SlideShare a Scribd company logo
1 of 3
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
ASSIGNMENT
DRIVE
PROGRAM
SUBJECT CODE & NAME
SEMESTER
BK ID
CREDITS
MARKS

WINTER 2014
PROGRAM/SEMESTER -MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3) PGDISMN (SEM 1)
MI0035- COMPUTER NETWORKS
3
BK ID -B1481
4
60

Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.

Q.1. Write short notes on:
a. LAN
b. Analog and digital data transmission
c. High level data link control
Ans : a) Local Area Network (LAN):
These types of computer networks connect network devices over a relatively short distance. Quite
often, a networked office building, home or school contains a single LAN although it is normal to
come across a building that

b. Analog and digital data transmission :
Analog data transmission:
Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal
or video information using a continuous signal which varies in amplitude, phase, or some other
property in proportion to that of a variable

c. High level data link control:
High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer
protocol developed by the International Organization for Standardization (ISO). The original ISO
standards for HDLC are:
ISO 3309 – Frame Structure

Q.2. Virtually all networks in use today are based in some fashion on the Open Systems
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of
seven layers that define the different stages that data must go through to travel from one device
to another over a network. Explain the seven layer architecture of OSI model with diagram.
Ans: OSI reference model :
The OSI, or Open System Interconnection, model defines a networking framework to implement
protocols in seven layers. Control is passed from one layer to the next, starting at the application
layer in one station, and proceeding to the bottom layer, over the channel to the next station and
back up the hierarchy.

Q.3. Consider yourself as the operation head in a telecommunication company. What are the
different types of multiplexing techniques will you implement to get efficient data transmission
process?
Ans: Multiplexing is a technology to transfer digital or analog data in daily use devices like telephone
and television. Here, we discuss the various multiplexing technologies used for data transmission.
Multiplexing is a method of combining multiple analog massage signals or digital data streams into
one signal. The objective of this technology is to share an expensive medium for transmitting
multiple signals. Actually, the low-level communication signals are divided into high-level logical
channels using this technology. Furthermore, each channel is then used for transmitting one
message signal or data stream.

Q.4. Integrated Services for Digital Network (ISDN) is a set of communication standards for
Simultaneous digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network. It was first defined in 1988 in the
CCITT red book. Explain the different types of ISDN with their features and advantages for each
one of them. (Explaining Two different types , Features of both of them , Advantages of both of
them) 2,4,4
ANS: Different types of ISDN :
Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in
any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to
the line, and used as needed. That means an ISDN line can take care of most people's complete
communications needs (apart from broadband

Q.5. ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365
storage capacity, storage management and internet service to the customers. It now needs a
solution that will eliminate downtime. Downtime is nothing but the time during which a computer
or computer system is down, or inoperative due to hardware or software failure. We also need the
flexibility in quick response to both the development in customer base and additional capacity and
service demands of the customers. ABC company took the help of network storage infrastructure
software provider to achieve their goals by providing support for end to end redundancy and
bondless scalability. By creating a scalable storage network with the ability to confidentially
deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the
ISP/SSP to attract and retain customers and substantially build its business. As the same time, the
solution has effectively lowered ABC company’s total cost of ownership for its entire storage
solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution.
The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting network storage
infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications.
Ans : The problems faced by ABC Company after reading the SLM
The important issue to address while choosing connectivity solutions is, whether application servers
are being connected to storage or disparate networks are being interconnected. The key factors to
be considered are elimination of single points of failure, high scalability, and ease of set up. The
FalcoStor’s IP Stor software solution, a leading network storage infrastructure software provider,
helped ABC Company to achieve their goal by providing support for End-to-End redundancy and
bondless scalability. The ISP/SSP found its high

Q.6. Cryptography is the science of hiding information. The traditional security system employed a
different of encryption process known as symmetric cryptography, which involves the use of the
same method for both encryption and decryption. Explain the different networking algorithms
that are used for cryptography along with its subtypes. (Explaining the two types of cryptography
and the networking algorithms used for them)
Ans: Cryptography
Cryptography is derived from the Greek word “Kryptos”, meaning hidden. Cryptography is the
science of hiding information. The main issue in using internet applications is maintenance of data
and security. The process of cryptography employs an algorithm which in turn uses a numerical
value to modify data, making that data secure and accessible only to those who have been assign
the authority to handle it.

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )

More Related Content

What's hot

Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
smumbahelp
 
Computer Network Architecture Training
Computer Network Architecture TrainingComputer Network Architecture Training
Computer Network Architecture Training
Tonex
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
 

What's hot (20)

It6601 mobile computing unit 2 questions
It6601 mobile computing unit 2 questionsIt6601 mobile computing unit 2 questions
It6601 mobile computing unit 2 questions
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
 
Mpls vpn1
Mpls vpn1Mpls vpn1
Mpls vpn1
 
Chapter i
Chapter iChapter i
Chapter i
 
D0362035
D0362035D0362035
D0362035
 
Networking concept with chat server programming
Networking concept with chat server programming Networking concept with chat server programming
Networking concept with chat server programming
 
G0314043
G0314043G0314043
G0314043
 
Computer Network Architecture Training
Computer Network Architecture TrainingComputer Network Architecture Training
Computer Network Architecture Training
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
2002023
20020232002023
2002023
 
Network data
Network dataNetwork data
Network data
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Advance Network Technologies
Advance Network TechnologiesAdvance Network Technologies
Advance Network Technologies
 

Similar to Mi0035 computer networks...

Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
smumbahelp
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
Iisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatuaIisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatua
IISRT
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
Aashish Pande
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
Christian Reina
 

Similar to Mi0035 computer networks... (20)

Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
Mi0035
Mi0035Mi0035
Mi0035
 
Mi0035 summer 2014
Mi0035 summer 2014Mi0035 summer 2014
Mi0035 summer 2014
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Cisco SFPOC48SR
Cisco SFPOC48SRCisco SFPOC48SR
Cisco SFPOC48SR
 
IEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTSIEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTS
 
Iisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatuaIisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatua
 
Cisco MEM-C6K-CPTFL256M
Cisco MEM-C6K-CPTFL256MCisco MEM-C6K-CPTFL256M
Cisco MEM-C6K-CPTFL256M
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Networks
Networks Networks
Networks
 
3Com SPA-4XOC3-POS
3Com SPA-4XOC3-POS3Com SPA-4XOC3-POS
3Com SPA-4XOC3-POS
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
Bca 4010 computer networking
Bca 4010 computer networkingBca 4010 computer networking
Bca 4010 computer networking
 

Mi0035 computer networks...

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 (Prefer mailing. Call in emergency ) ASSIGNMENT DRIVE PROGRAM SUBJECT CODE & NAME SEMESTER BK ID CREDITS MARKS WINTER 2014 PROGRAM/SEMESTER -MBADS (SEM 3/SEM 5) MBAFLEX/ MBAN2 (SEM 3) PGDISMN (SEM 1) MI0035- COMPUTER NETWORKS 3 BK ID -B1481 4 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Q.1. Write short notes on: a. LAN b. Analog and digital data transmission c. High level data link control Ans : a) Local Area Network (LAN): These types of computer networks connect network devices over a relatively short distance. Quite often, a networked office building, home or school contains a single LAN although it is normal to come across a building that b. Analog and digital data transmission : Analog data transmission: Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable c. High level data link control:
  • 2. High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO). The original ISO standards for HDLC are: ISO 3309 – Frame Structure Q.2. Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. Explain the seven layer architecture of OSI model with diagram. Ans: OSI reference model : The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. Q.3. Consider yourself as the operation head in a telecommunication company. What are the different types of multiplexing techniques will you implement to get efficient data transmission process? Ans: Multiplexing is a technology to transfer digital or analog data in daily use devices like telephone and television. Here, we discuss the various multiplexing technologies used for data transmission. Multiplexing is a method of combining multiple analog massage signals or digital data streams into one signal. The objective of this technology is to share an expensive medium for transmitting multiple signals. Actually, the low-level communication signals are divided into high-level logical channels using this technology. Furthermore, each channel is then used for transmitting one message signal or data stream. Q.4. Integrated Services for Digital Network (ISDN) is a set of communication standards for Simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book. Explain the different types of ISDN with their features and advantages for each one of them. (Explaining Two different types , Features of both of them , Advantages of both of them) 2,4,4 ANS: Different types of ISDN : Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the line, and used as needed. That means an ISDN line can take care of most people's complete communications needs (apart from broadband Q.5. ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 storage capacity, storage management and internet service to the customers. It now needs a solution that will eliminate downtime. Downtime is nothing but the time during which a computer or computer system is down, or inoperative due to hardware or software failure. We also need the
  • 3. flexibility in quick response to both the development in customer base and additional capacity and service demands of the customers. ABC company took the help of network storage infrastructure software provider to achieve their goals by providing support for end to end redundancy and bondless scalability. By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract and retain customers and substantially build its business. As the same time, the solution has effectively lowered ABC company’s total cost of ownership for its entire storage solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively. a. What were the problem which ABC Company was facing before consulting network storage infrastructure software provider? b. What were the benefits of implementing a scalable storage network? c. List the different classes of ISPs and their applications. Ans : The problems faced by ABC Company after reading the SLM The important issue to address while choosing connectivity solutions is, whether application servers are being connected to storage or disparate networks are being interconnected. The key factors to be considered are elimination of single points of failure, high scalability, and ease of set up. The FalcoStor’s IP Stor software solution, a leading network storage infrastructure software provider, helped ABC Company to achieve their goal by providing support for End-to-End redundancy and bondless scalability. The ISP/SSP found its high Q.6. Cryptography is the science of hiding information. The traditional security system employed a different of encryption process known as symmetric cryptography, which involves the use of the same method for both encryption and decryption. Explain the different networking algorithms that are used for cryptography along with its subtypes. (Explaining the two types of cryptography and the networking algorithms used for them) Ans: Cryptography Cryptography is derived from the Greek word “Kryptos”, meaning hidden. Cryptography is the science of hiding information. The main issue in using internet applications is maintenance of data and security. The process of cryptography employs an algorithm which in turn uses a numerical value to modify data, making that data secure and accessible only to those who have been assign the authority to handle it. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 (Prefer mailing. Call in emergency )