MI0035- COMPUTER NETWORKS


Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )


ASSIGNMENT

DRIVE
WINTER 2014
PROGRAM
PROGRAM/SEMESTER -MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3) PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0035- COMPUTER NETWORKS
SEMESTER
3
BK ID
BK ID -B1481
CREDITS
4
MARKS
60


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.


Q.1. Write short notes on:
a. LAN
b. Analog and digital data transmission
c. High level data link control

Ans : a)   Local Area Network (LAN):

These types of computer networks connect network devices over a relatively short distance. Quite often, a networked office building, home or school contains a single LAN although it is normal to come across a building that



b. Analog and digital data transmission :

Analog data transmission:

Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable


c. High level data link control:

High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO). The original ISO standards for HDLC are:
ISO 3309 – Frame Structure


Q.2. Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. Explain the seven layer architecture of OSI model with diagram.

Ans: OSI reference model :

The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.


Q.3. Consider yourself as the operation head in a telecommunication company. What are the different types of multiplexing techniques will you implement to get efficient data transmission process?

Ans: Multiplexing is a technology to transfer digital or analog data in daily use devices like telephone and television. Here, we discuss the various multiplexing technologies used for data transmission.
Multiplexing is a method of combining multiple analog massage signals or digital data streams into one signal. The objective of this technology is to share an expensive medium for transmitting multiple signals. Actually, the low-level communication signals are divided into high-level logical channels using this technology. Furthermore, each channel is then used for transmitting one message signal or data stream.


Q.4. Integrated Services for Digital Network (ISDN) is a set of communication standards for
Simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book. Explain the different types of ISDN with their features and advantages for each one of them. (Explaining Two different types , Features of both of them , Advantages of both of them) 2,4,4

ANS: Different types of ISDN :

Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the line, and used as needed. That means an ISDN line can take care of most people's complete communications needs (apart from broadband


Q.5. ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 storage capacity, storage management and internet service to the customers. It now needs a solution that will eliminate downtime. Downtime is nothing but the time during which a computer or computer system is down, or inoperative due to hardware or software failure. We also need the flexibility in quick response to both the development in customer base and additional capacity and service demands of the customers. ABC company took the help of network storage infrastructure software provider to achieve their goals by providing support for end to end redundancy and bondless scalability. By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract and retain customers and substantially build its business. As the same time, the solution has effectively lowered ABC company’s total cost of ownership for its entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively. a. What were the problem which ABC Company was facing before consulting network storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications.

Ans : The problems faced by ABC Company after reading the SLM

The important issue to address while choosing connectivity solutions is, whether application servers are being connected to storage or disparate networks are being interconnected. The key factors to be considered are elimination of single points of failure, high scalability, and ease of set up. The FalcoStor’s IP Stor software solution, a leading network storage infrastructure software provider, helped ABC Company to achieve their goal by providing support for End-to-End redundancy and bondless scalability. The ISP/SSP found its high


Q.6. Cryptography is the science of hiding information. The traditional security system employed a different of encryption process known as symmetric cryptography, which involves the use of the same method for both encryption and decryption. Explain the different networking algorithms that are used for cryptography along with its subtypes. (Explaining the two types of cryptography and the networking algorithms used for them)

Ans: Cryptography

Cryptography is derived from the Greek word “Kryptos”, meaning hidden. Cryptography is the science of hiding information. The main issue in using internet applications is maintenance of data and security. The process of cryptography employs an algorithm which in turn uses a numerical value to modify data, making that data secure and accessible only to those who have been assign the authority to handle it.

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )

No comments:

Post a Comment

Note: only a member of this blog may post a comment.