Wednesday, May 6, 2020
Internet Networking Topologies and Calculations Free-Samples
Questions: 1.Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. 2.Explain encapsulation and decapsulation in a five layer TCP/IP Protocol suite. 3.Calculate the approximate bit rate and signal level(s) for a 6.8 MHz bandwidth system with a signal to noise ratio of 132. 4.Explain why the OSI Model is better than the TCP/IP Model. 5. What is the total delay (latency) for a frame of size 5 million bits that is being sent on a link with 10 routers each having a queuing time of 3.5 s and a processing time 6.Draw a diagram and explain to show these four states and how POP3 moves between them. Answers: 1. Topology Real Example Advantage Disadvantage Bus Cafeteria or Internet Cafes 1. The length of the link required for the topology is not as much as some other topology 2. The cost of the topology is low 3. Foundation of the Bus system is simple 4. Good for little systems 1. It has dependency on focal hub 2. Constrained hubs can be associated with the system 3. Keeping in mind the end goal to dump signals, legitimate end is required Star The computer laboratory 1. The execution of the topology is great 2. It gives the chance of brought together administration 3. The limit of the focal center point chooses the execution 4. It is simple for the director to associate new hub or gadget 1. The general cost of the topology increments with the utilization of switch, focal gadget and center 2. As the dependency on the focal gadget increment, the hazard increments Mesh In research centers 1. Change in the topology is managed without influencing the procedures of hubs 2. The transmission happens through various way in the event that one part fails 3. Is fit for withstand high measure of activity 4. Information exchange from various gadgets should be possible at the same time 1. The likelihood of excess is high in this sort of system associations 2. It is hard to build up and keep up the topology 3. In correlation with the other systems administration topologies, this topology requires a bigger measure of money to be executed 4. The system organization is difficult to do 2.Decapsulation is an invert procedure of encapsulation. This happens just when information is transmitted from the transmitter PC. With the transmission of the information to upper layer from the lower layer of TCP/IP stack, each of the layers unloads the related header. On the other hand, in case of encapsulation, at the season of information transmission to the lower from upper layer of TCP/IP convention stack, each of the layers comprise of a bundle of information that are applicable to the transmission. These bundles containing the applicable information are called header with expansion to the genuine information. The header and the upper layer information changes over into the information, which is repackaged at the lower layer of the TCP/IP with the header of the lower layer. The header can be considered as the supplementary information that has been put at the start of the square of information at the season of transmission. This supplementary information is used at the getti ng side for extricating the data from the embodied bundle of information. Second Part: Multiplexing is the accumulation of techniques that allows the simultaneous communicate of a few flag crosswise over single connection of information. On the off chance that the transmission ability of the medium connecting two spate gadgets is bigger in examination with the prerequisite of transmission of the gadgets, the connection might be circulated for augmenting the utilization of the connection. Taken for instance, one link is equipped for conveying different stations of Television. As far as demultiplexing strategy, the channels are utilized for breaking down the multiplexed flag to its basic parts signals.Provided, B= 6.8 MHz (bandwidth) 3.SNR= 132 (ratio of signal to noise) C= bit rate. C=B log (1+SNR) =6.8x106 log2 (1+132) = 6.8x106 log2 133 = 48 Mbps. Let, L be the number of signals C = 2 x B x log2(L) = 48= 2x6.8xlog2L = log2 L=48/(6.8x2) = log2 L= 3.56 0r 4 (approximately) = L = 24= 16. 4.TCP associates with fourth layer of OSI or transport layer. Besides, it speaks with a few elements of fifth layer of OSI or the session layer. TCP/IP is not ready to expect in regards to the events of exercises over the session layer. The TCP/IP exhibit indicated by many does not work for the overwhelming some portion of classes of framework. The TCP/IP model is not able to delineate to OSI model as it was concocted ten years before the OSI demonstrate. The TCP/IP model was planned with the motivation behind solving a specific gathering of issues. It was not created to work as a general depiction with respect to whole system correspondence. The web convention conveys to an OSI layer three subset or the system layer. OSI Model Advantage and Disadvantage: The advantage is that the layers inside the OSI display designs are separated as per the interfaces, administrations and conventions. The disadvantage is that the model is not fit for characterizing a particular convention. TCP/IP Model Advantage and Disadvantage: The advantage is that it is fit for building up associations among the different sorts of devices. The disadvantage is that TCP/IP is slower than the IPX. 5.Frame size (F)= 5 million bits [given] Speed of propagation= 2.2x 108 m/s Length of link = 1900 km = 1900 x 103 Bandwidth = 8 x 106 bps Queuing Time= 10 x 3.5 mS = 35 mS. Processing delay = 1.8 x 10 mS = 18 mS. Time of transmission = 5 x 106 /8 mS= 62500 =0.625 seconds Time of propagation = 1900 x 103/ 2.2x 108uS = 8 uS Total Time for delay = 35 + 18 + .08 + 62500 = 62551.08mS = .63 seconds Total delay time is 0.63 seconds. The leading component has been this transmission delay. The component negligible here is propagation time. 6.The association has been set up from the Closed State. Next the Authorization is finished. After this, the exchange is finished. At that point the refresh procedure gets finished. In conclusion the POP3 is finished effectively and gets shut. Bibliography: Bajde, D. (2013). Consumer culture theory (re) visits actornetwork theory: Flattening consumption studies.Marketing Theory,13(2), 227-242. Burger, M., Zelazo, D., Allgwer, F. (2014). Duality and network theory in passivity-based cooperative control.Automatica,50(8), 2051-2061. Holme, P. (2015). Modern temporal network theory: a colloquium.The European Physical Journal B,88(9), 1-30. Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks.IEEE Communications Surveys Tutorials,16(3), 1617-1634. Qin, Z., Denker, G., Giannelli, C., Bellavista, P., Venkatasubramanian, N. (2014, May). A software defined networking architecture for the internet-of-things. InNetwork Operations and Management Symposium (NOMS), 2014 IEEE(pp. 1-9). IEEE. Schwerdel, D., Reuther, B., Zinner, T., Mller, P., Tran-Gia, P. (2014). Future Internet research and experimentation: The G-Lab approach.Computer Networks,61, 102-117. Stein, M., Frmmgen, A., Kluge, R., Lffler, F., Schrr, A., Buchmann, A., Mhlhuser, M. (2016, May). TARL: Modeling topology adaptations for networking applications. InProceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems(pp. 57-63). ACM. Sterbenz, J. P., etinkaya, E. K., Hameed, M. A., Jabbar, A., Qian, S., Rohrer, J. P. (2013). Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation.Telecommunication
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.