Fully solved MBA assignments by subject and semester
1. Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
ASSIGNMENT
DRIVE SPRING 2014
PROGRAM PROGRAM/SEMESTER -MBADS (SEM 3/SEM 5)
MBAFLEX/ MBAN2 (SEM 3) PGDISMN (SEM 1)
SUBJECT CODE & NAME MI0035- COMPUTER NETWORKS
SEMESTER 3
BK ID BK ID -B1481
CREDITS 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.1. Write short notes on:
a. LAN
b. Analog and digital data transmission
c. High level data link control
Ans : a) Local Area Network (LAN):
These types of computer networks connect network devices over a relatively short distance. Quite
often, a networked office building, home or school contains a single LAN although it is normal to
come across a building that
b. Analog and digital data transmission :
Analog data transmission:
Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal
or video information using a continuous signal which varies in amplitude, phase, or some other
property in proportion to that
c. High level data link control:
2. High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer
protocol developed by the International Organization for Standardization (ISO). The original ISO
standards for HDLC are:
ISO 3309 – Frame Structure
Q.2. Virtually all networks in use today are based in some fashion on the Open Systems
Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of
seven layers that define the different stages that data must go through to travel from one device
to another over a network. Explain the seven layer architecture of OSI model with diagram.
Ans: OSI reference model :
The OSI, or Open System Interconnection, model defines a networking framework to implement
protocols in seven layers. Control is passed from one layer to the next, starting at the application
layer in one station, and proceeding to the bottom layer, over the channel to the next station and
back up the hierarchy.
Q.3. Consider yourself as the operation head in a telecommunication company. What are the
different types of multiplexing techniques will you implement to get efficient data transmission
process?
Ans: Multiplexing is a technology to transfer digital or analog data in daily use devices like telephone
and television. Here, we discuss the various multiplexing technologies used for data transmission.
Multiplexing is a method of combining multiple analog massage signals or digital data streams into
one signal. The objective of this technology is to share an expensive medium for transmitting
multiple signals. Actually, the low-level communication
Q.4. Integrated Services for Digital Network (ISDN) is a set of communication standards for
Simultaneous digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network. It was first defined in 1988 in the
CCITT red book. Explain the different types of ISDN with their features and advantages for each
one of them. (Explaining Two different types , Features of both of them , Advantages of both of
them) 2,4,4
ANS: Different types of ISDN :
Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in
any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to
the line, and used as needed. That means an ISDN
3. Q.5. ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365
storage capacity, storage management and internet service to the customers. It now needs a
solution that will eliminate downtime. Downtime is nothing but the time during which a computer
or computer system is down, or inoperative due to hardware or software failure. We also need the
flexibility in quick response to both the development in customer base and additional capacity and
service demands of the customers. ABC company took the help of network storage infrastructure
software provider to achieve their goals by providing support for end to end redundancy and
bondless scalability. By creating a scalable storage network with the ability to confidentially
deliver the 24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the
ISP/SSP to attract and retain customers and substantially build its business. As the same time, the
solution has effectively lowered ABC company’s total cost of ownership for its entire storage
solution: the IP Stor/CNP union has enabled a painless, flexible cost effective, scalable solution.
The complementary IP Stor/CNT solution has allowed to its customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting network storage
infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications.
Ans : The problems faced by ABC Company after reading the SLM
The important issue to address while choosing connectivity solutions is, whether application servers
are being connected to storage or disparate networks are being interconnected. The key factors to
be considered are elimination of single points of failure, high scalability, and ease of set up. The
FalcoStor’s IP Stor software solution, a leading network storage infrastructure software provider,
helped ABC Company to achieve their goal by providing support for End-to-End redundancy and
bondless scalability. The ISP/SSP found its high
Q.6. Cryptography is the science of hiding information. The traditional security system employed a
different of encryption process known as symmetric cryptography, which involves the use of the
same method for both encryption and decryption. Explain the different networking algorithms
that are used for cryptography along with its subtypes. (Explaining the two types of cryptography
and the networking algorithms used for them)
Ans: Cryptography
Cryptography is derived from the Greek word “Kryptos”, meaning hidden. Cryptography is the
science of hiding information. The main issue in using
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )