Tuesday, January 28, 2020

Various Components Of Computer Network Structure Information Technology Essay

Various Components Of Computer Network Structure Information Technology Essay What are the various components of Computer Network structure. Explain in brief. Write down the differences between connection oriented and connectionless services. Explain in brief the topologies that are used for broadcasting type of communication. Television channels are 6MHz wide. How many bits/sec. can be sent if four levels digital signals are used? Assume a noiseless channel. Which of the OSI layer handles each of the following: Breaking the transmitted bit stream into frames. Determining which route through the subnet to use. Providing compatibility in data and text. Providing terminal compatibility. Providing facility for remote login. Sketch the Manchester and Differential Manchester encoding for the following bit stream: 0111000111001101 For differential Manchester encoding assume the line is initially in the low state. UPTU 2007-08 Attempt any two parts of the following: (102=20) What do you mean by a computer network? Explain in detail various goals and applications in real life of computer networks. Give different categorization of the computer networks. What are internetworks? How you will categorize internetworks using above categories of computer networks. Give a detail description of the functionality of different layer of OSI model. UPTU 2008-09 Attempt any two parts of the following: (102=20) (i) What do you mean by network topology? Explain in brief any three such network topologies. (ii) What is difference between TCP/IP and OSI model? What are channel types in ISDN to construct the transmission structure of any access link? Explain them. Which types of transmission media are used at physical layer transmission? Give a comparative study of different transmission media in guided media. When unguided media is suitable for transmission? UPTU 2009-10 Attempt any two parts of the following: (102=20) What are the reasons for using layered protocol? A system has an n-layer protocol Hierarchy. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? (i) If a binary signal is sent over a 3-kHz channel whose signal-to-noise ratio is 20 dB, what is the maximum achievable data rate? (ii) What is the percent overhead on a T1 carrier; that is, what percent of the 1.544 Mbps are not delivered to the end user? Explain the advantages and disadvantages if any of the following topologies: (i) star (ii) ring (iii) bus (iv) mesh UNIT II UPTU 2006-07 Attempt any four parts of the following: (54=20) Suppose that the string 0101 is used as the bit string to indicate the end of a frame and the bit stuffing rule is to insert a 0 after each appearance of 010 in the original data; thus 010101 would be modified by stuffing to 01001001. In addition, if the frame proper ends in 01, 0 would be stuffed after the first 0 in the actual terminating string 0101. Show how the following would be modified by this rule? 11011010010101011101 Measurements of an infinite user slotted ALOHA channel show that 10% of the slots are idle: (i) What is the channel load, G? (ii) What is throughput? (iii) Is the channel underloaded or overloaded? Consider an error free 64-Kbps satellite channel used to send 512 byte data frames in one direction, with very short acknowledgement coming back the other way. What is the maximum throughput for window sizes of 01 and 07? A bit stream 10011101 is transmitted used the standard CRC method. The generator polynomial is x3 + 1. Show the actual bit string transmitted. Suppose the third bit from the left is inverted during transmission. Show that this error is detected at the receivers end. Explain Basic-Bit-Map (a collision free protocol) used at MAC sublayer. Sixteen stations, numbered 1 through 16, are contending for the use a shared channel by using the adaptive Free Walk Protocol. If all the station whose addresses are prime number suddenly becomes ready at once, how many bit slots are needed to resolve the contention? UPTU 2007-08 Attempt any two parts of the following: (102=20) What is Hamming code? For the following word pattern (message) find out the number of check bit and the bit at eleventh position. If any error is detected, show it. M = 1111 1010 0000 1110 What are medium access control (MAC) protocols? Discuss salient feature of CSMA/CD protocol. Describe the bit stuffing rule used the HDLC protocol. Consider a CSMA/CD network running at 200 Mbps over a 1 Km cable with no repeaters. The signal speed is 2 * 108 m/sec. Compute the minimum frame size. UPTU 2008-09 Attempt any two parts of the following: (102=20) What do you mean by ALOHA? How does slotted ALOHA improve efficiency? SEC(7,4) hamming code can be converted into a double error detecting and single error correcting code (8,4) by using an extra parity check. Construct the generator matrix for the code and show that the code is quasi perfect. Design a decoder for the code. Explain the IEEE 802.3 MAC sublayer frame format. What is the binary exponential back off algorithm? UPTU 2009-10 Attempt any two parts of the following: (102=20) A large population of ALOHA users manage to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec. What is the chance of success on the first attempt? What is the probability of exactly k collisions and then a success? Explain the working of CSMA/CD protocol. Why there is a minimum frame length restriction in CSMA/CD? Explain the working of GO-BACK N ARQ protocol. How it is different from selective repeat ARQ? UNIT III UPTU 2006-07 Attempt any two parts of the following: (102=20) Write and explain the kinds of shortest path routing Algorithm in brief. Find the shortest path in the following subnet using Dijsktra Algorithm, when the source is fixed but destination is not fixed. Describe the choke-packet method of congestion control. You are also required to explain the variation in the above mentioned algorithm. Explain the concept of Tunnelling in Internetworking. Write down the difference in IPv4 and IPv6. UPTU 2007-08 Attempt any two parts of the following: (102=20) Answer the following question: How is IPv6 different from IP protocol? Convert IP address whose hexadecimal representation is C22F1582 to dotted decimal notation. A class B class network on the internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts per subnet? Explain the purpose of subnetting. What is Link Control Protocol? Give the format of LCP packet. Also how authentication is supported in PPP? Explain. (i) A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to a capacity with 8 megabit. How long can the computer transmit at the full 6 Mbps? (ii) Discuss the token passing technique used in FDDI. UPTU 2008-09 Attempt any two parts of the following: (102=20) What is the congestion in network layer? Differentiate and explain Leaky-Bucket algorithm and Token Bucket algorithm? What is the role of routing algorithm? Explain the working of Distance Vector Routing algorithm with the help of a suitable example. (i) Explain various phases through which a PPP connection goes using transition state diagram. (ii) What is the significance of IP address classification? What problems of IPv4 are being addressed by IPv6? UPTU 2009-10 Attempt any two parts of the following: (102=20) A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer transmit at the full 6 Mbps? Give a classification of IP addresses used in the Internet. Suppose that instead of using 16 bits for the network part of a class B address originally, 20 bits had been used. How many class B networks would there have been? (i) The protocol field used in the IPv4 header is not present in the fived IPv6 header. Write your justification. (ii) IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated every picosecond, how long will the addresses last? UNIT IV UPTU 2006-07 Attempt any two parts of the following: (102=20) Describe Transmission Control Protocols (TCP) Transmission policy. Explain the Remote Procedure Call with suitable diagram. You are also required to explain the use of RPC in Transport layer. Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. Are deadlocks now possible? Give an example or how what none exist. UPTU 2007-08 Attempt any two parts of the following: (102=20) Why does UDP exist? Would it not have been enough to just let user processes send raw IP packets? What are two army problem and a three way handshake? State the elements of transport protocol. Describe the feature of the following devices: Routers Bridges Gateway UPTU 2008-09 Attempt any two parts of the following: (102=20) A TCP connection is using a window size of 1000 B and the previous acknowledgement no was 22,001. It receives a segment with acknowledgement no 24,001. Draw a diagram to show the situation of the window after and before the acknowledgement is received. If the window size is change to 11000B and 9000B separately, than what will be the situation? Discuss the issue to be considered in designing different layers. (i) What is user datagram protocol? Give its datagram format. (ii) Would it not have been enough to just let user processes send raw IP packets? Give reason in support to your answer. UPTU 2009-10 Attempt any two parts of the following: (102=20) Draw the TCP header format and explain its various fields. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 10-msec one way delay. What is the maximum throughput achievable? What is the line capacity? Explain Connection Management at the transport layer in detail. UNIT V UPTU 2006-07 Attempt any two parts of the following: (102=20) Explain the architecture of Electronic Mail (i.e. E-mail). Describe the concept of Domain name System in brief. Explain the working of server side in the architectural overview of World-Wide-Web (WWW). UPTU 2007-08 Attempt any two parts of the following: (102=20) One secret key encryption method involves the permutation of bits. For example an 8 bit plain text is permuted, bit 8 becomes bit 3, bit 1 becomes bit 2 and so on. Draw a diagram to show the mapping of each bit to its new designation. Scramble the bits as you please. What is encryption and decryption algorithm? What do you mean by following : HTTP SNMP How MPEG file format is different from JPEG file format? Encode the following message using Huffman coding: INDIAN INNING Write short note on one of the following : Network security and cryptography Electronic mail and FTP. UPTU 2008-09 Attempt any two parts of the following: (102=20) One secret key encryption method involves the XOR operation. A bit patter (plaintext) of a fixed size in XORed with a block of bits of the same size to create to fixed sized cipher text. What is the encryption algorithm here? What is the decryption algorithm here? Remember that an XOR algorithm is a reversible algorithm. (i) Why do we need Domain name space when we can directly use an IP address? (ii) What is trivial file transfer protocol? How it is different from simple FTP? (i) What is the role of digital signature in cryptography? (ii) What is JPEG standard? How it is different from JPEG 2000? UPTU 2009-10 Attempt any four parts of the following: (54=20) Can a query message in DNS have one question section but the corresponding response message have several answer sections? Describe the addressing system used by SMTP. Describe the functions of the two FTP connection. What is anonymous FTP? Compare the way SMTP and HTTP transfer images. Which one do you think is more efficient? Why? The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (719, 3, 191). Bob responds with (543). Alices secret number, x, is 16. What is the secret key? Can IPsec using AH be used in transport mode if one of the machines is behind a NAT box? Explain your answer.

Monday, January 20, 2020

rock & pop :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  What has the power to make you get up and move, to both inspire you and enrage you? Rock, rap, â€Å"pop†, country, and blues are all forms of this phenomenon we call music. Music has been a part of each and everyone of our lives. How often have you heard a song and it brought you back to a place in your past, or reminded you of someone? Chances are you were listening to music that fell into one of the two most popular categories, rock or pop. Both rock and pop can be considered movements in society, however the motivation for these movements were on the opposite ends of the spectrum. Also another thing that they have in common is that once the artists are famous the may both have a tendency to fall off the deep end. This may entail spending thousands of dollars on drugs and alcohol. Eventually many of both pop and rock stars end up in rehab. Even though the lines between rock and pop can be blurred at times there are many distinct differences.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  One of the most profound differences is the way both types of music came about. Rock and roll started back in the early 60’s. It was a time when the Vietnam war had just begun. Steppenwolf, The Beetles, Jimi Hendrix, and The Doors all were sending out soulful messages through their music. They were singing about war, drugs, and love instead of war. There lyrics were from the heart. It provoked feelings of rage for the government, and love for one another. The rock and roll movement began out of pent up energy that had to be released in an positive manner. It had very pure, honest intentions. On the other hand pop, short for popular, music was contrived from the beginning. It too had it’s beginnings in the 60’s starting with the Monkeys. Four guys were brought together by some corporate bigwigs to create an American version of the Beetles. Little did the public know that they were not even singing their own songs. They were lip-singing the whol e time. But, they managed to top the charts and make young girls faint. That could be considered the first pop music.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Another major difference between rock and pop groups are the way they get started. Pop groups are usually formed by record companies with preconceived notions of what kind of image they want the artist to have.

Sunday, January 12, 2020

Cats are not good pets

Who would ever in their right mind want a cat as a pet? Cats are the most conniving animals alive and no one should even think to keep them as a pet. There are some people who have a large number of cats in their house at one time and continue adding to the number and that is Just ridiculous. Cats can carry around a foul smell or odor and shed their hair which gets everywhere it should not be. There is also a lot of money that can be involved with investing in supplies, health and food or a cat.If anyone has a cat for a pet they should be ready to take full responsibility of the cat and all of the downfalls that come with it. If anyone owns a cat in their house then they should really consider neutering the rambunctious mammal because there is an overpopulation of cats in America. There should be a limit of how many cats a person can have in their home. â€Å"It is impossible to determine how many stray dogs and cats live in the United States; estimates for cats alone range up to 70 million† (ASPIC, 2012).If anyone owns a cat then it should be mandatory that the cat should be spayed and neutered with random inspections. Pets can be very expensive and America is currently in a recession for the people who are unaware. â€Å"The average cost of basic food, supplies, medical care and training for a dog or cat is $600 to $900 annually† (CAPS, 2012). If people do not have enough money to eat a decent meal and have ten cats at home then it is simple math. Get rid of the cat! Although some may see cats as cute and cuddly Just remember that they are very neck animals and cannot be trusted.Burning a hole into your pocket for an animal that cannot be trusted is a complete waste of money and resources. â€Å"About 78. 2 million dogs and about 86. 4 million cats are owned in the United States† (CAPS, 2012). This means that there are some animals that do not need to be around. There are too many animals that are living on the streets and taking up space . Many Americans are living on the streets and unable to find food, clothes to wear or shelter and we are worried about cats.

Friday, January 3, 2020

Example of a Mock-Heroic Poem - Free Essay Example

Sample details Pages: 1 Words: 272 Downloads: 2 Date added: 2017/09/16 Category Advertising Essay Did you like this example? As I opened the door to my room I came to find The Jungle of Mess that I thought I left behind I mustered all my courage and stepped in But nothing could have prepared me for what was in store; Oh, if I only knew that my future would soon become dim! Coming fast and unexpectedly the serpent slithered fast Concocted by the closet demon of all the clothes forgotten on the floor that was left in the past Panicked, I proceeded to run out Only to be bombarded by a tsunami of dity socks, crumpled papers and dust spread throughout I fought and pleaded for them to let me go But they just laughed and prepared to give the final death blow All hope is lost! I give up! Im dying! Theyve won! I thought miserably And just as soon as I was ready to step into the light I found courage and instead decided not to give up without a fight I picked up a guitar all used and worn Don’t waste time! Our writers will create an original "Example of a Mock-Heroic Poem" essay for you Create order And smashed it on the serpent with anger and scorn Threw all the socks in the laundry bin and the papers in the trash And swept all the dust away in a flash The closet demon cried as it lost its power slowly and slowly until finally vanishing into debris. I sighed in relief claiming victory for myself My room was clean and no longer will I have feelings of dread. I went to bed and fell asleep Only to wake up to a familiar sight and so I screamed Oh no, it was just a dream!