You can pay in 6 installment of
Rs 125-125 if u have any doubt.
computeroperator4@gmail.com
www.smuassignment.in
www.assignmenthelpforall.blogspot.in
DRIVE-
WINTER DRIVE 2013
PROGRAM/SEMESTER
-MBADS (SEM 3/SEM 5)
MBAFLEX/
MBAN2 (SEM 3)
PGDISMN
(SEM 1)
SUBJECT
CODE & NAME
MI0035-
COMPUTER NETWORKS
BK
ID -B1481
CREDIT-
4
MARKS-
60
Q.1.
Write short notes on: 2, 3, 5
a.
LAN
b.
Analog and digital data transmission
c.
High level data link control
ANS:
a)
Local
Area Network (LAN)
Local Area Network (LAN) is a
small computer network, in which two or more computers are directly
connected within a single building or office. It is a small privately
owned network, covering a distance of up to 10km that helps to connect
personal computers or workstations to share information and resources.
LANs use transmission cables to connect the computing devices with the help
of physical media. LANs consist of two broadcast networks namely Bus topology
and Ring topology. In ring topology the computers and other network
devices are connected to each other in the form of a ring or a circle. In
a bus topology all the computers and other network devices are connected
in a straight line and single communication line. You will get a detail
explanation on these topologies in unit 8: Network
Q.2.
Virtually all networks in use today are based in some fashion on the Open
Systems Interconnection (OSI) standard. The core of this standard is the OSI
Reference Model, a set of seven layers that define the different stages that
data must go through to travel from one device to another over a network.
Explain the seven layer architecture of OSI model with diagram. (Explaining the
OSI reference model, Diagram of OSI reference model) 8, 2
ANS:
OSI Reference Model with diagram
Communication between two devices
was done by a dedicated copper wire or radio link. As the networking of
computers developed though the concept of wireless network, there arose number
of questions pertaining to data transfer and security. A set of protocols
were created to answer those questions. However, working on those
questions to find appropriate answers was unmanageable. In 1977, the
International Organisation for standardisation
Q.3.
Consider yourself as the operation head in a telecommunication company. What
are the different types of multiplexing techniques will you implement to get
efficient data transmission process? (Explaining various multiplexing
techniques) 10
ANS:
Multiplexing
Multiplexing is the process of
sending several different signals or streams of information through a
single carrier. Transmission of these signals takes place at the same
time by combining several signals into one complex signal then
separating these signals at the receiving end. An electronic device that
performs multiplexing is known as multiplexer (MUX). Multiplexing is
applicable in telephony services. Optical network also uses multiplexing
technique for voice and video transmission, which uses same however
separate wavelengths from source to destination. Multiplexing is an effective
tool that helps in every form of communication ranging from
Q.4.
Integrated Services for Digital Network (ISDN) is a set of communication
standards for
Simultaneous
digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network. It was first
defined in 1988 in the CCITT red book. Explain the different types of ISDN with
their features and advantages for each one of them. (Explaining Two different
types , Features of both of them , Advantages of both of them) 2,4,4
ANS:
ISDN channels
The term ISDN channel means the
passage or transmission of signalling and user information in a single
direction. The three basic ISDN channels are Data channel (D channel),
Bearer channel (B channel), and Hybrid channel (H channel).
Q.5.
ABC company is an internet service provider. The main goal of ABC is to provide
24 X7X365 storage capacity, storage management and internet service to the
customers. It now needs a solution that will eliminate downtime. Downtime is
nothing but the time during which a computer or computer system is down, or
inoperative due to hardware or software failure. We also need the flexibility
in quick response to both the development in customer base and additional
capacity and service demands of the customers. ABC company took the help of
network storage infrastructure software provider to achieve their goals by
providing support for end to end redundancy and bondless scalability. By
creating a scalable storage network with the ability to confidentially deliver
the 24X7X365 reliability, and speed that outsourcing customers demand, it has
enabled the ISP/SSP to attract and retain customers and substantially build its
business. As the same time, the solution has effectively lowered ABC company’s
total cost of ownership for its entire storage solution: the IP Stor/CNP union
has enabled a painless, flexible cost effective, scalable solution. The
complementary IP Stor/CNT solution has allowed to its customers easily and
cost- effectively. a. What were the problem which ABC Company was facing before
consulting network storage infrastructure software provider? b. What were the
benefits of implementing a scalable storage network? c. List the different
classes of ISPs and their applications. ( Mentioning the problems faced by ABC
company after reading the SLM, Listing the benefits, Listing the different
classes of ISP and their applications) 2,3,5
ANS:
The
problems faced by ABC Company after reading the SLM
The important issue to address
while choosing connectivity solutions is, whether application servers are being
connected to storage or disparate networks are being interconnected. The key
factors to be considered are elimination of single points of failure, high
scalability, and ease of set up. The FalcoStor’s IP Stor software solution, a
leading network storage infrastructure software provider, helped ABC Company to
achieve their goal by providing support for End-to-End redundancy and bondless
scalability. The ISP/SSP found its high availability Fiber Channel SAN solution
in the synergy between FalcoStor’s highly scalable IP Stor software, which
supports end-to-end redundancy,
Q.6.
Cryptography is the science of hiding information. The traditional security
system employed a different of encryption process known as symmetric
cryptography, which involves the use of the same method for both encryption and
decryption. Explain the different networking algorithms that are used for
cryptography along with its subtypes. (Explaining the two types of cryptography
and the networking algorithms used for them) 10
ANS:
Cryptography
Cryptography is derived from the
Greek word “Kryptos”, meaning hidden. Cryptography is the science of
hiding information. The main issue in using internet applications is
maintenance of data and security. The process of cryptography employs an
algorithm which in turn uses a numerical value to modify data, making
that data secure and accessible only to those who have been assign the
authority to handle it. Accordingly, the term maintenance of data and
security refers to the secure administration of data, which is provided
to its actual recipient. The traditional
No comments:
Post a Comment