Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
PROGRAM
|
Master of Science in Information
Technology(MSc IT)Revised Fall 2011
|
SEMESTER
|
2
|
SUBJECT CODE & NAME
|
MIT204– Data Communication &
Networking
|
CREDIT
|
4
|
BK ID
|
B1389
|
MARKS
|
60
|
Answer all Questions
Q.1. Discuss on transmission impairments.
Answer:With any communications system, it must be recognized that the received
signal will differ from the transmitted signal due to various transmission
impairments. For analog signals, these impairments introduce various random
modifications that degrade the signal quality. For digital signals, bit errors
are introduced: A binary 1 is trans- – formed into a binary 0 and vice versa.
In this section, we examine the various impairments and comment on their effect
on the information-carrying capacity of a communication link.
·
Attenuation:Attenuation means a loss of energy The strength
of a signal falls off with distance over any transmission medium. For guided
media, this reduction in strength, or attenuation, is generally logarithmic and
is
Q. 2. Explain the major criteria for a Data
Communication Network
Answer:Data communications refers to the transmission of this digital data
between two or more computers and a computer network or data network is a
telecommunications network that allows computers to exchange data. The physical
connection between networked computing devices is established using either
cable media or wireless media. The best-known computer network is the Internet.
The major criteria that a Data Communication
Q. 3. Write a note on
a) 10Base2:10BASE2 (also known as cheapernet, thin Ethernet, thinnet, and thinwire)
is a variant of Ethernet that uses thin coaxial cable (RG-58A/U or similar, as
opposed to the thicker RG-8 cable used in 10BASE5 networks), terminated with
BNC connectors. During the mid to late 1980s this was the dominant 10 Mbit/s
Ethernet standard, but
b) 10Base- T: Ethernet over twisted pair technologies use twisted-pair cables for the
physical layer of an Ethernet computer network.
Early Ethernet cabling had generally been
based on various grades of coaxial cable, but in 1984, StarLAN showed the
potential of simple unshielded twisted pair by using Cat3 cable—the same simple
cable used for telephone systems. This
Q. 4. What do you mean by congestion?
Explain
Answer:Congestion, in the context of networks, refers to a network state where a
node or link carries so much data that it may deteriorate network service
quality, resulting in queuing delay, frame or data packet loss and the blocking
of new connections. In a congested network, response time slows with reduced network
throughput. Congestion occurs when bandwidth is insufficient and network data
traffic exceeds capacity.
Data packet loss from congestion is partially
countered by aggressive network protocol retransmission, which maintains a
network
Q. 5. Explain the following
a) Class A networks: Class A networks are assigned to
organizations with very large numbers of computers—including servers and
routers—attached to their networks. A government department or a Fortune 500
corporation would be examples of this type of network. The following
characteristics apply to class A
b) Class B networks: Class B networks are also assigned to
organizations with large networks. Class B networks have the following
characteristics:
·
Class B
network addresses range from 128.0.0.0 to 191.255.255.255.
·
The
first 2 bits in a class B address are always 10 (128).
·
In a
class B network, the netid is determined by the first 8 bits (first 2 bytes).
·
The
hostid is determined by the last 8 bits (last 2 bytes).
·
There
are 216 (65,536)
Q. 6. Explain the following.
a) Open loop congestion control: In open-loop congestion control, policies are
applied to prevent congestion before it happens. In these mechanisms,
congestion control is handled by either the source or the destination. We give
a brief list of policies that can prevent congestion.
Retransmission Policy:Retransmission is sometimes unavoidable. If
the sender feels that a sent packet is lost or
b) Closed loop congestion control: Closed-loop congestion control mechanisms try
to alleviate congestion after it hap-pens. Several mechanisms have been used by
different protocols. We describe a few of them here.
Backpressure: The technique of backpressure refers to a congestion control mechanism in
which a congested node stops receiving data from the immediate upstream node or
nodes.
Choke Packet: A
Q. 7. Explain the categories Network
security problems
Answer:Network security consists of the provisions and policies adopted by a
network administrator to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible resources.
Network security involves the authorization of access to data in a network,
which is controlled by the network administrator. Users choose or are assigned
an ID and password or other authenticating information that allows them access
to information and programs within their authority.
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.