Amityuniversity.de

Amity University , Mcqs , Books ,Notes , Projects

Saturday, 05 December 2015 10:47

Computer NETWORKING

Written by
Rate this item
(0 votes)

COMPUTER NETWORKING 
1) A 
software company named "Hindsoft" wants to design its network. The company has three departments at different locations in India, like Administration in Bangalore, sales in Bombay and Development at Delhi. Each Department has 30 computers, 4 printers and 2 FAX machines whileadministration department is working as the central office to maintain all databases and main server. The main server is connected with the servers of other two departments. Give answers of the following, based on the network specification defined above : 

(a) Draw and explain the best suited physical and logical topology.
(b) Justify the need of each network device you may use in the network.
( c ) Which cable is best suited for this all the available cables to justify your answer.
(d) Which 
operating system is best for this 4 company ? Justify your answer.
(d) Explain the best hardware and software you should use in the network to implement the security.

2) (a) Explain any two functionalities of each of the following :
(i) Data link layer of OSI model
(ii) Internet layer of TCP/IP model
(iii) Session layer of OSI model

(b) What are print servers ? Why do we need them ? Explain the print queue management.

3) Write three difference between each of the following pairs : 
(a) 
Fiber optics and Coaxial cable
(b) Bridge and 
Gateways
(c) Connection Oriented and Connectionless Services
(d) Peer to Peer and 
Client-Server Networking
(e) ATM and Frame Relay

4) (a) What are the main difference between proxy server and Firewall ? Explain different types of firewalls that use different strategies for protecting network resources.

(b) What is meant by Trust Relationship ? 7 Explain the Domain Trust Relationship and Alternative Domain Trust Relationship.

5) (a) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Also, explain the purpose of fields in Token Ring frame header.

(b) Explain the "Resource Password Security Model".

6) (a) Why disk administration is an important part of network Management ? Does it provide security and reliability ? Also, explain the important options provided by
disk administrator in Windows NT.
7) Assume you are designing a LAN for library, which has three departments in the 
library buildinglike Administration, Purchase unit and Maintenance. purchase unit and Maintenance department have 25 computers, o printers each, while Administration department, which is functioning as the Central department has 38 computers, 4 printers and 2 FAX machines Administration department maintains all databases and the main server. The main server is connected with the servers of other departments. Give answers of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the above network specification.

(ii) Justify the need of each hardware device you may use in the network at different t of all

(iii) Which cable is best suited for this library ? Compare merits and demerits of all the available cables to justify your answer.

(iv) Which operating system is best for this network ? Justify your answer.
(v) Explain the best hard wares and soft wares you should use in the network to implement the securitv.

8) (a) Explain the importance of User Access security model. Also, Recursive Password security model, with their advantages and
(b) Explain different aspects of print queue management.

(c) Explain the importance of disk administration in networking.

9) (a) Explain, how windows NT manages the domains. Also, explain the trust relationship domain with the help of an example.

(b) What is the role of Network Interface Card NIC) ?

( c ) How does Stateful Inspection Technique provide security in networks ?

10 )(a) What is a difference between Viruses' and' Trojan Horses' ? Explain the possible precautions an administrator has to take for controlling Viruses and Trojan Horses.

(b) Explain the different file systems explain the NTFS master file table supported by Windows NT. Also, draw and structure and define its components'

11) Assume you are designing a network for a university, which has 25 Lecture rooms' ,Administration department, 20 Teachers rooms and one management department' Each Lecture room and Teacher room is having a computer, while administration and managernent department has 20 computers, 10 printers and 2 FAX machines each. Administration is working as the central office which maintains all databases and main serverThe main server is connected to all computers and servers of other departments.
Give answers of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the network
specification
(ii) justify. the need of each hardware device you may use in the network at different locations.

(iii) Which cable is best suited for this company ? Compare merits and demerits of all
the available cables to justify your answer.

(iv) Which operating system is best for this company ? Justify your answer.

(v) Explain the best hard wares and soft wares that can be used in the network to
implement the security

12) Explain. any two functionalities of each of the following : 
(i) Physical layer '
(ii) Data link layer
(iii) Transport layer

(b) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Explain the fields in a Token Ring frame header..


13) write three differences between each of the following pairs : 
(a) IEEE 802.6 and IEEE 802.4
( b) Iterative and Recursive name resolution
(c) Coaxial cable and Fiber optics
(d) Centralized computing and Distributed computing
(e) Internet and Intranet

14) (a) How does Windows NT manage file system ? Explain different systems supported by Windows NT. Write two advantages and two disadvantages of each model. 

(b) Explain the 'flow control' and 'error control' mechanism in X.25 protocol.

15)(a) What are print servers? Why do we need them ? What do you understand by -
print queue management ?
b) Explain the "Resource Password Security Model


16) Assume you are designing a network for a hospital, which has four departments in the hospital building like administration, OPD, Lab, and Maintenance. Each department has 20 computers, 4printers and 1 FAX machine, while Administration department is working as the Central department which maintains all databases and the main server. The main server is connected with the servers of other departments.
Give answers of the following, based on the network defined above :

(i)Draw and explain the best suited physical and logical topology for the network specification

(ii) Justify the need of each hardware device you may use in the network at different locations.

(iii)Which cable is best suited for this company ? Compare merits and demerits of all
the available cables to justify your answer.

(iv) Which operating system is best for this company ? justify your answer.

(v) Explain the best hard wares and soft wares you should use in the network to.
implement the security. 


17) Assume you are designing a network for a Gargent manufacturing and distribution
company. The company has 3 departments at different locations in India like Administration, Manufacturing and Distribution departments at New Delhi, Gujarat and Mumbai respectively. Further, distribution department has .4 sub distribution departments in Mumbai at different locations.

Each department has 25 computers, 2 printers and one FAX machine, and each sub-department has 10 computers and 2 printers while Administration department is working as the central office which maintains all database, transactions and main server.
The main server is connected with servers of other departments and sub-departments. Give answer of the following, based on the network defined above :

(i) Draw and explain the best suited physical and logical topology for the network specification.
(ii) justify the need of each hardware device you may use in the network at different locations.
(iii) Which cable is best suited for this company ? Compare merits and demerits of all
the available cables, to justify your answer.
(iv) Which operating system is best for this company? Justify your answer.
(v) Explain the best hard wares and soft wares you should use in the network to implement the security

18) Explain any two functionalities of each of the following : (i) Presentation layer
(ii) Data link layer
(iii) Internet layer of TCP/IP
(b) Explain, how the microwave communication works. In what ways is it different ' from the satellite communication ? Give at least three differences.
(c) In OSI model, how does the transport layer ensure the complete reliability of the
message and the proper ordering of the message ?

19) Write three differences between each of the following pairs
(a) Token ring and Token bus
(b) Message switching and Packet switching
(c) Connection oriented and Connection-less services
(d) 10 Base 2 and 100 Base T cable
(e) Gateway and Router

14)(a) What is the importance of mirroring ? How do we mirror a disk partition on : I server ? can we establish the mirror of boot partition ? If yes, how f If no, why not ?
(b) How does NTFS file system provide the 'recoverability' and 'compression' of files ? Explain your answer with the help of suitable examples for each.

15) (a) What is disk stripping ? What are the differences between strip set with parity
and. without -parity ? .Explain, how you can create and remove strip set with parity and without parity.

16) (a) What are the different types of activities that could be administrator in the security policy ? Also, explain addressed by the network why these activities are included in the security policy.

(b) How are the configuration of a Explain with suitable diagram. local printer and a network printer different ?

Read 2966 times
Login to post comments
You are here: Home