Language Bar

Monday, January 24, 2011

VU Notice

Published On:  Saturday, January 22, 2011
All VU students who are enrolled in Fall 2010 Semester and have not yet made their Final Term Exam date sheet are encouraged to appear in the Fall 2010 Final Term Examination by sending an explicit request at datesheet@vu.edu.pk on or before 27th January 2011.

Upon receipt of their email request on or before Jan 27, 2011 their exam date sheet will be designed by Examination Department according to the availability of seats/slots/exam centers. For this Rs.500/= will be charged as Late Exam Date Sheet Fee payable by the students in their forthcoming issued fee challan form.

VU Notice


Published On:  Tuesday, January 18, 2011


The intended participants may send their “ESSAYS” to the undersigned by February 28, 2011.
 Director Kashmir Committee,
Mr.Sultan Ahmad,
Room # 427, 4th floor, Parliament House,
Islamabad.
Tel: 051-9201972, 9022454

VU Notice


Published On:  Monday, January 17, 2011
Important Instructions: Fall 2010 Final Term Examinations
1.      For every paper, you must carry your VU Id Card and “Exam Entrance Slip” for entering the Examination Hall.
2.      You shall be responsible for any loss of examination time for not having these documents.
3.      You shall report at the Exam Center 15 minutes before the starting time of your paper.
4.      You shall not be allowed to carry a mobile phone (even in offline mode) in the Examination Hall.
5.      You must not carry any type of helping material (Hard/Soft) in the Examination Hall.
6.      You must avoid disturbing the peace in and around the Examination Hall.
7.      Strict disciplinary action such as cancellation of the paper(s) and registration of umc etc shall be taken against the violators 
NOTE: Students entry in the examination hall will be banned 15 minutes after the start of paper.


     

VU Notice

Published On:  Friday, January 14, 2011
As announced earlier, the web interface for making your date sheet is being placed on the following link:http://datesheet.vu.edu.pk/ 
Note: You MUST make your date sheet on or before:  Friday, January 21, 2011. Seats will be available on a 'first come first served' basis.

INSTRUCTIONS
  1. Logon using your VULMS ID and Password (In case of any password related problem contact at password@vu.edu.pk)
  2. Choose Your Exam City in which you want to appear for Exam (optional)
  3. Choose your Exam Center out of the centers available to you(Once selected, you can not change your Exam Center)
  4. Select available exam date and start time of your own choice for each of your courses, then click “Confirm” button to confirm your selection.
  5. Repeat the Step-4 for all your remaining courses one by one.
  6. Finally click the button at the bottom of the page to get Examination Password and print your Examination Slip which you MUST keep with you for entry in Examination Center on each of the Exam Dates.

VU Notice

Published On:  Friday, December 24, 2010
VU has launched a new segment on its television channel, "Lecture on Demand". Now you can select and watch the lectures of your choice. To avail the opportunity, simply vote via email at lod@vu.edu.pk or sms to the number 0333-4881304 and demand any lecture from the preceding week. The details of the lectures will be available on your TV screens on the LOD bars.  Right after the countdown ends the most voted lecture will be telecast. This exclusive lecture broadcast is available on VTV1 on Saturdays at 12:00 noon, 3:00 pm and 6:00 pm starting from the 1st of January, 2011. Do not miss this unique opportunity and access the resource of knowledge the way you want it. 


        

VU Notice


Published On:  Thursday, December 02, 2010
Announcement: As per Higher Education Commission (HEC), Islamabad “PARENTS ALERT!” message dated November 28, 2010 published in National Newspapers, reproduced as under. Virtual University of Pakistan encourages all its enrolled (upto spring 2010) 2-year MBA students to complete their studies at the earliest.

VU Notice

Published On:  Tuesday, November 30, 2010
 VU EXAM SOFTWARE FOR WINDOWS-7 64 BIT VERSION

All overseas students who are facing difficulties in installation of VU Exam Software on 64 bit windows platform are advised to download and install the relevant version of VU Exam Software from the following link:



A step by step guide for installation of exam software is also provided.


     

VU Notice


Published On:  Friday, November 26, 2010
Dear Students,

Your Student ID and password gives you access to your LMS and VU email accounts. If someone else obtains your password which is your personal digital key, he/she can use your account to access your private data, including your personal profile, emails, assignments, MDB, GDB, Quizzes and can alter your secret information to retrieve forgotten password. Further more, he/she may perform illegal activities in your name and will remain undetected, unless you eventually change your password. You are advised to treat your password(s) as confidential information not to share with anybody.  Follow the guidelines below to protect your LMS and VU Email accounts from unauthorized access.

  • You are YOURSELF responsible for the security of your LMS and VU Email passwords and login credentials.
  • Do not share your passwords with anybody.
  • Make separate passwords for LMS and VU Email accounts respectively.
  • Do not use Remember Password feature of internet browser.
  • Change your LMS and VU Email passwords at least once a week and immediately whenever you feel someone might know your password.
  • Do not re-use your old passwords.
  • Passwords should not be based on personal information including name, birthday, address, phone number, etc.
  • Password should be at least 8 characters long, easier for you to remember but harder for someone else to guess. 
  • Password should be a non-dictionary word containing upper and lowercase letters, numbers and special characters.
Contact password@vu.edu.pk for further assistance.
VU IT Department

VU Notice

Published On:  Tuesday, September 28, 2010
The students are not allowed to deposit/handover their fee to the PVCs. If any student hands over fee to the PVC, the University will not be responsible for any claim of the student.

     

CS615 Assignment No 5 SOLUTION

Software Project Management
Assignment # 05
Fall 2010
                                                               Marks: 20
Due Date
Your assignment must be uploaded before or on 31st
 January 2011.

Uploading instructions:
Please view the Assignment Submission Process document provided to you by
the Virtual University for uploading assignments.
•  Assignment should be in .doc format.
•  Save your assignment with your ID (e.g. bx020200786.doc).
•  Assignment submission through email is highly discouraged.

Rules for Marking:
It should be clear that your assignment will not get any credit if:
•  The assignment is submitted after due date.
•  The submitted assignment file is corrupted.
•  The assignment is copied.
Note:
Your answer must follow the below given specifications. You will be assigned zero
marks if you do not follow these instructions.
•   Font style: “Times New Roman”
•   Font color: “Black”
•   Font size: “12”
•  Bold for heading only.
•  Font in Italic is not allowed at all.
•  No formatting or bullets are allowed to use.

Assignment:

Q. 01 How a change process carried out in a projects?  Also differentiate among its
different stages? [Your answer should be precise and to the point]

Q. 02 In table 1.0 given below indicates estimated inputs, outputs, inquiries, files
and external interfaces for software. The given table 1.1 indicates the values
from F1-F14 values?
Table 1.0:

 Optimistic Realistic Pessimistic Average
Complexity Factor
No. of Inputs 14 18 24 3
No. of Outputs 12 14 20 4
No. of Inquiries  12 16 22 3
No. of Files 5 5 6 8
No. of Interfaces 3 3 4 6

Table 1.1:

14 Question for
F1 to F14

Values
F1 5
F2 5
F3 4
F4 6
F5 3
F6 4
F7 0
F8 5
F9 6
F10 8
F11 8
F12 6
F13 5
F14 5
114 FF − = ∑  70


Calculate the No. of Function Point (FP),  if the organizational productivity for the
system of this type is 14 FP/month & labor rate is Rs. 6000/month then compute
Cost / FP, total estimated project cost and estimated effort in Person Month (PM).  



 ----------------------------------------------------------------------------------------------

Solution



Question No 1
How a change process carried out in a projects?  Also differentiate among its different stages?

Solution
In The transform Management method is the system used to begin, record, measure, endorse and decide project modify. Project changes are necessary when its judge necessary to change the scope, time or cost of one or more before standard project deliverables. Mainly change will influence the financial plan and timetable of the project. The use of the recognized change management process will be compulsory when any changes are revealed. Conclusion to analyze and result to carry on with changes will be made by the Client Manager and the Project Manager if they do not collision between scope budget and schedule. Changes which do impact forwarded to the Steering Committee for reconsider. The Steering Committee may make a decision that managerial Sponsor sanction and review is mandatory earlier than making a judgment.

There are different stages which areas under:

Identify (recognize and record documents what is required change)
Validate (confirm the change is applicable and need management)
Analyze (monitor the cost, efforts impact of change record timetable)
Control (come to a decision whether to perform the change)
Action (execute decision)
Close (confirm that action is complete)




Question No 2
In table 1.0 given below indicates estimated inputs, outputs, inquiries, files and external interfaces for software. The given table 1.1 indicates the values from F1-F14 values?

Solution

Sensibly if we divide our software application into parts it will always come to one or more of the 5 functionalities. A software application cannot be copied without using any one of the functionalities.
Once the TDI is determined we can put it in the formula below to get the VAF.
VAF = 0.65 + (0.01 * TDI)
Finally the Adjusted Function Points or Function Points are
FP = UFP * VAF
Now these FP's can be used to determine the Size of the Software, also can be used to quote the price of the software, get the time and effort required to complete the software.
Effort in Person Month = FP divided by no. of FP's per month
Schedule in Months = 70* 14/month
Optimal Schedule = 70 * 46^1/3 ~ 12 months
Optimal Team Size = 65 / 12 ~ 5 or 6 persons. 



CS610 Assignment 5 Solution

CS 610 Computer Networks
Assignment # 05
Fall 2010
Total Marks = 20
Deadline

Your assignment must be uploaded / submitted before or on January 31, 2011.

Upload Instructions
Please view the assignment submission process document provided to you by the
Virtual University.

Rules for Marking
Please note that your assignment will not be graded if:
It is submitted after due date
The file you uploaded does not open
The file you uploaded is copied from someone else or from internet
It is in some format other than .doc

Objective

The assignment has been designed to enable you develop the understanding about the transport protocols and network address translation.

Note: Material that is an exact copy from handouts or internet would be graded
zero marks. Your solution should consist of the material found through different sources and written in your own words.

Assignment Statements:

Q1. Differentiate between internet protocol and transport protocol with the help of examples.
                                                                                                    (10 Marks)

Q2. Describe the pros and cons of NAT?
                                                                                                    (10 Marks)



--------------------------------------------------------------------------------------------

SOLUTIONS




Q1. Differentiate between internet protocol and transport protocol with the help of examples. (10 Marks)



Helping Material:-



Internet Protocol
The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.

IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.

Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connection-oriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP.

The first major version of IP, now referred to as Internet Protocol Version 4 (IPv4) is the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6) is in active, growing deployment worldwide.
TRANSPORT PROTOCOLS
       


Q2. Describe the pros and cons of NAT?

 Network Address Translation or NAT is a technique that allows the translation of local network addresses or the internal IP addresses (used within an organization) into globally unique IP addresses that help identify an online resource in a unique manner over the Internet. The process is also referred to as Network Masquerading or the Native Address Translation. Network Address Translation allows multiple resources within an organization or connected to a local LAN to use a single IP address to access the Internet. The idea of Network Address Translation is very simple indeed. It essentially abstracts internal addressing from the global IP addressing used over the Internet. This abstraction allows helps the network resources to get over a shortage of the address space by mapping relatively few real IP addresses to the abundant local IP addresses created locally by the Proxy server for addressing purposes. It allows the use of different addresses over the local and global level and local sharing of IP addresses over the Internet.
An increasing usage of the Network Address Translation was a direct result of the limited address space offered by the erstwhile Internet protocols such as the IPv4 that carried the bulk of the Internet traffic. NAT became a popular mechanism to overcome the shortage of unique IP addresses for individual network resources over the Internet. The Network Address Translation protocol maps the internal addresses to the real IP addresses that are required for communication process over the Internet.

 
                         Types of NAT:

1.Full Cone NAT The term Full Cone NAT is also commonly referred known as one-to-one NAT. Full Cone NAT allows the mapping of various external (non local) address ports to the corresponding internal addresses ports in a symmetrical manner. 

2.Restricted Cone NAT This allows the local IP address and port number to be mapped to a particular external IP address and port number respectively. The relative mapping in the internand external domains is not disturbed in the Restricted Cone network address translation. 

3.Port restricted cone NAT As the name suggests, the Port restricted cone NAT restricts the portnumbers that are used for communication purposes over the Internet. All the external communication is directed to particular communication port except if there is a continuous communication with an application over a specific communications port. 

4.Symmetric NAT The communication process directed outwards is mapped to a unique externaladdress along with a port number. This scheme imparts a logical symmetry to the process of external network access by the resources connected to the LAN.

In actual practice a pure NAT implementation is rarely used. Rather, a combination of the above
types is implemented to achieve the desired network configuration

 .          


       ------------------------------------------------------------------------------------------



Q1. Differentiate between internet protocol and transport protocol with the help of examples.

SOLUTION

TCP is also called or known as Transmission Control Protocol. It is main protocol of the Internet Protocol collection. Internet Protocol is also called IP. The Internet Protocol (IP) is the primary communications protocol used for transmit datagram which is packets. Accountable for steering packets across network limitations. The two major concern of TCP are the two end systems. First are web browser and second one is web server.
For example,
TCP give the release of a stream of bytes from a program from one computer to another computer. TCP is also responsible of controlling size, flow control, the rate of data exchange, and network traffic blocking.
The first major version of IP is as Internet Protocol Version 4 (IPv4). It is the leading protocol of the Internet and in the other side Internet Protocol Version 6 (IPv6) is in rising operations globally.

TCP offer communication services at a middle level among an application program and the IP. Its indicate that when an application program wants to send a large piece of data across the internet using the Internet Protocol in its place of breaking the data into sizes that will fit the IP and using a sequence of requests from the IP. The software is able to issuing a single request to TCP and allows to protocol handle the information of the IP transfer. TCP sense problems that occur in the IP Requests retransmission of the packets that were lost reorganize the order of the packets. Now they are put reverse into their appropriate order and help to reduce network.

·     TCP is main operating on a comparatively high level and IP work at a lower level.

·     TCP gives communication services at an intermediate level between an application program and the IP. IP encapsulates all data and is connectionless.

·     TCP is the protocol that major Internet applications rely on applications such as the WWW, email, and file transfer.
 


Q2. Describe the pros and cons of NAT?

SOLUTION

NAT or Network Address Translation is a method that permits the conversion of local network addresses or the private IP addresses used within an LAN into worldwide matchless IP addresses that help recognize an online resource in a unique manner on Internet. An upward usage of the NAT was limited address space offered by the previous Internet protocols such as the IPv4. NAT turn into a popular system to overcome the lack of unique IP addresses. The NAT protocols plot the private addresses to the valid IP addresses that are necessary for communication process over the Internet.

NAT Pros and Cons:
Network Address Translation does not allow a true end-to-end connectivity that is necessary by some real time applications. An amount of real-time applications require the formation of a logical tunnel to swap the data packets rapidly in real-time. It needs a fast and faultless connectivity of any mediators just like proxy server that inclined to make difficult and slow down the connections process.
NAT creates difficulties in the performance of Tunnelling protocols. Any communication that is routed through a Proxy server be likely to reasonably slow and prone to trouble. Positive significant applications offer no space for such shortfall.
Examples telemedicine, teleconferencing. Like this applications find the process of network address translation as a block in the communication network creating preventable twist in the end-to-end connectivity.
NAT do something like out of work channel in the online communication over the Internet. The two causes for the extensive fame and following acceptance of the network address translation process were a lack of IPv4 address space and the safety fear. These concerns have been fully satisfied in the IPv6 protocol. In the IPv6 gradually substitute the IPv4 protocol. The NAT process will turn into out of work and worthless even as consuming the limited network resources for providing services that will be no longer required over the IPv6 networks


                         
             

STA630 GDB 2 Solution

Due date Jan 26, 2011

"Briefly describe the situation where Coding of the responses can be done before the data collection and when coding is done after the data collection?”






Solution


* Data collection is the systematic recording of information; data analysis involves working to uncover patterns and trends in data sets; data interpretation involves explaining those patterns and trends.
*

* Scientists interpret data based on their background knowledge and experience, thus different scientists can interpret the same data in different ways.
*

* By publishing their data and the techniques they used to analyze and interpret that data, scientists give the community the opportunity to both review the data and use it in future research.


CS507 Assignment 4 Solution


QUESTION NO 1
What are the challenges faced by WAFs (Web Application Firewalls) in order to secure the web applications? Write only five challenges.

Solution:

The five challenges faced by WAFs (Web Application Firewalls) in order to secure the web applications are under below.

  1.  Application firewall needs to be able to apply exact, focused mitigation rules needs to be able to handle potentially thousands of such rules and needs to rapidly authenticate mitigation and report the full process.
  2. Automatic expose recognition alone cannot effectively recognize concerns with convention applications or exclusive business reason.
  3. The entire solution involves both vulnerability recognition and application firewalls. Evaluation needs to recognize rapidly confirmed vulnerabilities, extremely low false optimistic ratio.
  4. Vulnerability scanners alone cannot give web application safety measures. They can only give you insight into the specific concerns you have to fix.
  5. Application firewalls alone cannot offer web application defense. They cannot give guarantee that you have blocked all vulnerabilities or that no vulnerabilities exist. Manual configuration takes important amounts of time and need competent security analyst to do properly. 

         

MGT613 GDB Solution

Due date Monday, January 24, 2011

ABC Company deals in manufacturing Air Conditioners. For manufacturing purpose the company uses 824 compressors annually. Ordering costs are $14, carrying costs are $6 per compressor a year. According to price schedule orders less than 50 compressors will cost $15 per compressor, 50 to 79 compressors will cost $13 per compressor, 80 to 99 compressors will cost $11 per compressor and lager orders will cost $10 per compressor.

Determine the optimal order quantity and describe in which price range it will fall. Based on that price range also determine the total cost.





Solution
Given data

D=demand =824 annually
S=ordering cost =14 per compressor
H=carrying cost =6 per compressor


Range Price
1 – to - 49 RS 15
50 - to - 79 RS 13
80 - to - 99 RS 11
100 or more Rs 10

EOQ= under root (2DS/H)
EOQ=under root 23072 / 6
EOQ= under root 3845
EOQ= 62
TOTAL COST
TC= carrying cost + order cost +purchase cost
TC= 11084.06

CONTACT US FORM