VUsolutions Transferred to AchiKhasi.com

From December 2011, this blog www.VUsolutions.blogspot.com is transferred to http://achikhasi.com/vu/ . So, you may visit http://achikhasi.com/vu/ for latest study related help.

Back to home VUsolutions

VUsolutions Fans Club [join us for MORE solutions]

VUsolutions on Facebook

Eng201 Assignment No. 3

Thursday, December 30, 2010 Posted In Edit This
Some hints by some one


Q1 (Answer)

Feasibility report including these headings, you can explain by yourself just focus on headings.

1- Title (where you show subject, and your name)

2- contents

3- Introduction

(now start the report)

date

your name

4- Criteria

5- Method of obtaining facts

4- Overview of alternatives

5- Evaluation

6- Conclusions

7- Recommendations

(you just make a story after read the Q1, and write here)

Q-2

To answer the reader typical questions about empirical research report, writer use a substructure that has the following elements.

1- Introduction (Why is your research important to us)

2- Objectives of research(What were you trying to find out)

3- Methods Results(Was your research method sound

4- Discussion(What results did your research produce)

5- Conclusions(How do you interpet your research)

6- Recommendation(What do you think we should do)

SOC101 Assignment No. 2 Announcement

Thursday, December 30, 2010 Posted In Edit This
Semester "Fall 2010"
"Introduction to Sociology (SOC101)"
Assignment No. 02 Marks: 20


Schedule
Opening Date and Time December 30, 2010 At 12:01 A.M. (Mid-Night)
Due Date and Time January 10, 2011 At 11:59 P.M. (Mid-Night)

Institution of family

Purpose of Assignment:
The purpose of giving you this assignment:
• To present the problem to be researched and its importance.
• To enhance your practical learning of the subject.
• To suggest that how the data will be gathered, treated and interpreted.
• You are required to choose a Family of your choice to complete your Assignment.

1. Select a family (joint or extended)

Instructions:Things to consider when choosing a family to prepare your report:
• Mention the name of family you have visited.
• Choose a family which is in your access.
• Analyze your information keeping in mind its relevance with sociology and use sociological terms while interpreting the data.
• Avoid selecting any family that you cannot easily gather information on.
• In general, you must discuss your assignment related problems through email at SOC101@vu.edu.pk.
2. Conduct basic factual research on the family.

Focus on the following while conducting the research:
You should conduct qualitative research (collect data) on the following
• Type of family (brief explanation)
• Interaction patterns of family
• Marriage practices followed by specific family
• Primary and secondary ***** affiliations
• Ways of communication
• Cultural patterns
• Gender role socialization
• Social mobility of particular family

You can gather such information in many ways:
Contact the family directly or contact some reliable person to get information from family members. (Note: Be aware that family personnel are often busy and might not have time to answer all your questions. Be respectful of their time.)

GUIDELINES FOR REPORT WRITING
Write a brief report (that summarizes your experience and your assessment of the information.

The final documentation of report must consist of following chapters;

Title Page
Table of contents
Abstract: write a brief summary of your report writing into 200-250 words.
1) Introduction
In this part, a brief and comprehensive introduction to the topic under study is
given. It includes the background of your study.
2) General findings of the study
3) Analysis of results
4) conclusions
5) Appendices/References

Marking details:Introduction of the family = 03 marks
General findings of the study = 05 marks
Analysis & Interpretation = 05 marks
Conclusion = 05 marks
Referencing =02 marks

Important TipsThis Assignment can be best attempted from the knowledge acquired after watching video lecture no. 01 to lecture no 30 and reading handouts as well as recommended text books.

Schedule
Opening Date and Time December 30, 2010 At 12:01 A.M. (Mid-Night)
Due Date and Time January 10, 2011 At 11:59 P.M. (Mid-Night)

Note: Only in the case of Assignment, 24 Hrs extra / grace period after the above mentioned due date is usually available to overcome uploading difficulties which may be faced by the students on last date. This extra time
should only be used to meet the emergencies and above mentioned due dates should always be treated as final to avoid any inconvenience.

Important Instructions:Please read the following instructions carefully before attempting the assignment solution.

Deadline:
• Make sure that you upload the solution file before the due date. No assignment will be accepted through e-mail once the solution has been uploaded by the instructor.

Formatting guidelines:
• Use the font style "Times New Roman" and font size "12".
• It is advised to compose your document in MS-Word 2003.
• Use black and blue font colors only.
• Assignment must not be more than 10 pages.

Solution guidelines:• Use APA style for referencing and citation. For guidance search "APA reference style" in Google and read various website containing information for better understanding or visit http://linguistics.byu.edu/faculty/henr ... APA01.html
• Every student will work individually and has to write in the form of an analytical assignment.
• Give the answer according to question, there will be negative marking for irrelevant material.
• For acquiring the relevant knowledge don't rely only on handouts but listen the audio lectures and use other reference books also.
• Remember don't try to copy from handouts or website; otherwise you will get absolutely 0 marks

Rules for Marking
Please note that your assignment will not be graded or graded as Zero (0) if:
• It has been submitted after due date
• The file you uploaded does not open or is corrupt
• It is in any format other than .doc (MS. Word)
• It is cheated or copied from other students, internet or books.

CS610 - Computer Network Assignment No. 3 Solution

Thursday, December 30, 2010 Posted In Edit This
Assignment Statements:

a). Summarize the difference between classful IP address and classless IP address in tabular format.
(Your answer should not increase more than one page)
(10 marks)

b.) Show your IP address by using DOS command "ipconfig" and answer the following. (2 x 5 marks)
(i) Show your IP address and subnet mask
(ii) Convert the IP address and Subnet mask into binary representation.
(iii) What is the class of your IP address in classful scheme and why?
(iv) Find your host number and network number in classful and classless scheme, also gives the reason to your answers.
(v) Given the address 23.56.7.91, find the beginning address i.e. network address

.................
Classful Vs Classless Address



Image
Classful addressing:In the classful addressing system all the IP addresses that are available are divided into the five classes A,B,C,D and E, in which class A,B and C address are frequently used because class D is for Multicast and is rarely used and class E is reserved and is not currently used.Each of the IP address belongs to a particular class that's why they are classful addresses.Earlier this addressing system did not have any name,but when classless addressing system came into existence then it is named as Classful addressing system.The main disadvantage of classful addressing is that it limited the flexibility and number of addresses that can be assigned to any device.One of the major disadvantage of classful addressing is that it does not send subnet information but it will send the complete network address. The router will supply its own subnet mask based on its locally configured subnets. As long as you have the same subnet mask and the network is contiguous, you can use subnets of a classful network address.
Image
Classless Addressing:Classless addressing system is also known as CIDR(Classless Inter-Domain Routing).Classless addressing is a way to allocate and specify the Internet addresses used in inter-domain routing more flexibly than with the original system of Internet Protocol (IP) address classes.What happened in classful addressing is that if any company needs more than 254 host machines but far fewer than the 65,533 host addresses then the only option for the company is to take the class B address.Now suppose company needs only 1000 IP addresses for its host computers then in this (65533-1000=64533) IP addresses get wasted.For this reason, the Internet was, until the arrival of CIDR, running out of address space much more quickly than necessary. CIDR effectively solved the problem by providing a new and more flexible way to specify network addresses in routers.A CIDR network address looks like this:

192.30.250.00/15

The "192.30.250.00" is the network address itself and the "15" says that the first 15 bits are the network part of the address, leaving the last 17 bits for specific host addresses.One more advantage of classless addressing is that classless protocol sends subnet information. This allows you to create discontiguous networks with any given classful network address.
...................
(i) Show your IP address and subnet mask

To use the ipconfig utility, go to the Start button. Select Run.

Image
Enter command into the Open box and click OK. This will open the MS-DOS (Command) Prompt window.
C:\WINDOWS\Desktop>
Enter ipconfig and press Enter. You should see something similar to the output below. 

Example: Dialup Connection (Windows XP)
C:\WINDOWS\Desktop>ipconfig 


Windows IP Configuration 

Ethernet adapter Local Area Connection: 

Connection-specific DNS Suffix . : expedient.net 
IP Address. . . . . . . . . . . . : 216.151.124.X 
Subnet Mask . . . . . . . . . . . : 255.255.255.0 
Default Gateway . . . . . . . . . : 216.151.124.1 

PPP adapter Dialup Stargate: 

Connection-specific DNS Suffix . : 
IP Address. . . . . . . . . . . . : 209.166.149.121 
Subnet Mask . . . . . . . . . . . : 255.255.255.255 
Default Gateway . . . . . . . . . : 209.166.149.121
..............

Given the address 23.56.7.91, find the beginning address i.e. network address

Solution

The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is 23.0.0.0.

Fin622 Online Quiz No. 3 Announcement

Thursday, December 30, 2010 Posted In Edit This
Quiz No.3
Dated: Dec 30, 10

On-Line Quiz (No.03) Announcement Quiz will cover video lecture no. 01 to 28


Schedule
Opening Date and Time:     January 04, 2011 At 12:01 AM (Mid-Night)
Closing Date and Time:       January 06, 2011 At 11:59 PM (Mid-Night)

The Quiz will remain open for "72 Hours" 24 hours extra time is not available

Fin621 Online Quiz No. 3 Announcement

Thursday, December 30, 2010 Posted In Edit This
Quiz # 3

Dated: Dec 30, 10

On-Line Quiz (No.03) Announcement Quiz will cover video lecture no. 01 to 28

Schedule
Opening Date and Time:       January 04, 2011 At 12:01 AM (Mid-Night)
Closing Date and Time:         January 06, 2011 At 11:59 PM (Mid-Night)

The Quiz will remain open for "72 Hours" 24 hours extra time is not available

IT430 Assignment No. 2 Solution

Thursday, December 30, 2010 Posted In Edit This

Assignment # 2

All the students of IT430 are directed to download the 2nd assignment. Due date for submission is Monday 03 January, 2011. No assignment after due date will be accepted.

Note: Send email at it430@vu.edu.pk for any assignment related problem
...............
Question: (10)

What are the steps involved in symmetric cryptography? Also explain key management in conventional cryptography using some example.

Note: Submit .doc files only. Send email at it430@vu.edu.pk for any assignment related query. 

Your work must be original. If you have to search the topic from internet then write it in your own words. No marks will be given in case of cheating or copying from the internet or from any other student.

Deadline:
Your assignment must be uploaded/submitted on or before 3rd January 2011.

SOLUTION:


Symmetric Cryptography 


With symmetric cryptography, both the sender and recipient share a key that is used to perform both encryption and decryption. Symmetric cryptography is commonly used to perform encryption. It also provides data integrity when symmetric keys are used in conjunction with other algorithms to create Message Authentication Codes (MACs). For more information about MACs, see Data Origin Authentication in Chapter 2, "Message Protection Patterns." 


Figure 1 illustrates the process of encrypting and decrypting data with a shared secret key.
Image
Figure 1. The process of symmetric encryption 


As illustrated in Figure 1, symmetric encryption involves the following steps: 
The sender creates a ciphertext message by encrypting the plaintext message with a symmetric encryption algorithm and a shared key. 
The sender sends the ciphertext message to the recipient. 
..............
Key Management and Conventional Encryption
Conventional encryption has benefits. It is very fast. It is especially useful for encrypting data that is not going anywhere. However, conventional encryption alone as a means for transmitting secure data can be quite expensive simply due to the difficulty of secure key distribution. The expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks (or small children with secret decoder rings). 


Recall a character from your favorite spy movie: the person with a locked briefcase handcuffed to his or her wrist. What is in the briefcase, anyway? It's probably not the missile launch code/ biotoxin formula/ invasion plan itself. It's the key that will decrypt the secret data. 


For a sender and recipient to communicate securely using conventional encryption, they must agree upon a key and keep it secret between themselves. If they are in different physical locations, they must trust a courier, the Bat Phone, or some other secure communication medium to prevent the disclosure of the secret key during transmission. Anyone who overhears or intercepts the key in transit can later read, modify, and forge all information encrypted or authenticated with that key. The persistent problem with conventional encryption is key distribution: how do you get the key to the recipient without someone intercepting it? 


And the minor problem with it is the storage of keys: when you want to communicate with a lot of people and you have one key for each partner, how do you manage so many keys?


Some Examples of Conventional Cryptosystems


Captain Midnight's Secret Decoder Ring (which you may have owned when you were a kid)


Julius Caesar's cipher


DES, Data Encryption Standard
The recipient decrypts the ciphertext message back into plaintext with a shared key. 


Numerous symmetric algorithms are currently in use. Some of the more common algorithms include Rijndael (AES) and Triple DES (3DES). These algorithms are designed to perform efficiently on common hardware architectures. 


Symmetric cryptography is comparatively simple in nature, because the secret key that is used for both encryption and decryption is shared between the sender and the recipient. However, before communication can occur, the sender and the recipient must exchange a shared secret key. In some cases (such as SSL), asymmetric cryptography can be used to ensure that the initial key exchange occurs over a secure channel.
..........
A:
Answer
1) Symmetric Cryptography
When one party wishes to communicate secured data with another and they both share
the same key for encrypting and decrypting the data, the process is known as symmetric
Cryptography.
The shared key is referred to as a symmetric key.
Because the same key is used to encrypt and decrypt the data with symmetric
cryptography, the decryption process is essentially a reversal of the encryption process.
STEPS INVOLVED IN SYMMETRIC CRYPTOGRAPHY:
Symmetric encryption involves the following steps:
1. The sender creates an encoded text message by encrypting the plaintext message
with a symmetric encryption algorithm and a shared key.
2. The sender sends the encoded text message to the recipient.
3. The recipient decrypts the encoded text message back into plaintext with a shared
key.
2) Conventional cryptography
In conventional cryptography, (also called secret-key or symmetric-key encryption),
one key is used both for encryption and decryption.

Key management in conventional cryptography:

Conventional encryption is very fast. It is especially useful for encrypting data that is not going anywhere. However, conventional encryption alone as a means for transmitting secure data can be
quite expensive simply due to the difficulty of secure key distribution.
The expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks.
EXAMPLES:
Following are the examples of key management in conventional cryptography
1-The Data Encryption Standard (DES): is an example of a conventional crypto system that is widely employed by the Federal
Government.

2-Captain Midnight's Secret Decoder Ring: (which
is an "encoder" ring as well) is also an example of conventional
cryptography which allows you to do a simple substitution encryption. It
usually has two concentric wheels of letters, A through Z.

3-Julius Caesar's cipher : The Caesar cipher is named for Julius Caesar who used an alphabet with a left shift of three is also an example of conventional cryptography.

..............
Following all are the examples of 2nd part IT assignment:
1- 3-Way
2- CMEA
3- DES
4- FEAL
5- GOST
6- LOKI
7- Lucifer
8- MMB
9- REDOC
10- Safer

..........
What are the steps involved in symmetric cryptography? Also explain key management in conventional cryptography using some example.

Answer
1) Symmetric Cryptography
When one party wishes to communicate secured data with another and they both share
the same key for encrypting and decrypting the data, the process is known as symmetric
Cryptography.
The shared key is referred to as a symmetric key.
Because the same key is used to encrypt and decrypt the data with symmetric
cryptography, the decryption process is essentially a reversal of the encryption process.
STEPS INVOLVED IN SYMMETRIC CRYPTOGRAPHY:
Symmetric encryption involves the following steps:
1. The sender creates an encoded text message by encrypting the plaintext message
with a symmetric encryption algorithm and a shared key.
2. The sender sends the encoded text message to the recipient.
3. The recipient decrypts the encoded text message back into plaintext with a shared
key.
2) Conventional cryptography
In conventional cryptography, (also called secret-key or symmetric-key encryption),
one key is used both for encryption and decryption.

Key management in conventional cryptography:

Conventional encryption is very fast. It is especially useful for encrypting data that is not going anywhere. However, conventional encryption alone as a means for transmitting secure data can be quite expensive simply due to the difficulty of secure key distribution.
The expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks.
EXAMPLES:
Following are the examples of key management in conventional cryptography
1-The Data Encryption Standard (DES): is an example of a conventional crypto system that is widely employed by the Federal Government.

2-Captain Midnight's Secret Decoder Ring: (which is an "encoder" ring as well) is also an example of conventional cryptography which allows you to do a simple substitution encryption. It usually has two concentric wheels of letters, A through Z.

3-Julius Caesar's cipher : The Caesar cipher is named for Julius Caesar who used an alphabet with a left shift of three is also an example of conventional cryptography.

Back to home VUsolutions

Shaadi.com: Just create ur account & find ur partner or EARN money, its reall & EASY

VUsolutions Followers (Join NOW and Get Extra Benefits)

Install LATEST toolbar having lot of features - GET solutions on Desktop

toolbar powered by Conduit
Caliplus 300x250 NoFlam VitoLiv 468x60 GlucoLo