0% found this document useful (0 votes)
13 views3 pages

MBA Network Concept

MBA Network Concept

Uploaded by

sarath kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views3 pages

MBA Network Concept

MBA Network Concept

Uploaded by

sarath kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MBA - IT 4th SEM Assignment-01

Subject - Networking Concepts


1. What are the four divisions made in the sliding window?

The sliding window technique is commonly used in computer science and algorithms, particularly for problems
involving sequences or arrays, where the window "slides" over the data structure to solve the problem
efficiently. While the "four divisions" is not a standard phrase, in the context of sliding windows, we can
interpret it in different ways, such as:

1. Initial Window: The first division is the window's initial position.

2. Sliding Step: This refers to the process of sliding the window one position forward (or backward) after
processing the current subarray or subsequence.

3. End Condition: This marks when the window reaches the end of the sequence.

4. Window Update/Adjustment: After each slide, you may need to adjust certain aspects of the window,
such as recalculating sums, averages, or other metrics, or updating conditions based on the window's
new contents.

2. Compare and contrast different types of bridges?


Bridges are essential structures that span physical obstacles (such as rivers, valleys, or roads) to allow
the passage of vehicles, pedestrians, or other forms of transportation. The design of a bridge depends
on various factors like the terrain, load requirements, material availability, and the purpose of the
bridge. Below is a comparison of some of the most common types of bridges:
1. Beam Bridge
 Structure: A beam bridge is one of the simplest types of bridges, consisting of a horizontal beam
supported at both ends.
 Design: The weight of the bridge and any load it carries is transferred directly to the supports at either
end (also known as abutments).
 Materials: Typically made from concrete, steel, or wood.
 Load-bearing: It relies on the strength of the beam to resist bending.
 Advantages:
o Simple design and construction.
o Cost-effective for short spans.
 Disadvantages:
o Limited to shorter spans (typically up to 250 feet).
o Can be less aesthetically pleasing.
2. Arch Bridge
 Structure: An arch bridge features a curved structure that directs the load primarily along the curve of
the arch, transmitting forces to the supports (abutments) at either end.
 Design: The arch is a key component, often made of stone, concrete, or steel.
 Materials: Traditionally made of stone or brick; modern versions use concrete and steel.
 Load-bearing: The load is transferred efficiently through compression in the arch.
 Advantages:
o Strong and can span larger distances than a beam bridge.
o Aesthetic and historically significant.
o Very efficient at handling compression.
 Disadvantages:
o Requires strong foundations to support the arch.
o More complex to build, especially in mountainous or difficult terrains.
a. What is distributed database?
A distributed database is a type of database that is spread across multiple physical locations, which may
be on different machines or networks. It allows for data to be stored, managed, and accessed from
different sites while ensuring consistency and reliability through synchronization mechanisms.
b. Session Termination
Session termination refers to the process of ending a user's session in a system or application, typically
after they log out or the session expires. It ensures that any resources allocated to the session are
released and security is maintained by invalidating authentication tokens or session identifiers.
c. Repeaters
Repeaters are network devices used to extend the range of signals in communication systems by
amplifying or regenerating the signal. They help maintain signal strength and quality over long distances,
especially in wired or wireless networks.
d. ATM
ATM (Asynchronous Transfer Mode) is a high-speed networking technology that transmits data in fixed-
size packets called cells, enabling efficient handling of voice, video, and data traffic. It is widely used in
wide-area networks (WANs) for its low-latency and high-bandwidth capabilities.
e. Explain SNA
SNA (Systems Network Architecture) is a network protocol developed by IBM for communication
between mainframe computers and other devices in a distributed network. It provides a structured
framework for managing and controlling data flow, ensuring reliable and secure communication in
enterprise environments.

Subject - Networking Concepts


Assignment – 02
1. Explain public key methods. What are the two keys used in it? Explain them

Public Key Methods refer to cryptographic systems that use two keys for secure communication: a public key and a private
key.

 Public Key: Shared openly; used to encrypt data.

 Private Key: Kept secret; used to decrypt data encrypted with the corresponding public key.

This method ensures secure communication, as only the holder of the private key can decrypt messages encrypted with
the public key.

2. Describe LAN giving an example. What are the distinguishing features of LAN?
LAN (Local Area Network) is a network that connects computers and devices within a small geographic area, like a
home, office, or campus.
Example: A network of computers in an office connected to shared printers and servers.
Distinguishing Features:
 Covers a small area (e.g., building or campus).
 High data transfer speeds.
 Owned and maintained by a single organization.
 Low latency and cost-effective.

a. Define data processing


Data processing is the manipulation and organization of raw data into meaningful information through various
methods like sorting, filtering, and calculating. It is essential for generating insights, reports, or making decisions in
businesses and systems.
b. Explain multipoint configuration.
Multipoint configuration is a network setup where multiple devices are connected to a single communication
channel, allowing them to share the same transmission medium. This configuration is commonly used in scenarios
like video conferencing or shared data networks.

c. Define FTAM
FTAM (File Transfer, Access, and Management) is a standard for exchanging files over a network, enabling users to
transfer, access, and manage files across different systems. It facilitates secure and efficient file communication in
distributed environments.

d. Explain data link layer


The Data Link Layer is the second layer in the OSI model, responsible for error detection, correction, and framing of
data for transmission over a physical medium. It ensures reliable communication between devices on the same
network.

e. Define information.
Information is data that has been processed or organized in a way that it is meaningful and useful for decision-
making or understanding. It provides context and relevance, transforming raw data into valuable insights.

You might also like