Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
[ Winter 2014 ] ASSIGNMENT
PROGRAM | Master of Science in Information Technology(MSc IT)Revised Fall 2011 |
SEMESTER | 2 |
SUBJECT CODE & NAME | MIT204– Data Communication & Networking |
CREDIT | 4 |
BK ID | B1389 |
MARKS | 60 |
Answer all Questions
Q.1. Discuss on transmission impairments.
Answer:With any communications system, it must be recognized that the received signal will differ from the transmitted signal due to various transmission impairments. For analog signals, these impairments introduce various random modifications that degrade the signal quality. For digital signals, bit errors are introduced: A binary 1 is trans- – formed into a binary 0 and vice versa. In this section, we examine the various impairments and comment on their effect on the information-carrying capacity of a communication link.
- Attenuation:Attenuation means a loss of energy The strength of a signal falls off with distance over any transmission medium. For guided media, this reduction in strength, or attenuation, is generally logarithmic and is
- 2. Explain the major criteria for a Data Communication Network
Answer:Data communications refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet.
The major criteria that a Data Communication
- 3. Write a note on
- a) 10Base2:10BASE2 (also known as cheapernet, thin Ethernet, thinnet, and thinwire) is a variant of Ethernet that uses thin coaxial cable (RG-58A/U or similar, as opposed to the thicker RG-8 cable used in 10BASE5 networks), terminated with BNC connectors. During the mid to late 1980s this was the dominant 10 Mbit/s Ethernet standard, but
- b) 10Base- T: Ethernet over twisted pair technologies use twisted-pair cables for the physical layer of an Ethernet computer network.
Early Ethernet cabling had generally been based on various grades of coaxial cable, but in 1984, StarLAN showed the potential of simple unshielded twisted pair by using Cat3 cable—the same simple cable used for telephone systems. This
- 4. What do you mean by congestion? Explain
Answer:Congestion, in the context of networks, refers to a network state where a node or link carries so much data that it may deteriorate network service quality, resulting in queuing delay, frame or data packet loss and the blocking of new connections. In a congested network, response time slows with reduced network throughput. Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.
Data packet loss from congestion is partially countered by aggressive network protocol retransmission, which maintains a network
- 5. Explain the following
- a) Class A networks: Class A networks are assigned to organizations with very large numbers of computers—including servers and routers—attached to their networks. A government department or a Fortune 500 corporation would be examples of this type of network. The following characteristics apply to class A
- b) Class B networks: Class B networks are also assigned to organizations with large networks. Class B networks have the following characteristics:
- Class B network addresses range from 128.0.0.0 to 191.255.255.255.
- The first 2 bits in a class B address are always 10 (128).
- In a class B network, the netid is determined by the first 8 bits (first 2 bytes).
- The hostid is determined by the last 8 bits (last 2 bytes).
- There are 216 (65,536)
- 6. Explain the following.
- a) Open loop congestion control: In open-loop congestion control, policies are applied to prevent congestion before it happens. In these mechanisms, congestion control is handled by either the source or the destination. We give a brief list of policies that can prevent congestion.
Retransmission Policy:Retransmission is sometimes unavoidable. If the sender feels that a sent packet is lost or
- b) Closed loop congestion control: Closed-loop congestion control mechanisms try to alleviate congestion after it hap-pens. Several mechanisms have been used by different protocols. We describe a few of them here.
Backpressure: The technique of backpressure refers to a congestion control mechanism in which a congested node stops receiving data from the immediate upstream node or nodes.
Choke Packet: A
- 7. Explain the categories Network security problems
Answer:Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601