Topology |
Advantage |
Disadvantage |
Star Topology |
1) Simple to set up and use due to its centralised structure. 2) Provides a direct and isolated connection to each workstation and this helps in the easy detection of network errors. 3) Does not affect network connectivity in other workstations when a single workstation starts malfunctioning (Karsai et al., 2011). |
1) The star topology is totally dependent on the central hub and in case the central hub malfunctions, the entire network will fail. 2) The cost of setting up a star topology is high. |
Mesh Topology |
1) In this network all the nodes are interconnected and thus the failure of even a single node in the network will not be able to compromise the performance of the entire network. 2) Detection of network errors is extremely easy in this network. 3) Mesh topology is ideally suited to handle huge network traffic. |
1) There is a high cost incurred in the maintenance of the mesh topology. 2) There is a huge amount of cable required in this network. |
Bus Topology |
1) This network is the easiest to implement and the cost associated with this network is much less than the other two networks. 2) This topology is ideally suited for small networks. |
1) Identification of faults within the network is not an easy task and it is a time consuming process (Lee et al., 2008). 2) This network can only perform effectively when there are small numbers of computers in a network. |
Encapsulation
Whenever the data transfer takes place between the different layers (upper layer to the lower layer) of the TCP/IP protocol stack, each layer comprises of a header which contains all the relevant information about the data along with the data which is being sent to a destination. The data package which comprises of the header and data are then again repackaged at the next lower level with the header of the lower layer. This process of packaging of header at the beginning of a block of information or data is known as Encapsulation (Jansson, 2007).
Decapsulation is the reverse process of encapsulation and this takes place when the data is received at the destination workstation. In this process, the data moves up from the lower layers of TCP/IP to the higher layers and unpacking of the corresponding headers at each layer takes place. The layers then utilise the information contained in the header for the purpose of delivering the data pack to its exact destination.
Multiplexing is the process wherein multiple data streams from diverse sources are combined and sent through a single data channel. There are mainly two types of multiplexing – Time Division Multiplexing and Frequency Division Multiplexing.
The process of De-multiplexing involves the separation of the different data streams which are combined within the single data channel into their respective original component (Fontaine et al., 2012).
The transmission control protocol and internet protocol mainly governs the way or manner in which data transmission takes place within a network. The TCP/IP does not discriminate or control what happens within its different layers unlike the OSI (Open System Interconnection) layer. In the OSI model the transmission of the data takes places in a more structured and sequential manner. The OSI model plays a very important role in guaranteeing the delivery of the data packs at the destination address through the transport layer (Li et al., 2011). However, the TCP/IP layer does not provide any assurances regarding the accurate delivery of the data packets to its intended destination. The OSI model gets updated and modified from time to time as new network technologies evolve. In case of TCP/IP, the modification process is extremely difficult to implement and it invariably takes up a lot of time and money. Thus, the OSI model is usually considered to be a better model as compared to the TCP/IP model (Zaman & Karray, 2009).
Advantages of OSI model:
1) It facilitates the addition of multiple networks.
2) Information and data are encrypted which helps in ensuring data security.
1) Complex in nature.
2) This model is not compatible with all types of telecommunications network.
1) Scalable client-server architecture helps in smoother expansion of the network to be utilised by more workstations.
2) It can function in an independent manner irrespective of the OS.
3) It facilitates connection between two different types of computer (Comer, 2009).
1) This is a complex model and incurs high maintenance cost.
2) Performance is much slower as compared to IPX.
The propagation time is negligible and the transmission time and delay latency is significant.
The POP3 is a protocol which is utilised for the purpose of sending and receiving emails. The users utilise this protocol for the purpose of downloading and accessing those messages which are held by the mail server. The POP3 session comprises of the responses which takes place between the client and serves until the end of the session. The session can be categorised into three states which are authorisation state, transaction state and update state (Khare et al., 2014).
In this state, mainly client login takes place. The client logs onto his own personal email with their unique user ID and password which is send to the mail server for verification.
The transaction state is the state where the users goes through their own email inbox and checks through their mails and responds to them. The commands associated with the transaction state have been described below:
In this state, the users remove all their interaction process with others by terminating the connection (Gellens & Newman, 2010).
References
Comer, D.E (2009). Computer Network and Internets, 5TH edition, Prentice Hall
Zaman, S., & Karray, F. (2009, May). TCP/IP model and intrusion detection systems. In Advanced Information Networking and Applications Workshops, 2009. WAINA’09. International Conference on (pp. 90-96). IEEE.
Cisco Inc. (2009) CCNA Exploration Course Booklet: LAN Switching and Wireless Version 4.0. Cisco Networking Academy Program.Cisco Press.ISBN-10:1587132540.
Gellens, R., & Newman, C. (2010). POP3 Support for UTF-8 (No. RFC 5721).
Tanenbaum, A S (2011), Computer Networks, 5th edition Prentice Hall.
Li, Y., Li, D., Cui, W., & Zhang, R. (2011, May). Research based on OSI model. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 554-557). IEEE.
Zimmerman, T. G. (2008). U.S. Patent No. 7,330,662. Washington, DC: U.S. Patent and Trademark Office.
Khare, S., Ratsimandresy, R. A., De Almeida, L., Cuda, C. M., Rellick, S. L., Misharin, A. V., … & Perlman, H. (2014). The PYRIN domain-only protein POP3 inhibits ALR inflammasomes and regulates responses to infection with DNA viruses. Nature immunology, 15(4), 343-353.
Klopfer, E., Osterweil, S., Groff, J., & Haas, J. (2009). Using the technology of today in the classroom today: The instructional power of digital games, social networking, simulations and how teachers can leverage them. The Education Arcade, 1, 20.
Paturzo, M., Memmolo, P., Miccio, L., Finizio, A., Ferraro, P., Tulino, A., & Javidi, B. (2008). Numerical multiplexing and demultiplexing of digital holographic information for remote reconstruction in amplitude and phase. Optics letters, 33(22), 2629-2631.
Fontaine, N. K., Doerr, C. R., & Buhl, L. L. (2012, March). Efficient multiplexing and demultiplexing of free-space orbital angular momentum using photonic integrated circuits. In Optical Fiber Communication Conference and Exposition (OFC/NFOEC), 2012 and the National Fiber Optic Engineers Conference (pp. 1-3). IEEE.
Jansson, A. (2007). A sense of tourism: new media and the dialectic of encapsulation/decapsulation. Tourist Studies, 7(1), 5-24.
Karsai, M., Kivelä, M., Pan, R. K., Kaski, K., Kertész, J., Barabási, A. L., & Saramäki, J. (2011). Small but slow world: How network topology and burstiness slow down spreading. Physical Review E, 83(2), 025102.
Lee, D. S., Park, J., Kay, K. A., Christakis, N. A., Oltvai, Z. N., & Barabási, A. L. (2008). The implications of human metabolic network topology for disease comorbidity. Proceedings of the National Academy of Sciences, 105(29), 9880-9885.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download