MI0035 – COMPUTER NETWORKS

Dear students get fully solved  SMU MBA assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

ASSIGNMENT

DRIVE
WINTER 2015
PROGRAM
MBADS (SEM 3/SEM 5)MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0035 – COMPUTER NETWORKS
BK ID
B1973
CREDITS
4
MARKS
60


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q. 1. Explain the working of Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Protocol.

Answer:Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a media access control method used most notably in local area networking using early Ethernet technology. It uses a carrier sensing scheme in which a transmitting data station detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.

CSMA/CD is a modification of pure carrier




Q. 2. Differentiate between seven layered OSI reference model and four layered OSI reference model.

Answer:The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1.

Define seven layered






Q. 3. Write short notes on

a. Subnet:A subnetwork, or subnet, is a logical, visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.  Computers that belong to a subnet are addressed with


b. Super netting:A supernetwork, or supernet, is an Internet Protocol (IP) network that is formed from the combination of two or more networks (or subnets) with a common Classless Inter-Domain Routing (CIDR) prefix. The new


c. Subnet masks: A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host


d. Dynamic NAT: Dynamic NAT is atype of NAT in which a private IP address is mapped to a public IP address drawing from a pool of registered (public) IP addresses. Typically, the NAT router in a network will keep a



e. Domain Name System:The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates



Q. 4. What is DWDM? What are the pros and cons of DWDM
Answer:Dense wavelength division multiplexing (DWDM) is a technology that puts data from different sources together on an optical fiber, with each signal carried at the same time on its own separate light wavelength. Using DWDM, up to 80 (and theoretically more) separate wavelengths or channels of data can be multiplexed into a lightstream transmitted on a single optical fiber. Each channel carries a time



Q. 5. Briefly explain the networking applications in government sector

Listing the objectives
About networking applications – understanding the networking for government sector and listing the websites and portals and explaining for them

Answer:When we speak of applications, we simply mean the things a computer or other tool can be used for. You are familiar with many applications, like word processing, email, Web browsing, and spreadsheet processing.




Q. 6. Explore the different models in cloud environment and their examples

Answer: Infrastructure as a Service: In the most basic cloud-service model & according to the IETF (Internet Engineering Task Force), providers of IaaS offer computers – physical or (more often) virtual machines – and other resources. (A hypervisor, such as Xen, Oracle VirtualBox, KVM, VMware ESX/ESXi, or Hyper-V runs the virtual machines as guests. Pools of hypervisors within the cloud operational support-system can support large
Dear students get fully solved  SMU MBA assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.