Star Topology
Figure 1. STAR TOPOLOGY
Source: (created by Author)
The Advantages of the star topology are:
Bus Topology
Figure 2. BUS TOPOLOGY
Source: (created by Author)
The advantages of the Bus topology are:
Disadvantages of the Bus topology:
Mesh Topology
Figure 3. MESH TOPOLOGY
Source: (created by Author)
The advantages of the mesh topology are:
The disadvantages of the mesh topology are:
Figure 4. DATA TRANSFER
Source: (created by Author)
The data transfer in the networks takes place by transferring the data packets from one node to another. In addition to this the data packets also have through the different layers of anetwork in a single machine before they are ready to be transferred. At first in the sender machine the data packets are generated in the application layer. The data traverses the through the different layers and finally arrives at the network layer where the data would transported to the other machines. During the traversal through all the network layers, some additional bits are added to the data packets every time the data moves down from the layer to the layer below it. This process is known as the process of data encapsulation.
After the data packet is sent from the sender machine into the network, the recipient would have to receive the data packets. After the reception process is over, the data is kept in the network layer. In the recipient machine, the data travels from the network layer to the application layer. IN this machine every time the data packets move up, the extra bits that were added in each layer of the sender machine are deleted from the data packet in each layer of the recipient machine. This process of the removal of the extra bit from the data packets is known as the process of decapsulation. After the decapsulation process is completed the actual data is obtained by the application layer.
The techniques of mutilplexing and demultiplexing are dissimilar to the techniques that involve the encapsulation and the decapsulation of data. The multiplexing and the demutiplexing technique are applied on the signals of the network, while the encapsulation and the decapsulation techniques are appied to the data that is flowing through the network. In addition this, the multiplexing and the demultiplexing techniques are used for simplifying the signals of the network, whereas the encapsulationand the decapsulation techniques are usually involved with ensureing the data security within the network. They ensure that the data ment for a single machine can not be received by some other machine.
It is given that,
B= 6.8 MHz is the bandwidth.
SNR= 132 is the signal to noise ratio
C= Bit Rate.
C=B log (1+SNR) = 6.8×106 log2 (1+132) = 6.8×106 log2 133 = 48 Mbps.
Hence, the bit rate is 48 Mbps.
Let, L be the number of signals
Therefore, C = 2 x B x log2 (L)
0r, 48= 2×6.8xlog2L
Or, log2 L=48/(6.8×2)
Or, log2 L= 3.56 0r 4 (approx)
Or, L = 24= 16.
There are 16 level of signals.
The OSI model and the TCP/IP model are almost similar to each other but are there are some differences in the functionality of both the models. The number layers present the OSI model are more than that of the TCP/IP model. Hence the OSI model provides more functionality and more number of options to the network. The OSI model also provides enhancement of the security of the network. The OSI model involves a number of authentication procedures due to the number of layers in the model and also some extra functions due to the presence of the extra layers in the network model.
Although the OSI model is more efficient than the TCP/IP model, yet the TCP/IP model is preferred over the TCP/IP model. This because the OSI model is efficient theoretically, but the practical implementation of the model is very difficult, and in addition to this the TCP/IP model is easier to implement practically and also the TCP/IP model is collaborated with the reputed models.
The main advantages of the OSI model are that they can interpret functions at each level of the model and also they provide with a number of options to the networks. But the main disadvantage of the OSI model is that they are very difficult to implement.
The main advantages of the TCP/IP model are that they are very easy to implement and have more preferences. But the main disadvantages of this model are that they are slow are than the other model and also the security of data is less efficient.
It is given that,
The frame size is 5 million bits.
The propagation speed is 2.2x 108 m/s
The distance is 1900 Km.
Length of the link = 1900 Km = 1900 x 103 meters.
Bandwidth of the network = 8 x 106 bps
The queuing time is 10 x 3.5 mS = 35 mS.
The delay in processing is 1.8 x 10 mS = 18 mS.
The transmission time is 5 x 106 /8 mS = 62500 =.625 s
The propagation time = 1900 x 103 / 2.2x 108 uS = 8 uS
Total delay time = 35 + 18 + .08 + 62500 = 62551.08 mS = .63 sec
The total delay time is .63 sec and the dominant component is the transmission delay and the negligible component is the propagation time.
Figure 5. The POP 3 State diagram
Source: (created by Author)
The POP 3 protocol has four states:
Authorization: The authorization of an established connection takes place.
Transaction: The transactions of the authorized connection takes place.
Update: The transaction are updated.
Closed: After completion of the update procedure the POP 3 is closed.
Agnoloni, T., & Pagallo, U. (2014). The case law of the italian constitutional court between network theory and philosophy of information. In 2 ND INTERNATIONAL WORKSHOP ON “Network Analysis in Law” (Vol. 91, No. F1, pp. 94-9).
An, H., Zhong, W., Chen, Y., Li, H., & Gao, X. (2014). Features and evolution of international crude oil trade relationships: A trading-based network analysis. Energy, 74, 254-259.
Becker, T., Meyer, M., & Windt, K. (2013, September). A network theory approach for robustness measurement in dynamic manufacturing systems. In 17th Annual Cambridge International Manufacturing Symposium, September, Cambridge.
Deo, N. (2016). Graph theory with applications to engineering and computer science. Courier Dover Publications.
Gao, C., Sun, M., & Shen, B. (2015). Features and evolution of international fossil energy trade relationships: A weighted multilayer network analysis. Applied Energy, 156, 542-554.
Goodall, K. T., Newman, L. A., & Ward, P. R. (2014). Improving access to health information for older migrants by using grounded theory and social network analysis to understand their information behaviour and digital technology use. European journal of cancer care, 23(6), 728-738.
Groenewegen, P., & Moser, C. (2014). Online communities: Challenges and opportunities for social network research. In Contemporary Perspectives on Organizational Social Networks (pp. 463-477). Emerald Group Publishing Limited.
Haque, A., & Mantode, K. L. (2013, June). Governance in the Technology Era: Implications of Actor Network Theory for Social Empowerment in South Asia. In International Working Conference on Transfer and Diffusion of IT (pp. 375-390). Springer Berlin Heidelberg.
Kärrholm, M. (2013). Building type production and everyday life: rethinking building types through actor-network theory and object-oriented philosophy. Environment and Planning D: Society and Space, 31(6), 1109-1124.
Li, H., Fang, W., An, H., & Yan, L. (2014). The shareholding similarity of the shareholders of the worldwide listed energy companies based on a two-mode primitive network and a one-mode derivative holding-based network. Physica A: Statistical Mechanics and its Applications, 415, 525-532.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Mpazanje, F., Sewchurran, K., & Brown, I. (2013). Rethinking information systems projects using actor-network theory–perspectives from a developing country. The Electronic Journal of Information Systems in Developing Countries, 58.
Rucco, M., Castiglione, F., Merelli, E., & Pettini, M. (2016). Characterisation of the idiotypic immune network through persistent entropy. In Proceedings of ECCS 2014 (pp. 117-128). Springer International Publishing.
Siemens, G. (2014). Connectivism: A learning theory for the digital age.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download