Вы находитесь на странице: 1из 9

ASSIGNMENT

DRIVE FALL DRIVE 2013


PROGRAM B.COM GENERAL
SEMESTER II
BCC201 & COMPUTER AWARENESS AND INTERNET

CONTACT ME TO GET FULLY SOLVED SMU


ASSIGNMENTS/PROJECT/SYNOPSIS/EXAM GUIDE PAPER
Email Id: mrinal833@gmail.com
Contact no- 9706665251/9706665232/
www.smuassignmentandproject.com
COST= 100 RS PER SUBJECT

Q. No 1 Explain the concept of parallel computers. 10 Marks


Answer:
Bus Topology
In a bus topology, all the devices are attached to the same transmission medium. The medium has a
physical beginning and end. All buses are implemented using electrical cables, usually coaxial, and the
ends of the cable must be terminated with a terminating resistor that matches the impedance of the cable.
The terminating resistor prevents data reflections that come across as data corruption. The bus is
considered as a multipoint system because all the devices tap the same backbone cable. An important
characteristic to remember in bus topologies is that all data signals are broadcast throughout the entire bus
structure.
Bus Type LAN

When Station B sends a packet to another station on the LAN, it passes by all of the stations connected to
that LAN. The electrical signal representing the packet travels away from the sending station in both the
directions on the shared cable. All stations will see the packet, but only the station it is addressed to will
pay attention to it. In a shared media network, when one station wishes to send a message to another
station, it uses the software in the station to put the message in an envelope. This envelope, called a
packet, consists of the message data surrounded by a header and trailer that carry special information used
by the network software to identify the destination station. One piece of information placed in the packet
header is the address of the destination station.
A bus topology has the following advantage:
Cabling costs are minimized because of the common trunk.
Disadvantages of bus topology are as follows:
It is difficult to troubleshoot because no central distribution points exist.
If the cable breaks, it can disable the entire segment of the network because they remove the required
termination from each of the two cable fragments.

2 Explain how the time slots are allotted in time division multiplexing.
Answer:
For digital sources, two alternative technologies have evolved for multiplexing. These are Time Division
Multiplexing (TDM) and Code Division Multiplexing (CDM). TDM offers a way to merge data from
multiple sources into a single channel for communication over telephone lines, satellite system or a
microwave system. TDM can be implemented in two ways. These are synchronous TDM and
asynchronous TDM. Asynchronous TDM is popularly known as Statistical
TDM (STDM). In synchronous TDM, a single channel is broken into time slots and each transmitting
device is given or alotted at least one of the time slots for its transmission.
Time slots are assigned in such a way that each transmitting device gets its required share of the available
bandwidth. TDMs are not sensitive to protocol and have the capability to combine various protocols onto
a single high-speed transmission link. Because of this, time-bandwidth multiplexing technique,

irrespective of whether the device is active or idle, the multiplexer allocates similar time slots to each
device at all times. Voice and video systems as well as other similar devices may need more slots to
ensure that when the data arrives at the distant link-end, it is not distorted from slower data rates. In case
of TDM, time slots are allocated to channels, even if they have no information to transmit. This is just
wastage of the bandwidth and to overcome this inefficiency of standard TDM, a technique known as
STDM has been developed where time is allocated to lines only when it is required. This is achieved with
the use of intelligent devices that are capable of identifying when a terminal is idle. The intelligent device
statistically compensates for normal idle time and hence more lines can be connected to a transmission
medium.
During the peak traffic period, a buffer memory temporarily stores the data; so high-speed line time can
be effectively utilized with active channels. It adopts a methodology where each transmission has an
identification information
(a channel identifier). This increases the overheads, which are handled by grouping a number of
characters for each channel together for transmission. It is also referred as Intelligent TDM. In this case,
data rate capacity is a lot lower than the sum of connected capacity of each channel because it utilizes the
idle time very effectively. Since it is digital, more complicated framing of data is required.
It is commonly used for remote communications with multiple terminals.
The additional services such as data compression, line priority, mixed speed lines, host ports sharing,
network port control, automatic speed detection, etc., are available with STDM techniques.

3 Differentiate between parallel and serial transmission. 10 Marks


Answer:
Data transmission can be divided into parallel and serial data transmission.
Parallel Transmission
One or more bytes of data are sent over two or more wires. Each wire transmits one digit of binary code.
Therefore, sending one byte (8 bits) of data requires 8 wires as shown in Figure 10.9. In this type of
transmission, it is necessary to detect where each byte of data is separated from the next. Normally, this
detection is made on elapsed time base. The interface of a printer with PC is a good example for this case.
Two key issues occur in parallel transfer. The wire itself is the first issue.
Minimum of nine wires (eight for data bits, one for circuit ground) are required.

Many a times extra wires are needed to control the flow of data across the interface. The other issue is
with the nature of the bits or voltages itself. When there is change in the state of the bit/voltage from a one
to zero or vice versa, it happens at the rate of nanoseconds (one billionth of a second). A crucial part of
the data transfer is the abruptness. The changes that occur slowly, i.e., between zero and one are not
accepted as data.
Serial Transmission
Data is sent over a single wire as shown in Figure 10.10. Therefore, sending one byte does not require 8
wires. These are sent one after the other. In this transmission, it is necessary to detect where each bit is
separated from the next and also where each block is separated from the next. Serial transmission is
suitable for long distance data transmission because it is less costly and more resistant to noise. Therefore,
almost all transmission lines for data communication systems are serial transmission lines.
Transmitting eight individual bits one after the other involves eight times more than the time required for
transmitting them all at the same time parallely.
This speed limit does not prove to be significant for several applications. Compared to the internal speed
of the microprocessors, serial peripheral mechanisms are slower. They involve long, mechanical
processes which restrict their speed: the speeds of their print-heads often limit the printers; the frequency
limitations of the telephone lines affect the modems and time-consuming rotational speed limits the disk
drives. The speed that is built within the process of parallel data transfer is a waste on such peripheral
mechanisms. The serial method thus, sacrifices a part of the speed while sufficiently servicing the
peripheral devices. In such situations, the sacrifice in speed is unimportant compared to the added
transmission range and reliability.

4 List out the major features of internet. 10 Marks


Answer:
The Internet has made communication simple. It can be used for the following:
Facilitating direct communication: You can send messages to family and friends, business associates
and acquaintances using the e-mail facility. Using e-mail, you can send and receive messages within a few
seconds anywhere in the world. Using the Internet Relay Chat (IRC), you can communicate online with
people over the Internet. You can log into a chat room and converse with others by typing messages that

are instantly delivered. With the improvement of network technologies and increase in broadband, not
only can you use text messages but also graphics, audio and video for communication with other people.
Facilitating online shopping: Logically, the Internet has removed all barriers of distance and
nationality. You can shop for products and services across the world by logging on to a Web portal. You
can also pay your bills online using credit and debit cards. You can also transfer money between different
accounts with the click of a mouse.
Facilitating distance education: The Internet provides a perfect medium for knowledge sharing and
information dissemination. Courses are available on the Internet. You can register and pay online and
complete a course on different interest areas. You can also pursue specialized higher studies now in the
comfort of your own office or home.
Increasing knowledge base: The Internet provides a rich information base that people from across the
globe can access. In fact, it is one of the richest information bases that can be accessed at the click of a
mouse.
Using search engines, you can search for detailed information on any topic of your interest.
Smoothening banking services: Banks are using information technology to provide online banking
facilities to their customers. Using the Internet, you can now view your account details, get drafts made,
request for cheque books and transfer money from one account to another. The use of ATMs has shifted
the mundane back-office work to the customer himself.
Instead of hiring an army of bank clerks, banks can now uses ATMs to considerably reduce time and
operational costs.
Helping travel sector: Using the Internet, travel agencies can publish their services on the Web along
with the latest discounts, packages and availability details, so that customers can compare rates, make
online bookings and avail discounts without having to run around multiple offices.
Easing bill payments: The government sector has also realized the benefits of IT. Now you can make
online payments for public utilities such as water, electricity and phones, using credit cards as the
payment medium.

5 Identify the various applications of computer networks. 10 Marks


Answer:

There are various areas where computer networking is used.


Applications in Railways
The railroad industry is the backbone of the countrys economy. Some of the major IT initiatives taken by
Indian Railways are as follows:
All India centralized reservation system provides the facility for the passenger to book tickets from any
destination and is one of the most successful examples of computerization in the country.
Indian Railway Catering and Tourism Corporation (IRCTC) is an online railway ticket booking portal
which enables the passenger to book railway tickets for any destination in India from anywhere in the
world. It also provides very useful information like computerized reservation-related enquiries about
passenger status, train schedule and trains between pairs of stations.
Indian Railways has also started a pilot project for issuing periodical season tickets through the ATM
and another pilot project for buying tickets through smart cards.
The Interactive Voice Response System (IVRS) has also been introduced to update the passengers with
railway inquiry and other related information.
Application in Airlines
The airline business is one of the largest users of computers. Computers have been deployed in almost all
aspects of the airline business for increasing revenues, reducing cost and enhancing customer satisfaction.
Some of the major IT initiatives taken by the airline industry are as follows:
Online Ticket Booking Through the Internet: Almost all the airline companies, may it be domestic or
international are selling air tickets online. Air tickets can be booked online by paying through credit card
and e-tickets can be printed on your printer.
Flight and Seat Availability Information: Flight and seat availability information along with the cost
of the ticket is now easily available online with an option to compare it with other available airlines,
making it easier to choose the airlines according to the time and price that best suits an individual.
All these facilities would not have been possible for airline companies without the use of computer
networks.
Application in Banking
With the increasing number of branches, banks had to simply recruit more manpower to cope up with the
additional workload which requires more operational cost. To reduce this operational cost, banks
computerized all the customer accounts. However, computerization reduces the back office operational
cost only but banks still needed manpower as customer relation officers for the front office. To deal with
this problem, banks played a smart move by introducing the Automated Teller Machines (ATMs). With

the introduction of the ATMs, customer interaction with the bank staff was drastically reduced and
customers had the privilege of 247 banking.
Application in Telecommunication
Use of computer network has made voice communication very easy and at affordable cost. Revolution has
come in conventional telephone industries as well as in mobile telephony.
Telephone Exchanges: The conventional telephones had to be directly connected by telephone wire in
order to make a call. This system was adequate when the number of phone users was very few and the
scale of the telephone network was very small but the consequences of implementing this system on a
larger scale became apparent very quickly.
Now telephone exchanges are automated and computerized not only for switching calls but also for
passing information to a user regarding the status of their call. They can switch and connect numerous
calls at a time with no delays or mistakes. These systems removed the need for human operators to
connect calls or perform other related services. In fact modern telephone networks would cease to
function if they relied on a human component for switching or connection. Computerization and
digitization of telephone exchanges have allowed the integration of other systems into the telephone
network making a variety of services and functionality available to users.
Mobile Phones: The perfect solution for providing connectivity is a mobile phone.
It works on the fundamental concept of a radio. Increased coverage can be provided while keeping cost
and power expenditure at a minimum by dividing coverage area into cells. Each cell contains a base
station within its area of coverage. The base station hosts an antenna and other radio equipment which
wirelessly connects with the mobile phones located in its proximity. Mobility beyond the coverage of a
cell is achieved by allowing inter-cell communication and transfer of connection from one cell to another.

6 Discuss the various hashing techniques. 10 Marks


Answer:
In order to overcome the disadvantages of the former method, a very common approach is hashing where
a calculation is done on the key value to obtain the address of the record. Note that hashing can be applied
to non-numeric keys as well as numeric keys.

Mid Square Hashing


In this technique, the key (K) is squared and then specified digits are extracted from the middle of the
result (K2) to yield the address of the records. The following examples show how mid square hashing is
performed on key values given as under:
K : 3248 5212
K2 : 10549504 27164944
Hash Address : 49 64

Division Remainder Method


One of the earliest and most effective hashing methods is the division remainder method. The basic idea
is to divide the key value by an appropriate number then use the remainder of the division as the address
of the record.
The divisor (number used to divide) is usually a prime number.
Let K= 4150 divisor (prime no. p) = 11
Hash Address = K mod p
= 4150 mod 11
= 3(remainder)
Folding Method
In this method, the key is split into two or more parts and a suitable arithmetic operation is performed on
the parts. The operation can be added, subtracted, divided, etc. See the examples given below:
Let Key (K) = 113425
Let us split into two parts 113 and 425
Now performing Add operation on two parts we get the Hash address as given under:
113
+ 425
_______
Hash Address 538
Let K= 891473995 may be folded by splitting it into 3 groups of 3 digits and adding the group
891
374
995

____
Hash Address 2260
In this technique, there are chances that the records with different key values may Hash to the same
address, for example, with folding technique the keys
891473995 and 473995891 will generate the same address, i.e., 2260.
Such mapping of keys to the same address is known as a collision and the keys are called as synonyms.
A separate overflow area is reserved in the disk for record storage when a collision occurs. When a record
is to be stored, the Hashing function is applied on the key of the record and an address is generated.
The program accesses that storage area, and, if it is used, the record is stored there. If there is already a
record stored, the new record is written in the overflow area. When the record is to be retrieved, the same
process is repeated. The record is checked at the address generated. If it is not the desired one, the system
looks for the record in the overflow area and retrieves the record from there.
Access Mode
Direct access by the way of establishing a relationship between the desired record key field and the
corresponding address of the record, i.e., find the address and access directly from the location.

CONTACT ME TO GET FULLY SOLVED SMU


ASSIGNMENTS/PROJECT/SYNOPSIS/EXAM GUIDE PAPER
Email Id: mrinal833@gmail.com
Contact no- 9706665251/9706665232/
www.smuassignmentandproject.com
COST= 100 RS PER SUBJECT

Вам также может понравиться