SMU MBA ASSIGNMENTS

Sikkim manipal Solved MBA Assignments, SMU MBA, Solved assignments, 1st sem, 2nd sem, 3rd sem, 4th sem, SMU MBA PROJECTS

Email Us

SEM 3 – MI

Fall Drive/Aug 2012

Master of Business Administration – MBA Semester III

MI0033 — Software Engineering – 4 Credits

Assignment – Set- 1 (60 Marks)

Answer all the questions

Q1. Quality and reliability are related concepts but are fundamentally different in a number of ways. Discuss them.

Answer :  The quality movement started in the 1940s with a major contribution on quality aspects from W. Edwards Deming. One of the major benefits of quality has been the saving in the overall cost of production. A system of continuous improvement helps in achieving good quality. Kaizen, refers to a system of continuous process improvement. The purpose of kaizen is to develop a process that is visible,

repeatable, and measurable. After Kaizen it is afterimage hinshitsu, which refers to examination of intangibles that affect the process and works to optimize their impact. Both kaizen and afterimage hinshitsu focuses on processes. The next stage is kansei which leads to improvement in the product itself and, potentially, to the process that created it. The final stage is miryokuteki hinshitsu which broadens the management concern beyond the immediate product.

 

Quality Concepts:

It is a well-known fact that all engineered and manufactured parts exhibit some or the other variation. The variations may not be clearly visible always. The variations are sometimes microscopic which can be identified by means of some equipment necessary to measure the geometrical attributes, electrical characteristics etc.

 

Quality:

Designers specify the characteristics of the quality of a product. The grade of materials used in the product development and product characteristics, permissible tolerances, and performance specifications contribute to the quality of design. For higher-grade of materials the tolerances are very small. When the tolerance is set to a very low level the expected design characteristics would be of high quality. When greater levels of performance are specified, there is an increase in the design quality of a product and the manufacturing processes and the product specification are set according to the specified quality norms.

Quality of conformance is expressed as the degree to which the design specifications are followed during the process of manufacturing. If the degree of conformance is high then the level of quality of conformance is also deemed as high.

Quality of conformance is mainly focused on the implementation of the software.

 

Quality Control:

Quality is the buzz word of every organization today. But how does one work towards achieving quality in the organization and within the organization at various process levels. There are a number of ways of achieving quality. One can consider the fundamental step of quality where the variations are measured with respect to the expected values in any process or characteristics of the product. The first step towards quality is to see that the variations are minimized. Controlling quality can be done by means of measuring various characteristics of the product and understanding the behaviour of the product towards changes in the product characteristics. It involves a series of inspections, reviews, and tests on the software processes. A feedback mechanism in the process list will help in constantly reviewing the performance and enhancement in the performance.

A combination of the measurement and the feedback allows the software developer to refine the software process and tend to approach perfection.

It is possible to automate these steps in the quality control process of the software system. One of the concepts of quality control is that every process can be measured. The measurement will tell as to whether there has been any improvement in the process or not.

 

Quality Assurance:

Quality assurance is a process of auditing various areas and identifying the non conformances in such areas. A non conformance is reported if a deviation is observed in the actual performance when compared with the planned performance against certain expectation. The expectations are listed out based on the requirement of certain standards norms. The non-conformances are reported area wise or process wise. The report based on the audit provides the management with the information that is necessary for them to take suitable actions.

 

Cost of Quality:

There are many activities involved in a software project leading to the completion of the intended service or the product. Every such activity is associated with some cost. And associated with every process is the quality which again comes with certain cost. The total cost of quality means the sum total of all the costs involved in setting up a quality process or a quality activity and additional resources procured towards maintaining and running the quality process. The main categories under which the quality costs may be listed are the ones dealing with processes towards prevention, processes towards appraisal, and processes towards maintenance. The main components contributing towards the cost are the cost component of quality planning, cost component of formal technical reviews and the cost component pertaining to the test equipment.

 

Software Reliability:

The need for quality is there in the minds of everybody associated with the software project. One of the key issues pertaining to the quality aspect is the reliability of the software product. There are number of methods to ensure reliability of the product which depends upon the characteristics of the product and its features and the expectations from the product and its services. One of the task before the software engineer or the software manager is to establish the relevant reliability measures well in advance before the implementation so that the quality is assured. A series of audits may be conducted to keep a tab on the deviations if they tend to occur.

Statistically the software reliability may be defined as the probability of an operation of a computer program which is free from error or has not failed during the operation time, tested under a specified environment and for specified time. Failure refers to non-conformance to the requirements of the software stated. One of the simple measures of reliability is the express it as the meantime between failure (MBF) which is the sum of mean time of occurrence of failure (MTF) and mean time towards repair (MTR). It is necessary to identify and assess the hazards in software projects that affect the software performance. If it is possible to identify the hazards in the early stages of the software project then a module to counteract such hazards could be developed or built in to the software which will then be able to rectify errors leading to hazards. Suitable models could be used to achieve this safety.

 

Background Issues:

The quality assurance processes are very vital in establishing quality features in the product. Various standard mechanisms are developed in the companies to focus on the quality of the product. These mechanisms have to undergo improvements time to time in order to maintain the competition in the market. The product has to be viewed from the user point of view. A satisfaction note on the various features of the product is necessary to be reviewed to bring a change in the product to enhance it and to make it a quality product.

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Q2. Discuss the Objective & Principles Behind Software Testing.

Q4. Discuss the Water Fall model for Software Development.

Q5. Explain the Advantages of Prototype Model, & Spiral Model in Contrast to Water Fall model.

Q6. Explain the COCOMO Model & Software Estimation Technique.

 

 

Fall Drive/Aug 2012

Master of Business Administration – MBA Semester III

MI0033 — Software Engineering – 4 Credits

Assignment – Set- 2 (60 Marks)

Answer the Following ( 6 * 10 = 60 Marks )

Q1. Write a note on myths of Software.

Answer : Myth is defined as “widely held but false notation” by the oxford dictionary, so assign other fields software arena also has some myths to demystify. Pressman insists “Software myths- beliefs about software and the process used to build it- can be traced to earliest days of computing. Myths have number of attributes that have made them insidious.” So software myths prevail but though they do are not clearly visible they have the potential to harm all the parties involved in the software development process mainly the developer team. Tom Demark expresses “In the absence of meaningful standards, a new industry like software comes to depend instead on folklore.” The given statement points out that the software industry caught pace just some decades back so it has not matured to formidable level and there are no strict standards in software development. There does not exist one best method of software development that ultimately equates to the ubiquitous software myths. Primarily, there are three types of software myths, all the three are stated below: 1.Management Myth2.CustomerMyth3.Practitioner/Developer Myth before defining the above three myths one by one lets scrutinize why these myths occur on the first place. The picture below tries to clarify the complexity of the problem of software development requirement analysis mainly between the developer team and the clients

SOFTWARE MYTHS:

There are many myths that are associated with the software development world. Unlike ancient myths which provide human lessons, software myths transmit confusion. Various Software Myths are given below:

  • Software can work right at the first time
  • We cannot expect software to work properly at the first time. For example, you go to an aeronautics engineer, and ask him to build a jet fighter; he will quote us the price. But if we demand it to be put into production without building its prototype, then he will refuse the job. Software engineers are often asked to do that sort of work that is quite unexpected.
  • Software is easy to change

Well, source code of the software is easy to edit, but is quite different from saying that it is easy to change. Because changes made in software without introducing problems are very difficult. Verification of the complete system is needed after every change. Therefore software is not easy to change and proper care is needed during every change.

  • Software with more features is a better software

It is a totally false statement that software with more features is better software. Best software is that which does one task well.

  • Reusing Software increases safety

Reusing software does not increase safety. Reusing code can helps in improving the development efficiency, but it needs a lot of analysis to check its suitability and testing to see if it works.

  • Addition of more software engineers will cover up the delay

It is not true in all the cases. Sometimes, by adding more software engineers during the project, we may further delay the project. Therefore it is not true in our case, but adding more people can certainly cover up the delay in civil engineering work. Software myths list is endless. Various other software myths are like computer provides greater reliability than the device they replaced; testing errors can remove the errors etc.

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Q2. Explain Version Control & Change Control.

 

Q4. Explain

 

ii. Software is engineered & not manufactured.

 

Q5.Explain the Different types of Software Measurement Techniques.

 

Q6.Write a Note on Spiral Model.

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Aug/Fall 2012

Master of Business Administration – MBA Semester III

MI0034 — Database Management System – 4 Credits

Assignment – Set- 1 (60 Marks)

Answer all the questions

Q1. Differentiate between Traditional File System & Modern Database System? Describe the properties of Database & the Advantage of Database?

Answer :  Differentiate between Traditional File System & Modern Database System:

Traditional File System Modern Database  Systems
Traditional File system is the system that was followed before the advent of DBMS i.e., it is the older way. This is the Modern way which has replaced the older concept of File system.
In Traditional file processing, data definition is part of the application program and works with only specific application.
  • Data definition is part of the DBMS
  • Application is independent and can be used with any application.
File systems are Design Driven; they require design/coding change when new kind of data occurs.

E.g.:: In a traditional employee the master file has Emp_name, Emp_id, Emp_addr, Emp_design, Emp_dept, Emp_sal, if we want to insert one more column ‘Emp_Mob number’then it requires a complete  restructuring of the file or redesign of the application code, even though

basically all the data except that in one column is the same.

  • One extra column (Attribute) can be added without any difficulty

 

  • Minor coding changes in the Application Program may be required.
Traditional File system keeps redundant [duplicate] information in many locations. This might result in the loss of Data Consistency.

For e.g.: Employee names might exist in separate files like Payroll Master File and also in Employee Benefit Master File etc. Now if an

employee changes his or her last name, the name might be changed in the pay roll master file but not be changed in Employee Benefit

Master File etc. This might result in the loss of Data Consistency.

Redundancy is eliminated to the maximum extent in DBMS if properly defined.
In a File system data is scattered in various files, and each of these files may be in different formats, making it difficult to write new application programs to retrieve the appropriate

data.

This problem is completely solved here.
Security features are to be coded in the Application Program itself. Coding for security requirements is not

required as most of them have been taken care by the DBMS.

 

Properties of Database:

The following are the important properties of Database:

1. A database is a logical collection of data having some implicit meaning. If the data are not related then it is not called as proper database.

E.g.  Student studying in class II got 5th rank.

 

2. A database consists of both data as well as the description of the database structure and constraints.

3. A database can have any size and of various complexity. If we consider the above example of employee database the name and address of the employee may consists of very few records each with simple structure.

Like this there may be „n number of records.

4. The DBMS is considered as general-purpose software system that facilitates the process of defining, constructing and manipulating databases for various applications.

5. A database provides insulation between programs, data and data abstraction. Data abstraction is a feature that provides the integration of the data source of interest and helps to leverage the physical data however the structure is.

6. The data in the database is used by variety of users for variety of purposes. For E.g. when you consider a hospital database management system the view of usage of patient database is different from the same used by the doctor. In this case the data are stored separately for the different users. In fact it is stored in a single database. This property is nothing but multiple views of the database.

7. Multiple user DBMS must allow the data to be shared by multiple users simultaneously. For this purpose the DBMS includes concurrency control software to ensure that the updation done to the database by variety of users at single time must get updated correctly. This property explains the multiuser transaction processing.

 

Advantage of Database:

1. Redundancy is reduced

2. Data located on a server can be shared by clients

3. Integrity (accuracy) can be maintained

4. Security features protect the Data from unauthorized access

5. Modern DBMS support internet based application.

6. In DBMS the application program and structure of data are independent.

7. Consistency of Data is maintained

8. DBMS supports multiple views. As DBMS has many users, and each one of them might use it for different purposes, and may require to view and manipulate only on a portion of the database, depending on requirement.

 

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

 

Q2. What is the disadvantage of sequential file organization? How do you overcome it? What are the advantages & disadvantages of Dynamic Hashing?

 

Q3. What is relationship type? Explain the difference among a relationship instance, relationship type

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

& a relation set?

 

Q4. What is SQL? Discuss.

 

Q5. What is Normalization? Discuss various types of Normal Forms?

Q6. What do you mean by Shared Lock & Exclusive lock? Describe briefly two phase locking protocol?

 

Aug/Fall 2012

Master of Business Administration – MBA Semester III

MI0034 — Database Management System – 4 Credits

Assignment – Set- 2 (60 Marks)

Answer all the Questions

Q1. Define Data Model & discuss the categories of Data Models? What is the difference between logical data Independence & Physical Data Independence?

Answer : A database model is a theory or specification describing how a database is structured and used. Several such models like Hierarchical model, Network model, Relational model etc., have been suggested.

Data Model, Schemas and Instances:

Data Model  :

It is a set of Concepts for viewing a set of data in a structured way. This can be easily understood by professionals and non-technical users. It can explain the way in which the organization uses and manages the information.

Concepts used in data Model

Entity An entity is something that has a distinct, separate existence, though it need not beef a material existence.E.g. – Employee.

Attribute

It is the property that describes an entity

It is a characteristic or property of an object, such as weight, size, or colour Relationship

Describes the relationship between two or more entities

 

Schemas

The description of the data base means defining the names, data type, size of column in a table and database [actual data in the table] itself.

The description of a database is called the database schema [or the Meta data].

Description of a database is specified during database design and is not frequently changed.

Roll No.

Name Semester

Branch

 

Instances

The collection of data stored in the database at a particular moment is a database instance or database state or snapshot.

These changes very frequently due to addition, deletion and modification.

Roll No.

Name Semester

Branch

1

Rajesh Parch

Ii

E & C

Data independence is defined as the ability to modify a schema definition in one level without affecting schema definition in a higher level.

 

Physical data independence

This is the ability to modify the physical scheme without causing application programs to be rewritten. Modifications at this level are usually to improve performance.

Logical data independence

This is the ability to modify the conceptual scheme without causing application programs to be rewritten. This is usually done when theological structure of database is altered. Logical data independence is harder to achieve, as the application programs are usually heavily dependent on the logical structure of the data. An analogy is made to abstract data types in programming languages.

 

 

 

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Q2. What is a Biters? Describe the structure of both internal and leaf nodes of a Biter?

 

Q3. Describe Projection operation, Set theoretic operation & join operation?

Q4. Discuss Multi Table Queries?

 

Q5. Discuss Transaction Processing Concept? 10.2 Describe properties of Transactions?

 

Q6. Describe the advantage of Distributed database? What is Client/server Model? Discuss briefly the security and Internet violation?

irect access to the data.

Aug/Fall 2012

Master of Business Administration – MBA Semester III

MI0035 — Computer Network – 4 Credits

Assignment – Set- 1 (60 Marks)

Note: Each question carries 10 Marks. Answer all the questions.

Q.1 Explain all design issues for several layers in Computer. What is connection — oriented and connectionless service? [10 Marks]

Answer : The various key design issues are present in several layers in computer networks. The important design issues are:

 

1. Addressing: Mechanism for identifying senders and receivers, on the network need some form of addressing. There are multiple processes running on one machine. Some means is needed for a process on one machine to specify with whom it wants to communicate.

 

2. Error Control: There may be erroneous transmission due to several problems during communication. These are due to problem in communication circuits, physical medium, due to thermal noise and interference. Many error detecting and error correcting codes are known, but both ends of the connection must agree on which one being used. In addition, the receiver must have some mechanism of telling the sender which messages have been received correctly and which has not.

 

3. Flow control: If there is a fast sender at one end sending data to a slow receiver, then there must be flow control mechanism to control the loss of data by slow receivers. There are several mechanisms used for flow control such as increasing buffer size at receivers, slow down the fast sender, and so on. Some process will not be in position to accept arbitrarily long messages. Then, there must be some mechanism to   disassembling, transmitting and then reassembling messages.

 

4. Multiplexing / demultiplexing: If the data has to be transmitted on transmission  media separately, it is inconvenient or expensive to setup separate connection for each pair of communicating processes. So, multiplexing is needed in the physical layer at sender end and demultiplexing is need at the receiver end.

 

5. Routing: When data has to be transmitted from source to destination, there may be multiple paths between them. An optimized (shortest) route must be chosen. This decision is made on the basis of several routing algorithms, which chooses optimized route to the destination.

 

Connection Oriented and Connectionless Services:

Layers can offer two types of services namely connection oriented service and connectionless service.

 

Connection oriented service:

The service user first establishes a connection, uses the connection and then releases the connection. Once the connection is established between source and destination, the path is fixed. The data transmission takes place through this path established. The order of the messages sent will be same at the receiver end. Services are reliable and there is no loss of data. Most of the time, reliable service provides acknowledgement is an overhead and adds delay.

 

Connectionless Services:

In this type of services, no connection is established between source and destination. Here there is no fixed path.

Therefore, the messages must carry full destination address and each one of these messages are sent independent of each other. Messages sent will not be delivered at the destination in the same order. Thus, grouping and ordering is required at the receiver end, and the services are not reliable.

 

There is no acknowledgement confirmation from the receiver. Unreliable connectionless service is often called datagram service, which does not return an acknowledgement to the sender. In some cases, establishing a connection to send one short messages is needed. But reliability is required, and then acknowledgement datagram service can be used for these applications.

Another service is the request-reply service. In this type of service, the sender transmits a single datagram containing a request from the client side. Then at the other end, server reply will contain the answer. Request reply is commonly used to implement communication in the client-server model.

 

Q.2 Discuss OSI Reference model. [10 Marks]

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Q.3 Describe different types of Data transmission modes. [10 Marks]

Q.4 Define Switching. What is the difference between circuit switching and Packet Switching? [10 Marks]

 

Q.5 Classify Guided medium (wired).Compare fibber optics and copper wire. [10 Marks]

 

Q.6 What are different types of satellites? [10 Marks]

 

Aug/Fall 2012

Master of Business Administration – MBA Semester III

MI0035 — Computer Network – 4 Credits

Assignment – Set- 2 (60 Marks)

Note: Each question carries 10 Marks. Answer all the questions.

Q.1 Write down the features of Fast Ethernet and Gigabit Ethernet. [10 Marks]

Answer : Fast Ethernet Technology Fast Ethernet, or 100BaseT, is conventional Ethernet but faster, operating at 100 Mbpsinstead of 10 Mbps. Fast Ethernet is based on the proven CSMA/CD Media Access Control (MAC) protocol and can use existing10BaseT cabling (See Appendix for pinot diagram and table). Data can move from 10Mbps to 100 Mbps without protocol translation or changes to application and networkingsoftware.Data- Link Layer Fast Ethernet maintains CSMA/CD, the Ethernet transmission protocol. However, Fast Ethernet reduces the duration of time each bit is transmitted by a factor of 10, enabling the packet speed to increase tenfold from 10 Mbps to 100 Mbps. Data can move between Ethernet and Fast Ethernet without requiring protocol translation, because Fast Ethernet also maintains the 10BaseT error control functions as well as the frame format andlength.Other high-speed technologies such as 100VG-AnyLAN, FDDI, and Asynchronous Transfer Mode (ATM) achieve 100 Mbpsor higher speeds by implementing different protocols that require protocol translation when moving data to and from 10BaseT. This protocol translation involves changes to the frame that typically mean higher latencies when frames are passed through layer 2 LAN switches.

Physical Layer Media Options Fast Ethernet can run over the same variety of media as 10BaseT, including UTP,shielded twisted-pair (STP), and beer. The Fast Ethernet specification dense separate physical sub layers for each media type:- 100BaseT4 for four pairs of voice- or data-grade Category 3, 4, and 5 UTP wiring- 100BaseTX for two pairs of data-grade Category 5 UTP and STP wiring- 100BaseFX for two strands of 62.5/125-micron multimode beer In many cases, organizations can upgrade to 100BaseT technology without replacing existing wiring. However, for installations with Category 3 UTP wiring in all or part of their locations, four pairs must be available to implement Fast Ethernet. The MII layer of 100BaseT couples these physical sub layers to the CSMA/CD MAC layer (see Figure 1). The MII provides a single interface that can support external transceivers for any of the 100BaseT physical sub layers. For the physical connection, theme is implemented on Fast Ethernet devices such as routers, switches, hubs, and adapters, and on transceiver devices using a 40-pin connector (See Appendix for pinoutand connector diagrams). Cisco Systems contributed to the MII specification.PublicCopyright © 1999 Cisco Systems, Inc. All Rights Reserved. Physical Layer Signalling Schemes Each physical sub layer uses a signalling scheme that is appropriate to its media type.100BaseT4 uses three pairs of wire for 100-Mbps transmission and the fourth pair for collision detection. This method lowers the 100BaseT4 signalling to 33 Mbps per pair, making it suitable for Category 3, 4, and 5 wiring.100BaseTX uses one pair of wires for transmission (125-MHz frequency operating at 80- percent efficiency to allow for 4B5B encoding) and the other pair for collision detection and receive. 100BaseFX uses one beer for transmission and the other beer for collision detection and receive. The 100BaseTX and 100BaseFX physical signalling channels are based on FDDI physical layers developed and approved by the American National.

Standards Institute (ANSI) X3T9.5 committee. 100BaseTX uses the MLT-3 line encoding signalling scheme, which Cisco developed and contributed to the ANSIcommittee as the specification for FDDI over Category 5 UTP. Today MLT-3 also issued as the signalling scheme for ATM over Category 5 UTP.Gigabit Ethernet: Gigabit Ethernet is a 1-gigabit/sec (1,000-Mbit/sec) extension of the IEEE 802.3 Ethernet networking standard. Its primary niches are corporate LANs, campus networks, and service provider networks where it can be used to tie together existing 10-Mbit/sec and100-Mbit/sec Ethernet networks. Gigabit Ethernet can replace 100-Mbit/sec FDDI (Fibber Distributed Data Interface) and Fast Ethernet backbones, and it competes with ATM(Asynchronous Transfer Mode) as a core networking technology. Many ISPs use Gigabit Ethernet in their data centers.Gigabit Ethernet provides an ideal upgrade path for existing Ethernet-based networks. It can be installed as a backbone network while retaining the existing investment in Ethernet hubs, switches, and wiring plants. In addition, management tools can be retained, although network analyzers will require updates to handle the higher speed. Gigabit Ethernet provides an alternative to ATM as a high-speed networking technology. While ATM has built-in Quos (quality of service) to support real-time network traffic, Gigabit Ethernet may be able to provide a high level of service quality by providing more bandwidth than is needed.

Gigabit Ethernet features and specification

Gigabit Ethernet modes and functional elements

Gigabit Ethernet committees and specifications, including:

1000Base-LX (IEEE 802.3z)

1000Base-SX (IEEE 802.3z)

1000Base-CX (IEEE 802.3z)

1000Base-T (IEEE 802.3ab)

10-Gigabit Ethernet (IEEE 802.3ae)

Gigabit Ethernet switches

Network configuration and design

Flat network or subnets

Gigabit Ethernet backbones

Switch-to-server links

Gigabit Ethernet to the desktop

Switch-to-switch links

Gigabit Ethernet versus ATM

Hybrid Gigabit Ethernet/ATM Core Network

10-Gigabit Ethernet

As if 1 Grits/sec wasn’t enough, the IEEE is working to define 10-Gigabit Ethernet(sometimes called “10 GE”). The new standard is being developed by the IEEE 802.3aeWorking Group. Service providers will be the first to take advantage of this standard. It is being deployed in emerging metro-Ethernet networks. See “MAN (Metropolitan Area  Network)” and ” Network Access Services.”As with 1-Gigabit Ethernet, 10-Gigabit Ethernet will preserve the 802.3 Ethernet frame format, as well as minimum and maximum frame sizes. It will support full-duplex operation only. The topology is star-wired LANs that use point-to-point links, and structured cabling topologies. 802.3ad link aggregation will also be supported.

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

The new standard will support new multimedia applications, distributed processing, imaging, medical, CAD/CAM, and a variety of other applications-many that cannot even be perceived today. Most certainly it will be used in service provider data centres and as part of metropolitan area networks. The technology will also be useful in the SAN(Storage Area Network) environment. Refer to the following Web sites for more information.

 

Q.2 Differentiate the working between pure ALOHA and slotted ALOHA. [10 Marks]

 

Q.3 Write down distance vector algorithm. Explain path vector protocol. [10 Marks]

Q.4 State the working principle of TCP segment header and UDP header. [10 Marks]

Q.5 What is IP addressing? Discuss different classes of IP Addressing. [10 Marks]

Q.6 Define Cryptography. Discuss two cryptographic techniques. [10 Marks]

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Aug/Fall 2012

Master of Business Administration – MBA Semester III

MI0036 — Business Intelligence Tools – 4 Credits

Assignment – Set- 1 (60 Marks)

Note: Each question carries 10 Marks. Answer all the questions.

Q.1 Define the term business intelligence tools? Briefly explain how the data from one end gets transformed into information at the other end? [10 Marks]

Answer :  Business intelligence tools. The various tools of this suite are:

-Data Integration Tools:

These tools extract, transform and load the data from the source databases to the target database. There are two categories; Data Integrator and Rapid Marts. Data Integrator is an ETL tool with a GUI. Rapid Marts is a packagedETL with pre-built data models for reporting and query analysis that makes initial prototype development easy and fast for ERP applications. The important components of Data Integrator include;

Graphical designer:

This is a GUI used to build and test ETL jobs for data cleansing, validation and auditing.

Data integration server:

This integrates data from different source databases.

Metadata repository:

This repository keeps source and target metadata and the transformation rules.

Administrator:

This is a web-based tool that can be used to start, stop, schedule and monitor ETL jobs.

-BI Platform:

This platform provides a set of common services to deploy, use and manage the tools and applications. These services include providing the security, broadcasting, collaboration, metadata and developer services.

-Reporting Tools and Query & Analysis Tools

: These tools provide the facility for standard reports generation, ad hoc queries and data analysis.

Performance Management Tools:

These tools help in managing the performance of a business by analyzing and tracking key metrics and goals.

 

-Business intelligence tools are a type of application software designed to help in making better business decisions. These tools aid in the analysis and presentation of data in a more meaningful way and so play a key role in the strategic planning process of an organization. They illustrate business intelligence in the areas of market research and segmentation, customer profiling, customer support, profitability, and inventory and distribution analysis to name a few.

 

-Various types of BI systems viz. Decision Support Systems, Executive Information Systems (EIS), Multidimensional Analysis software or OLAP (On-Line Analytical Processing) tools, data mining tools are discussed further. Whatever is the type, the Business Intelligence capabilities of the system is to let its users slice and dice the information from their organization’s numerous databases without having to wait for their IT departments to develop complex queries and elicit answers.

 

-Although it is possible to build BI systems without the benefit of data warehouse, most of the systems are an integral part of the user-facing end of the data warehouse in practice. In fact, we can never think of building a data warehouse without BI Systems. That is the reason; sometimes, the words ‘data warehousing’ and ‘business intelligence’ are being used interchangeably.

 

-Figure 1.1 depicts how the data from one end gets transformed to information at the other end for business information.

 

 

 

Q. 2 what do you mean by data ware house? What are the major concepts and terminology used in the study of data warehouse? [10 Marks]

.

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Q.3 what are the data modelling techniques used in data warehousing environment? [10 Marks]

 

Q.4 Discuss the categories in which data is divided before structuring it into data ware house? [10 Marks]

 

Q.5 Discuss the purpose of executive information system in an organization? [10 Marks]

 

Q.6 Discuss the challenges involved in data integration and coordination process? [10 Marks]

 

Aug/Fall 2012

Master of Business Administration – MBA Semester III

MI0036 — Business Intelligence Tools – 4 Credits

Assignment – Set- 2 (60 Marks)

Note: Each question carries 10 Marks. Answer all the questions.

Q.1 Explain business development life cycle in detail? [10 Marks]

Answer :  The Business development Lifecycle is a methodology adopted for planning, designing, implementing and maintaining the BI system. Various steps involved in this approach are depicted below.

Each of the phases in the above life cycle is described below.

Project Planning

 

Developing a project plan involves identification of all the tasks necessary to implement the BI project. The Project Manager identifies the key team members, assigns the tasks, and develops the effort estimates for their tasks. There is much interplay between this activity and the activity of defining the Business Requirements and aligning the BI system/data warehouse system with the business requirements is very crucial. Therefore you need to understand the business requirements properly before proceeding further.

 

Project Management

This is the phase wherein the actual implementation of the project takes place. The first step here is to define the business requirements and the implementation is carried out in three phases on the basis of the requirements. The first phase (includes technical architecture design, selection and installation of a product) deals with technology, the second phase (includes Dimensional Modelling, Physical Design, ETL Design & Development) focuses on data and the last phase (includes BI Application Specification, BI Application Development) deals with design and development of analytical applications. The steps in these phases are discussed below.

 

1 Defining the Business Requirements

Business requirements are the bedrock of the BI system and so the Business Requirements Definition acts as the foundation of the Lifecycle methodology. The business requirements defined at this stage provide the necessary guidance to make the decisions. This process mainly includes the following activities:

 

  • Requirements planning
  • Collecting the business requirements
  • Post-collection documentation and follow-up

 

 

2 Technical Architecture Design

 

Creation of the Technical Architecture includes the following steps:

 

1. Establishing an Architecture task-force

 

2. Collecting Architecture-related requirements

 

3. Documenting the Architecture requirements

 

4. Developing a high-level Architectural model

 

5. Designing and specifying the subsystems

 

6. Determining Architecture implementation phases

 

7. Documenting the technical Architecture

 

8. Reviewing and finalizing the Architecture

 

 

 

3 Selection and Installation of a Product

The selection and the installation of a business intelligence product is carried out in the following steps:

 

1. Understanding the corporate purchasing process

 

2. Developing a product evaluation matrix

 

3. Conducting market research

 

4. Short listing the options and performing detailed evaluations

 

5. Conducting a prototype (if necessary)

 

6. Selecting a product, installing on trial, and negotiating the value/price.

 

 

 

4 Dimensional Modelling

A dimensional model packages the data in a symmetric format whose design goals are obtaining the user know-how, query performance, and resilience to change. In this step, a data-modelling team is formed and design workshops are conducted to create the dimensional model. Once the modelling team is confident of the model prepared, the model is demonstrated and validated with a broader audience and then documented.

 

5 Physical Design

In this step, the dimensional model created in the previous step is translated into a physical design. The physical model includes the details viz., physical database, data types, key declarations, permissibility of nulls.

 

6 ETL Design & Development

 

ETL stands for Extraction, Transformation, and Loading. ETL tools are used to extract the data from the operational data sources and to load the same into a data warehouse.

 

 

 

7 BI Application Specification

 

In this step, a set of analytical applications are identified for building a BI system based on the business requirements definition, type of data being used, and the architecture of the warehouse proposed.

 

8 BI Application Development

 

This is step wherein a specific application (tool) is selected from the identified applications for actual implementation of the BI system.

 

9 Deployment

 

This is the step wherein the technology, data and analytical application tracks are converged. The completion of this step can be assumed as the completion of actual building of the BI system.

 

10 Maintenance & Growth

 

During this step, the project team provides the user-support to the end-users of the system. Also, the team involves in providing the technical support required for the system so as ensure the continuous utilization of the system. This step may also include making some minor enhancements to the BI system.

 

Revising the Project Planning

 

As the project makes progress, the project manager of the project has to revise the project plan to accommodate the new business interests, concerns raised by the end-users.

 

 

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com 

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

 

 

 

 

Q.2 Discuss the various components of data warehouse? [10 Marks]

 

Q.3 Discuss data extraction process? What are the various methods being used for data extraction? [10 Marks]

 

Q.4 Discuss the needs of developing OLAP tools in details? [10 Marks]

 

 

Q.5 what do you understand by the term statistical analysis? Discuss the most important statistical techniques? [10 Marks]

 

Q.6 what are the methods for determining the executive needs? [10 Marks]

 

Dear Students,

Get your assignments from Our ESTEEMED ORGANIZATION smumbaassignment.com  

Just email to kvsude@gmail.com  or  S M S  to +91 9995105420.

message Format – SMU MBA <Name> <E-MAIL ID> <SEM ? >  To +91 9995105420 , we will reach back you with in 24H

Or Directly call our Middle East Office +974 55702886 .

More Info, Kindly visit  smumbaassignment.com

Best Regards, Admin

smumbaassignment.com

 

 

Leave a Reply

You must be logged in to post a comment.