Layered concept of computer networks, Computer Networking

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the process.

Q2.  How does Intranet differ  from an  Internet? A modern Corporate Organization, spread over a few cities and continents, needs to have an information network of its own. Security of data and information  cannot  be compromised.  Suggest  a  suitable  type  of  network which  is  secured, easy to operate and economical too.

Discuss the topological structure of the network.      

Q3.  IT can be used in an extensible manner to deal with speed and accuracy. Devise an IT based system suitable for a Discom that can be used for load management and should be able to address the issues like Power Theft, Outages, Under Voltage and Over/ Under frequency etc. that are crucial for any power supply company.

Q4.  CRM plays a very important role in revenue realization for any power distribution company. Discuss a  few measures which  fulfill  these objectives  in modern day operations of a power company. Has e-business any role in it?

 Q5.  How are data, information, knowledge and intelligence related? Explain with suitable examples from a Power Generating Company. How can we exchange business data using IT interface in the same industry?

Q6.  Describe the role of GIS in power transmission and distribution.  Also,  discuss  the  hardware  &  software elements of such a system in detail. What advantages do you feel would accrue to the company by having such a system over the conventional manual efforts?

Posted Date: 2/23/2013 6:27:11 AM | Location : United States

Related Discussions:- Layered concept of computer networks, Assignment Help, Ask Question on Layered concept of computer networks, Get Answer, Expert's Help, Layered concept of computer networks Discussions

Write discussion on Layered concept of computer networks
Your posts are moderated
Related Questions
Notice repetition of information in routing table for node 1 as given above in the figure. We can see that switch has only outgoing connection, all traffic must goes that connec

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p

Parallel Programming Environment Characteristics  The parallel programming environment consists of an debugger, a editor,  performance evaluator and programme visualizer for i

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

What are TP-Lite and TP-Heavy Monitors? TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy is TP Monitors which handles the Client/S

Illustrate a traffic light is an example of what type of mechanism Ans) A Traffic light is an example of flow control.

Q. What is Shielded Twisted Pair? - A metal foil or braided-mesh covering encases every pair of insulated conductors to prevent electromagnetic noise called crosstalk - Cros

In multiprocessing, various processors have to to communicate with each other. Therefore, synchronisation is needed between them. The correctness and performance of parallel execut

Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.