Basic CS-Networks [3i Infotech Placement]: Sample Questions 51 - 52 of 90

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 51

Networks
Edit

Describe in Detail

Essay▾

What is wide-mouth frog?

Explanation

  • The simplest known key distribution centre authentication protocol.
  • A key distribution centre is part of a cryptosystem intended to reduce risks in exchanging keys.
  • Allows individuals communicating over a network to prove identity to each other preventing reply attack.
  • Provides detection of modification.
  • Prevention of unauthorized reading.
  • First described under the name “The Wide-mouthed-frog Protocol” in the paper “A Logic of Authentication” .
  • The protocol can be specified as follows in security protocol notation.
  • Security protocol notation:

  • The protocol has several problems:
  • Requires a global clock.
  • The server has access to all keys- single point of failure and attack
  • The value of the shared key between “A” and “B” is completely determined by “A” - an attacker can pretend to be “A”
  • Can replay messages within period when timestamp is valid.
  • “A” is not assured that “B” exists.
  • Protocol is stateful.

Question 52

Networks
Edit

Describe in Detail

Essay▾

Define network management.

Explanation

Network Management Principles
  • A set of hardware and software tools allowing IT professionals to remotely supervise individual components of a network.
  • Communication and information is open and available, usually on an intranet or internet system.

Network management system components assist with:

  • Network device discovery:
    • Identifying what devices are present on a network.
  • Network device monitoring:
    • Monitoring devices to determine the health of network components and assuring that performance matches capacity plans.
  • Network performance analysis:
    • Tracking performance indicators such as bandwidth utilization, packet loss, latency, availability and uptime of routers.
  • Intelligent notifications:
    • Configurable alerts responding to specific network scenarios by paging, emailing, calling or texting a network administrator.

Developed by: