This document provides a summary of an assignment for a computer networks course. It includes 6 questions related to computer networks topics like LANs, data transmission methods, OSI model, multiplexing techniques, ISDN, network storage solutions for an ISP, and cryptography. Students are asked to write short answers and explanations for each question, with the longest being approximately 400 words. Marks are allocated for each question, with the total marks for the assignment being 60.
Introduction to ArtificiaI Intelligence in Higher Education
Get Answers on Networking Concepts
1. Get Answers on www.smuHelp.comGetAnswersonwww.smuHelp.com
ASSIGNMENT
DRIVE SPRING DRIVE 2014
PROGRAM MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE &
NAME
MI0035- COMPUTER NETWORKS
BK ID B1481
CREDIT 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.No Questions Marks Total Marks
1 Write short notes on
a. LAN
b. Analog and digital data transmission
c. High level data link control
A a. LAN 2
10b. Analog and digital data transmission 3
c. High level data link control 5
2 Virtually all networks in use today are based in some fashion on the Open Systems
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of
seven layers that define the different stages that data must go through to travel from one device
to another over a network. Explain the seven layer architecture of OSI model with diagram
A Explaining the OSI reference model 8
10Diagram of OSI reference model 2
3 Consider yourself as the operation head in a telecommunication company. What are the
different types of multiplexing techniques will you implement to get efficient data
transmission process?
A Explaining various multiplexing techniques 10 10
4 Integrated Services for Digital Network (ISDN) is a set of communication standards for
simultaneous digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network. It was first defined in 1988 in the
CCITT red book. Explain the different types of ISDN with their features and advantages for
2. Get Answers on www.smuHelp.comGetAnswersonwww.smuHelp.com
each one of them.
A Explaining Two different types 2
10Features of both of them 4
Advantages of both of them 4
5 ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365
storage capacity, storage management and internet service to the customers. It now needs a
solution that will eliminate downtime. Downtime is nothing but the time during which a
computer or computer system is down, or inoperative due to hardware or software failure. We
also need the flexibility in quick response to both the development in customer base and
additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software provider to achieve
their goals by providing support for end to end redundancy and bondless scalability.
By creating a scalable storage network with the ability to confidentially deliver the 24X7X365
reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract
and retain customers and substantially build its business. As the same time, the solution has
effectively lowered ABC company’s total cost of ownership for its entire storage solution: the
IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The
complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting network
storage infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications
A a. Mentioning the problems faced by
ABC company after reading the SLM
2
10b. Listing the benefits 3
c. Listing the different classes of ISP and
their applications
5
6 Cryptography is the science of hiding information. The traditional security system employed a
different of encryption process known as symmetric cryptography, which involves the use of te
same method for both encryption and decryption. Explain the different networking algorithms
that are used for cryptography along with its subtypes.
A Explaining the two types of cryptography and the
networking algorithms used for them
10
10
*A-Answer