MI0026-Computer Networks-Feb-10

MI0026-Computer Networks-Feb-10 - Spring 2010(Jan-June...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Spring 2010(Jan-June) Master of Business Administration-MBA Semester IV MI0026 Computer Networks– 2 Credits (Book ID: B1041) Assignment Set- 1 (30 Marks) Note: Each question carries 10 Marks. Answer all the questions. Q.1 write the diagram of a LAN network of your organization connecting all the peripheral devices. Also specify what kind of topology you use to connect your organization to the internet and why. [10 Marks] Q.2 Explain the different modes of data transmission. [10 marks] Q.3 Write short notes on a. CSMA/CD b. Fast Ethernet c. IEEE 802.11 Frame structure d. Routing algorithms [10 Marks] Spring 2010(Jan-June) Master of Business Administration-MBA Semester IV MI0026 Computer Networks– 2 Credits (Book ID: B1041) Assignment Set- 2 (30 Marks) Note: Each question carries 10 Marks. Answer all the questions. Q.1 Bring out the differences between the different topologies. [10 Marks] Q.2 Network security is an issue at firms of all sizes. Even the best of information- technology (IT) departments constantly face new challenges as they try to keep their firms' systems secure. The only completely secure computer is one that is not connected to a network or the Internet - and we all know that is not an option in today’s workplace. With that in mind, we need to find ways to mitigate the threats of data loss both in transition and on digital media. Data encryption, one of the best and most commonly used methods of determining data theft and hacking, is transparent to the end user. Encryption is the act of adding a cipher or string of characters to raw data (such as binary computer files), and in doing so, creating "ciphertext," or encoded blocks of text. In effect, encryption takes data that is easily viewable and "translates" it into a coded language that is very difficult to read. The computer system has to remove the cipher to convert it back to usable data by the end user. Encryption is used primarily in three security scenarios: SSL Web encryption, digital media encryption and email encryption. SSL encryption To most users, the padlock in the corner of their Web browser that shows up on certain Web pages is an indication that the information they are sending or retrieving over the Internet is secure. Any site can be encrypted by simply purchasing and applying a Secure Socket Layer (SSL) Certificate to the site. SSL encryption allows for the transmission of sensitive data between people and sites, eliminating the worry about whether that information is floating around the Internet in plain-text format. about whether that information is floating around the Internet in plain-text format....
View Full Document

This note was uploaded on 04/15/2010 for the course MBA mba taught by Professor Smu during the Spring '10 term at Manipal University.

Page1 / 5

MI0026-Computer Networks-Feb-10 - Spring 2010(Jan-June...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online