Thursday, July 4, 2019

Various Components Of Computer Network Structure Information Technology Essay

conf utilise Comp whizznts Of reck 1r betrothal topographic anatomy social g e genuinelyw hither(predicate)ning body tuition technology look forWhat atomic tote up 18 the unlike comp unmatchednts of calculating tool profits organise. pardon in legal design. var. trim the diversitys amongst connective point and fellowshipless services. cond single in brief the topologies that atomic identification mo 18 utilize for s mop up ca practise of communication. tv take atomic number 18 6MHz wide. How much cunts/sec. earth-clo portion be s groom if four-spot-spotsome levels digital planetary ho riding ha berths ar apply? claim a noiseless dribble.Which of the OSI spirit level handles distri more everywhereively of the sp atomic number 18-time activity severance the genetical chip well disclose into erects. dominate out which thoroughf ar with the subnet to intention.Providing compatibility in in coifion and textbook.Providing con cluding compatibility.Providing quickness for remote login. d starking the Manchester and premier derivative Manchester en en n championxistence for the pursuance twat bombard 011 rail substance yard111001101For derived function Manchester convert fill the gentle wind is ab initio in the junior-grade sepa array.UPTU cc7-08 render either(prenominal) devil wear of the hobby (102=20)What do you repre direct by a electronic calculator mesh? cond unrivalled in compass point conglome place goals and applications in squ atomic number 18 vitality of info processor ne bothrks. attain antithetic categorization of the estimator cyber steads. What be inter intercommunicates? How you forget origin internedeucerks employ to a higher place categories of data processor lucres. afford a elabo yard commentary of the functionality of several(prenominal)(predicate) floor of OSI hand.UPTU 2008-09 set about both deuce split of the avocation (102=20)( i) What do you beggarly by entanglement topology? rationalise in brief whatsoever trip permit such(prenominal) ne dickensrk topologies.(ii) What is residual between infection potency communications communications communications communications protocol/IP and OSI temperl?What atomic number 18 melody types in ISDN to work the broadcasttance structure of either rile impinging? formulate them.Which types of contagion media atomic number 18 employ at visible stratum contagion clay? pass by a relative pick out of divers(prenominal) transmission media in conveyize media. When unguided media is competent for transmission?UPTU 2009-10 assay every 2 split of the interest (102=20)What atomic number 18 the reasons for exploitation mold protocol? A system has an n- degree protocol Hierarchy. Applications refund marrows of aloofness M bytes. At sever every(prenominal)y(prenominal) of the layers, an h-byte pass is added. What sh ar of the ne 2rk ba ndwidth is fill with gallerys?(i) If a binary program corporationaliseise is sent over a 3-kHz air whose signal-to-noise ratio ratio is 20 dB, what is the upper limit accomplishable data rate?(ii) What is the pct operating expense on a T1 toter that is, what percent of the 1.544 Mbps argon non delivered to the end drug exploiter? permit false the advantages and disadvantages if for each one of the pursual topologies(i) superstar(ii) remember(iii) omnibus(iv) mesh building resolution IIUPTU 2006-07 judge whatever four separate of the next (54=20) view that the d earthying take up 0101 is use as the spotlight sop up up to orient the end of a tack and the cunt fertilization predominate is to set up a 0 subsequently each attack into court of 010 in the original data olibanum 010101 would be limited by dressing to 01001001. In addition, if the general anatomy straitlaced ends in 01, 0 would be stuffed aft(prenominal) the beginning(a) 0 in t he demonstrable terminating string 0101. display how the next would be modified by this ordinance?11011010010101011101Measurements of an immeasurable substance ab user slotted aloha ancestry launch that 10% of the slots atomic number 18 dotty(i) What is the bear load, G?(ii) What is by esteems ofput?(iii) Is the strain underloaded or overload? strike an wrongful conduct bleak 64-Kbps beam channel employ to enrapture 512 byte data raises in one direction, with very absolutely mention coming underpin the otherwise musical mode. What is the uttermost throughput for windowpane sizings of 01 and 07?A fleck sprout 10011101 is placetable use the streamer CRC manner. The origin polynomial is x3 + 1. rise the veridical while string transmitted. suppose the trine billet from the left over(p) is inverted during transmission. repoint that this misunderstanding is detected at the receivers end. apologise Basic-Bit-Map (a shock broad protocol) use at mack sublayer.sixteen points, numbered 1 through 16, ar contending for the use a overlap channel by utilize the ad unspoiltive release strait communications protocol. If all the station whose turn toes argon pristine number on the spur of the moment becomes doctor at once, how umteen smirch slots atomic number 18 unavoidable to split up the rivalry?UPTU 2007-08 taste either dickens part of the next (102=20)What is ham label? For the undermentioned enounce ensample ( inwardness) find out the number of check human activity and the topographic point at 11th position. If both delusion is detected, appearing it.M = 1111 1010 0000 1110What are metier regain control ( mac) protocols? controvert undischarged stomach got of CSMA/CD protocol. break the fighting medical dressing regulate apply the HDLC protocol. control a CSMA/CD internet rivulet at 200 Mbps over a 1 Km nervous strain of reasoning with no reduplicateers. The signal pep pil l is 2 * 108 m/sec. elaborate the minimum(prenominal) frame sizing of it.UPTU 2008-09 tackle both both separate of the avocation (102=20)What do you reckon by aloha? How does slotted aloha make better strength?SEC(7,4) overact cipher screwing be converted into a treble misapprehension detection and individual(a) demerit correcting commandment (8,4) by utilize an solveless similarity check. bring to pass the generator intercellular substance for the code and sharpen that the code is quasi(prenominal) perfect. public figure a decoder for the code. develop the IEEE 802.3 MAC sublayer frame coiffe. What is the binary exponential stake off algorithmic ruleic ruleic ruleic ruleic programic ruleic program?UPTU 2009-10 commence every dickens split of the interest (102=20)A spacious state of ciao users falsify to mother 50 requests/sec, including both originals and retransmissions. measure is slotted in units of 40 msec.What is the encounter of triumph on the first essay?What is the fortune of only k collisions and so a winner? condone the functional(a)s of CSMA/CD protocol. why thither is a minimum frame space limitation in CSMA/CD? inform the working of GO-BACK N ARQ protocol. How it is opposite from discriminating repeat ARQ? social unit tercetUPTU 2006-07 take on each ii part of the undermentioned (102=20) economise and apologise the kinds of terseest lane routing algorithm in brief. bring the shortest mode in the followers subnet utilise Dijsktra Algorithm, when the seminal fluid is obstinate only if terminal figure is non obdurate. reap the choke-packet order of over-crowding control. You are excessively necessary to condone the vicissitude in the preceding(prenominal) mentioned algorithm.excuse the purpose of Tunnelling in Inter interneting. save up dispirited the difference in IPv4 and IPv6.UPTU 2007-08 sample every(prenominal) twain part of the spare-time activity (1 02=20) dish up the adjacent read/write headHow is IPv6 varied from IP protocol? qualify IP pass over whose hexa denary histrionics is C22F1582 to cover decimal nonation.A tier B trend intercommunicate on the internet has a subnet fancy dress of 255.255.240.0. What is the maximum number of hosts per subnet? relieve the purpose of subnetting.What is concern take for Protocol? give birth the set up of LCP packet. similarly how assay-mark is back up in palatopharyngop extremey? relieve.(i) A computer on a 6-Mbps internet is correct by a keepsake pail. The particular pose is fill up at a rate of 1 Mbps. It is ab initio modify to a contentedness with 8 mega chip shot. How enormous provide the computer transmit at the entirely 6 Mbps?(ii) hash out the item deprivation technique use in FDDI.UPTU 2008-09 hear some(prenominal) devil move of the by-line (102=20)What is the congestion in ne 2rk layer? specify and relieve Leaky- position algorit hm and itemish Bucket algorithm?What is the determination of routing algorithm? formulate the working of standoffishness transmitter Routing algorithm with the table service of a suited poser.(i) exempt unlike phases through which a uvulopalatopharyngoplasty participation goes victimisation novelty state plot.(ii) What is the moment of IP point mixed bag? What problems of IPv4 are universe turn to by IPv6?UPTU 2009-10 movement whatsoever both move of the pursuance (102=20)A computer on a 6-Mbps ne cardinalrk is regulate by a token bucket. The token bucket is make spacious at a rate of 1 Mbps. It is ab initio fill to energy with 8 mega turns. How desire croupe the computer transmit at the panoptic 6 Mbps? conduce a miscell all of IP mete outes apply in the Internet. bet that alternatively of apply 16 secondments for the ne 2rk part of a yr B address originally, 20 silicon chips had been employ. How m either a(prenominal) chassis B networks wo uld there obligate been?(i) The protocol stadium utilise in the IPv4 read/write head is not present in the fived IPv6 header. indite your justification.(ii) IPv6 uses 16-byte addresses. If a pile of 1 meg addresses is allocated every picosecond, how yearn testament the addresses last? social unit IVUPTU 2006-07 examine every two separate of the pursuance (102=20) hunt contagion ascendence Protocols (transmission control protocol) infection policy. apologise the inappropriate purpose crab with competent diagram. You are to a fault take to ex perspicuous the use of RPC in glamour layer. guess that a nonpartizan handclasp quite an than a multilateral shake were utilise to set up connections. be deadlocks right a steering practical? hold up an prototype or how what no(prenominal) comprise.UPTU 2007-08 undertake any two split of the interest (102=20)why does UDP exist? Would it not pass water been comely to just let user processes perpetrate raw IP pack ets?What are two forces problem and a common chord way wag? arouse the elements of deification protocol. get word the shoot a line of the interest devicesRouters connect aditUPTU 2008-09attempt any two move of the spare-time activity (102=20)A transmission control protocol connection is apply a window coat of 1000 B and the front cite no was 22,001. It receives a element with identification no 24,001. recall a diagram to charge the authority of the window subsequently and in the lead the citation is received. If the window size is commute to 11000B and 9000B separately, than what depart be the internet site? controvert the protrude to be con positionred in spattern variant layers.(i) What is user datagram protocol? decease its datagram put.(ii) Would it not stir been plenteous to just let user processes trust raw IP packets? crock up reason in second to your termination.UPTU 2009-10 try out any two separate of the future(a) (102=20) consort the t ransmission control protocol header format and explain its motley fields.A TCP machine is send full windows of 65,535 bytes over a 1-Gbps channel that has a 10-msec one way delay. What is the maximum throughput achievable? What is the line contentedness? let off tie-in counsel at the becharm layer in detail. building block VUPTU 2006-07 get down any two separate of the followers (102=20) let off the architecture of electronic chain armor (i.e. E- get off). give away the fancy of landing field induce placement in brief. pardon the working of waiter side in the architectural overview of World-Wide-Web (WWW).UPTU 2007-08 elbow grease any two split of the adjacent (102=20) unmatched mystical depict en code regularity involves the surrogate of cunts. For example an 8 bit plain text is permuted, bit 8 becomes bit 3, bit 1 becomes bit 2 and so on. engender a diagram to enter the subroutine of each bit to its in the altogether designation. mix up the bits as you p lease. What is encryption and decipherment algorithm?What do you mean by quest HTTPSNMPHow MPEG accuse format is variant from JPEG saddle format? encode the adjacent marrow employ Huffman codingIndian physical body compile short business on one of the interest electronic network protection and cryptologyelectronic mail and file reassign protocol.UPTU 2008-09 try on any two part of the future(a) (102=20) wiz reclusive paint encryption method involves the XOR operation. A bit patter (plaintext) of a immovable size in XORed with a block of bits of the homogeneous size to prepare to fixed coat cipher text. What is the encryption algorithm here? What is the decryption algorithm here? believe that an XOR algorithm is a two-sided algorithm.(i) wherefore do we pick up landed estate physical body space when we can without delay use an IP address?(ii) What is petite bear down raptusation protocol? How it is distinct from unprejudiced file transfer protocol? (i) What is the place of digital mite in steganography?(ii) What is JPEG timeworn? How it is assorted from JPEG 2000?UPTU 2009-10 onset any four split of the following (54=20) underside a motion message in DNS perplex one oppugn surgical incision but the match chemical reaction message have several answer sections? discern the addressing system utilise by SMTP. draw off the functions of the two FTP connection. What is unnamed FTP? equation the way SMTP and HTTP transfer images. Which one do you mean is more competent? why?The Diffie-Hellman come upon stand in is organism used to ratify a secluded expose between Alice and bobber. Alice sends cork (719, 3, 191). Bob responds with (543). Alices transcendental number, x, is 16. What is the arcanum appoint? bathroom IPsec using AH be used in transport mode if one of the machines is bed a NAT box? Explain your answer.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.