Layered concept of computer networks, Computer Networking

Assignment Help:

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the process.

Q2.  How does Intranet differ  from an  Internet? A modern Corporate Organization, spread over a few cities and continents, needs to have an information network of its own. Security of data and information  cannot  be compromised.  Suggest  a  suitable  type  of  network which  is  secured, easy to operate and economical too.

Discuss the topological structure of the network.      

Q3.  IT can be used in an extensible manner to deal with speed and accuracy. Devise an IT based system suitable for a Discom that can be used for load management and should be able to address the issues like Power Theft, Outages, Under Voltage and Over/ Under frequency etc. that are crucial for any power supply company.

Q4.  CRM plays a very important role in revenue realization for any power distribution company. Discuss a  few measures which  fulfill  these objectives  in modern day operations of a power company. Has e-business any role in it?

 Q5.  How are data, information, knowledge and intelligence related? Explain with suitable examples from a Power Generating Company. How can we exchange business data using IT interface in the same industry?

Q6.  Describe the role of GIS in power transmission and distribution.  Also,  discuss  the  hardware  &  software elements of such a system in detail. What advantages do you feel would accrue to the company by having such a system over the conventional manual efforts?


Related Discussions:- Layered concept of computer networks

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Verify vlans and trunking - ccna, Verify VLANs and trunking. Use the sh...

Verify VLANs and trunking. Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VL

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Define interconnection network, Interconnection Network An interconnect...

Interconnection Network An interconnection network is designed for transferring data between two processors in a Multi-stage network. Memory bottleneck is a fundamental limitat

Drawback of repeaters, Drawback of  Repeaters. Repeater  has no filte...

Drawback of  Repeaters. Repeater  has no filtering capability as it forwards  every frame. Repeater shell  be placed  at accurate distance  before  actual  signal becomes

Explain about the middleware support, Explain about the Middleware support ...

Explain about the Middleware support All the connectivity interface related tools come under the category of middleware. Middleware provides the link for data exchange between

Network control protocols ncp, Network  Control  protocols ( NCP) Th...

Network  Control  protocols ( NCP) The first  ARPANET  networking protocols  was named  simply the network  control protocols in 1970,and  was created by  created by  network

Explain simple mail transfer protocol, Q. Explain Simple Mail Transfer Prot...

Q. Explain Simple Mail Transfer Protocol? Electronic Mail -Simple Mail Transfer Protocol (SMTP) is used to support email on the Internet -Addressing consists of two pa

Leased satellite channel, LEASED SATELLITE CHANNEL: It may span arbitr...

LEASED SATELLITE CHANNEL: It may span arbitrarily big distance. It is given in the figure below.   Figure Satellite connections are low bandwidth to protect cost

Set up to use pvm run and complie, PVM uses two environment variables when ...

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd