Sign in to follow this  
Followers 0

Prüfungsfragen 28.06.2010

4 posts in this topic

Posted

Hola Chicos!

So, nachdem aktuelle Infos in diesem Forum momentan Mangelware sind, gibts hier von mir mal die Fragen von der heutigen Prüfung:

  1. What is the difference between Ring-Nodes and Line Nodes?
  2. What is the main task for distributed operating systems?
  3. Give three dimensions of Scalability.
  4. What is the difference between Protocol-Conformancy and Interoperability?
  5. 3 drivers for Smart Power Grids. (SPG)
  6. Describe the basic principe of Dijsky-Algo.
  7. What does a LONWorks Node do?
  8. Why 3 CPUs in LONNodes? What do they do?
  9. What are the differences between HW- and SW-Clock synchronisation according to IEEE1588?
  10. What is a DoS-Attack?
  11. Wie kommt IT beim E-Car zum tragen?
  12. Name and describe 2 types of passive attacks.
  13. List three facts that influence high accuracy clock sync.
  14. What is an active (power-) distribution grid?
  15. Why is bidirectional communication important for SPG? Describe two aspects.
  16. List three configuration-parameters of LON-Sensors.
  17. AODV vs. OSPF/IS-IS/OLSR (Vorteile, Nachteile, Wann-Was)
  18. List three components of microgrids
  19. List 5 categories of Secure Services.
  20. Describe the main aspects of SPG in one sentence.
  21. How does key-distribution work in hybrid cryptosystems?
  22. Describe pro-active routing. Which situation uses advantages of it?
  23. Why is telecommunication essential for load-based frequency control?
  24. Describe differences between LinkState- and DistanceVector-Routing.
  25. What does it mean if a routing algo is unconditionally malleable?

Gl für die Prüfung!

mlu

Share this post


Link to post
Share on other sites

Posted

Auch gut .. brauch ich sie nicht eintippen =).

Aber trotzdem danke im Namen aller die sich nicht bedanken ...

Share this post


Link to post
Share on other sites

Posted

Hat schon jemand was von einem Ergebnis gehört ?

Share this post


Link to post
Share on other sites

Posted

(Quasi)Neu (13.12.2010.):

What topology does KNX use?

Compare Dijkstra's and Bellman-Ford's algorithms.

Name two passive attacks and explain them.

Explain the differences between asymmetric and symmetric encryption.

Define distributed system.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0