Friday, April 5, 2019

Various Components Of Computer Network Structure Information Technology Essay

conf utilise Components Of Computer mesh Structure Information Technology EssayWhat argon the various components of Computer Ne devilrk structure. apologize in instruct.Write down the differences between connection oriented and connectionless services.Explain in brief the topologies that are used for broadcasting type of communication.Television channels are 6MHz wide. How m whatever kidnappings/sec. chiffonier be sent if four levels digital signals are used? Assume a noiseless channel.Which of the OSI layer handles each of the questBreaking the genetic bit stream into vomit ups.Determining which route through the subnet to use.Providing compatibility in information and text.Providing terminal compatibility.Providing facility for remote login.Sketch the Manchester and Differential Manchester en arcanum writing for the pursuit bit stream 0111000111001101For unalikeial gear Manchester encoding assume the line is initially in the low state.UPTU 2007-08 flak either two sep arate of the interest (102=20)What do you mean by a information processing system cyberspace? Explain in item various goals and applications in real life of computer networks. let different categorization of the computer networks. What are profitsworks? How you will categorize internetworks using above categories of computer networks. depict a detail description of the functionality of different layer of OSI model.UPTU 2008-09Attempt whatsoever two parts of the next (102=20)(i) What do you mean by network topology? Explain in brief any three such network topologies.(ii) What is difference between transmission control protocol/IP and OSI model?What are channel types in ISDN to construct the transmission system structure of any access link? Explain them.Which types of transmission media are used at physical layer transmission? lend a comparative study of different transmission media in guided media. When unguided media is capable for transmission?UPTU 2009-10Attempt any two parts of the followers (102=20)What are the reasons for using layered protocol? A system has an n-layer protocol Hierarchy. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What split of the network bandwidth is filled with headers?(i) If a binary signal is sent all over a 3-kHz channel whose signal/noise ratio is 20 dB, what is the maximum achievable data rate?(ii) What is the percent overhead on a T1 carrier that is, what percent of the 1.544 Mbps are not delivered to the end user?Explain the advantages and disadvantages if any of the next topologies(i) virtuoso(ii) ring(iii) bus(iv) meshUNIT IIUPTU 2006-07Attempt any four parts of the following (54=20)Suppose that the string 0101 is used as the bit string to indicate the end of a frame and the bit stuffing rule is to insert a 0 after each appearance of 010 in the original data thus 010101 would be modified by stuffing to 01001001. In addition, if the frame tight-laced end s in 01, 0 would be stuffed after the first 0 in the actual terminating string 0101. taper how the following would be modified by this rule?11011010010101011101Measurements of an infinite user slotted aloha channel denominate that 10% of the slots are idle(i) What is the channel load, G?(ii) What is throughput?(iii) Is the channel underloaded or overloaded?Consider an hallucination chuck up the sponge 64-Kbps satellite channel used to send 512 byte data frames in one direction, with very soon acknowledgement coming back the other way. What is the maximum throughput for window sizes of 01 and 07?A bit stream 10011101 is transmitted used the standard CRC mode. The generator polynomial is x3 + 1. Show the actual bit string transmitted. Suppose the terzetto bit from the left is inverted during transmission. Show that this error is detected at the receivers end.Explain Basic-Bit-Map (a collision free protocol) used at MAC sublayer.Sixteen stations, numbered 1 through 16, are cont ending for the use a divided up channel by using the adaptive Free Walk Protocol. If all the station whose heades are prime of life number suddenly becomes ready at once, how many bit slots are needed to resolve the bitterness?UPTU 2007-08Attempt any two parts of the following (102=20)What is Hamming code? For the following word standard (message) find out the number of check bit and the bit at eleventh position. If any error is detected, immortalise it.M = 1111 1010 0000 1110What are medium access control (MAC) protocols? Discuss salient feature of CSMA/CD protocol.Describe the bit stuffing rule used the HDLC protocol.Consider a CSMA/CD network campaign at 200 Mbps over a 1 Km cable with no repeaters. The signal f number is 2 * 108 m/sec. Compute the minimum frame size.UPTU 2008-09Attempt any two parts of the following (102=20)What do you mean by ALOHA? How does slotted ALOHA improve efficiency?SEC(7,4) hamming code can be converted into a double error detecting and single e rror correcting code (8,4) by using an extra parity check. Construct the generator matrix for the code and show that the code is quasi(prenominal) perfect. Design a decoder for the code.Explain the IEEE 802.3 MAC sublayer frame format. What is the binary exponential back absent algorithmic program?UPTU 2009-10Attempt any two parts of the following (102=20)A large population of ALOHA users manage to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec.What is the chance of success on the first attempt?What is the probability of exactly k collisions and then a success?Explain the workings of CSMA/CD protocol. wherefore there is a minimum frame length restriction in CSMA/CD?Explain the working of GO-BACK N ARQ protocol. How it is different from selective repeat ARQ?UNIT IIIUPTU 2006-07Attempt any two parts of the following (102=20)Write and explain the kinds of shortest class routing Algorithm in brief.Find the shortest path in the following subnet using Dijsktra Algorithm, when the source is fixed but destination is not fixed.Describe the choke-packet method of congestion control. You are also required to explain the variation in the above mentioned algorithm.Explain the creation of Tunnelling in Internetworking. Write down the difference in IPv4 and IPv6.UPTU 2007-08Attempt any two parts of the following (102=20)Answer the following questionHow is IPv6 different from IP protocol?Convert IP address whose hexadecimal representation is C22F1582 to dotted decimal notation.A class B class network on the internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts per subnet?Explain the purpose of subnetting.What is Link Control Protocol? Give the format of LCP packet. Also how authentication is supported in uvulopalatopharyngoplasty? Explain.(i) A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to a capac ity with 8 megabit. How long can the computer transmit at the full 6 Mbps?(ii) Discuss the token passing technique used in FDDI.UPTU 2008-09Attempt any two parts of the following (102=20)What is the congestion in network layer? differentiate and explain Leaky-Bucket algorithm and Token Bucket algorithm?What is the role of routing algorithm? Explain the working of aloofness Vector Routing algorithm with the help of a suitable example.(i) Explain various phases through which a PPP connection goes using transition state diagram.(ii) What is the significance of IP address classification? What problems of IPv4 are cosmos addressed by IPv6?UPTU 2009-10Attempt any two parts of the following (102=20)A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer transmit at the full 6 Mbps?Give a classification of IP addresses used in the Internet. Suppose that ins tead of using 16 bits for the network part of a class B address originally, 20 bits had been used. How many class B networks would there have been?(i) The protocol field used in the IPv4 header is not present in the fived IPv6 header. Write your justification.(ii) IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated every(prenominal) picosecond, how long will the addresses last?UNIT IVUPTU 2006-07Attempt any two parts of the following (102=20)Describe Transmission Control Protocols (TCP) Transmission policy.Explain the Remote Procedure Call with suitable diagram. You are also required to explain the use of RPC in Transport layer.Imagine that a two-way waggle rather than a three-way handshake were used to set up connections. Are deadlocks now practicable? Give an example or how what none exist.UPTU 2007-08Attempt any two parts of the following (102=20)Why does UDP exist? Would it not have been enough to just let user processes send raw IP packets?What are tw o army problem and a three way handshake? State the elements of becharm protocol.Describe the feature of the following devicesRoutersBridgesGatewayUPTU 2008-09Attempt any two parts of the following (102=20)A TCP connection is using a window size of 1000 B and the prior acknowledgement no was 22,001. It receives a segment with acknowledgement no 24,001. Draw a diagram to show the situation of the window after and before the acknowledgement is received. If the window size is change to 11000B and 9000B separately, than what will be the situation?Discuss the issue to be considered in designing different layers.(i) What is user datagram protocol? Give its datagram format.(ii) Would it not have been enough to just let user processes send raw IP packets? Give reason in support to your answer.UPTU 2009-10Attempt any two parts of the following (102=20)Draw the TCP header format and explain its various fields.A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that h as a 10-msec one way delay. What is the maximum throughput achievable? What is the line capacity?Explain Connection Management at the transport layer in detail.UNIT VUPTU 2006-07Attempt any two parts of the following (102=20)Explain the architecture of Electronic Mail (i.e. E-mail).Describe the concept of mankind name System in brief.Explain the working of server side in the architectural overview of World-Wide-Web (WWW).UPTU 2007-08Attempt any two parts of the following (102=20)One secret fundamental encryption method involves the surrogate of bits. For example an 8 bit plain text is permuted, bit 8 becomes bit 3, bit 1 becomes bit 2 and so on. Draw a diagram to show the mapping of each bit to its new designation. Scramble the bits as you please. What is encryption and decryption algorithm?What do you mean by following HTTPSNMPHow MPEG file format is different from JPEG file format? Encode the following message using Huffman codingINDIAN INNINGWrite short note on one of the foll owing Network gage and cryptographyElectronic mail and FTP.UPTU 2008-09Attempt any two parts of the following (102=20)One secret key encryption method involves the XOR operation. A bit patter (plaintext) of a fixed size in XORed with a block of bits of the same size to create to fixed sized cipher text. What is the encryption algorithm here? What is the decryption algorithm here? Remember that an XOR algorithm is a reversible algorithm.(i) Why do we need Domain name space when we can directly use an IP address?(ii) What is unserviceable file transfer protocol? How it is different from simple FTP?(i) What is the role of digital signature in cryptography?(ii) What is JPEG standard? How it is different from JPEG 2000?UPTU 2009-10Attempt any four parts of the following (54=20)Can a query message in DNS have one question section but the corresponding reply message have several answer sections?Describe the addressing system used by SMTP.Describe the functions of the two FTP connection. What is anonymous FTP?Compare the way SMTP and HTTP transfer images. Which one do you think is more than efficient? Why?The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (719, 3, 191). Bob responds with (543). Alices secret number, x, is 16. What is the secret key?Can IPsec using AH be used in transport mode if one of the machines is behind a NAT box? Explain your answer.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.