Select Page

# Network Planning and Design-1

\$10.00

SKU: 77483f6400a2 Category: Tag:

# MBA BBA Assignment

Semester:4th Semester Amity Assignments

PART – A

Q1. What is the use of Project Management Techniques. Explain PERT/CPM in NPD.

Q2. Discuss Queuing Theory and explain M/M/l and M/M/N Queue models.

Q3. Write note on

A)-Phases of Network Planning and Design. B)-Network Environment.

Q4. What is Delay? What type of Delays is possible in Switches and how you take care of delays when you are designing a Network? In a fully connect topology with n nodes how many links are possible?

Q5. Discuss Centralized and Distributed networks.

PART – B

Q1 Describe RMA. If for a network system MTBF is 5 unit time and MTTR is 1 unit time then find out the availability.

Q2 What is the use of trade off s in Network Design. Discuss Cost and Time trade off and Hierarchical and Interconnectivity trade off.

Q3 Describe single server queue and write the relationship between arrival rate mean service time and utilization.

Case Study

In the modern world, planning efficient routes is essential for business and industry, with applications as varied as product distribution, laying new fiber optic lines for broadband internet, and suggesting new friends within social network websites like Facebook.

This field of mathematics started nearly 300 years ago as a look into a mathematical puzzle (we’ll look at it in a bit). The field has exploded in importance in the last century, both because of the growing complexity of business in a global economy and because of the computational power that computers have provided us.

In mathematics and computer science, graph theory is the study of graphs:   A “graph” in this context refers to a collection of vertices or ‘nodes’ and a collection of edges that connect pairs of vertices.

Case Study Questions

What is the use of graph theory for designing of efficient routing protocols? Discuss minimum spanning tree and explain Prim’s algorithm by taking suitable example.

Assignment – C

1. During the analysis phase, the project team:

a)   describes the functional features of the system chosen for development in the previous phase

b)   studies the organization’s current procedures and the information systems used to perform organizational tasks

c)   determines the scope of the proposed systems and produces a specific plan for the proposed project

d)   codes, tests, and installs the new system

2. Network analysis, architecture, and design are processes used to produce designs that are logical

a)   logical

b)   reproducible

c)   defensible

d)   All of the above

3. Network design is also about applying

b)   dependencies

c)   constraints developed as part of the network architecture.

d)   All of the above

4. The various sources of delay are

a)   propagation,

b)   transmission,

c)   queuing

d)   None of the above

5. Which of the following are performance characteristics of Services?

• Capacity
• Delay
• RMA
• All of the above

6. The post implementation phases of a network’s life cycle can be broken into

a)   Operations

b)   Maintenance

c)   Human knowledge

d)   None of the above

7. The key characteristics of a network architecture and design that affect the post implementation costs are

a)   Network and system reliability

b)   Network and system maintainability

c)   Training of the operators to stay within operational constraints

d)   All of the above

8. The terms are associated with capacity are

a)   Bandwidth

b)   throughput,

c)   goodput.

d)   All of the above

9. A threshold is a value for

a)   a performance

b)   a delay

c)   a reliability

d)   none of the above

10. The network behaviour describes with help of

a)   delay (end-to-end and round-trip)

b)   latency

c)   delay variation

d)   All of the above

11. Devices can act as both data sources and sinks, depending on the application and flow. Which of the following devices (for the applications given) are data sinks?

a)   A storage device receiving streaming video from a camera

b)   A video editing unit, using video from the storage device in (a)

c)   A Web server and its clients

d)   A storage disk farm

12. Which flow models apply to each set of flows described below?

a)   Users on the Internet accessing the same Web server

b)   Forty workstations processing batch jobs overnight, managed by a central mainframe

c)   Email use across the Internet

d)   A transaction-processing application, authorizing credit card transactions between a company’s retail stores and its headquarters

13. Flow specifications describe flows

a)   best-effort

b)   predictable

c)   guaranteed requirements

d)   All of the above

14. Flow model based on the relationship between

b)   the computing devices

d)   None of the above

15. Some common approaches to identifying flows include:

a)   Focusing on a particular application

b)   application group

c)   device or function

d)   None of the above

16. Flows are becoming increasingly important in the fields including

a)   Analysis

b)   Architecture

c)   design processes

d)   Data process

17. Flowspec has a different level of detail, based on whether the flows have

a)   best-effort

b)   predictable

c)   guaranteed requirements.

d)   All of the above

18. A service plan describes network performance in terms of

a)   Capacity

b)   Delay

c)   RMA

d)   All of the above

19. The primary characteristics of flow models are

a)   Directionality

b)   Hierarchy

c)   diversity

d)   None of the above

20. The most favourable solution to non-uniform demand is probably to:

1. Always maintain excess capacity
2. Hire or lay off workers as required
3. Use overtime or part-time workers
4. Employ a mixed capacity management plan

21. Capacity is usually expressed in terms of:

1. The Master Production Schedule
2. A production forecast
3. Potential output from an operations system
4. The design life of an operations process

22. The maximum output of a system in a given period is called:

1. The designed capacity
2. The master production schedule
3. The economic order quantity
4. The production efficiency

23. The first steps of capacity planning and control do not include:

1. Measuring aggregate demand and capacity?
2. Identifying the alternative capacity plans?
3. Studying the effect of queueing theory
4. Choosing the most appropriate capacity plan?

24. Which of the following is not one of the assumptions of an M/M/l model?

a)   Arrivals are independent of preceding arrivals but the arrival rate does not change over time.

b)   Arrivals are served on a last-in, first-served basis.

c)   Service times follow the negative exponential probability distribution.

d)   Arrivals follow the Poisson distribution and come from an infinite population.

25. The utilization factor for a system represents

a)   the steady state average waiting time.

b)   the probability that no one is in the system.

c)   the probability that the service facility is being used.

d)   the average number of customers in the queue.

26. At the start of football season, the ticket office gets very busy the day before the first game. Customers arrive at the rate of four every ten minutes. The customer would be better off if the stadium employed

a)   a single ticket seller who could service a customer in two minutes.

b)   two ticket sellers each of whom could service a customer in three minutes.

c)   The two situations produce the same wait times.

d)   All of the above.

27. The minimal-spanning tree technique would best be used

a)   by an architect to lay out corridors between offices in a new office building.

b)   by a telephone company attempting to lay out wires in a new housing development.

c)   by an airline laying out flight routes.

d)   all of the above.

28. The maximal-flow technique might be used

a)   to help design the moving sidewalks transporting passengers from one terminal to another in a busy airport.

b)   by someone designing the traffic approaches to an airport.

c)   by someone attempting to design roads which would limit the flow of traffic through an area.

d)   none of the above.

29. Small size network problems can usually be solved by

a)   the simplex method.

b)   Inspection

c)   calculus and advanced sophisticated techniques.

d)   none of the above

30. A tree is

a)   any graph that is connected and every edge is a bridge.

b)   any graph that has no circuits.

c)   any graph with one component.

d)   any graph that has no bridges.

31. The Gantt Chart is used to:

a)   control cost of all the activities.

b)   provide a schedule of the activities .

c)   track the cost of the activities.

d)   provide a schedule and track costs of activities.

32. The critical path in a network of activities:

a)   will be the path with the most number of activities.

b)   must have at least three activities.

c)   will always have all activities with positive slack.

d)   cannot be delayed or else the entire project will be delayed.

33. Which of the following statements is true?

a)   PERT and CPM are both probabilistic techniques.

b)   PERT is considered as a probabilistic techniques and CPM is considered as a deterministic approach.

c)   PERT and CPM are both considered as deterministic approaches.

d)   PERT is considered as a deterministic approach and CPM is a probabilistic techniques.

34. The immediate predecessors of any node in a project network drawn as a AON diagram:

a)   may be one or more node(s).

b)   may be two or more nodes.

c)   is always only one node.

d)   may be no nodes to many nodes.

35. The standard deviation for a PERT diagram is calculated by:

a)   taking the sum of the standard deviations on the nodes on the critical path.

b)   taking the sum of the variances on the nodes on the critical path, then find the square root.

c)   taking the sum of the variance on all the nodes, then find the square root.

d)   taking the sum of the standard deviations on all the nodes.

36. Which of the following can shorten the duration of an activity or project?

a)   Overtime

b)   Subcontracting

c)   Hiring extra labour

37. Which of the following statements is true?

a)   The EFT for an activity is equal to the EST minus the slack for that activity.

b)   Dummy activities do not require any resources.

c)   When considering the possible crashing of a project, the normal time equals the length of the shortest path prior to any crashes.

d)   For the beta distribution, m will always be exactly in the middle of a and b.

38. An expected project completion time follows a normal distribution with a mean of 21 days and a standard deviation of 4 days. What is the probability that the project will be completed in a time between 22 to 25 days inclusive?

a)   0.8413

b)   0.7734

c)   0.0819

d)   0.2426

39. The latest finish time for an activity:

a)   equals the min. of LFT – t for all immediate successors.

b)   equals the min. of EST + t for all immediate successors.

c)   equals the max. of LFT -1 for all immediate predecessors.

d)   equals the max. of EST + t for all immediate predecessors.

40. Which of the following statements is true?

a)   The variance of the time taken to complete an activity is equal to (b – a)/6.

b)   Three time estimates are necessary so that we can estimate the parameters of the Beta distribution.

c)   The standard deviation of a project completion time is the sum of the standard deviations for the critical path activities.

d)   The critical path is the path with the largest probability of being completed on time