The document discusses computer networks and the data link layer. It provides classifications of computer networks including PAN, LAN, MAN and WAN. It discusses the goals of computer networks which include resource sharing, reliability, cost savings, performance and communication. It then discusses point-to-point subnets and their possible topologies. Finally, it discusses the services provided by the data link layer, including encapsulation, frame synchronization, error control and logical link control.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
In this tutorial on 'What Is Ethernet?'. we will look into the way for how network devices access internet using the ethernet cables, why it is beneficial to use ethernet, along with types and advantages and disadvantages of using ethernet in the network.
The topics covered in this tutorial on 'What Is Ethernet?' are:
1. What Is Ethernet?
2. Why use Ethernet?
3. Types of Ethernet
4. Working of Ethernet
5. Advantages & Disadvantages of Ethernet
6. Ethernet vs Internet
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
Various routing algorithm are used for the purpose of deciding which route an incoming data packet needs to be transmitted on to reach destination efficiently.
These are the algorithms which change their routing decisions whenever network topology or traffic load changes
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Switching concepts Data communication and networksNt Arvind
This slide explains you about the different types of sxitching networks like circuit switched network , datagram network , virtual circuit network , message switched network
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Indexing is used to speed up access to desired data.
E.g. author catalog in library
A search key is an attribute or set of attributes used to look up records in a file. Unrelated to keys in the db schema.
An index file consists of records called index entries.
An index entry for key k may consist of
An actual data record (with search key value k)
A pair (k, rid) where rid is a pointer to the actual data record
A pair (k, bid) where bid is a pointer to a bucket of record pointers
Index files are typically much smaller than the original file if the actual data records are in a separate file.
If the index contains the data records, there is a single file with a special organization.
Office automation refers to the varied computer machinery and software used to digitally create, collect, store, manipulate, and relay office information needed for accomplishing basic tasks.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
In this tutorial on 'What Is Ethernet?'. we will look into the way for how network devices access internet using the ethernet cables, why it is beneficial to use ethernet, along with types and advantages and disadvantages of using ethernet in the network.
The topics covered in this tutorial on 'What Is Ethernet?' are:
1. What Is Ethernet?
2. Why use Ethernet?
3. Types of Ethernet
4. Working of Ethernet
5. Advantages & Disadvantages of Ethernet
6. Ethernet vs Internet
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
Various routing algorithm are used for the purpose of deciding which route an incoming data packet needs to be transmitted on to reach destination efficiently.
These are the algorithms which change their routing decisions whenever network topology or traffic load changes
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Switching concepts Data communication and networksNt Arvind
This slide explains you about the different types of sxitching networks like circuit switched network , datagram network , virtual circuit network , message switched network
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Indexing is used to speed up access to desired data.
E.g. author catalog in library
A search key is an attribute or set of attributes used to look up records in a file. Unrelated to keys in the db schema.
An index file consists of records called index entries.
An index entry for key k may consist of
An actual data record (with search key value k)
A pair (k, rid) where rid is a pointer to the actual data record
A pair (k, bid) where bid is a pointer to a bucket of record pointers
Index files are typically much smaller than the original file if the actual data records are in a separate file.
If the index contains the data records, there is a single file with a special organization.
Office automation refers to the varied computer machinery and software used to digitally create, collect, store, manipulate, and relay office information needed for accomplishing basic tasks.
Cisco Intelligent WAN: Ou comment améliorer l’expérience en succursaleCisco Canada
Session: Cisco Intelligent WAN: Ou comment améliorer l’expérience en succursale
Presenter: Martin Langlois, Architecte de solutions technologiques
Date: October 27, 2015
"This presentation was created through wide-ranged research and is intended specially for everyone interested in network technology".
-BRIAN S. CUNAL
KALINGA-APAYAO STATE COLLEGE
IT Instructor.
A network consists of two or more computers that are linked together in order to share
the resources, such as printers, exchange files among computers, with the help of electronic
communications. The computers on a network may be linked by cables, telephone lines,
radio waves, satellites, or infrared light beams etc.
Illustrate this Basic concept of Computer networks and
distributed systems, Goals of networking, General approaches of communication within a network, Network classification, Uses & Network Software
This is Data Communication Lecture Assignment. Here discussed about many topics above the subject. I am really learned more from Data Communication subject. Specially thanks to Dear Respectable Sir Pranab Bandhu Nath
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
1. 1. What is computer Network? Give the classification and goals of computer network.
Computer Networks:
The old model of a single computer serving all of the organization’s computational needs has
been replaced by one in which a large number of separate but interconnected computers do the
job. These systems are called computer networks.
Types of networks:
I. Personal Area Network (PAN)
II. Local Area Network (LAN)
III. Metropolitan Area Network (MAN)
IV. Wide Area Network (WAN)
Goals of Computer Network:
I. The main goal of networking is "Resource sharing", and it is to make all programs,
data and equipment available to anyone on the network without the regard to the
physical location of the resource and the user.
II. A second goal is to provide high reliability by having alternative sources of supply. For
example, all files could be replicated on two or three machines, so if one of them is
unavailable, the other copies could be available.
III. Another goal is saving money. Small computers have a much better price/ performance
ratio than larger ones. Mainframes are roughly a factor of ten times faster than the
fastest single chip microprocessors, but they cost thousand times more. This imbalance
has caused many system designers to build systems consisting of powerful personal
computers, one per user, with data kept on one or more shared file server machines.
This goal leads to networks with many computers located in the same building. Such a
network is called a LAN (local area network).
IV. Another closely related goal is to increase the systems performance as the work load
increases by just adding more processors. With central mainframes, when the system is
full, it must be replaced by a larger one, usually at great expense and with even greater
disruption to the users.
V. Computer networks provide a powerful communication medium. A file that was
updated/ modified on a network can be seen by the other users on the network
immediately.
2. What is point- to- Point subnet? Draw the possible topologies for point- to- Point
subnet.
On point to point links we actually do not need special broadcast address of that subnet because
there’s only one way you can send a packet across point to point link. All we have is the IP
address on the other side of the link. We know that if we want to send broadcast it will go there no
matter that address is separate broadcast address or any other address. There cannot be more
destination than one and the router will then know that broadcast will be directed on the same link
as the normal unicast for the link destination address.
Router OS (Cisco IOS in this case) will try to be sure that you will use this kind of subneting only
for Point-to-point links.
2. Fig.: point- to- point subnet.
3. Write the principles for designing the layered architecture of a network.
Principles of layered architectures
• The basic principle of Layered Architectures is layer independence – A layer hides
implementation details from other layers – the functions it realizes are encapsulated and
only the service it provides is visible (but not the details of how it is realized)
• Adjacent layers communicate (interact) through an interface (service interface) – A layer
provides a service to the upper layer through a (service) interface
• A layer uses the service provided by the layer below to perform its own functions, thus
adding value to the service it provides to the layer above
4. Write short note on: NSFNET, ARPANET, and Internet.
3. NSFNET: A wide-area network developed under the auspices of the National Science
Foundation (NSF). NSFnet replaced ARPANET as the main government network linking
universities and research facilities. In 1995, however, the NSF dismantled NSFnet and replaced
it with a commercial Internet backbone. At the same time, the NSF implemented a new
backbone called very high-speed Backbone Network Service (vBNS), which serves as a testing
ground for the next generation of Internet technologies.
ARPANET was the network that became the basis for the Internet. Based on a concept first
published in 1967, ARPANET was developed under the direction of the U.S. Advanced
Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the
interconnection of four university computers.
ARPANET was the network that became the basis for the Internet. Based on a concept first
published in 1967, ARPANET was developed under the direction of the U.S. Advanced
Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the
interconnection of four university computers. The initial purpose was to communicate with and
share computer resources among mainly scientific users at the connected institutions.
ARPANET took advantage of the new idea of sending information in small units called packets
that could be routed on different paths and reconstructed at their destination. The development
of the TCP/IP protocols in the 1970s made it possible to expand the size of the network, which
now had become a network of networks, in an orderly way.
INTERNET: A means of connecting a computer to any other computer anywhere in the
world via dedicated routers and servers. When two computers are connected over the Internet,
they can send and receive all kinds of information such as text, graphics, voice, video,
and computer programs.
No one owns Internet, although several organizations the world over collaborate in its
functioning and development. The high-speed, fiber-optic cables (called backbones) through
which the bulk of the Internet data travels are owned by telephone companies in their
respective countries.
The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then
called ARPANET) established by the US Department Of Defense in 1960s for collaboration in
military research among business and government laboratories. Later universities and other
US institutions connected to it. This resulted in ARPANET growing beyond
everyone's expectations and acquiring the name 'Internet.'
The development of hypertext based technology (called World Wide web, WWW, or just
the Web) provided means of displaying text, graphics, and animations, and
easy search and navigation tools that triggered Internet's explosive worldwide growth.
5. Define layer, protocol, interfaces. Show how communication is provided to the top
layer in the layer based network?
Layers: To reduce their design complexity, most networks are organized as a stack of layers or
levels, each one built upon the one below it. The number of layers, the name of each layer, the
contents of each layer, and the function of each layer differ from network to network. The
purpose of each layer is to offer certain services to the higher layers while shielding those
layers from the details of how the offered services are actually implemented. In a sense, each
layer is a kind of virtual machine, offering certain services to the layer above it.
4. Protocol: a protocol is an agreement between the communicating parties on how
communication is to proceed. In another word, Protocol is set of some rules and regulations
that govern data communication over network.
Interface: Between each pair of adjacent layers is an interface. The interface defines which
primitive operations and services the lower layer makes available to the upper one. When
network designers decide how many layers to include in a network and what each one should
do, one of the most important considerations is defining clean interfaces between the layers.
Doing so, in turn, requires that each layer perform a specific collection of well-understood
functions.
A five-layer network is illustrated in Fig. 1-13. The entities comprising the corresponding layers
on different machines are called peers. The peers may be software processes, hardware
devices, or even human beings. In other words, it is the peers that communicate by using the
protocol to talk to each other.
In reality, no data are directly transferred from layer n on one machine to layer n on another
machine. Instead, each layer passes data and control information to the layer immediately
below it, until the lowest layer is reached. Below layer 1 is the physical medium through
which actual communication occurs. In Fig. 1-13, virtual communication is shown by dotted
lines and physical communication by solid lines.
6. Define connection oriented and connectionless networks. Explain how packets are sent
in a simple client server interaction on connection oriented network?
Connection-oriented Requires a session connection (analogous to
a phone call) be established before any data can be sent. This
method is often called a "reliable" network service. It can guarantee
5. that data will arrive in the same order. Connection-oriented services
set up virtual links between end systems through a network, as
shown in Figure 1. Note that the packet on the left is assigned the
virtual circuit number 01. As it moves through the network, routers
quickly send it through virtual circuit 01.
Connectionless Does not require a session connection between
sender and receiver. The sender simply starts sending packets (called
datagram’s) to the destination. This service does not have the
reliability of the connection-oriented method, but it is useful for
periodic burst transfers. Neither system must maintain state
information for the systems that they send transmission to or receive
transmission from. A connectionless network provides minimal
services.
7. Name and define services of data link layer. Show the environment of data link layer.
Explain how data link layer work in Internet with diagram.
6. Services
Encapsulation of network layer data packets into frames
Frame synchronization
Logical link control (LLC) sub layer:
Error control (automatic repeat request, ARQ), in addition to ARQ provided by
some transport-layer protocols, to forward error correction (FEC) techniques provided on
the physical, and to error-detection and packet canceling provided at all layers, including
the network layer. Data-link-layer error control (i.e. retransmission of erroneous packets) is
provided in wireless networks and V.42 telephone network modems, but not in LAN
protocols such as Ethernet, since bit errors are so uncommon in short wires. In that case,
only error detection and canceling of erroneous packets are provided.
Flow control, in addition to the one provided on the transport layer. Data-link-layer error
control is not used in LAN protocols such as Ethernet, but in modems and wireless
networks.
Media access control (MAC) sub layer:
Multiple access protocols for channel-access control, for example CSMA/CD protocols
for collision detection and re-transmission in Ethernet bus networks and hub networks, or
the CSMA/CA protocol for collision avoidance in wireless networks.
Physical addressing (MAC addressing)
LAN switching (packet switching), including MAC filtering, Spanning Tree Protocol (STP)
and Shortest Path Bridging (SPB)
Data packet queuing or scheduling
Store-and-forward switching or cut-through switching
Quality of Service (QoS) control
Virtual LANs (VLAN)
7. Fig.: Internal Environment of Data Link Layer
Fig.: The Data Link Layer in the Internet
8. Name and define key assumptions for dynamic channel allocation protocol. Define
CSMA/ CD protocol with algorithm.
8.
9. 9. What is error control? Error correction and detection using hamming code (odd/ even
parity for the given code).
Error control (automatic repeat request, ARQ), in addition to ARQ provided by some transport-
layer protocols, to forward error correction (FEC) techniques provided on the physical, and to
error-detection and packet canceling provided at all layers, including the network layer. Data-
link-layer error control (i.e. retransmission of erroneous packets) is provided in wireless
networks and V.42 telephone network modems, but not in LAN protocols such as Ethernet,
since bit errors are so uncommon in short wires. In that case, only error detection and canceling
of erroneous packets are provided.
10. Name and define the fields of Ethernet frame format.
A data packet on the wire and the frame as its payload consist of binary data. Data on Ethernet
is transmitted with most-significant octet (byte) first; within each octet, however, the least-
significant bit is transmitted first, except for the frame check sequence (FCS).
The internal structure of an Ethernet frame is specified in IEEE 802.3-2012.[1]
The table below
shows the complete Ethernet frame, as transmitted, for the payload size up to the MTU of 1500
octets. Some implementations of Gigabit Ethernet (and higher speed Ethernets) support larger
frames, known as jumbo frames.
10. 11. Draw a typical ADSL arrangement and explain the function of its.
12. What is Bluetooth technology? Define the goals of Bluetooth. Explain the Bluetooth
architecture. Name five Bluetooth profiles. Define different types of multiplexing.
13. Define the characteristics/ properties of twisted pair and coaxial cables with diagrams.
One of the oldest and still most common transmission media is twisted pair. A twisted pair
consists of two insulated copper wires, typically about 1 mm thick.
Cat 5 replaced earlier Category 3 cables with a similar cable that uses the same connector, but
has more twists per meter. More twists result in less crosstalk and a better-quality signal over
longer distances, making the cables more suitable for high-speed computer communication,
especially 100-Mbps and 1-Gbps Ethernet LANs.
Twisted-pair cabling comes in several varieties. The garden variety deployed in many office
buildings is called Category 5 cabling, or ‘‘Cat 5.’’ A category 5 twisted pair consists of two
insulated wires gently twisted together. Four such pairs are typically grouped in a plastic sheath
to protect the wires and keep them together. This arrangement is shown in Fig. (b).
(a) Category 3 UTP.
(b) Category 5 UTP.
11. 14. What are the major components of an optical system? Write the working principles of
fiber optic.
i. Compact Light Source
ii. Low loss Optical Fiber
iii. Photo Detector
Compact Light Source
Laser Diodes
Depending on the applications like local area networks and the long haul communication systems,
the light source requirements vary. The requirements of the sources include power, speed, spectral
line width, noise, ruggedness, cost, temperature, and so on. Two components are used as light
sources: light emitting diodes (LED’s) and laser diodes.
The light emitting diodes are used for short distances and low data rate applications due to their
low bandwidth and power capabilities.
Low Loss Optical Fiber
Optical fiber is a cable, which is also known as cylindrical dielectric waveguide made of low loss
material. An optical fiber also considers the parameters like the environment in which it is
12. operating, the tensile strength, durability and rigidity. The Fiber optic cable is made of high quality
extruded glass (si) or plastic, and it is flexible. The diameter of the fiber optic cable is in between
0.25 to 0.5mm (slightly thicker than a human hair).
The purpose of photo detectors is to convert the light signal back to an electrical signal.
Two types of photo detectors are mainly used for optical receiver in optical communication
system: PN photo diode and avalanche photo diode. Depending on the application’s
wavelengths, the material composition of these devices vary. These materials include
silicon, germanium, InGaAs, etc.
Fig.: How fiber optic works
13. (a) Three examples of a light ray from inside a silica fiber impinging on the air/silica
boundary at different angles.
(b) Light trapped by total internal reflection.
(a) Side view of a single fiber.
(b) End view of a sheath with three fibers.
15. Define cabling and cable topologies for Ethernet.
14. Network Topology
Computers in a network have to be connected in some logical manner. The layout pattern of the
interconnections between computers in a network is called network topology. You can think of
topology as the virtual shape or structure of the network. Network topology is also referred to as
'network architecture.'
Devices on the network are referred to as 'nodes.' The most common nodes are computers and
peripheral devices. Network topology is illustrated by showing these nodes and their connections
using cables. There are a number of different types of network topologies, including point-to-point,
bus, star, ring, mesh, tree and hybrid. Let's review these main types.
Point-to-Point
Point-to-point topology is the simplest of all the network topologies. The network consists of a
direct link between two computers. This is faster and more reliable than other types of connections
since there is a direct connection. The disadvantage is that it can only be used for small areas
where computers are in close proximity.
Bus
Bus topology uses one main cable to which all nodes are directly connected. The main cable acts
as a backbone for the network. One of the computers in the network typically acts as the computer
server. The first advantage of bus topology is that it is easy to connect a computer or peripheral
device. The second advantage is that the cable requirements are relatively small, resulting in lower
cost.
One of the disadvantages is that if the main cable breaks, the entire network goes down. This type
of network is also difficult to troubleshoot. For these reasons, this type of topology is not used for
large networks, such as those covering an entire building.
15. Star
In star topology, each computer is connected to a central hub using a point-to-point connection.
The central hub can be a computer server that manages the network, or it can be a much simpler
device that only makes the connections between computers over the network possible.
Star topology is very popular because the startup costs are low. It is also easy to add new nodes to
the network. The network is robust in the sense that if one connection between a computer and the
hub fails, the other connections remain intact. If the central hub fails, however, the entire network
goes down. It also requires more cable than bus topology and is, therefore, more expensive.
Ring
In ring topology, the computers in the network are connected in a circular fashion, and the data
travels in one direction. Each computer is directly connected to the next computer, forming a single
pathway for signals through the network. This type of network is easy to install and manage.
If there's a problem in the network, it is easy to pinpoint which connection is defective. It is also
good for handling high-volume traffic over long distances since every computer can act as a
booster of the signal. On the downside, adding computers to this type of network is more
cumbersome, and if one single computer fails, the entire network goes down.
Mesh
In mesh topology, every node has a direct point-to-point connection to every other node. Because
all connections are direct, the network can handle very high-volume traffic. It is also robust
because if one connection fails, the others remain intact. Security is also high since data travels
along a dedicated connection.
This type of topology requires a lot of cables and is, therefore, expensive. Many of the connections
are also redundant since there are several different paths for data to travel from one node to
another.
Tree
Tree topology combines multiple star topologies onto a bus. Hub devices for each star topology
are connected to the bus. Each hub is like the root of a tree of devices. This provides great
flexibility for expanding and modifying the network.
16. Write short notes on gigabit, switched Ethernet, and Bluetooth technology.
increase performance tenfold while maintaining compatibility with all existing Ethernet
standards. In particular, gigabit Ethernet had to offer unacknowledged datagram service with
both unicast and broadcast, use the same 48-bit addressing scheme already in use, and
maintain the same
frame format, including the minimum and maximum frame sizes. The final standard met all
these goals. Like fast Ethernet, all configurations of gigabit Ethernet use point-to-point links. In
the simplest configuration, illustrated in Fig. 4-20(a), two computers are directly connected to
each other. The more common case, however, uses a switch or a hub connected to multiple
computers and possibly additional switches or hubs, as shown in Fig. 4-20(b). In both
configurations, each individual Ethernet cable has exactly two devices on it, no more and no
fewer.
16. Also like fast Ethernet, gigabit Ethernet supports two different modes of operation: full-duplex
mode and half-duplex mode. The ‘‘normal’’ mode is full duplex mode, which allows traffic in
both directions at the same time.
The heart of this system is a switch containing a high-speed backplane that connects all of
the ports, as shown in Fig. 4-17(b). From the outside, a switch looks just like a hub. They are
both boxes, typically with 4 to 48 ports, each with a standard RJ-45 connector for a twisted-
pair cable. Each cable connects the switch or hub to a single computer.
Inside the switch, however, something very different is happening. Switches only output
frames to the ports for which those frames are destined. When a switch port receives an
Ethernet frame from a station, the switch checks the Ethernet addresses to see which port the
frame is destined for.
In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to
other devices (e.g., laptops) without cables. Together with four other companies (IBM, Intel,
Nokia, and Toshiba), it formed a SIG (Special Interest Group, i.e., consortium) in 1998 to
develop a wireless standard for interconnecting computing and communication devices and
accessories using short-range, low-power, inexpensive wireless radios. The project was
named Bluetooth, after Harald Blaatand (Bluetooth) II (940–981), a Viking king who unified
(i.e., conquered) Denmark and Norway, also without cables.
17. The basic unit of a Bluetooth system is a piconet, which consists of a master node and up to
seven active slave nodes within a distance of 10 meters. Multiple piconets can exist in the
same (large) room and can even be connected via a bridge node that takes part in multiple
piconets.
17. Manchester and differential Manchester code with time diagram.
(a) Binary encoding,
(b) Manchester encoding,
(c) Differential Manchester encoding.
18. How can you define active repeaters for optical fiber? Name the ways of connecting
fiber optical cable.
18. At the bottom, in the physical layer, we find the repeaters. These are analog devices that work
with signals on the cables to which they are connected. A signal appearing on one cable is
cleaned up, amplified, and put out on another cable. Repeaters do not understand frames,
packets, or headers. They understand the symbols that encode bits as volts. Classic Ethernet,
for example, was designed to allow four repeaters that would boost the signal to extend the
maximum cable length from 500 meters to 2500 meters.
19. How DNS works? Define DNS namespace with diagram.
How DNS works
If you've ever used the Internet, it's a good bet that you've used the Domain Name System,
or DNS, even without realizing it. DNS is a protocol within the set of standards for how computers
exchange data on the Internet and on many private networks, known as the TCP/IP protocol suite.
Its basic job is to turn a user-friendly domain name like "howstuffworks.com" into an Internet
Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network.
It's like your computer's GPS for the Internet.
Computers and other network devices on the Internet use an IP address to route your request to the
site you're trying to reach. This is similar to dialing a phone number to connect to the person you're
trying to call. Thanks to DNS, though, you don't have to keep your own address book of IP
addresses. Instead, you just connect through a domain name server, also called a DNS
server or name server, which manages a massive database that maps domain names to IP
addresses.
Whether you're accessing a Web site or sending e-mail, your computer uses a DNS server to look
up the domain name you're trying to access. The proper term for this process is DNS name
resolution, and you would say that the DNS server resolves the domain name to the IP address.
For example, when you enter "http://www.howstuffworks.com" in your browser, part of the network
connection includes resolving the domain name "howstuffworks.com" into an IP address, like
70.42.251.42, for HowStuffWorks' Web servers.
Definition and diagram
The DNS (Domain Name System) is a massive network ofservers that comprises the largestdigital database
on the planet.This database is maintained,managed and regulated byseveral internet authorities,including
the IANA (Internet Assigned Numbers Authority) and ICANN (Internet Corporation for Assigned Names and
Numbers).
Many people confuse the various terms associated with the DNS and mistakenlyrefer to them as either the
same thing or completelyseparate entities.In truth, they are neither separate nor are they the same thing;
rather, they are integral pieces to the puzzle that is the world wide web.
19. 20. What are resource records? Explain with example.
21. What is name server? Explain with example how resolver looks- up a remote name in
DNS namespace?
A name server is a web server that has DNS software installed on it, particularlya server that is managed by a
web hostthat is specificallydesignated for managing the domain names thatare associated with all of the
hosting provider's accounts.
Name servers are often called DSN servers as well, and this is likely the origin of all of the confusion
associated with name servers and the DNS.
22. Define e- mail systemshowing the SMTP and POP3 protocol environment?
23. Explain the architecture framework of WWW with diagram. Write the steps that
occur when a URL is selectedin the browser.