Free Essay

Networking

In: Other Topics

Submitted By satyakamala
Words 3493
Pages 14
COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
1.What do you mean by data communication? Ans: It is the exchange of data between two devices via some form of transmission medium such as wire cable. The communicating system must be part of a communication system made up of a combination of hardware and software.The effectiveness of a data communication system depends on three fundamental characteristics: delivery, accuracy and timeliness. 2.What is simplex? Ans: It is the mode of communication between two devices in which flow of data is unidirectional. i.e. one can transmit and other can receive. E.g. keyboard and monitor. 3.What is half-duplex? Ans: It is the mode of communication between two devices in which flow of data is bidirectional but not at the same time. ie each station can transmit and receive but not at the same time. E.g walkie-talkies are half-duplex system. 4.What is full duplex? Ans: It is the mode of communication between two devices in which flow of data is bidirectional and it occurs simultaneously. Here signals going in either direction share the capacity of the link. E.g. telephone 5.What is a network? Ans: It is a set of devices connected by communication links. A node can be a computer or any other device capable of sending and/or receiving data generated by other nodes on the network. 6.What is distributed processing? Ans: It is a strategy in which services provided by the network reside at multiple sites. 7.What is point to point connection? Ans:It provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between the two devices e.g. when we change the TV channels by remote control we establish a point to point connection between remote control and TV control system. 8.What is multipoint connection? Ans: In multipoint connection more than two specific devices share a single link. Here the capacity of the channel is shared either separately or temporally. 9.What is a topology? Ans: Topology of a network is defined as the geometric representation of the relationship of all the links and linking devices (node) to one another.Four basic topologies are star, bus, ring and mesh. Star – Here each device has a dedicated point to point link only to a central controller called hub.
WWW.PROFMARIAMICHAEL.COM Page 1

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
Bus -It is multipoint. One long cable acts as a backbone to link all the devices in the network. Ring -Here each device has a dedicated point to point connection only with the two devices on either side of it. Mesh -Here every device has a dedicated point to point link to every other device. 10.Define LAN, MAN and WAN. Ans: LAN- A local area network (LAN) is a privately owned and links the devices in a single office, building or campus. It allows resources to be shared between personal computers and work stations. MAN- A metropolitan-area network (MAN) spreads over an entire city. It may be wholly owned and operated by a private company, eg local telephone company. WAN – A wide area network (WAN) provides long distance transmission of data, voice, image and video information over large geographic areas that comprise a country, a continent or even whole world.

11.Define internet? Ans: It is a network of networks. 12.What is a protocol? Ans: It is a set of rules that governs data communication. A protocol defines what is communicated, how it is communicated, and when it is communicated. The key elements of protocol are syntax, semantics and timing. 13.What is TCP/IP protocol model? Ans: It is a five layered model which provides guidelines for the development of universally compatible networking protocols. The five layers are physical, data link, network, transport and application. 14.Describe the functions of five layers? Ans: Physical- It transmits raw bits over a medium. It provides mechanical and electrical specification. Data link- It organizes bits into frames. It provides hop to hop delivery. Network-It moves the packets from source to destination.It provide internetworking. Transport-It provides reliable process to process message delivery and error recovery. Application-It allows ti access to network resources. 15.What is ISO-OSI model? Ans: Open Systems Interconnection or OSI model was designed by the International Organization for Standardization (ISO) .It is a seven layer model. It is a theoretical model designed to show how a protocol stack should be implemented. It defines two extra layers in addition to TCP/IP model. Session -It was designed to establish, maintain, and synchronize the interaction between communicating system.
WWW.PROFMARIAMICHAEL.COM Page 2

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
Presentation-It was designed to handle the syntax and semantics of the information exchanged between the two systems. It was designed for data translation, encryption, decryption, and compression. 16. What is multiplexing? Ans: Multiplexing is the process of dividing a link, the phycal medium, into logical channels for better efficiency. Here medium is not changed but it has several channels instead of one. 16.What is switching? Ans: Switching in data communication is of three types Circuit switching Packet switching Message switching 17.How data is transmitted over a medium? Ans: Data is transmitted in the form of electromagnetic signals. 18. Compare analog and digital signals? Ans: Analog signals can have an infinite number of values in a range but digital signal can have only a limited number of values. 19.Define bandwidth? Ans: The range of frequencies that a medium can pass is called bandwidth. It is the difference between the highest and lowest frequencies that the medium can satisfactorily pass. 20.What are the factors on which data rate depends? Ans: Data rate ie.how fast we can send data depends upon i) Bandwidth available ii) The levels of signals we can use iii) The quality of the channel (level of noise)

21.Define bit rate and bit interval? Ans: Digital signals are aperiodic.so instead of using period and frequency we use bit interval and bit rate respectively.Bit interval is the time required to send one single bit.Bit rate is the number of bit intervals per second. 22.What is Nyquist bit rate formula? Ans: For a noiseless channel, the Nyquist bit rate formula defines the theoretical maximum bit rate Bitrate=2* Bandwidth*log2L Where Bandwidth is the bandwidth of the channel L is the number of signal level used to represent the data Bitrate is the bit rate in bits per second.
WWW.PROFMARIAMICHAEL.COM Page 3

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
23.Define Shannon Capacity? Ans: Shannon Capacity determines the theoretical highest data rate foe a noise channel. Capacity= Bandwidth * log2 (1+SNR) Bandwidth is the bandwidth of the channel. SNR is the signal to noise ratio, it is the statical ratio of the power of the signal to the power of the noise. Capacity is the capacity of the channel in bits per second 24.What is sampling? Ans: It is the process of obtaining amplitude of a signal at regular intervals. 25.Define pulse amplitude modulation? Ans: It is an analog to digital conversion method which takes analog signals, samples it and generates a series of pulse based on the results of the sampling. It is not used in data communication because the series of pulses generated still of any amplitude. To modify it we use pulse code modulation. 26.Define pulse code modulation? Ans: Pulse code Modulation modifies pulses created by PAM to create a completely digital signal. For this PCM first quantizes the PAM pulse. Quantization is the method of assigning integral values in a specific tange to sampled instances.PCM is made up of four separate processes: PAM, quantization, binary encoding and line encoding. 27.What is Nyquist Theorem? Ans: According to this theorem, the sampling rate must be at least 2 times the highest frequency of the original signal. 28.What are the modes of data transmission? Ans: Data transmission can be serial or parallel in mode In parallel transmission, a group of bits is sent simultaneously, with each bit on a separate line.In serial transmission there is only one line and the bits are sent sequentially. 29.What is Asynchronous mode of data transmission? Ans: It is a serial mode of transmission. In this mode of transmission, each byte is framed with a start bit and a stop bit. There may be a variable length gap between each byte. 30.What is Synchronous mode of data transmission? Ans: It is a serial mode of transmission.In this mode of transmission, bits are sent in a continuous stream without start and stop bit and without gaps between bytes. Regrouping the bits into meaningful bytes is the responsibility of the receiver.

WWW.PROFMARIAMICHAEL.COM

Page 4

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
31.What are the different types of multiplexing? Ans: Multiplexing is of three types. Frequency division multiplexing and wave division multiplexing is for analog signals and time division multiplexing is for digital signals. 32.What is FDM? Ans: In frequency division multiplexing each signal modulates a different carrier frequency. The modulated carrier combines to form a new signal that is then sent across the link. Here multiplexers modulate and combine the signal while demultiplexers decompose and demodulate. Guard bands keep the modulating signal from overlapping and interfering with one another. 32.What is TDM ? Ans: In TDM digital signals from n devices are interleaved with one another, forming a frame of data. Framing bits allow the TDM multiplexer to synchronize properly. 33.What are the different transmission media? Ans: The transmission media is broadly categorized into two types i)Guided media(wired) i)Unguided media(wireless) 34.What are the different Guided Media? Ans: The media which provides a conduct from one device to another is called a guided media. These include twisted pair cable, coaxial cable, and fiber-optic cable. 35.Describe about the different Guided Medias. Ans: Twisted pair cable consists of two insulated cupper wires twisted together. It is used in telephone line for voice and data communications. Coaxial cable has the following layers: a metallic rod-shaped inner conductor, an insulator covering the rod, a metallic outer conductor (shield), an insulator covering the shield, and a plastic cover.Coaxial cable can carry signals of higher frequency ranges than twisted-pair cable. Coaxial cable is used in cable TV networks and Ethernet LANs.Fiber-optic cables are composed of a glass or plastic inner core surrounded by cladding, all encased in an outer jacket.Fiber-optic cables carry data signals in the form of light. The signal is propagated along the inner core by reflection. Its features are noise resistance, low attenuation, and high bandwidth capabilities. It is used in backbone networks, cable TV nerworks, and fast Ethernet networks. 36.What do you mean by wireless communication? Ans: Unguided media transport electromagnetic waves without using a physical conductor. This type of communication is referred as wireless communication. Here signals are broadcaster through air and thus available to anyone who has a device to receive it.

WWW.PROFMARIAMICHAEL.COM

Page 5

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
37.What do you mean by switching? Ans: It is a method in which communication devices are connected to one another efficiently. A switch is intermediary hardware or software that links devices together temporarily. 38.What are the switching methods? Ans: There are three fundamental switching methods: circuit switching, packet switching, And message switching.In circuit switching, a direct physical connection between two devices is created by space division switches, time division switches or both. In packet switching data is transmitted using a packet switched network. Packet switched network is a network in which data are transmitted in independent units called packets. 39.What are the duties of data link layer? Ans: Data link layer is responsible for carrying packets from one hop (computer or router) to the next. The duties of data link layer include packetizing, adderssing, error control, flow control, medium access control. 40.What are the types of errors? Ans: Errors can be categorized as a single-bit error or burst error. A single bit error has one bit error per data unit. A burst error has two or more bits errors per data unit.

41.What do you mean by redundancy? Ans: Redundancy is the concept of sending extra bits for use in error detection. Three common redundancy methods are parity check, cyclic redundancy check (CRC), and checksum. 42.Define parity check. Ans: In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd parity).Simple parity check can detect all single bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.In two dimensional parity checks, a block of bits is divided into rows and a redundant row of bits is added to the whole block. 43. Define cyclic redundancy check (CRC). Ans: C RC appends a sequence of redundant bits derived from binary division to the data unit. The divisor in the CRC generator is often represented as an algebraic polynomial. 44. What is hamming code? Ans: The hamming code is an error correction method using redundant bits. The number of bits is a function of the length of the data bits. In hamming code for a data unit of m bits, we use the formula 2r >= m+r+1 to determine the number of redundant bits needed. By rearranging the order of bit transmission of the data units, the hamming code can correct burst errors. 45.What do you mean by flow control? Ans: It is the regulation of sender’s data rate so that the receiver buffer doesn’t become
WWW.PROFMARIAMICHAEL.COM Page 6

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS overwhelmed.i.e. flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgement. 46.What do you mean by error control? Ans: Error control refers primarily to methods of error detection and retransmission. Anytime an error is detected in an exchange, specified frames are retransmitted. This process is called automatic repeat request (ARQ). 47.Define stop and wait ARQ. Ans: In stop and wait ARQ, the sender sends a frame and waits for an acknowledgement from the receiver before sending the next frame. 48.Define Go-Back-N ARQ? Ans: In Go-Back-N ARQ, multiple frames can be in transit at the same time. If there is an error, retransmission begins with the last Unacknowledged frame even if subsequent frames arrived correctly. Duplicate frames are discarded. 49.Define Selective Repeat ARQ? Ans: In Selective Repeat ARQ, multiple frames can be in transit at the same time. If there is an error, only unacknowledged frame is retransmitted. 50.What do you mean by pipelining, is there any pipelining in error control? Ans: The process in which a task is often begun before the previous task has ended is called pipelining. There is no pipelining in stop and wait ARQ however it does apply in Go-Back-N ARQ and Selective Repeat ARQ.

51.What is HDLC? Ans: It is a bit oriented data link protocol designed to support both half duplex and full duplex communication over point to point and multi point links.HDLC is characterized by their station type,configuration and their response modes. 52.What do you mean by point to point protocol? Ans: The point to point protocol was designed to provide a dedicated line for users who need internet access via a telephone line or a cable TV connection. Its connection goes through three phases: idle, establishing, authenticating, networking and terminating. At data link layer it employs a version of HDLC. 53. What do you mean by point to point protocol stack? Ans: Point to point protocol uses a stack of other protocol to use the link, to authenticate the parties involved, and to carry the network layer data. Three sets of protocols are defined: link control protocol, Authentication protocol, and network control protocol.

WWW.PROFMARIAMICHAEL.COM

Page 7

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS
54.What do you mean by line control protocol? Ans: It is responsible for establishing, maintaining, configuring, and terminating links. 55.What do you mean by Authentication protocol? Ans: Authentication means validating the identity of a user who needs to access a set of resources. It is of two types i)Password Authentication Protocol(PAP) ii)Challenge Handshake Authentication Protocol(CHAP) PAP is a two step process. The user sends a authentication identification and a password. The system determines the validity of the Information sent.CHAP is a three step process. The system sends a value to the user. The user manipulates the value and sends the result. The system Verifies the result. 56.What do you mean by network control protocol? Ans: Network control protocol is a set of protocols to allow the encapsulation of data coming from network layer protocol that requires the services of PPP. 57. What do you mean by CSMA? Ans: To reduce the possibility of collision CSMA method was developed. In CSMA each station first listen to the medium (Or check the state of the medium) before sending. It can’t eliminate collision. 58.What do you mean by Bluetooth? Ans: It is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers and so on. Bluetooth LAN Is an adhoc network that is the network is formed spontaneously? It is the implementation of protocol defined by the IEEE 802.15 standard. 59.What is IP address? Ans: The internet address (IP address) is 32bits that uniquely and universally defines a host or router on the internet. The portion of the IP address that identifies the network is called netid. The portion of the IP address that identifies the host or router on the network is called hostid. 60.What do you mean by subnetting? Ans: Subnetting divides one large network into several smaller ones. It adds an intermediate level of hierarchy in IP addressing.

61.What are the advantages of fiber optics cable ? Ans: The advantages of fiber optics cable over twisted pair cable are Noise resistance-As they use light so external noise is not a factor. Less signal attenuation-fiber optics transmission
WWW.PROFMARIAMICHAEL.COM Page 8

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS distance is significantly greater than that of other guided media.Higher bandwidth-It can support higher bandwidth. 62.What are the disadvantages of fiber optics cable? Ans: The disadvantages of fiber optics cable over twisted pair cable are Cost-It is expensive Installation/maintenance-Any roughness or cracking defuses light and alters the signal Fragility-It is more fragile. 63.What are the propagation type of radio wave ? Ans: Radio wave propagation is dependent upon frequency.There are five propagation type. i)surface propagation ii)Tropospheric propagation iii)Ionospheric propagation iv)Line of sight propagation v)space propagation 64.What do you mean by Geosynchronous Satellites ? Ans: Satellite communication uses a satellite in geosynchronous orbit to relay signals.The Satellite must move at the same speed as the earth so that it seems to remain fixed above a certain spot..Only one orbit can be geosynchronous.This orbit occurs at the equatorial plane and is approximately 22,000 miles from the surface of earth. 65.What are the factors for evaluating the suitability of the media ? Ans: The factors are cost,throughput,attenuation,Electromagneric interference(EMI),securtty. 66.What do you mean by medium access control(MAC) sublayer. Ans: The protocols used to determine who goes next on a multi-access channel belong to a sublayer of the data link layer is called the multi-access channel(MAC) sublayer.It is the buttom part of data link layer. 67.What do you mean by ALOHA ? Ans: It is the method used to solve the channel allocation problem .It is used for: i)ground based radio broadcasting ii)In a network in which uncoordinated users are competing for the use of single channel. It is of two types: 1.Pure aloha 2.Slotted aloha 68.What is pure ALOHA? Ans: It lets users transmit whenever they have data to sent.Collision may occur but due to feedback property sender can know the status of message.conflict occur when at one time more bits are transmitted.The assumptions are : i)all frame size is same for all user. ii)collision occur when frames are transmitted simultaneously iii)indefinite population of no of user.
WWW.PROFMARIAMICHAEL.COM Page 9

COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS iv)N=number of frames/frame time iv)it obeys poisson’s distribution if N>1 there will be collision 0

Similar Documents

Premium Essay

Networking

...Networking in My Life and Career Angel Salvador Maldonado DeVry University Author Note This paper was prepared for CEIS-100 taught by Professor Reinaldo Fernandez. Course Project Week #: 2 Networking in My Life and Career A network is defined as a group of computers that are connected to share information. An NIC is a Network Interface Card. It is the physical component of a computer that allows a computer to connect to a network. Three types of media used for network connections are cable television coaxial, fiber optic cable and wireless connections. There have often been times when I have had to access my home wireless internet network and have not been able too. I start to troubleshoot by disconnecting and re connecting to the wireless network in the Open Network and Sharing Center. If that does not work, I check my wireless router to see if the lights on the router are green indicating that it is working properly. If there is a red or orange light on the router, I unplug the power source of the router and let it reset. This usually resolves the issue. My career goal is to become a Network System Administrator. That being said, I will be dealing with networks on a daily basis. A Network System Administrator is responsible for designing, installing, maintaining and upgrading networks in businesses of different sizes. I still have not taken any networking classes. I do know that by the time I obtain my Associates in Network Systems Administration I will have gained...

Words: 298 - Pages: 2

Premium Essay

Networking

...headquarters. Until now, its networks have relied entirely on wired connections. The company’s CIO (chief information officer) decided long ago that she would wait until wireless technology “settled down” before investing in it. 1. What can you tell her about the wireless standards that might convince her that now is the time to adopt wireless technology? There are many advantages to wireless networks. Some advantages of a wireless network are convenience, mobility, ease of set up, the cheaper cost in the long run, and with the newest 802.11 standards the throughput could be just as good as or even better than some Ethernet connections without the hustle of all the wires. 2. Also, what can you tell her to convince her that wireless networking could improve the company’s productivity? With the implication of a wireless network it opens up more options for employees such as the ability to use laptops and their smartphones to complete work so it can be completed however they would like. 3. Which employees could make best use of wireless connections and how? The production, order fulfillment, and research departments would probably benefit the most from the wireless connections so that they can work while on the go and easily update any data even when outside the office. 4. In what type of situations would all employees benefit from wireless...

Words: 570 - Pages: 3

Free Essay

Networking

...1. List two advantages of wireless networking. User mobility in the workplace, and cost effective networking media for use in areas that are difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard? Physical Layer (PHY): The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.) Medium Access Control (MAC): The reliability of the data service, access control to the shared wireless medium, protecting the privacy of the transmitted data. MAC management protocols and services: Authentication, association, data delivery, and privacy. 3. What is an ad hoc network? In this network, the wireless clients (stations) communicate directly with each other. 4. What is the purpose of an Extended Service Set? By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended. 5. What are the four physical layer technologies being used in 802.11 wireless networking? Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS); Infrared, and Orthogonal Frequency Division Multiplexing (OFDM) 6. Describe the frequency spectrum for the DSSS channels in 802.11b wireless networking. It implements 14 channels (each consuming 22 MHz) over approximately 90 MHz of RF spectrum in the 2.4 GHz ISM (industrial, scientific, and medical) band. 7. Define a pseudorandom sequence as it applies to FHSS. Pseudorandom means the sequence...

Words: 1208 - Pages: 5

Free Essay

Networking

...Solution | Healthcare Network Allied Telesis Healthcare Network Construction Guidebook Contents Healthcare Network Solution | Introduction Outline of a Healthcare Network Importance of the network Main requirements in designing a healthcare network Non-stop Network Network bandwidth and QoS (Quality of Service) Data capacity Network bandwidth and cost of LAN devices QoS (Quality of Service) Redundancy and proactive measures to overcome network failures Core switch redundancy Comparison of redundancy of communication Loop protection Secure and Reliable Network Security Importance of security: both physical and human factors Threats to network security Network authentication External network (Internet) connection Inter-regional cooperative healthcare network Effective use of Wireless LAN Security in Wireless LAN Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network...

Words: 8999 - Pages: 36

Premium Essay

Networking

...I. Computer Dynamics Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. Each building is approximately 90 feet long by 50 feet wide. They are set about 100 feet apart. The current network is poorly design for its current needs and must be completely replaced. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Figure 11.16 provides a list of equipment and costs you can use to build your network. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. We need 5 switches has 24 ports each in each floor to create the access layer of the network and also we need 100 Cat 5 cables in each floor to connect the computer to the switches. All the switches in the four floors are connected to core layer 3 switch using fiber optic cable to handle this huge number of connection. creating Vlans on each access layer switches to give privileges to each group of users can reduce the process in the core switches. then we can create a link between the core switch and the router. The router have T3 wan interface and connection with ISP pop to provide 44.370 Mbps can be pretty good for 300 users...

Words: 271 - Pages: 2

Free Essay

Networking

...NT1210 FINAL PROJECT INTRO TO NETWORKING Computer lab design Item | Qty | Description | Price | Item code | Total | HP All-in-One PC | 32 | 18-5110 (G4B05AA#ABA) AMD Dual-Core Processor E1-2500 (1.40GHz) 4GB DDR3 500GB HDD 18.5" Windows 8.1 | $309.99 | Item#: N82E16883280514 | $9,919.68 | Tri-Band Gigabit Wireless Router | 1 | NETGEAR R8000-100NAS Nighthawk X6 AC3200 | $299.99 | Item#: N82E16833122611 | $299.99 | Laser Printer | 2 | Samsung SL-C1860FW/XAA Up to 19 ppm Color Wireless 802.11b/g/n | $224.99 | Item#: N82E16828112551 | $250.00 | 48-Port Fast Ethernet Smart Switch | 1 | NETGEAR ProSAFE FS750T2NA w/ 2 Gigabit Ports 10/100 Mbps | $214.50 | Item#: N82E16833122082 | $214.50 | Pivot-Plug Surge Protector | 3 | BELKIN BP112230-08 8 Feet 12 Outlets 4320 Joules | $33.99 | Item#: N82E16812107131 | $101.97 | Printer/Fax Stand | 1 | Safco 5206BL Under desk, 1-Shelf, 19w x 16d x 13-1/2h, Black | $56.99 | Item#: N82E16848045141 | $56.99 | Wireless Keyboard and Mouse Combo - Black | 32 | Logitech MK520 2.4GHz | $39.95 | Item #: N82E16823126192 | $1278.40 | Black Cat 6 Network Cable | 8 | Link Depot C6M-25-BKB 25 FT | $7.99 | Item #: N82E16812189032 | $63.92 | | | | | Total | 12,185.45 | Labor charge | $22.00 | 5 Technical assemblers | 20 hrs. | | $2,200 | | | | | Total | 14,385.45 | taxes | $.07 | | | | $.07 | | | | | Total | 15,392.432 | Justification for product necessity. In order to turn this classroom into a computer...

Words: 538 - Pages: 3

Premium Essay

Computer Networking

...Varna Free University “Chernorizec Hrabar” ------------------------------------------------------------------------Institute of Technology Introduction to Computer Networking Prof. Teodora Bakardjieva 1 1.0 Introduction The purpose of the networking guidelines are as follows:  to assist students in understanding the benefits of networking  to help students place in context their current stage of networking development in their school.  to assist students in planning the next stage of network development in their school.  to provide standard networking ‘models’ and best practice to students that will assist students in their network planning. This document includes information under the following main headings:  Introduction to Networking  Advantages of Networking  Types of Networks  Models of networking appropriate to students  NCTE recommendation to students  Some relevant terms. 1.1. Basic of Networking A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers. 2 File and Print Server CD or Multimedia Servers Access to: Internet content & learning resources, Scoilnet etc Email communication Users computers Cache, Proxy, Filtering, Firewall Server ...

Words: 4611 - Pages: 19

Free Essay

Business Networking

...Business networking is a socioeconomic business activity by which groups of like-minded businesspeople recognize, create, or act upon business opportunities. A business network is a type of business social network whose reason for existing is business activity. There are several prominent business networking organizations that create models of business networking activity that, when followed, allow the business person to build new business relationships and generate business opportunities at the same time. A professional network service is an implementation of information technology in support of business networking. Many business people contend business networking is a more cost-effective method of generating new business than advertising or public relations efforts. This is because business networking is a low-cost activity that involves more personal commitment than company money. Country-specific examples of informal networking are guanxi in China, blat in Russia, and Good ol' boy network(US)/Old boy network(UK). In the case of a formal business network, its members may agree to meet weekly or monthly with the purpose of exchanging business leads and referrals with fellow members. To complement this business activity, members often meet outside this circle, on their own time, and build their own one-to-one business relationship with the fellow member. Business networking can be conducted in a local business community, or on a larger scale via the Internet. Business networking...

Words: 297 - Pages: 2

Free Essay

Wireless Networking

...WIRELESS NETWORKING Introduction A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model  network structure. Examples of wireless networks include cell phone networks, Wi-Fi local networks and terrestrial microwave networks. Wireless network made up of There are two kinds of wireless networks: * An ad-hoc, or peer-to-peer wireless network * Access point Ad-hoc or peer-to-peer wireless network It consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. They can share files and printers this way, but may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. (This is called "bridging") Each computer with a wireless interface can communicate directly with all of the others. Access point or base station A wireless network can also use an access point...

Words: 1355 - Pages: 6

Free Essay

Ip Networking

...Wiring a LAN * * * Task 1: Communicating on a star topology Procedure 1. Disconnect your lab computer from the ITT LAN and plug in your network cable to the ITT lab computer. 2. Connect the other end of your network cable to the hub provided by the instructor. Answer the following questions: a. What is the purpose of the hub? b. What is the topology you are creating? 3. Turn on the hub and verify that a link light is illuminated both on the computer’s network interface card (NIC) and the network hub. If not, check with the instructor. Answer the question: a. What does the link light indicate? 4. On the workstation, open a command prompt by clicking START> RUN and type CMD. 5. Next, type the IPCONFIG/ALL command to determine current TCP/IP settings for clients on a network. Record the following: a. Your computer’s IP address b. Classmate’s IP address connected with your hub 6. Next, use the PING command to verify network connectivity between clients. Type PING XX.XX.XX.XX at the command prompt where XX.XX.XX.XX is the IP address that you recorded in Step 5b. 7. You will receive ICMP replies from your classmate’s computer illustrating that your computers are connected and communicating. If not, you can check with your instructor. 8. Now, unplug your network cable from the hub and repeat Step 6. What was the result? 9. Unplug your cable from the ITT computer. Replace the ITT UTP cable to the ITT computer...

Words: 401 - Pages: 2

Premium Essay

Social Networking

...Social networking sites are a part of everyday life and they have brought revolutionary changes in communication between people. These sites provide different resources such as email and instant messages in one place. Availability of these resources makes the communication easy and faster. When we look at the social impact of social networking sites, we find that these sites have both positive and negative effects. Because of this fact, it is necessary to analyze both advantage and drawbacks of social networking sites. Undoubtedly, social networking sites are advantageous to young generation. With the help of these sites, people can communicate and express themselves by exchanging messages and comments. Social networking sites help in establishing connection with people, friends and relatives. These sites can be accessed from any part of the globe. Therefore, a person can interact with any person from any place. For example a student can clear his doubts with the help of a teacher. People having different professions can make groups like doctors, lawyers, students, poets, writers, social workers etc. The most common disadvantage of social networking sites is addiction. Often users of these sites get addicted to it. They spend hours using these sites and it harms their performance in other fields. It causes mental health problems and sometimes it harms their body too. Sometimes users provide their personal information to others which is insecure. We can see clearly...

Words: 297 - Pages: 2

Premium Essay

Social Networking

...Social Networking in our daily life Social network is a structured set of organisations between a set of dyadicties. The network provides a bundle of methods to manage the pattern of social enities. Some of the methods used in social entities are related to communication. Facebook, Viber, Skype and WhatsApp are the top communities used around the world. Social network works with the help of social networking service. Social networking service is a platform to build social relation among people who share their interests and activities. There are many types of social services as Facebook, Viber, WhatsApp, Tango, WeChat, Skype and Instagram. They allow you to share your photos, feelings and other activities with your friends, by clicking a few keys on your mobile phone or PC. There are many advantages and disadvantages of social netorking. If we take a look at these communities we see many benefits crawling towards us. The most appealing benefit is that they make the way to communicate with our family and friends much more easier. We can share photos, videos and talk to them. If we even take a closer look, we see many harmful effects coming towards us. The most harm done is that our eye sight gets weak. We waste a lot of time in talking which we have to consume in our schedule to study. The final decision which comes after this whole discussion is that social networking is useful in some ways. It should be used when needed and not to spend extra time on these...

Words: 258 - Pages: 2

Premium Essay

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the Windows...

Words: 574 - Pages: 3

Premium Essay

Computing Trends - Networking Proposal for Rubha Reidh

...Networking Proposal for Rubha Reidh Name Institution Table of Contents Abstract 3 Introduction 5 Overview of Satellite Link Technology 7 Overview of Fibre Optics Link Technology 9 Choice of Satellite over Fibre Internet Connection 10 Wireless Networking Design 12 Mesh Network Backbone 13 802.11 Access Points 15 Intranet Services 16 Challenges 16 Proposed System Design 17 Phase I: Bed and breakfast building to include the private rooms, common area and lounge 17 Phase II: Extending to cover the lighthouse and associated surrounding area 18 Budget 18 Phase I Deployment 18 Phase II Deployment 19 References 21 Abstract The aim of the Rubha Reidh internet project is to construct a robust computer network to encompass the whole lighthouse area using a high speed and reliable internet connection. This has been determined as mesh networking technology. This network will deliver access to email, Web pages, and internet resources for users in the lighthouse area, using both laptops and desktops, as well as mobile devices with connectivity capability. By leveraging the usage of robust and inexpensive wireless network technology, this plan will substantially decrease expenditures for ensuring internet connectivity for the whole lighthouse area, as well as allow better elasticity in planning and expansion. Rubha Reidh is an automated lighthouse that is located in the Scottish remote western coast. Its remoteness stems from the fact that its nearest neighbour is Melvaig...

Words: 4859 - Pages: 20

Premium Essay

The Influence of Social Networking Website

...What is Social Networking Website? The definition of social networking is “the relationships that exist between network of people” (Walter & Ribiere, 2004). Today, when we talk about social networking, we think of social networking websites like Facebook, MySpace, and Twitter, which are the top three popular social networking sites in the United States (Alexa.com, 2010). These sites are defined as web-based platforms that allow individuals to build their own profiles and reflect social relations. The users of these sites are able to “articulate a list of other users with whom they share a connection, and view and traverse their list of connections and those made by others within the system” (Boyd &Ellison, 2008). Within the system, the users are able to present themselves, articulate their social networks, and establish or maintain connections with others; moreover, these social networking websites can be oriented toward different fields like work-related, romantic relationship related, interest sharing related, or student community (Ellison, Steinfield & Lampe, 2008). Mostly, users participate in these sites for interaction with their friends or meet new people. With these sites, they provide various features such as profiles, comments, private messaging, photo-sharing, and video-sharing capabilities; moreover, with the improving technology, now users are capable of using mobile phones to achieve online interactions. How Popular are Social Networking Websites? According...

Words: 2114 - Pages: 9