Solution of Assignment Synopsis & Project Dissertation Report

Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!



Title Name Amity Solved Assignment BSC IT 4th Sem for LAN Switching and Wireless
University AMITY
Service Type Assignment
Course B.Sc-(IT)
Semester Semester-IV Course: B.Sc-(IT)
Short Name or Subject Code LAN Switching
Commerce line item Type Semester-IV Course: B.Sc-(IT)
Product Assignment of B.Sc-(IT) Semester-IV (AMITY)


Click to View Price
Download Question File
Download Answer File 326245897158.docx (Purchase the product for download...!!!)


LAN Switching and Wireless


Assignment A


  1. 1. Identify the five components of data communication system? What is the difference between half-duplex and full-duplex transmission modes? Name the four basic network topologies, and cite an advantage of each type.


  1. Define analog transmission? Define analog to analog conversion.


  1. Define digital to analog conversion. Which of the four digital to analog conversion technique is most susceptible to noise? Defend your answer.


  1. How do guided media differ from unguided media? What are the three major classes of guided media? Name the advantages of optical fibre over twisted–pair and coaxial cable?


  1. Compare and contrast error control and flow control. What are the three protocols used for error control for noisy channels?


  1. State and explain adaptive and non-adaptive routing algorithms.


  1. What are the characteristics of CSMA/CD? Explain Token bus and Token ring standards.


  1. What is TCP/TP model and explain function of each layer. Compare the TCP header and UDP header. List the fields in the TCP header that are missing from UDP header. Give the reason for their absence.


Solve by contact for more details at 8882309876

Assignment B

Case Detail:

Being a network administrator in XYZ bank, it so happened that a hacker stole sensitive business information, an employee opened an attachment with a virus that badly damaged your system and online bank password or credit card info is stolen using spyware?

  1. In view of the situation explained above, design robust firewalls with a secure network design to keep hackers at bay and implement a business continuity solution in case of an attack.


Assignment C

  1. There are ______________ Internet service providers.

 (A): regional

 (B): local

 (C): national and international

 (D): all of the above

  1. Which topology requires a multipoint connection?

 (A): Bus

 (B): Star

 (C): Mesh

 (D): Ring

  1. Which of the following is the logical topology?

 (A): Bus

 (B): Tree

 (C): Star

 (D): Both a and b

  1. The standard suit of protocols used by the Internet, Intranets, extranets and some other networks.

 (A): TCP/IP

 (B): Protocol

 (C): Open system

 (D): Internet work processor

  1. Another name for Usenet is

 (A): Gopher

 (B): Newsgroups

 (C): Browser

 (D): CERN

  1. In FDDI, data normally travel on ..................

 (A): The primary ring

 (B): The Secondary ring

 (C): Both rings

 (D): Neither ring

  1. Devices on one network can communicate with devices on another network via a .......

 (A): File Server

 (B): Utility Server

 (C): Printer Server

 (D): Gateway

  1. What is Trojan horse ?

 (A): It is a useful way to encrypt password

 (B): It is a user which steals valuable information

 (C): It is a rogue program which tricks users

 (D): It’s a brute force attack algorithm

  1. What is trap door ?

 (A): IT is trap door in WarGames

 (B): It is a hole in software left by designer.

 (C): It is a virus which traps and locks user terminal

 (D): None of these

  1. .Which mechanism is used by worm process ?

 (A): Trap door

 (B): Fake process

 (C): Spawn Process

 (D): VAX process

  1. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?

 (A): Robert Morris

 (B): Bob Milano

 (C): Mark zuckerberg

 (D): Bill Gates

  1. Which is not a port scan type ?

 (A): TCP scanning

 (B): SYN scanning

 (C): UDP scanning

 (D): SYSTEM Scanning

13.What are zombie systems ?

 (A): Are specific system which are designed to attack by manufacturer

 (B): They are network of known hacking group

 (C): These systems are previously compromised, independent systems

 (D): None of the mentioned

14.What is known as DOS attack ?

 (A): It is attack to block traffic of network

 (B): It is attack to harm contents stored in HDD by worm spawn processes

 (C): It is an attempt to make a machine or network resource unavailable

 (D): None of the mentioned

15.In wireless ad-hoc network

 (A): access point is not required

 (B): access point is must

 (C): nodes are not required

 (D): none of the mentioned

16..Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

 (A): CDMA



 (D): none of the mentioned

  1. In wireless distribution system

 (A): multiple access point are inter-connected with each other

 (B): there is no access point

 (C): only one access point exists

 (D): none of the mentioned

  1. A wireless network interface controller can work in

 (A): infrastructure mode

 (B): ad-hoc mode

 (C): both (a) and (b)

 (D): none of the mentioned

  1. In wireless network an extended service set is a set of

 (A): connected basic service sets

 (B): all stations

 (C): all access points

 (D): none of the mentioned

  1. Mostly ________ is used in wireless LAN

 (A): time division multiplexing

 (B): orthogonal frequency division multiplexing

 (C): space division multiplexing

 (D): none of the mentioned

  1. What is Wired Equivalent Privacy (WEP) ?

 (A): security algorithm for ethernet

 (B): security algorithm for wireless networks

 (C): security algorithm for usb communication

 (D): none of the mentioned

  1. What is WPA?

 (A): wi-fi protected access

 (B): wired protected access

 (C): wired process access

 (D): wi-fi process access

  1. What is the frequency range of the IEEE 802.11a standard?

 (A): 2.4Gbps

 (B): 5Gbps

 (C): 2.4GHz

 (D): 5GHz

  1. What is the maximum data rate for the 802.11a standard?

 (A): 6Mbps

 (B): 11Mbps

 (C): 22Mbps

 (D): 54Mbps

  1. How many non-overlapping channels are available with 802.11a?

 (A): 3

 (B): 12

 (C): 23

 (D): 40

  1. What is the maximum distance running the lowest data rate for 802.11a?

 (A): About 100 feet

 (B): About 175 feet

 (C): About 300 feet

 (D): About 350 feet

  1. Which of these are the features of ADSL?

 (A): symmetric, adaptive and bandwidth upto 1.1 MHz

 (B): asymmetric, adaptive and bandwidth upto 1.1 MHz

 (C): asymmetric, non-adaptive and bandwidth upto 1.1 MHz

 (D): symmetric, non-adaptive and bandwidth upto 1.1 MHz

  1. In stop and wait ARQ, the sequence numbers are generated using

 (A): Modulo-16 arithmetic

 (B): Modulo-8 arithmetic

 (C): Modulo-4 arithmetic

 (D): Modulo-2 arithmetic

  1. What is the difference between CSMA/CD and ALOHA?

 (A): frame transmission

 (B): Addition of persistence process

 (C): Jamming signal

 (D): All of the above

  1. Which of these uses the Orthogonal Frequency-division Multiplexing for signal generation in a 5Ghz ISM Band.

 (A): 802.11

 (B): 802.11a

 (C): 802.11b

 (D): 802.11a

  1. Which of these is described as a multiport repeater?

 (A): Passive Hub

 (B): Active Hub

 (C): Bridge

 (D): Amplifie

  1. Which of these is not a functionality of a Repeater?

 (A): regeneration

 (B): forwarding

 (C): Filtering

 (D): connects two segments of a LAN

  1. An example of Medium-Earth-Orbit satellite system is-

 (A): Global Positioning System

 (B): Cellular Phone

 (C): Weather forecast

 (D): Celestial studies

  1. In TDM Data rate management is done by which of these strategies

 (A): Multilevel multiplexing

 (B): Multi-slot allocation

 (C): Pulse stuffing

 (D): all of the above

  1. which type of EM waves are used for unicast communication such as cellular telephones, satellite networks and wireless LANS.

 (A): Infrared

 (B): Microwaves

 (C): Radio waves

 (D): light waves

  1. Which of these is not an advantage of Optical fibers

 (A): easy installation and maintenance

 (B): Immune to electromagnetic interference

 (C): Less signal attenuation

 (D): greater immunity to tapping

  1. In cryptography, what is cipher?

 (A): algorithm for performing encryption and decryption

 (B): encrypted message

 (C): both (a) and (b)

 (D): none of the mentioned

  1. In asymmetric key cryptography, the private key is kept by

 (A): sender

 (B): receiver

 (C): sender and receiver

 (D): all the connected devices to the network

  1. Which one of the following algorithm is not used in asymmetric-key cryptography?

 (A): RSA algorithm

 (B): diffie-hellman algorithm

 (C): electronic code book algorithm

 (D): none of the mentioned

  1. What is data encryption standard (DES)?

 (A): block cipher

 (B): stream cipher

 (C): bit cipher

 (D): none of the mentioned 


Only after making the payment you would be able to see the answer...!!!


Average user rating

4.8 / 5

Rating breakdown

80% Complete (danger)
80% Complete (danger)
80% Complete (danger)
80% Complete (danger)
80% Complete (danger)

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

10-Mar, 2018
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.