Layered concept of computer networks, Computer Networking

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the process.

Q2.  How does Intranet differ  from an  Internet? A modern Corporate Organization, spread over a few cities and continents, needs to have an information network of its own. Security of data and information  cannot  be compromised.  Suggest  a  suitable  type  of  network which  is  secured, easy to operate and economical too.

Discuss the topological structure of the network.      

Q3.  IT can be used in an extensible manner to deal with speed and accuracy. Devise an IT based system suitable for a Discom that can be used for load management and should be able to address the issues like Power Theft, Outages, Under Voltage and Over/ Under frequency etc. that are crucial for any power supply company.

Q4.  CRM plays a very important role in revenue realization for any power distribution company. Discuss a  few measures which  fulfill  these objectives  in modern day operations of a power company. Has e-business any role in it?

 Q5.  How are data, information, knowledge and intelligence related? Explain with suitable examples from a Power Generating Company. How can we exchange business data using IT interface in the same industry?

Q6.  Describe the role of GIS in power transmission and distribution.  Also,  discuss  the  hardware  &  software elements of such a system in detail. What advantages do you feel would accrue to the company by having such a system over the conventional manual efforts?

Posted Date: 2/23/2013 6:27:11 AM | Location : United States







Related Discussions:- Layered concept of computer networks, Assignment Help, Ask Question on Layered concept of computer networks, Get Answer, Expert's Help, Layered concept of computer networks Discussions

Write discussion on Layered concept of computer networks
Your posts are moderated
Related Questions
What is a Multiplexor


What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

Q. Show the Character-level Encryption? - Substitutional - Monoalphabetic - simplest form; also called Caesar cipher - Every character is replaced with another character


The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l


Routing Principle The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one

Hardware difficulty of Benz Network: - Benz network uses smaller switches and it gives excellent connectivity.  To find hardware difficulty of Benz network let us presume that