Spring 2013 Bachelor of Science in Information Technology (BScIT) – Semester 5 BT8902 – E-Commerce – 4 Credits (Book ID: B1186) Assignment Set (60 Marks) Answer all questions 6x10 = 60 1. Explain the different activities carried out on E–Commerce‚ with appropriate examples. The core activities that are carried out on Electronic Commerce are: a) Buying and selling of products b) Shipping of products c) Producing financial statements All the above functions are carried out without
Free OSI model OSI protocols
Ch1 1 - A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. a. Intranet b. I-net c. Local Area Network d. Extranet Answer: A‚ page 7 2 - A backbone network is: a. a high speed central network that connects other networks in a distance from hundreds of feet to several miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable so they can exchange information. c. a network
Premium OSI model Computer networking Data Link Layer
a. Flow control It is the process of managing the rate of data transmission between two nodes to prevent a fast sender from outrunning a slow receiver. It provides a mechanism for the receiver to control the transmission speed‚ so that the receiving node is not overwhelmed with data from transmitting node. Flow control should be distinguished from congestion control‚ which is used for controlling the flow of data when congestion has actually occurred. Error control It is the process of detecting
Premium Data transmission OSI model Ethernet
The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating‚ for example‚ that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages. It is assigned protocol number 1. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between
Premium
of the OSI model is responsible for providing reliable network communications between end nodes? a. The physical Layer 2. What layer of the OSI model is responsible for the routing of IP packets based on the destination IP address in the IP packet? a. The network Layer 3. What layer of the OSI model defines the electrical‚ mechanical‚ and functional specifications for initiating‚ maintaining‚ and terminating communications on a physical medium? a. The physical Layer 4. What layer of the OSI model
Free OSI model OSI protocols
OSI in China: Pre-assignment OSI China is a difficult situation because they have already invested a large amount of capital‚ time and are currently left with 80% of the chicken after vertical integration. All four options to consider are mixed with unpredictable outcome regardless of the option and will depend heavily on the company’s capabilities and resources. Since 80% of the chicken is currently available for sale with no demand from Chinese customers one of the solutions OSI can consider
Premium Chicken Fried chicken
EIGRP OSPF Protocol support IPX‚ IPv4‚ IPv6‚ AppleTalk can be tuned to work with anything with minimal effort. IPv4‚ IPv6 Type Hybrid of both link-state and distance-vector Link-state Algorithm for path selection Diffusing Update Algorithm Dijkstra’s algorithm Metrics Minimum bandwidth‚ delay‚ load‚ reliability‚ and maximum transmission unit external Scalability Difficulty scaling in to a large network Works great with large networks scales great Admin distance 5 110 EIGRP stands for Enhances
Premium Routing protocol
Authentication Protocol for Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system‚ the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL‚ and verifying the authenticity of the certificate and signature of the sender. In this paper‚ we propose an Expedite Message Authentication Protocol (EMAP)
Premium Cryptography Algorithm Public key infrastructure
OSI in China: Pre-assignment If I were Stefan‚ I would choose to export the parts of the chicken that is not sold to OSI’s customers in China. I will go through each of the proposed options and share my thoughts on why it may or may not be a good choice. 1. Expand sales to current customers The only way to expand sales to the current customer base is to successfully come up with new processed items that QSRs’ customers will want to buy. Although it is stated that OSI is in the process
Premium Sales Retailing Supply and demand
The routing protocol is the key component of any mobile ad hoc network‚ this is the minimum requisite in order to enable communication within the network. We have developed OLSR‚ an optimized link state routing protocol which is based on MPR flooding. Since OLSR support the whole legacy of internet‚ it can carry many extensions‚ some of them specific to mobile ad hoc networking. This protocol has been presented and successfully defended in the working group MANET of the Internet Engineering Task
Premium Computer network Routing protocol Internet