Você está na página 1de 9

Q. 1 Explain the meaning of Data communication?

Answer-Data communication is the exchange of data between two devices via some form of transmission medium such as wire cable. The effectiveness of a data communication system depends on three fundamental characterstics :Delivery :- The system must deliver data to the correct destination. Data must be received by the intended device or user and only by that device or user. Accuracy :- The system must deliver the data accurately. Timeliness :- The system must deliver data in a timely manner. A Data Communication System has five components:(1) Message : The message is the information (data) to be communicated. It can consist of text, numbers, pictures, sound or video or any combination of these. (2) Sender : The sender is the device that sends the data message. (3) Receiver : The receiver is the device that receives the message. (4) Medium : The transmission medium is the physical path by which a message travels from sender to receiver. (5) Protocol : A protocol is a set of rules that governs data communication.

Q. 5. What do you mean by variable, expression and functions in JavaScript. Answer-Variables are the named value holders.They act as a container to store the value.To declare the variable we will use the var keyword. The general form is , var variablelist; e.g. var a,b,c; Types of values : 1) integer values : The values without the fractional part .e.g. 10,-45 etc... 2) real values : The values which contains the fractional part e.g. 5.6,7.89 etc...The real values are also known as the floating point values. 3) character values : It refers to the single character. e.g. 'a','%','3' etc... 4) string values : It refers to the group of characters. "ajay" etc...

Q. 6 Write short Notes on Answer-(i) WAN :-WAN is a collection of computers and network resources connected via a network over a geographic area. Wide-Area Networks are commonly connected either through the internet or special arrangements made with phone companies or other service providers. A WAN is different from a MAN because of the distance between each of the networks. In a WAN, one network may be anywhere from several hundred miles away, to across the globe in a different country. For home routers the port the router connects to your Internet connection is often labeled as a WAN, Internet port, since it is what allows your home network to communicate with the Internet network. In the below picture, is an example of the Internet port on the back of a home router, next to four standard Ethernet ports. (ii) FTP:-File Transfer Protocol, is a protocol through which internet users can upload files from their computers to a website or download files from a website to their PCs. Originated by Abhay Bhushan in 1971 for use in the military and scientific research network known as ARPANET, FTP has evolved into a protocol for far wider applications on the World Wide Web with numerous revisions throughout the years. FTP is the easiest way to transfer files between computers via the internet, and utilizes TCP, transmission control protocol, and IP, internet protocol, systems to perform uploading and downloading tasks. How It Works TCP and IP are the two major protocols that keep the internet running smoothly. TCP manages data transfer while IP directs traffic to internet addresses. FTP is an underling of TCP and shuttles files back and forth between FTP server and FTP client. Because FTP requires that two ports be open--the server's and the client's--it facilitates the exchange of large files of information. First, you as client make a TCP control connection to the FTP server's port 21 which will remain open during the transfer process. In response, the FTP server opens a second connection that is the data connection from the server's port 20 to your computer. Using the standard active mode of FTP, your computer communicates the port number where it will stand by to receive information from the controller and the IP address-internet location--from which or to which you want files to be transferred. If you are using a public--or anonymous--FTP server, you will not need proprietary signin information to make a file transfer, but you may be asked to enter your email address. If you are using a private FTP server, however, you must sign in with a user name and password to initiate the exchange of data.

Modes of File Transfer Three modes of transferring data are available via FTP. The system can use a stream mode, in which it transfers files as a continuous stream from port to port with no intervention or processing of information into different formats. For example, in a transfer of data between two computers with identical operating systems, FTP does not need to modify the files. In block mode, FTP divides the data to be transferred into blocks of information, each with a header, byte count, and data field. In the third mode of transfer, the compressed mode, FTP compresses the files by encoding them. Often these modifications of data are necessary for successful transfer because the file sender and file receiver do not have compatible data storage systems. Passive FTP Should your computer have firewall protection, you may have difficulties using FTP. A firewall protects your PC by preventing internet sites from initiating file transfers. You can circumvent your firewall's function by using the PASV command that reverses the FTP process, allowing your computer to initiate the transfer request. Many corporate networks use PASV FTP as a security measure to protect their internal network from assaults of unwanted external files. Also called passive FTP, the process requires that any transfer of information from the internet or other external source must be initiated by the client or private network rather than the external source. Further FTP Security In response to the need for a more secure transfer process for sensitive information such as financial data, Netscape developed a Secure Sockets Layer (SSL) protocol in 1994 that it used primarily to secure HTTP--HyperText Transfer Protocol--transmissions from tampering and eavesdropping. The industry subsequently applied this security protocol to FTP transfers, developing SFTP, a file transfer protocol armored with SSL for protection from hackers.

Q. 7 Explain the concept of Telnet. Answer-Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the Internet). Using telnet client software on your computer, you can make a connection to a telnet server (i.e., the remote host). Once your telnet client establishes a connection to the remote host, your client becomes a virtual terminal, allowing you to communicate with the remote host from your computer. In most cases, you'll need to log into the remote host, which requires that you have an account on that system. Occasionally, you can log in as guest or public without having an account.

Telnet clients are available for all major operating systems. Command-line telnet clients are built into most versions of Mac OS X, Windows, Unix, and Linux. To use these clients, go to their respective command lines (i.e., the Terminal application in Mac OS X, the shell in Unix or Linux, or the DOS prompt in Windows), and then enter: telnet host Replace host with the name of the remote computer to which you wish to connect. Q. 8 What are advantage and disadvantage of E-commerce? Answer-Advantage of e commerce:1. Facilitates the globalization of business:-e commerce facilitates the globalization of business by providing some economical access to distant markets and by supporting new opportunities for firms to increase economies by distributing their products internationally. 2. Provides increased purchasing opportunities for the buyer:-As e commerce increases sales opportunities for the seller, it also increases purchasing opportunities for buyer. 3. Lowering staffing cost:- As in e commerce, the selling & purchasing process is outline, the amount of interaction with staff is minimized. 4. Market based expansion: - An e commerce is open to entirely new group of users, which include employees, customers, suppliers & business partners. 5. Increased profits:-With e commerce, companies reach more & more customers where physical commerce cannot reach, thus increasing profits. 6. Increased customer service & loyality:- e commerce enables a company to be open for business wherever a customer needs it. 7. Increase speed & accuracy:- E commerce see the speed and accuracy with which business can exchange information, which reduces cost on both sides of transactions. It is available 24 hours a day & 7 days a weak. 8. ReIncreased customer service & loyalityIncrease speed & accuracyRduction of paper storage. 9. Increased response times:- In e commerce, the interaction with the system take place in real time & therefore allows customer or bidder to respond more quickly & thus reduces the time of discussion between then as in traditional commerce. Limitations of e commerce:1. Security:- the security risk in e commerce can be :i. client / server risk ii. data transfer and transaction risk iii. virus risk

2. High start up cost:The various components of cost involved with e commerce are:A) Connection:- connection cost to the internet. B) Hardware / software:- this includes cost of sophisticated computer, moduer, routers, etc. C) Maintenance:- this include cost involve in training of employees and maintenance of web-pages. 3. Legal issues: - these issues arise when the customer data is fall in the hands of strangers. 4. Lack of skilled personnel:- there is difficulty in finding skilled www developers and knowledgeable professionals to manage and amaintain customer on line. 5. Loss of contact with customers:-Sometimes customers feel that they do not have received sufficient personal attention. 6. Uncertainity and lack of information:- most of the companies has never used any electronic means of Communication with its customers as the internet is an unknown mode for them. 7. Some business process may never be available to e commerce:-Some items such as foods, high cost items such as jewellery may be impossible to be available on the internet. Q. 9 Describe Electronic payment system. Answer Electronic Payment (also known as c-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically. Typically, this involves use of computer networks, the internet and digital stored value systems. Electronic Funds Transfer (EFT) and direct deposit are examples of electronic payment. Also, it is a collective term for financial cryptography and technologies enabling it. The components of Electronic Payment system are described as below in details: COMPUTER Network:

A computer network is a group of interconnected computers. Network s may be classified according to a wide variety of characteristics. Based on their scale, networks can be classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), etc. Computer networks can also be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such

as Optical fibre, Ethernet, Wireless LAN, Home PNA, or Power line communication. Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers. Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium. Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture. Computer networks may be classified according to the network topology upon which the network is based, such as Bus network, Star network, Ring network, Mesh network, Star-bus network. Tree or Hierarchical topology network, Network Topology signifies the way n which devices in the network see their logical relations to one another. The use of the term logical here is significant. That is, network topology is independent of the physical layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology, in this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Internet:

The Internet is a specific internet work. It consists of a worldwide incoming connection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense. The internet is also the communications backbone underlying the World Wide Web (WWW). The Internet is most commonly spelled with a capital I as a proper noun, for historical reasons and to distinguish it from other generic internet works. Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reach ability of their address spaces through the [Border Gateway Protocol] (BGP), forming a redundant worldwide mesh of transmission paths.

3.) BASIC HARDWARE COMPONENTS:


All networks are made up of basic hardware b11ing blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable. Less common are microwave links (as in IEEE 802.11) or optical cable (optical fibre).

NETWORK Interface Cards

A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a lowlevel addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.

REPEATER

Repeater is an electronic device that receives a signal and retransmits it at a higher rate, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable runs longer than 100 meters away from the computer.

HUBS

A Hub contains multiple ports. When a packet arrives at one port, it is copied to all the ports of the hub for transmission. When the packets are copied, the destination address in the frame does not change to a broadcast address. It does this in a rudimenJ ary way: It simply copies the data to all of the Nodes connected to the hub.

Bridges

Network Bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.

Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types: 1. Local bridges: Directly connect local area networks (LANs) 2. Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers. 3.Wireless bridges: Can be used to join LANs or connect remote stations to LANs. Switches

A switch is a device that performs switching. Specifically, it forwards and filters OSI layer 2 data grams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets. This is distinct from a hub in that it only forwards the datagram to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or the entire network is connected directly to the switch, or another switch that is in. turn connected to a switch. Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch. Routers

Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets. Routers work at the network layer of the TCP/IP model or layer 3 of the OSI model.

Routers also provide interconnectivity between like and unlike media (RFC 1812). This is accomplished by examining the Header of a data packet, and making a decision on the next hop to which it should be sent (RFC 1812). They use preconfigured static routes, status of their hardware interfaces, and routing protocols to select the best route between any two subnets. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISPs network. Some DSL and cable modems, for home (and even office) use, have been integrated with routers to allow multiple home/office computers to access the Internet through the same connection. Many of these new devices also consist of wireless access points (waps) or wireless routers to allow for IEEE 802.1 lg/b wireless enabled devices to connect to the network without the need for cabled connections.

Você também pode gostar