OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
Transmission media (data communication)Pritom Chaki
Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data.
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Data communication and computer networks | Network TopologiesMSA Technosoft
This video tutorial is all about Data Communication & Computer Network. In this video we have covered several networking topics:
Data Communication, Computer Networks, Network Topologies, Components of Data Communication, Mode of Data flow, Type of Connection, point-to-point connection, multipoint connection, Physical topology, Logical Topology, Mesh Topology, Bus Topology, Ring Topology, Star Topology, Hybrid Topology, LAN Topologies, WAN Topologies, Daisy Chains, Hierarchies, Switched Topologies, Token passing, Three-Tiered WAN, Two-Tiered WAN, Categories of Networks, Internet, Protocol and Standards
For more details visit our Tech Blog:
https://msatechnosoft.in/blog/
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
Transmission media (data communication)Pritom Chaki
Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data.
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Data communication and computer networks | Network TopologiesMSA Technosoft
This video tutorial is all about Data Communication & Computer Network. In this video we have covered several networking topics:
Data Communication, Computer Networks, Network Topologies, Components of Data Communication, Mode of Data flow, Type of Connection, point-to-point connection, multipoint connection, Physical topology, Logical Topology, Mesh Topology, Bus Topology, Ring Topology, Star Topology, Hybrid Topology, LAN Topologies, WAN Topologies, Daisy Chains, Hierarchies, Switched Topologies, Token passing, Three-Tiered WAN, Two-Tiered WAN, Categories of Networks, Internet, Protocol and Standards
For more details visit our Tech Blog:
https://msatechnosoft.in/blog/
Recently Cat 8 cables has been frequently talked about, especially after the TIA category 8 cabling standard approved. Here is what we need to know about the basics of Cat 8 cabling.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
Check out these 10 tips for effective networking at events and conferences. You'll learn how to present yourself, approach other people, lead a meaningful conversation and create connections.
To learn more about events, go to http://blog.sli.do/ or https://www.sli.do
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
Illustrate this Basic concept of Computer networks and
distributed systems, Goals of networking, General approaches of communication within a network, Network classification, Uses & Network Software
How do we prepare for the next 40 years? Do we need to worry about this now? What do we know about the timeline? We will explore what we know now and what we need to consider going forward. Presented at the 2017 D-STOP Symposium.
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...VijiPriya Jeyamani
Interaction:
Introduction
Models of interaction
Ergonomics
Interaction styles
The context of the interactions
Paradigms:
Introduction
Paradigms for interaction.
2.2 Interaction Design:
Introduction
What is design?
User focus
Scenarios
Navigation design
Screen design and layout
Interaction and prototyping
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...VijiPriya Jeyamani
HCI in the Software Process:
Introduction
The software lifecycle
Usability engineering
Interactive design and prototyping
Design rationale
3.2 Design Rules
Introduction
Principles to support usability
Standards
Guidelines
Golden rules and heuristics
HCI patterns
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...VijiPriya Jeyamani
Implementation Support:
Introduction
Elements of windowing systems
Programming the application
User interface management systems
4.2 Evaluation Techniques
What is evaluation?
Goals of evaluation
Choosing an evaluation method
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....VijiPriya Jeyamani
Universal Design:
Introduction
Universal design principles
Multi-modal interaction
Designing for diversity
User Support:
Introduction
Requirements of user support
Approaches to user support
Adaptive help systems
Designing user support systems
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriyaVijiPriya Jeyamani
Chapter 1 Introduction to AI
Chapter 2 Introduction to Expert Systems
Chapter 3 Knowledge Representation
Chapter 4 Inference Methods and Reasoning
Chapter 5 Expert System Design and Pattern Matching
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriyaVijiPriya Jeyamani
Chapter 5 in Integrative Programming Technology
Integrative Coding: Design Patterns; Interfaces; Inheritance
Miscellaneous Issues: Adopt and Adapt vs. make; Versioning and version control
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Communication and Computer Networks
1. Information and CommunicationInformation and Communication
TechnologyTechnology
Chapter 7
Data Communication and Computer
Networks
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 1
2. Data CommunicationData Communication
collection of hardware & software
facilitates intersystem exchange of information between different
devices via wired or wireless transmission medium
transfer of data, the method of transfer and the preservation of
the data during the transfer process
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 2
3. Data Communication ComponentsData Communication Components
Five basic components
Message:
◦ information to be communicated
Sender:
◦ device sends the message
Receiver:
◦ device receives the message.
Medium:
◦ physical path communicates the message from sender to receiver.
Protocols:
◦ set of rules coordinates the exchange of information.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 3
4. Data Transmission ModeData Transmission Mode
◦ refers to the direction of signal flow between two linked devices
Simplex:
◦ Unidirectional
◦ Only one of the communicating devices transmits information, the other can
only receive it.
Half Duplex:
◦ each communicating device can receive and transmit information, but not at the
same time.
Full- Duplex:
◦ both communicating devices to transmit and receive data simultaneously
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 4
5. Data Transmission Mode con…Data Transmission Mode con…
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 5
6. Data Communication MeasurementData Communication Measurement
measurement of quantity of data passed down a communicating
link in a given time in terms of bandwidth
Bandwidth
refers to the maximum volume of information transferred over any
communication medium
communication data transfer rate is measured in a unit called baud
(bits per second)
level of bandwidth falls into three categories:
◦ Narrowband: (bandwidth capacity lies between 64Kbps and 1.544 Mbps.)
◦ Wideband: (etween1.544Mbps (T1 Lines) and 45 Mbps ( T3 Lines))
◦ Broadband: (equal to 45Mbps or a T3 line)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 6
7. Common Network DevicesCommon Network Devices
The Network Interface Card (NIC)
expansion card
installed in to connect (interface) computer to the network.
provides the physical, electrical, and electronic connections to the network media
built in to the motherboard of the computer
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 7
8. Common Network Devices Con…Common Network Devices Con…
The Repeater
amplifies (or repeats) network signals to extend the maximum reach of a network
receive network signals on one port, amplify and repeat them out on the other
port.
interconnect different media types
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 8
9. Common Network Devices Con…Common Network Devices Con…
The Hub
central device in a star topology.
receive a signal on one port and repeat it to all other ports (multiport repeaters)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 9
10. Common Network Devices Con…Common Network Devices Con…
The Bridge
logically separates a single network into two segments
keep traffic meant for stations on one segment on that side of the bridge and not let
that traffic pass to the other side.
improve network performance because traffic is not propagated unnecessarily on all
network segments
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 10
11. Common Network DevicesCommon Network Devices
Con…Con…
The Ethernet Switch
high-performance multi-interface bridges
subdivide larger networks
prevent the unnecessary flow of network traffic from one segment to another or in
the case of cross-segment traffic
direct the frames only across the segments containing the source and destination
hosts
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 11
12. Common Network Devices Con…Common Network Devices Con…
The Router
connects multiple, dissimilar, network segments into an internetwork.
special-purpose computer than a simple electronic device
reads source and destination address of a packet and forwards it based on the
information it gathers about the network.
make intelligent decisions about the best way to forward packets.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 12
13. Computer NetworkComputer Network
collection of two or more computers connected together to share
information and resources
interconnected by telephone lines, coaxial cables, satellite links,
radio and/or some other communication technique.
small network or larger internet, a worldwide network
three primary categories
◦ based on the size of the network, the distance it covers, and the type of link
used in interconnection
1. Local Area Network (LAN).
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 13
14. Local Area Network (LAN)Local Area Network (LAN)
spans only a small geographical area, such as an office, building or campus.
uses a variety of telecommunication media, ordinary telephone wiring, coaxial
cable etc.
To communicate, each PC has a circuit board called a network interface card
(NIC)
uses file server or network server having a larger hard disk capacity
contains network Operating System Program that controls communication,
sharing of network resources
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 14
15. Metropolitan Area NetworkMetropolitan Area Network
(MAN)(MAN)
large computer networks usually spanning a campus or a city.
use wireless infrastructure or optical fiber connections to link their sites.
support both data & voice, and related to the local cable television network.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 15
16. Wide Area Network (WAN):Wide Area Network (WAN):
spans a relatively large geographical area, consists of two or more LANs
are often connected through public networks, such as the telephone system,
Internet.
connected through leased lines or satellites
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 16
17. WANS differ from LANSWANS differ from LANS
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 17
LAN WAN
smaller distance greater distance
Faster speed slower speed
permanently connected permanently connected
private network transports public or private network transports
half-duplex communications full- or half-duplex communications
18. Peer-to-Peer NetworksPeer-to-Peer Networks
all computers are equal (peers) .
a client that requests resources and a server that provides resources upon request
They are characterized by the following:
Security is not centralized; each computer is responsible to check access rights for its
resources
Network is not scalable; good only for a few number of computers (≤10)
Each user is responsible for local backup
No specialized operating system is required; Windows NT 4.0 Workstation,
Windows 95/98, Windows 2000 Pro, etc. are sufficient
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 18
19. Client/Server NetworksClient/Server Networks
there exist dedicated servers provide resources/services when requested.
They are characterized by the following:
Security is centralized and tighter. All user accounts are stored in the same
database on the server.
The network is highly scalable; tens of thousands of workstations in the network.
Backup is centralized, done by backup operator
Specialized networking operating systems are required, such as Windows NT 4.0
server, Windows 2000 server, Novell NetWare, etc.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 19
20. Network TopologiesNetwork Topologies
the physical configuration of a network
determines how the network's computers are connected
bus, star mesh and ring topologies
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 20
21. Network Topologies con…Network Topologies con…
The Bus Topology
all computers are connected to a single cable
The cable is terminated at its ends to avoid signal bouncing
When a computer wants to send data to another computer, it places the data and
address of the recipient computer on the cable
Only the computer whose address is included with the data accepts the data
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 21
22. Network Topologies con…Network Topologies con…
Advantages of a Bus Topology
Easy to connect a computer or peripheral to a linear bus
Requires less cable length than a star topology
Disadvantages of a Bus Topology
Entire network shuts down if there is a break in the main cable
Terminators are required at both ends of the backbone cable
Difficult to identify the problem if the entire network shuts down
Network can slow down in heavy traffic
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 22
23. Network Topologies con…Network Topologies con…
The Star Topology
Each computer is connected to a central device (hub) by a separate cable.
When a computer wants to send data to another computer, it sends the data and
address of the recipient computer to the hub
The hub sends it every computer connected to it
Only the computer whose address is included with the data accepts the data.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 23
24. Network Topologies con…Network Topologies con…
Advantages of a Star Topology
Easy to install and wire
No disruptions to the network then connecting or removing devices
Easy to detect faults and to remove parts
Failure of one computer does not affect the rest of the network
Disadvantages of a Star Topology
Requires more cable length than a linear topology
If the hub or concentrator fails, nodes attached are disabled
More expensive than linear bus topologies because of the cost of the concentrators
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 24
25. Network Topologies con…Network Topologies con…
The Ring Topology
Each computer is connected directly to two other computers in the network.
Data moves down a one-way path from one computer and if the next computer is
the recipient it accepts the data; otherwise it amplifies it and sends it to the next
computer down in the path.
Any break disrupts the entire network
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 25
26. Network Topologies con…Network Topologies con…
Advantages of a Ring Topology
System provides equal access for all computers.
Performance is even despite many users
Disadvantages of a Ring Topology
Failure of one computer can impact the rest of the network
Problems are hard to isolate.
Network reconfiguration disrupts operation
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 26
27. Network Topologies con…Network Topologies con…
The Mesh Topology
Each computer is directly connected to every other computer.
complex as wiring and connections increase rapidly with the increase of computers
to connect.
For n computers, n(n-1)/2 cables are required
Today rarely used only in a WAN environment because the mesh topology is fault
tolerant
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 27
28. Network Topologies con…Network Topologies con…
Advantages of a Mesh Topology
System provides increased redundancy and reliability as well as ease of
troubleshooting
Disadvantages of a Mesh Topology
System is complex
expensive to install because it uses a lot of cabling
Considerations When Choosing a Topology:
Money
Length of cable needed
Future growth
Cable type
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 28
29. Media AccessMedia Access
Carrier Sense/Multiple Access with Collision Detection (CSMA/CD)
used in Ethernet networks
When a protocol that uses CSMA/CD has data to transmit,
1. it first senses if a signal is already on the wire (a carrier), indicating that
someone is transmitting currently
2. If no one else is transmitting, it attempts a transmission and then listens to hear
if someone else tried to transmit at the same time
3. If someone else transmits at the exact same time, a condition known as a
collision occurs
4. Both senders "back off" and don't transmit until some random period of time
has passed
5. They then both retry
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 29
30. Media Access con…Media Access con…
Carrier Sense/Multiple Access with Collision Detection
(CSMA/CD)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 30
31. Media Access con…Media Access con…
Token Passing : uses a special packet called a token.
1. The first computer turned on creates the token
2. It then passes the token on to the next computer
3. The token passes around the network until a computer that has data to send takes the
token off the network, modifies it, and puts it back on the network along with the data
it has to send
4. Each station between the sender and the receiver along the network reads the
destination address in the token
5. If the destination address doesn't match its own, the station simply sends the package
on its way
6. When the destination station recognizes its address in the destination address of the
token, the NIC copies the data into the station's memory and modifies the token,
indicating it has received the data.
7. The token continues around the network until the original sender receives the token
back again.
8. If the original sender has more data to send, the process repeats itself. If not, the
sender modifies the token to indicate that the token is "free" for anyone else to use
With this method, there are no collisions (as in CSMA/CD networks) because
everyone has to have "permission" to transmit (via the token).
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 31
32. Media Access con…Media Access con…
Token Passing
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 32