- Bus topology uses a single common line or data path for all connecting nodes hence it requires very short length of cable and its structure is simple and easy to maintain.
- In bus topology data passes through a single cable and all the nodes are connected to that single coil, so this topology is very simple and reliable with respect to hardware point of view.
- Additional nodes can be connected very easily at any point in an existing bus topology.
- As the bus topology consist of a simple structure, it is difficult to detect or diagnosis the fault.
- In case of extension of nodes in the bus topology, routers need to be configured, so it requires experts consult for installation.
- Each node in bus topology is directly connected to a central node, hence it is required to decide which node will be in use at a time. If the central node fails sometimes then the whole network will be down as all the nodes are connected to the central node. This is one of the major disadvantages of bus topology.
- In star topology failure of one node disconnects that node only not the whole network.
- All the nodes of star topology are directly connected to a central node, which actually helps to detect the fault or failure of the system and to isolate them.
- Access protocol of a star network is very simple as it has only one central node and one peripheral node in the whole network.
- In star network each nodes are directly connected to the central node which is situated in the center and requires a large length of cable.
- Due to large length of cables it is little costly.
- Star network is very difficult to expand as it is unknown how much length of cable is required to connect to the central node.
- The star network system is totally central node dependent, if the central node fails the whole network stall.
- Mesh topology avoid media failure very efficiently rather than other network topologies.
- In mesh topology every device or node is always have multiple paths between them to send or receive signals from one device to another device. If failure occurs in one path then signals can be routed to the other path.
- Mesh topology is easy to troubleshoot because each of the nodes connected to the mesh topology network is independent of all others.
- Mesh topology is difficult to install and reconfigure.
- Due to large no of cable connections its construction structure is complex.
- It is a costly network topology against other topologies.
Advantages and Disadvantages of Network Topologies
Real example of Bus topology is the LAN connection in an institute or office.
Real example of Star topology is the ATM service provided by the banks.
Real example of Mesh topology is in the military market.
Q2. Encapsulation- In TCP/IP protocol suite when data moves from upper layer to lower level outgoing transmission each layer includes a bundle of relevant information combined in one packet which contains header and the actual data. The data package containing the header and the data from the upper layer then becomes the data that is repackaged at the next lower level with lower layer’s header. Header is used as a supplemental data placed at the beginning of a block. This supplemental data is used at the receiving side to extract the data from the encapsulated data packets. This packing of data at each layer is known as data encapsulation.
Decapsulation- The whole process of Encapsulation is reversely repeated when data is reached in receiver side or destination computer. As the data flows from lower to upper levels each layer unpacks the corresponding header and uses the information contained in the header to deliver the packet to the exact network application waiting for the data. This reversed process of encapsulation is called Decapsulation.
Multiplexing is the technique which allows the simultaneous transmission of multiple signals across a single data link where encapsulation is the process of wrapping header and the data part together in one block during transmission from one layer to another layer in TCP/PT protocol network.
In case of the demultiplexing the stream is fed into a demultiplexer which separates it back to its component transmission and directs them to their correspondent lines where as in the decapsulation only the reverse encapsulation is performed.
Q3. Shanon’s formula to find the upper limit:
Data rate or bit rate =B log2 (1+SNR)
=106 log2 (1+132)
=106 log2133
= (2123851.641)/3
= 7Mbps
Q4. OSI (Open System interconnection) model is protocol independent acts as a communication gateway between the user and the network with a vertical approach through transport layer which guarantees the delivery of pockets. OSI model consists of 7 different layers and in each layers protocols are hidden and easily changeable with the change of technologies.
Where TCP/IP are two protocols of the model namely Transmission Control Protocol/Internet protocol having only four layers instead of 7.
- In 1990 OSI layered architecture model was the dominant data communication and networking literature. Everyone believed that the OSI model will become the ultimate standard of data communication system. But TCP/IP protocol suite becomes the dominant data communication model because it is used and tested extensively in the internet and practically the OSI model was never completely created. So practically in networks TCP/IP protocol model is implemented and used rather than OSI.
- Advantage of OSI model-
- OSI model follows vertical approach.
- It has a separate session and presentation layer.
- OSI model is a reference model around which the networks are build which is generally used as a guidance tool in the network.
- It defines al the protocols and its services very clearly.
- It is protocol independent.
- It is also machine independent.
- Easy to add multiple networks in the model.
- Disadvantage of OSI model-
- As OSI model is protocol independent, so it has a problem of fitting protocols into the model.
- The data integrity facility availed by OSI model cannot be applicable to all the applications.
- It is complex to implement.
- Advantage of TCP/IP model-
- This model is OS independent.
- It supports routing protocols and internetworking between organizations.
- It supports client-server architecture.
- Disadvantage of OSI model-
- It is very complex to implement the set up and manage.
- Replacing protocols is difficult to implement.
- It is protocol dependent and services provided by the protocols are not explained separately.
Q5. Latency(Delay)= propagation time+ transmission time+ queuing time + processing delay
Here, queuing time = 3.5 µs =3.5 * 10-6 sec,
Distance =1900 km= 1900*1000=1900000 m
Propagation time= distance / propagation speed
= 1900000 / 2.2 * 108
= 8.6363 ms
Processing delay= time taken by the router to process
=no of routers * processing time
= 10 * 1.8 * 10-6 sec
= 1.8 * 10-5 sec
Transmission time= message size / bandwidth
= 5000000 * 8 /106 ms
= 40 ms
Now,
Latency (Delay)= propagation time+ transmission time+ queuing time + processing delay
=8.6363 + 40 + 1.8*10-5+3.5 * 10-6
=8.6363 + 40 + 0.00018 + 0.0000035
=48.6364 ms
The transmission time is the most dominant section in total delay and the processing delay is negligible.
Q6. POP3 stands for Post Office Protocol 3 which enables a server to host communication through email and to monitor the servers, domains and mailboxes. It is mainly used by a client to access and download messages from the mail server.
POP3 has some sessions which are explained below-
POP3 Authorization State- POP3 connection is started with listening for connection port 110. Now in authorization session TCP makes a connection with the server and client provide user command with its user identification. If server responses with a positive success indicator then user issue pass command in its password section and goes to transaction session.
POP3 Transaction State- In this state client issues one or more commands and server returns positive or negative responses. Servers attends some messages, if it a valid message then it is marked as deleted and send a positive response and returns the highest no of accessed messages and enters to update session.
POP3 Update State- In the update state of POP3, the server deletes all messages marked for deletion, releases resources associated with the client’s mail-drop, and closes the TCP connection.
Afanasyev, A., Burke, J., Zhang, L., Claffy, K., Wang, L., Jacobson, V., … & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.
Comer, D. E. (2008). Computer networks and internets. Prentice Hall Press.
Comer, D. E., & Laverell, W. D. (2002). Hands-on networking with internet technologies. Prentice Hall Professional Technical Reference.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.
Kurose, J. F. (2005). Computer networking: A top-down approach featuring the internet, 3/E. Pearson Education India.
Rennie, F., & Morrison, T. (2013). E-learning and social networking handbook: Resources for higher education. Routledge.
Xia, W., Wen, Y., Foh, C. H., Niyato, D., & Xie, H. (2015). A survey on software-defined networking. IEEE Communications Surveys & Tutorials, 17(1), 27-51.
Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., … & Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE Communications Surveys & Tutorials, 16(2), 1024-1049.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., … & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.