SMU MBA IT 3 sem Solved Assignment Computer Networks


Computer Networks

1.    Explain the working of Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Protocol.

CSMA/CD is a set of protocols used to resolve and manage collisions of data that occur during the transfer of data. The CSMA/CD protocol is used in the second layer (data link layer) of the OSI model. Fig shows the working of CSMA/CD in a flowchart:

Simultaneous data transmissions by two nodes or devices degrade the
performance of the Ethernet, resulting in collisions. In such situations,
CSMA/CD is helpful. Data transmitted over the network is referred to as a
frame. Devices are connected through Ethernet technology of LAN uses
CSMA/CD as a base for the transmission of data. Devices on the network
are first connected to cables to access the CSMA/CD protocol.
The device that has to send the data first senses or detects whether the transmitting medium is free or not, with the help of a carrier (a specified level used for the transmission of a frame). If the carrier is detected, then the transmission is delayed until the carrier is terminated and a notification signal is sent to the device, while the non-detection of the carrier signifies that the medium for transmitting the frame is free and the process can proceed.
When the medium is found free, the device transmits the frame. If two or more devices transmit the frames at the same time, collision occurs. Carrier sensing detects for these collisions. This whole process of collision is known as listen while talking. When collision detection occurs, the device transmitting the frames waits for an indefinite period before retransmitting the frames. The process in which devices wait before transmitting frames is known as back off.
The period for which the device waits is decided by a random number that is generated by the collisions counter located on each device. The function of collisions counter is to count the number of frames for which one or more collisions happened when the frames were transmitted.
After a back off, the device involved in collision, broadcasts data again. This whole process is continued till a carrier is not detected or sensed.
If collision is not found in the working of CSMA/CD then transmission of the frame takes place and the process of transmission completes; otherwise, the frame is re-transmitted to the node until the collision counter is cleared.

2.    Write short notes on

a. Coaxial Cables

b. Satellite

c. Microwave

d. Value-added Network

e. Web EDI

Coaxial Cables
Coaxial cables are another type of transmission media having better shielding than twisted-pair media. A coaxial cable has a metal wire in the central axis covered by insulating material. These cables are mainly used in television dish, LANs, and long distance telephone networks. Coaxial cables are shielded in a better way; therefore, they are less prone to noise. The bandwidth of the signal is entirely based on the cable quality.
They can transfer the signals up to 1 GHz. Coaxial cables were widely used for the long distance telephone lines, but now they are largely replaced by fibre optics. However, they still have dominance in cable television and metropolitan area network (MAN).

Satellite
Satellite communication mode transmits and receives the data over the network using a series of satellites in orbits; thereby, allowing for long-range wireless communication. The satellite wireless mode includes satellite television, satellite phones, satellite Internet service, and Global Positioning
System (GPS). Satellite is the most widely used wireless communication medium nowadays. Due to this, satellite communication products, such as
Communications Intelligence (COMINT), are designed keeping the security issue in mind. COMINT provides consumers with intelligence on diplomatic, economic, and scientific developments. Different communication intelligence equipment’s have been designed to provide all security aspects with a secure communication channel. Satellites provide a way to build secure virtual networks. In addition, it enables you to include remote networks in secure virtual networks.

Microwave
Microwave is also used in global transmissions, which use geosynchronous satellite and ground-based dishes to adhere to the line-of-sight requirement. Microwave uses higher transmission for both short distance and global transmission. It can be used to extend the LAN’s using wireless. The limitation of using a microwave is that the transmitter and receiver must be within the line of sight of each other. It can be extremely expensive, but it is less susceptible to signal interference and eavesdropping than radio waves and provides higher bandwidth.
VAN
VAN acts as a regional post office in EDI, which first receives a transaction, verify the to-and-from information, and direct the transaction to the final recipient. VAN provides numerous other services, such as retransmitting documents, providing third party audit information, acting as a gateway for different transmission services, and handling telecommunication supports. organizations even in the cases when both trading parties are using
Internet-based protocols for transferring data.
VANs also help in replacing the certificates in the Applicability Statement 2(AS2) mode of transmission of data. Each mode in the traditional business oriented
AS2 transmission includes a security certificate. When a large number of partners are routed through VAN, the certificates can be replaced more easily. The functionalities of VAN as a transmission medium are as follows:
·         Routes, stores, and delivers EDI messages and provides delivery reports;
·         Examines the EDI messages and specifies the requirements whether or not the messages need extra envelopes for transfer of information; and,
·         Operates using various entities. Due to the services provided by VAN, it is preferably used by business
Web EDI
The Internet employs its own communication protocols for secured transmission of EDI documents over a network. The most commonly used protocols are HTTPS, AS2, and FTP using SSL (FTPS). Web-based EDI or the Web EDI allows an organization to interact with its buyers or suppliers in distant regions, without implementing a complex EDI infrastructure.
In other words, Web EDI helps the small to medium-scale business organizations to receive, create and manage electronic documents using only a Web browser. Web EDI transforms the transmitted data into the EDI format and then forwards the transformed data to the other trading partner.
EDI transactions can be received, edited and forwarded easily by using a Web-based interface, which can be accessed from anywhere.
The Web EDI works on the hub and spoke model, where the major trading partners or Application Servers are the hubs and the smaller partners are the spokes. The trading partners can send EDI messages directly to a web enabled EDI messaging site by using the hub and a Web browser. Web EDI users can interact with VANs without incurring the costs of setting a dedicated VAN connection.

3.    Write short notes on

a. Subnet

b. Super netting

c. Subnet masks

d. Dynamic NAT

e. Domain Name System

Subnets
A network that exists within the Class A, B, or C network is called a subnet. It can also be defined as a network within a network. Subnets are created to extend network IDs by using host bits of one or more Class A, B, or C. Therefore, subnets can have a network ID of any length. All devices that have IP addresses with same prefix are defined as subnets. These are connected to the Internet by using the same shared network. While designing a subnet, always specify the maximum number of subnets that are required and ensure that enough host addresses are available.
Supernetting
Supernetting is defined as the combination of all network routing commands in a single routing table entry. It is commonly called Classless Inter-Domain Routing (CIDR). It is designed to solve the problems such as, wastage of many addresses in the Class addresses.
Supernetting resolves many problems arising because of subnetting, such as, all zeroes, and all ones masks in the IP addresses. Supernetting, like subnetting, can take any number of host IDs. The difference between supernetting and subnetting is that in supernetting, the host and network IDs are merged, while in subnetting the IDs are split. CIDR masks for classes A, B, and C are /8, /16, and /24, respectively.
Subnet Masks
A subnet mask is another 32 bit number defined for identifying a subnetwork. Subnet masks describe the bits associated with the network and host IDs. If an octet in the subnet mask is equal to 1 it refers to the network ID, and if it is equal to zero it refers to the host ID. Subnet masks inform routers about the working of subnetting. The network ID of an IP address is determined when the router has both the IP address and subnet masks. Subnet masks defined with the Class A, B, and C addresses are the default subnet masks.
Network Address Translation
Network Address Translation (NAT) is a method used to convert a local IP address of a system into a global and unique IP address before the transmission of information takes place over an external network (Internet).
NAT technology is used as a firewall. So if computer in a company network uses local address 127.0.0.1 and it has to communicate to internet public address like www.google.com than the request from this computer is passed on by firewall to www.google.com however the IP address by the firewall will be changed (Natted) to public IP address of company. Multiple IP addresses are used internally by an organisation to join several ISDN connections into a single Internet connection. A system on NAT cannot be accessed by external network systems. NAT increases network security by hiding the internal structure of a network from systems outside the network.
DNAT, similar to SNAT, is used in large organisations for mapping private (internal) IP addresses to public (registered) IP addresses. However, unlike SNAT, DNAT maps private IP addresses to a group of registered IP addresses.
Domain Name System
Domain Name System (DNS) is a facility provided by the TCP/IP that allows you to remember only the name of a site instead of a lengthy IP address. It is a client/server based architecture that functions at the Application Layer. Nowadays, the use of Internet services is widespread. The name of a site you type in the address bar is converted into an IP address. Suppose, the DNS utility was not available and you wanted to search for information on any topic from Google. In that case, you had to type 216.239.51.10 instead of typing www.google.com.

4.    a. What is an email? List the advantages of an Email

b. Write the steps to set up a pop-up blocker

E-mail
E-mail is short form for electronic mail, a service that helps you communicate with others on the Internet. Through e-mail, you can communicate with anyone connected to the Internet and possessing an email identification (e-mail id) by sending and receiving electronic messages within seconds. In the starting days of this service, you could only send textual messages. However, today it is possible to send or receive information in different formats ranging from scanned/faxed images to Computer graphics and sound and video files along with your e-mail messages.
Advantages of E-mail
1.       Saves paper and allows you to edit the message easily.
2.       Transmits messages faster than other conventional forms of communication, such as postal service
3.       Sends messages according to the sender’s convenience
4.       Provides space to store incoming and outgoing email messages for future reference.
5.       Enables a user to transmit a single e-mail message to multiple users.
b. Steps to set up pop-up blocker.
1. Click the Tools menu in the Menu Bar of the Internet Explorer window.
2. Now, click the Pop-up Blocker option in the drop-down menu.
3. Click the Pop-up Blocker Settings option in the sub-menu to allow popup windows from any specific website and set the filter level.
4. Type the address of the website pop-up that you want to allow under the Address of website to allow option.
5. Click the Add button.
6. Repeat steps 4 and 5 to add other websites in the Allowed sites box.
7. Next, click the down arrow button below the filter level option to set the filter level.
8. Select an option — High, Medium or Low — as per your preference from the drop-down menu. In our case, we have selected the Low option.
9. Now, click the Close button.

5. Briefly explain the networking applications in government sector

In the government sector, e-governance is part of the networking applications. Electronic governance (e-governance) is the application of IT by the government for providing better facilities or services to its citizens, in an efficient manner. It helps in improving access of citizens to the government services and delivering these services on time. In other words, e-governance is a medium used by the government for interacting with its citizens electronically. E-governance is preferred because it provides the government with a cheap, transparent and easy way of interacting with its people. Therefore, e-governance can be considered as an application of electronics in governance.
·         To provide access to information about political processes, services and choices available to the people.
·         To encourage active participation of citizens by informing, consulting and involving them in various government activities.
·         To satisfy and fulfill the needs of citizens at the front office by simplifying their interaction with several online services.
·         To facilitate speedy, transparent and accountable administration services at the back office.


MCA 21— India’s Prestigious G2B Services Portal
The project named MCA 21 was conceived and implemented by the Ministry of Company Affairs in association with Tata Consultancy Services Limited to provide e-governance in the field of Company Law. This project provides the authorised signatories (stakeholders) or employees of companies, citizens and investors across the country with access to the online services provided by the Ministry of Company Affairs.

National Portal of India
The National Portal of India was developed in order to enable a single window access to information and services that are being provided by various entities of the Indian government. The content of this portal is the result of a combined effort of several ministries and departments of the Government of India, at the central, state or district level. The National
Portal of India is a Mission Mode Project, which lies under the National EGovernance Plan that was designed and maintained by National Informatics Centre (NIC), Department of Information Technology (DIT), Ministry of Communication and Information Technology (MoCIT) and Government of India. The URL of the National Portal of India is www.india.gov.in.

Income Tax Portal
The need for efficient tax collection system has been long felt in India. Therefore, the Income Tax department launched a website in 2002, with the aim to provide information that would help users to pay their income tax as well as solve their queries. Later in 2005-2006, electronic transactions were introduced through the income tax website. Presently, 19 services are
offered through this website. The URL of the income tax portal is www.incometaxindia.gov.in/home.asp.

Consular Passport and VISA Division (Passport Office of India)
Consular Passport and VISA Division, a division of Ministry of External Affairs, is the Indian Passport office for the people of India. It is an executive agency of the Government of India, which is responsible for issuing passports to Indians. Consular Passport and VISA Division portal helps citizens with any tasks or issues related to passports and answer any queries that they may have. The URL of the passport office of India is www.passport.gov.in.

Supreme Court of India
The Supreme Court of India is the highest judicial body in India. It also has a website that contains information related to the cases handled by it and the judgments it has passed. In addition, the website provides case studies, news and e-filing. The URL of the supreme court of India is www.supremecourtofindia.nic.in.

Indian Courts
Indian courts are a bouquet of websites, containing the websites of the Supreme Court and all 21 High Courts, and their branches in India. It offers a single point of access to information related to the Supreme Court or any High Court in India. The URL of the Indian courts is www.indiancourts.nic.in.

Defence Research and Development Organisation
Defence Research and Development Organisation (DRDO) works under the Department of Defence Research and Development of the Ministry of Defence. DRDO is a network of more than 50 laboratories that are involved in developing defence technologies covering various disciplines, including aeronautics, armaments, electronics, combat vehicles, engineering systems, instrumentation, missiles, advanced computing and simulation, special materials, naval systems, life sciences, training, information systems and agriculture. The URL of DRDO is www.drdo.gov.in.

6.    Explore the different models in cloud environment and their examples

Introducing Infrastructure as a Service
Infrastructure as a Service (IaaS) allows you to deliver hardware resources, such as servers, storage space and network, as cloud service to the customers. In addition, operating systems and virtualisation technology are provided to the customers to manage the resources. IaaS delivers computer infrastructure, i.e., the virtualised infrastructural environment as a service to the end users. Clients or customers, instead of investing in hardware or software resources, can simply purchase these resources as the outsourced service. This reduces the problems faced by customers in purchasing and installing these resources in their data centre. For such services, the cloud service providers charge the customers on the utility computing basis. It implies that the customers pay for this service on the basis of the amount of resources being utilised.
Introducing Platform as a Service
Platform as a Service (PaaS) offers the platform on a cloud for the customers and the services are consumed through the Web browser. In PaaS, the service provider offers you an integrated set of software that allows developers to build applications without installing any software for both application development and runtime. PaaS offers all the functionalities required for lifecycle management and provides Web applications on a cloud. When we talk about lifecycle management, we mean managing all the stages of software development, such as planning, designing, testing and deploying.
Introducing Software as a Service
Software as a Service (SaaS) is a software delivery model in which the required software is provided to customers on-demand and the software as well as its associated data is centrally hosted on cloud by a vendor. The software provided as a service is accessed by the customers through the Web browser. Generally, the hosted set of software that can run on a platform as well as infrastructure is provided to the customers, and the service providers charge on the basis of utilisation. When software is provided as a service, the customers are not required to do any development or programming; instead, they can simply configure the software.
Explaining Cloud Elements
Cloud computing solution comprises components such as clients, data centre and distributed servers. Each cloud component has a specific purpose and plays a major role in offering functional cloud-based application.
Clients: This signifies the general computers that you use at your home or in office. For instance, clients can be laptops, tablet computers, PDAs, PCs or mobile phones which access the data available on clouds. In general, clients are those devices that are used by the end users to work with their data available on the cloud.
Data Centre: This refers to the collection of servers on which the applications of the clients are installed or hosted. You can consider data centre as a large room in your office or room filled up with servers. Clients can access applications hosted by a data centre through the Internet. The growth and development in the IT world led to the introduction of virtual servers. This implies that multiple instances of virtual servers can be installed on a single physical server. Note that the count up of the virtual servers that you can install on a single physical server depends on the size and speed of the server.

Distributed Servers: This refers to the collections of servers that are located at geographically distant locations. However, due to the instant accessibility of data, clients assume that these servers are available at a single location. At the same time, due to the distributed nature of servers, cloud service providers have scalability in options and security. To understand how providers have flexibility due to the use of distributed servers, let us consider an example. The Google Cloud service provider has its servers distributed all across the world. Therefore, if a failure of any one of the server takes place, the customers can access the service through another server. Moreover, in terms of scalability, the distributed servers are a better option for service providers because of need of an additional hardware on cloud; the service providers can simply add the hardware on another server to provide it on the cloud.

Comments

Popular Posts