carrier sense signal called
Clear Channel Assessment (CCA), and provides a common PHY interface
for the MAC, which is independent of the transmission technology.
11. Write a note on DSSS.
6. What is Steganography?
n Invisible ink: A number of substances can be used for writing but the
ink leaves no visible trace until heat or a specific chemical is applied to
the paper.
CHAPTER THREE
RTSP
Ans: Raw Audio and Video samples after digitization occupy a large
amount of space. Therefore audio and video are compressed before being
sent through the network. The need for digitization is obvious: computer
networks transmit bits, so all transmitted information must be
represented as a sequence of bits. Compression is important because
uncompressed audio and video consume a tremendous amount of
storage and bandwidth.
n only in good light.
Ans: The Shortest Path First (SPF) routing algorithm is the basis for
OSPF operations. When an SPF router is powered up, it initializes its
routing-protocol data structures and then waits for indications from
lower-layer protocols that its interfaces are functional. After a router is
assured that its interfaces are functioning, it uses the OSPF Hello
protocol to acquire neighbors, which are routers with interfaces to a
common network. The router sends hello packets to its neighbors and
receives their hello packets. In addition to helping acquire neighbors,
hello packets also act as keepalives to let routers know that other routers
are still functional. On multiaccess networks (networks supporting more
than two routers), the Hello protocol elects a designated router and a
backup designated router. Among other things, the designated router is
responsible for generating LSAs for the entire multiaccess network.
The well known multiple letter encryption cipher is the playfair, which
treats diagrams in the plaintext as single units and translates these
units into ciphertext diagrams. The playfair algorithm is based on the
use of a 55 matrix of letters constructed using a keyword.
1. Repeating plaintext letters that would fall in the same pair are
separated with a filler letter, such as x, so that bolloon would be
enciphered as ba lx lo on.
2. Plaintext letters that fall in the same row of the matrix are each
replaced by the letter to the right, with first element of the row circularly
following the last. For example, ar is encrypted as RM.
3. Plaintext letters that fall in the same column are each replaced by the
letter beneath, with the top element of the row circularly following the
last. For example, mu is encrypted as CM.
4. Otherwise, the letter that lies in its own row replaces each plaintext
letter and the column occupied by the other plaintext letter. Thus, hs
becomes BP and ea becomes IM(or JM, as the encipherer wisher).
Transposition Ciphers
In a transposition cipher the plaintext remains the same, but the order of
characters is shuffled around. In a simple columnar transposition cipher,
the plaintext is written horizontally onto a piece of graph paper of fixed
width and the ciphertext is read off vertically seen the following example.
Decryption is a matter of writing the ciphertext vertically onto a piece of
graph paper of identical width and then reading the plain text off
horizontally.
EXPENSIVE
COMPUTERGR
APHICSMAYB
ESLOWBUTAT
LEASTITSEX
PENSIVE
Ciphertext:
CAELPOPSEEMHLANPIOSSUCWTITSBIVEMUTERATSGYAERBTX
party to another across some sort of Internet. The two parties, who are
the principals in this transaction, must cooperate for the exchange to
take place. A logical information channel is established by defining a
route through the Internet from source to destination and by the
cooperative use of communication protocols
(ii) Some secret information shared by the two principals and it is hoped,
unknown to the opponent.
Q. What is streaming?
11. Explain how does the helper application get data from a streaming
server.
Getting data from streaming server to helper application like the media
player requires at least two servers where data is placed. One server is
the HTTP server, and the second server is the streaming server.
For example, when a user visits any songs/news web site, the web
browser communicates with the web server where the user chooses the
file that has music or news. The moment the user clicks any media file;
media player requests for the media file to the streaming server and user
receives the media file on the media player
RTSP server keeps a track of the state of the client for each ongoing
RTSP session. For example, the server keeps track of whether the client
is in an initialization state, a play state, or a pause state. The session and
sequence numbers, which are part of each RTSP request and response,
help the server to keep track of the session state. The session number is
fixed throughout the entire session; the client increments the sequence
number each time it sends a new message; the server echoes back the
session number, and the current sequence number.
an audio or a video file to the client by sending the file into a socket. Both
the TCP and UDP socket connections are used. Before sending the
audio/video file to a network, the file is segmented, and the segments are
typically encapsulated with special headers appropriate for audio and
video traffic.Streaming servers send digital video for news,
entertainment, or educational content over the Internet by using
RTP/RTSP. A multimedia file gets uploaded on the server and streaming
servers encodes content in the latest media formats including MPEG- 4
(Moving Picture Expert Group) and the AAC (Advanced Audio Coder)
audio.
6. Why do audio and video file need to be compressed?
For example, a single image consisting of 1024 pixel * 1024 pixels, with
each pixel encoded into 24 bits requires 3 MB of storage without
compression. There are eight bits, three each for the colors red, green,
and blue. It would take approximately seven minutes to send the image
over a 64 kbps link. If the image is compressed at a modest 10:1
compression ratio, the storage requirement is reduced to 300 Kbytes and
the transmission time also drops by a factor of 10.
Subnet maskContains the subnet mask for the entry. If this field is
zero, no subnet mask has been specified for the entry.
Next hopIndicates the IP address of the next hop to which packets for
the entry should be forwarded.
Routing Protocols
CDP
The differences between direct routing and indirect routing are as follows.
Direct Routing
In direct routing, packet delivery occurs when the source and destination
of the packet is located on the same physical network or if the packet
delivery is between the last router and the destination host
(i) Next hop routing : In this technique the routing table holds only the
address of the next hop instead of holding information about the
complete route. Routing tables are thereby consistent with each other.
(ii) Network specific routing : In this technique instead of having an
entry for every host connected to the same physical network, we have
only one entry to define the address of network itself.
(iii) Host Specific routing: In this routing the host address is given in
the routing table. It is a good choice for certain purpose such as checking
the route or providing security measure.
(iv) Default Routing: This routing is used to simplify routing. In this
routing instead of listing all network in the entire internet. Host a can
just have one entry called the default.
IGRP
Indirect Routing
In indirect routing, the packet goes from router to router until it reaches
the router connected to the same physical network as its final
destination.
RTP
RTP defines a standardized packet format for delivering audio and video
over the Internet. It was developed by the audio and video transport
working group of the Internet Engineering Task Force (IETF) and first
published in 1996 as RFC 1889.
RTP does not have a standard TCP or UDP port from which it
communicates. The only standard that it obeys is that UDP
communications are done on an even port and the next higher odd port
is used for TCP communications. RTP uses UDP and defines format for
additional information required by an application such as sequence
number and time stamp.
RTCP works with RTP in the delivery and packaging of multimedia data
but does not transport any data. It also does not provide any flow
encryption or authentication means by itself. It is used periodically to
transmit control packets to participants in a streaming multimedia
session. The primary function of RTCP is to provide feedback on the
quality of service being provided by RTP.
Even worms can use some other server and network to send mass mails.
Many worm programs are used today to send mass junk e-mails to
disturb networks. Sending mass spam mails is an unlawful activity. The
following table lists ports about a few more protocols.
DNS
The DNS server collects and stores all the information that it receives
when a query is processed. The server retains this information in the
server cache till the specified time-period in the resource record. This
time-period is called the time-to-live (TTL) value of the returned record
information.
After caching, the TTL value starts decreasing so that the server knows
when to delete the resource record. The record is marked for deletion,
when the TTL value reaches zero.
The TTL value indicates the time for which a DNS client can use a DNS
record before deletion of the record or before the record expires. Users
can specify the TTL value for a DNS record in seconds.
The minimum default value of the TTL for records created by the DNS
server is 3600 seconds. A short TTL value results in heavy DNS traffic. A
large TTL value causes the server to reply to queries by using outdated
resource records.
HSRP
HSRP is a routing protocol that provides backup to a router in the event
of the failure of the router.
TIMERS IN RIP
ZeroThis field is not actually used by RFC 1058 RIP; it was added
solely to provide backward compatibility with pre-standard varieties of
RIP. Its name comes from its defaulted value: zero.
IGRP
CDP
3. What is a metric? What are some of the metrics used by the routing
protocols?
Some of the metrics used by the routing protocols are path length,
reliability, delay, bandwidth, load, and communication cost.
The working group was formed in 1988 to design an IGP based on the
Shortest Path First (SPF) algorithm for use in the Internet. Similar to the
Interior Gateway Routing Protocol (IGRP), OSPF was created because in
the mid-1980s, the Routing Information Protocol (RIP) was increasingly
incapable of serving
OSPF was derived from several research efforts, including Bolt, Beranek,
and Newmans (BBNs)
SPF algorithm developed in 1978 for the ARPANET (a landmark packetswitching network developed in OSPF has two primary characteristics.
The first is that the protocol is open, which means that its
OSPF is a link-state routing protocol that calls for the sending of linkstate advertisements (LSAs) to
l Prefer the path with the lowest IP address, as specified by the BGP
router ID.
n Server: Specifies to use this server as the DNS name server. If you
omit Server parameter, the default DNS name server is used.
SMTP
Even worms can use some other server and network to send mass mails.
Many worm programs are used today to send mass junk e-mails to
disturb networks. Sending mass spam mails is an unlawful activity. The
following table lists ports about a few more protocols.
l Weight
l Local preference
l Multi-exit discriminator
l Origin
l AS_path
l Next hop
l Community
Weight Attribute
Weight is a Cisco-defined attribute that is local to a router. The weight
attribute is not advertised to neighboring routers. If the router learns
about more than one route to the same destination, the route with the
highest weight will be preferred.
OSPF Features
Note: Because this chapter deals with multimedia data transmission and
streaming servers, the products available in the market have also been
discussed.
Industry standard protocols such as RTP and RTSP are used for this
purpose. Darwin Streaming Server supports a high level of
customizability and runs on a variety of platforms that allows a user to
manipulate the code.
Darwin Streaming Server 5.5 is the latest version available and includes
the following enhancements:
The source code of Darwin Streaming Server 5.5 currently supports Mac
OS X Server, Linux (Red Hat 8 or higher recommended), Solaris 9, and
Windows 2000/2003 Server. The source code of Darwin Streaming
Server can be compiled and run on these operating systems.
AS_path Attribute
Next-Hop Attribute
The EBGP next-hop attribute is the IP address that is used to reach the
advertising router. For EBGP peers, the next-hop address is the IP
address of the connection between the peers.
Community Attribute
it.
BGP could possibly receive multiple advertisements for the same route
from multiple sources. BGP
selects only one path as the best path. When the path is selected, BGP
puts the selected path in the IP
routing table and propagates the path to its neighbors. BGP uses the
following criteria, in the order
l If the path specifies a next hop that is inaccessible, drop the update.
l If the weights are the same, prefer the path with the largest local
preference.
l If the local preferences are the same, prefer the path that was originated
by BGP running on
this router.
l If no route was originated, prefer the route that has the shortest
AS_path.
l If all paths have the same AS_path length, prefer the path with the
lowest origin type (where
l If the origin codes are the same, prefer the path with the lowest MED
attribute.
l If the paths have the same MED, prefer the external path over the
internal path.
l If the paths are still the same, prefer the path through the closest IGP
neighbor.
asses less routing traffic than it would if the AS were not partitioned.
are in the same area; interarea routing occurs when they are in different
areas.
SPF Algorithm
The Shortest Path First (SPF) routing algorithm is the basis for OSPF
operations. When an SPF
After a router is assured that its interfaces are functioning, it uses the
OSPF Hello protocol to acquire
5 as keepalives to let routers know that other routers are still functional
. How can the present Internet be made to port multimedia data? For
making the existing Internet portable to multimedia data, the following
modifications need to be done:n A protocol is required that reserves
bandwidth on behalf of the streaming server applications.
n The scheduling policies in the router queues should be modified so
that the bandwidth reservations can be done. With the new scheduling
policies, not all packets get equal treatment, instead the packets from the
multimedia provider sites that reserve and pay more, get more
bandwidth.
n The applications must give the network a description of the traffic that
they intend to send to the network.
. How can the present Internet be made to port multimedia data? For
making the existing Internet portable to multimedia data, the following
modifications need to be done:n A protocol is required that reserves
bandwidth on behalf of the streaming server applications.
n The scheduling policies in the router queues should be modified so
that the bandwidth reservations can be done. With the new scheduling
policies, not all packets get equal treatment, instead the packets from the
multimedia provider sites that reserve and pay more, get more
bandwidth.
n The applications must give the network a description of the traffic that
they intend to send to the network.
10. Discuss the features of Real Time Protocol (RTP).The features of Real
Time Protocol (RTP) are:n RTP provides end-to-end delivery services for
data with real-time characteristics such as interactive audio and video.
However, RTP itself does not provide any mechanism to ensure timely
delivery. It needs support from the lower layers of OSI model that
actually have control over resources in switches and routers. RTP
depends on Resource Reservation Protocol (RSVP) to reserve resources
and to provide the requested quality of service.
n RTP provides timestamps, sequence numbers as hooks for adding
reliability, flow, and congestion control for packet delivery, but
implementation is totally left to the application.
Q. What are the limitations of best effort service? Explain.Ans: These are
Limitations of the best effort service*Packet Loss: Consider one of the
UDP segments generated by our Internet phone application. The UDP
segment is encapsulated in an IP datagram. As the datagram wanders
through the network, it passes through buffers (that is, queues) in the
routers in order to access outbound links. It is possible that one or more
of the buffers in the route from sender to receiver is full and cannot
admit the IP datagram. In this case, the IP datagram is discarded, never
to arrive at the receiving application.*End-to-End Delay: End-to-end
delay is the accumulation of transmission, processing, and queuing
delays in routers; propagation delays in the links; and end-system
processing delays. For highly interactive audio applications, such as
Internet phone, end-to-end delays smaller than 150 milliseconds are not
perceived by a human listener; delays between 150 and 400 milliseconds
can be acceptable but are not ideal; and delays exceeding 400
milliseconds can seriously hinder the interactivity in voice conversations.
The receiving side of an Internet phone application will typically
disregard any packets that are delayed more than a certain threshold, for
example, more than 400 milliseconds. Thus, packets that are delayed by
more than the threshold are effectively lost. * Packet Jitter: Varying
delays within the network, the time from when a packet is generated e
source until it is received at the receiver can fluctuate from packet to
packet. This phenomenon is called jitter. For an example, consider two
consecutive packets within a talk spurt in our Internet phone
application. The sender sends the second packet 20 msec after sending
the first packet. But at the receiver, the spacing between these packets
can become greater than 20 msec. To see this, suppose the first packet
arrives at a nearly empty queue at a router, but just before the second
packet arrives at the queue a large number of packets from other sources
arrive at the same queue. Because the first packet suffers a small
queuing delay and the second packet suffers a large queuing delay at this
router, the first and second packets become spaced by more than 20
mecs.
Q. What is multimedia? What is streaming server? Explain audio
streaming process.
Streaming Server: The Server which delivers the audio/video over nonHTTP protocol (Protocols that can be either proprietary or open
standards) is called streaming server. In order to get around HTTP and
/or TCP, audio/video can be stored on and sent from a streaming server
to the media player. This streaming server could be a proprietary
streaming server, such as those marketed by Real Networks and
Microsoft, or could be a public-domain streaming server. With a
streaming server, audio/video can be sent over UDP (rather than TCP)
using application-layer protocols that may be better tailored than HTTP
to audio/video streaming.
Audio Streaming:
The browser process establishes a TCP connection with the Web server
and requests the audio/video file with an HTTP request message.
(i)
type of the response message, launches the associate media player, and
passes the file to the media player.
(iv)
Candidates for physical layers were infrared and spread spectrum radio
transmission techniques. Additional features of the WLAN should include
the support of power management to save battery power, the handling of
hidden nodes, and the ability to operate worldwide.
There are different modes of modulation. Each node has its advantages
and disadvantages. The different modulation modes are:
Continuous Wave
Q. Explain the basic structure of an IEEE 802.11 MAC data frame. Ans:
Basic structure of an IEEE 802.11 MAC data frame
(i)
type of the frame (management, Control, data), whether the frame has
been fragmented, privacy information, and the 2 DS bits(distribution
system bits), indicating the meaning of the four address fields in the
frame.
(ii)
(iii)
IEEE 802 MAC addresses (48 bit each), as they are known from other
802.x LANs. The meaning of each address depends on the DS bits in the
frame control field.
(iv)
(v)
Ans: The IEEE 802.11 standard only covers the physical layer PHY and
medium access layer MAC like the other 802.x LANs do. Physical layer is
sub divided into physical layer convergence protocol (PLCP) and the
physical medium dependent sub layer PMD .The basic tasks of the MAC
layer comprise medium
the medium is idle again for at least DIFS. But if the randomized
additional waiting time for a node is over and the medium is still idle, the
node can access the medium immediately.
(ii)Start frame delimiters (SFD): The 16 bits indicate the start of the
frame and thus provide frame synchronization.
(iii) PLCP_PDU length word (PLW): The first field of the PLCP header
indicates the length of the payload in bytes including the 32 bit CRC at
the end of the payload .PLW can range between 0 and 4,095.
(iv) PLCP signaling fields (PSF): Only one bit is currently specified in this
4-bit field indicating the data rate of the payload (1or 2 Mbit/s).
Private-Key Encryption
n WINS Service
n NNTP Service
n NetDDE Service
n Task Scheduler
Kerberos
DES encrypts and decrypts data in 64-bit blocks, by using a 64-bit key
although the effective key strength is only 56 bits. DES takes a 64-bit
block of plaintext as input and outputs a 64-bit block of cipher text. DES
always operates on blocks of equal size and uses permutations and
substitutions in the algorithm. DES is both a block cipher and a product
cipher.
DES has 16 rounds, which means that the main algorithm is repeated
16 times to produce the cipher text. It has been found that the number
n Microsoft Office is the most widely used e-mail and productivity suite
across the globe. This includes applications such as Outlook, Word,
PowerPoint, Excel, Visio, FrontPage, and Access. Outlook Express, a
basic e-mail client, is installed with Internet Explorer and on all versions
of Microsoft Windows starting with Windows 95. Vulnerabilities in these
products can be exploited through the following attack vectors:
Digital Modulation is the process in which the changes in the signal are
chosen from a fixed list. Each entry of the fixed list conveys a different
possible piece of information. In analog modulation, the change is
applied continuously in response to the data signal. Modulation may be
applied to v Modulation is generally performed to overcome signal
transmission issues such as:
Digital Certificates
CA
Public-Key Encryption
Types of Controls
There are different types of security controls that can help reduce risk.
These are:
n Physical controls: These controls are not directly associated with the
information, data, system, or network security of an organization.
However, they indirectly help provide security at every level of the
organization.
shared values working for the public good, often spanning international
lines.
Q. What are the moral rule on the Internet? Discuss the type of
Problematic behavior.Ans:- Moral rules can be distinguished into two
types governing online behavior.The first type of moral rules identifies
our moral obligations online. Examples of such rules are netiquette rules
and Codes of conduct examples of which are be polite in e-mail
correspondence, always tell the client the truth, make yourself look
good online.
2. Adhere to the same standards online that you follow in real life.
the net.
: The greatest risk that the information technology business faces today
is the security of information in terms of integrity, availability, and
confidentiality. Stories about website defacements, credit card frauds,
non-availability of Web and application servers, and new virus attacks
are common. These defacements are done by hackers and this process is
called as hacking. Software piracy and other forms of product piracy:
This includes illegal access of computer programs. It also includes
copying the softwares of the individuals to gather more information
n Capacity to enter into contract: A person can enter into a contract only
after he has attained an age of majority and is not debarred by law for
doing any unlawful activity.
. a) Explain the impact of internet on the economy of the country and the
society at large. 10 Marks
Ans: Internet has the potential to make life easy for some people and at
the same time it has the power to
Ans:- E-Commerce is the use of the Internet to buy and sell goods and
services. E-Commerce is changing the way in which organizations do
Internet can also be used by businesses for managing their records and
they can make use of electronic bookkeeping. An on-line banking service
is another area, which can be used by the businesses. These services can
be used for funds transfer, payroll management, and electronic bill
payment.
6. Thou shalt not use of copy software for which you have not paid.
9. Thou shalt think about the social consequences of the program you
write.
Ans: While considering the general terrain of cyber law, as of now, the
following acts are construed as
Ans.:- While considering the general terrain of cyber law, as of now, the
following acts are construed as cyber crimes in the I.T. Act,
2000:1.Without permission of the authorized user2.Accessing or
securing access to such computer, computer system or computer network
3.Downloading, copying or extracting any data or information for such
computer, computer system or computer network including information
or data held or stored on any removable storage medium 4.Introducing
any computer virus or contaminant in the computer, computer system or
network 5.Damaging the computer, computer system or network
Ans-
Q. Intellectual property?
These are:
1. Source code: the source code consists of the code written by the
programmer in a high-level
represents.
4. Look and Feel of the program: It is the way the program appears on
the screen and interfaces
Q. State and discuss the primary assumptions of a legal systemAns:Ans. Following are the primary assumptions of a legal system:
Sovereignty: Law making power is a matter of sovereign prerogative. As a
result, the writ of sovereign authority runs throughout wherever
b) use the codes of practice conveyed by the CSI from time to time in
carrying out his tasks,
e) conduct his affairs so as to uphold project and further the image and
reputation of the CSI,
Ans- Computer ethics is the analysis of the nature and social impact of
computer technology and the formulation and justification of the policies
for the ethical use of such technology. Computer ethics examine the
Damages: The party who has broken the contract needs to pay
compensation for any loss or damage that has occurred to the party with
whom such a contract was entered into.
Ans:- The computer revolution is occurring in two stages. The first stage
was that of technology introduction in which computer technology was
developed and refined. The second stage is of technological permeation
in which technology gets integrated into everyday human activities. Thus
evolution of computer ethics is tied to the wide range of philosophical
theories and methodologies, which is rooted in the understanding of the
technological revolution from introduction to permeation.
In the 1940s and 1950s computer ethics as a field of study had its roots
in the new field of research called cybernetics-the science of
7.Explain the impact of internet on the economy of the country and the
society at large.Ans-8. Discuss the impact of globalization on computer
ethics
Ans-
Ans:- Computer ethics is rapidly evolving into a broader and even more
important field, which might reasonably be called global information
ethics. Global networks like the internet and especially the World Wide
Web.
Global education: Inexpensive access to the global information net for the
rich and the poor alike is necessary for everyone to have access to daily
news from a free press, free texts, documents, political, religious and
social practices of peoples everywhere. However the impact of this
sudden and global education on different communities, cultures and
religious practices are likely to be profound.
Ans.
In the history of moral philosophy, two fundamentally different and
mutually exclusive conceptions of the moral evaluation of individual
actions are prevalent:
n The other school of thought believes that it is important to look for the
course of action that maximizes the good. This approach involves
determining which action yields the best consequences measured in
some standard of the good or morality. This approach referred to as
teleological approach involves deciding on what is good for population.
It also spells out what is wrong with actions that interfere with attempts
to get it.
n The third level comprises several obligations that derive directly from
elements unique to the particular professional practice. Code elements at
this level assert more specific behavioral responsibilities that are more
closely related to the state of art within the particular profession. The
range of statements is from more general aspirational statement to
specific and measurable requirements. Professional code of ethics needs
to address all three of these levels.
b) use the codes of practice conveyed by the CSI from time to time in
carrying out his tasks,
e) conduct his affairs so as to uphold project and further the image and
reputation of the CSI,
a) EDUCOM **************
return for their work, increases prices, reduces the level of future
support and enhancements,
Describe the nature and features of the internet. What are the essentials
of a cyber contract?
Ans- A network of networks is called as an Internet. In this the
computers systems are connected with each other in a local area
network. They are also connected to computers on a national and
International scale. The fiber-optic cable, twisted pair copper wire,
microwave transmission, or other communications medias are used for
connecting each node, which is a part of the web. A set of rules is
followed when the computers on the web communicate with each other.
These rules are called as Internet Protocols.In this type of
communication, the Internet acts as a packet switched network. The data
that needs to be transmitted is broken down into smaller packets. The
address of the final destination is attached with the packets. These
packets may follow different route from computer to computer until their
final destination. At the final destination the recipient machine
reassembles the packets.
The links available in the Internet can be used by the Internet users to
retrieve various types of information. When the user sends a request, the
request is forwarded to the remote server where the addressee is housed.
In case the information supplied is right, a response is send back and
the user is bale to retrieve the information that they can access. Different
types of information such as graphics, sound and animated text can be
retrieved with the use of Internet.
Intention to be bound
TERMINATION OF OFFER
QUALITY OF ACCEPTANCE
Consideration
Consideration is not required for a promise to compensate, wholly or in
part, a person who has already voluntarily done something for the
promisor or something which the promisor was legally compellable to do.
It is also not required for a written and signed promise by the debtor (or
his duly authorized agent) to pay a time-barred debt to the creditor.
b) Cyber crimes
of essential importance.
The first level tries to sensitize people to the fact that computer
technology has social and ethical consequences.
The second level consists of someone who takes interest in computer
ethics cases, collects examples, clarifies them, looks for similarities and
differences, reads related works, attends relevant events to make
preliminary assessments, and after comparing them, suggests possible
analyses.
The third level of computer ethics referred to as theoretical computer
ethics applies scholarly theories from philosophy, social science, and law
to computer ethics cases and concepts in order to deepen the
understanding of issues.
Discuss the distinct features of the internetAns- There are three distinct
feature of the InternetGlobal scope: Internet communication has much
broader scope and reach. With little effort a user can reach hundreds
and thousands of individuals around the globe. The ability to reach many
people quickly and easily is not exactly new or unique compared to radio
or television communication.
Anonymity: The second important feature of the internet is that it
provides a certain kind of anonymity. It is a silent feature of this type of
communication that people can deliberately avoid seeing or hearing one
another directly.
6. Thou shalt not use of copy software for which you have not paid.
9. Thou shalt think about the social consequences of the program you
write.
The I.T. act states that where any law provides that information shall be
in writing or in printed form, the requirement is deemed to be satisfied if
such information is in an electronic form and is accessible for
subsequent reference. The key ingredients of the formation of electronic
contracts comprise communication of offer and acceptance by electronic
means, verification of the source of the communication, authentication of
the time and place of dispatch and finally the verifiability of the receipt of
the data communication. A subscriber may authenticate an electronic
record by affixing his digital signature. The digital signature serves to
satisfy the legal requirement of affixing of a signature in a written or
printed document.
Ans:- On the most basic level, computer ethics tries to sensitize people to
the fact that computer technology has social and ethical consequences.
Newspapers, magazines and TV news programs have highlighted the
topic of computer ethics by reporting on events relating to computer
viruses, software ownership law suits, computer aided bank robbery,
computer malfunction, computerized weapons etc.
ELECTRONIC GOVERNANCE
Where any law provides that information or any other matter shall be in
writing or in the typewritten or printed form, then, notwithstanding
anything contained in such law, such requirement shall be deemed to
have been satisfied if such information or matter is
Ans- The IT Act defines unauthorized access by any person as acts done
without the permission of the owner, which includes:
Ans- Amendments to the Indian Penal Code The Indian Penal Code (IPC)
details actions that constitute a crime and the punishments prescribed
for such actions. It elaborately classifies crimes based on interests that
are intended to be protected. The classifications includes
definition of that term in the IT Act of 1999. The other sections that have
been amended are section 167,172, 173, 175, 192, 204,463, 464, 468,
469, 470, 471, 474, 476 and 477A.
Be that as it may, like the benefits we are also experiencing the risks
and effects of vulnerabilities of the information technology in the same
way. Among other concerns, privacy in cyber space has acquired center
stage, of late, in view of more than one reason. As the number of online
users increase, the information rendered by them multiplies. The
concern about that information is, whether online users can exercise any
kind of control over the information that has been passed on to the
service provider in the cyber medium? The concern is quite legitimate,
because, by and large such information is personal and private.
b) Sources of Law
Ans-) Source of law Ans :- Speaking for our own context, our legal system
is based upon the foundations of common law conceived and shaped by
ritish rulers and jurists. Common law connotes, judicial practice of
recognizing customary, traditional practices of the people in a formal
sense of judgments. In this kind of system there are three main sources
of the law, namely, legislation, case law and custom. Legislation is the
formal enactment of law by the legislature created or authorized by the
Constitution. Essentially, the process of codification or legislative
enactment is the premise. It stands in contrast to judge made law;
Legislation consists of leges scriptae (written laws), as contrasted with
judge made law or common law (jus commune). Legislation also stands in
contrast to customary law (consuetudines).
c) Cyber crimes.
Ans- Cyber crime is a generic term that refers to all criminal activities
done using the medium of computers, the Internet, cyber space and the
worldwide web. There isnt really a fixed definition for cyber crime. The
Indian Law has not given any definition to the term cyber crime. In fact,
the Indian Penal Code does not use the term cyber crime at any point
even after its amendment by the Information Technology Act 2000 in the
Indian Cyber law.
a person, mean affixing of his hand written signature or any mark on any
document and the expression signature shall be construed accordingly.
(a) the filing of any form. application or any other document with any
office, authority, body
a particular manner;
then, notwithstanding anything contained in any other law for the time
being in force, such requirement
shall be deemed to have been satisfied if such filing, issue, grant, receipt
or payment, as the case may be, is effected by means of such electronic
form as may be prescribed by the appropriate Government.
(2) The appropriate Government may, for the purposes of sub-section (1),
by rules, prescribe(a) the manner and format in which such electronic
records shall be filed, created or issued;
(b) the manner or method of payment of any fee or charges for filing,
creation or issue any
TERMINATION OF OFFER
QUALITY OF ACCEPTANCE
It is also not required for a written and signed promise by the debtor (or
his duly authorized agent) to pay a time-barred debt to the creditor.
b) use the codes of practice conveyed by the CSI from time to time in
carrying out his tasks,
e) conduct his affairs so as to uphold project and further the image and
reputation of the CSI,
f) Maintain integrity in research and publications.