Star Topology
Figure 1. STAR TOPOLOGY
Source: (created by Author)
The Advantages of the star topology are:
Bus Topology
Figure 2. BUS TOPOLOGY
Source: (created by Author)
The advantages of the Bus topology are:
Disadvantages of the Bus topology:
Mesh Topology
Figure 3. MESH TOPOLOGY
Source: (created by Author)
The advantages of the mesh topology are:
The disadvantages of the mesh topology are:
Figure 4. DATA TRANSFER
Source: (created by Author)
The data transfer in the networks takes place by transferring the data packets from one node to another. In addition to this the data packets also have through the different layers of anetwork in a single machine before they are ready to be transferred. At first in the sender machine the data packets are generated in the application layer. The data traverses the through the different layers and finally arrives at the network layer where the data would transported to the other machines. During the traversal through all the network layers, some additional bits are added to the data packets every time the data moves down from the layer to the layer below it. This process is known as the process of data encapsulation.
After the data packet is sent from the sender machine into the network, the recipient would have to receive the data packets. After the reception process is over, the data is kept in the network layer. In the recipient machine, the data travels from the network layer to the application layer. IN this machine every time the data packets move up, the extra bits that were added in each layer of the sender machine are deleted from the data packet in each layer of the recipient machine. This process of the removal of the extra bit from the data packets is known as the process of decapsulation. After the decapsulation process is completed the actual data is obtained by the application layer.
The techniques of mutilplexing and demultiplexing are dissimilar to the techniques that involve the encapsulation and the decapsulation of data. The multiplexing and the demutiplexing technique are applied on the signals of the network, while the encapsulation and the decapsulation techniques are appied to the data that is flowing through the network. In addition this, the multiplexing and the demultiplexing techniques are used for simplifying the signals of the network, whereas the encapsulationand the decapsulation techniques are usually involved with ensureing the data security within the network. They ensure that the data ment for a single machine can not be received by some other machine.
It is given that,
B= 6.8 MHz is the bandwidth.
SNR= 132 is the signal to noise ratio
C= Bit Rate.
C=B log (1+SNR) = 6.8×106 log2 (1+132) = 6.8×106 log2 133 = 48 Mbps.
Hence, the bit rate is 48 Mbps.
Let, L be the number of signals
Therefore, C = 2 x B x log2 (L)
0r, 48= 2×6.8xlog2L
Or, log2 L=48/(6.8×2)
Or, log2 L= 3.56 0r 4 (approx)
Or, L = 24= 16.
There are 16 level of signals.
The OSI model and the TCP/IP model are almost similar to each other but are there are some differences in the functionality of both the models. The number layers present the OSI model are more than that of the TCP/IP model. Hence the OSI model provides more functionality and more number of options to the network. The OSI model also provides enhancement of the security of the network. The OSI model involves a number of authentication procedures due to the number of layers in the model and also some extra functions due to the presence of the extra layers in the network model.
Although the OSI model is more efficient than the TCP/IP model, yet the TCP/IP model is preferred over the TCP/IP model. This because the OSI model is efficient theoretically, but the practical implementation of the model is very difficult, and in addition to this the TCP/IP model is easier to implement practically and also the TCP/IP model is collaborated with the reputed models.
The main advantages of the OSI model are that they can interpret functions at each level of the model and also they provide with a number of options to the networks. But the main disadvantage of the OSI model is that they are very difficult to implement.
The main advantages of the TCP/IP model are that they are very easy to implement and have more preferences. But the main disadvantages of this model are that they are slow are than the other model and also the security of data is less efficient.
It is given that,
The frame size is 5 million bits.
The propagation speed is 2.2x 108 m/s
The distance is 1900 Km.
Length of the link = 1900 Km = 1900 x 103 meters.
Bandwidth of the network = 8 x 106 bps
The queuing time is 10 x 3.5 mS = 35 mS.
The delay in processing is 1.8 x 10 mS = 18 mS.
The transmission time is 5 x 106 /8 mS = 62500 =.625 s
The propagation time = 1900 x 103 / 2.2x 108 uS = 8 uS
Total delay time = 35 + 18 + .08 + 62500 = 62551.08 mS = .63 sec
The total delay time is .63 sec and the dominant component is the transmission delay and the negligible component is the propagation time.
Figure 5. The POP 3 State diagram
Source: (created by Author)
The POP 3 protocol has four states:
Authorization: The authorization of an established connection takes place.
Transaction: The transactions of the authorized connection takes place.
Update: The transaction are updated.
Closed: After completion of the update procedure the POP 3 is closed.
Agnoloni, T., & Pagallo, U. (2014). The case law of the italian constitutional court between network theory and philosophy of information. In 2 ND INTERNATIONAL WORKSHOP ON “Network Analysis in Law” (Vol. 91, No. F1, pp. 94-9).
An, H., Zhong, W., Chen, Y., Li, H., & Gao, X. (2014). Features and evolution of international crude oil trade relationships: A trading-based network analysis. Energy, 74, 254-259.
Becker, T., Meyer, M., & Windt, K. (2013, September). A network theory approach for robustness measurement in dynamic manufacturing systems. In 17th Annual Cambridge International Manufacturing Symposium, September, Cambridge.
Deo, N. (2016). Graph theory with applications to engineering and computer science. Courier Dover Publications.
Gao, C., Sun, M., & Shen, B. (2015). Features and evolution of international fossil energy trade relationships: A weighted multilayer network analysis. Applied Energy, 156, 542-554.
Goodall, K. T., Newman, L. A., & Ward, P. R. (2014). Improving access to health information for older migrants by using grounded theory and social network analysis to understand their information behaviour and digital technology use. European journal of cancer care, 23(6), 728-738.
Groenewegen, P., & Moser, C. (2014). Online communities: Challenges and opportunities for social network research. In Contemporary Perspectives on Organizational Social Networks (pp. 463-477). Emerald Group Publishing Limited.
Haque, A., & Mantode, K. L. (2013, June). Governance in the Technology Era: Implications of Actor Network Theory for Social Empowerment in South Asia. In International Working Conference on Transfer and Diffusion of IT (pp. 375-390). Springer Berlin Heidelberg.
Kärrholm, M. (2013). Building type production and everyday life: rethinking building types through actor-network theory and object-oriented philosophy. Environment and Planning D: Society and Space, 31(6), 1109-1124.
Li, H., Fang, W., An, H., & Yan, L. (2014). The shareholding similarity of the shareholders of the worldwide listed energy companies based on a two-mode primitive network and a one-mode derivative holding-based network. Physica A: Statistical Mechanics and its Applications, 415, 525-532.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Mpazanje, F., Sewchurran, K., & Brown, I. (2013). Rethinking information systems projects using actor-network theory–perspectives from a developing country. The Electronic Journal of Information Systems in Developing Countries, 58.
Rucco, M., Castiglione, F., Merelli, E., & Pettini, M. (2016). Characterisation of the idiotypic immune network through persistent entropy. In Proceedings of ECCS 2014 (pp. 117-128). Springer International Publishing.
Siemens, G. (2014). Connectivism: A learning theory for the digital age.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.