10 Questions at A Time
10 Questions at A Time
Bus Topology
Bus Topology
Figure 3: A bus topology with shared backbone cable. The nodes are connected
to the channel via drop lines.
If N devices are connected to each other in a bus topology, then the number of
cables required to connect them is 1, known as backbone cable, and N drop
lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to build
small networks.
If the common cable fails, then the whole system will crash down.
A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable. This topology is also
used in cable television networks. For more, refer to the Advantages and
Disadvantages of Bus Topology.
Star topology does not have any Bus topology has a terminators
5. terminator. at both ends of the network.
to a star topology.
11. Chances of data collision are less, Data collisions occur frequently
Ethernet networks
Easy to Set Up: Star topologies are relatively easy to set up, as each device only
requires one connection to the hub. This makes installation straightforward
(Techopedia).
Robustness: Star topologies are robust because if one link fails, only that link is
affected and not others. This makes them more reliable than bus topologies
(Wikipedia).
High Installation Cost: While the cabling itself may be inexpensive, the overall
cost of installation can be high due to the need for a central hub or switch.
Additionally, more cables are required compared to bus topologies.
Wireless Networks: Star topologies are also used in wireless networks where all
devices are connected to a wireless access point (AP). The AP acts as the
central hub, connecting devices to the wired network (Javatpoint).
S.
No. Star topology Ring Topology
connected to the central hub or connected to its left and right side
router. nodes.
In star topology, the only hub is In-ring topology, every node are
2. the failure point. failure point.
3. The cost of star topology is high. The cost of ring topology is low.
The cables are required in star The cables are required in ring
topology more than the ring topology less than the star
5. topology. topology.
Star topology is used for local Ring topology is used for Wide
9. Area Network Area Network
Applications-
Applications-
Used in SONET rings
High-speed LANs.
(Synchronous Optical Networks).
Usually employed in small size
Deployed in LAN and MAN and
networks, and more.
12. more.
5.Ring Topology:-
Ring topology is a type of network configuration where devices are connected
in a circular manner, forming a closed loop. Each device is connected to exactly
two other devices, forming a single continuous pathway for signals through
each node (Wikipedia). Data travels from one node to the next, around the ring,
until it reaches its destination.
Reliability: Ring topologies are often used where high reliability and fault
tolerance are the highest priority, such as in satellite networks (Mindsensors).
Low Chance of Collisions: In a ring topology, the chances of data collisions are
low compared to bus topologies, as data travels in a circular path (Javatpoint).
Drawbacks of Ring Topology
Difficult Fault Isolation: If a fault does occur, it can be difficult to isolate and
troubleshoot due to the circular nature of the network.
Bridges: Bridges sort packets by MAC addresses and operate at Layer 2 (Data
Link) of the OSI model. They connect two or more networks together, dividing
a larger network into smaller segments to improve performance (Rutgers
University).
Switches: Switches are multi-port bridges that connect multiple devices within a
network. They operate at Layer 2 (Data Link) of the OSI model and forward
packets based on MAC addresses (GeeksforGeeks).
Routers: Routers connect multiple networks together and route packets between
them. They operate at Layer 3 (Network) of the OSI model and forward packets
based on IP addresses (GeeksforGeeks).
Routers come in various forms, from small, home routers to large, enterprise
routers with many interfaces. They provide network address translation,
firewalling, and other advanced features to secure and manage network traffic.
RLE works by scanning through the data and identifying consecutive sequences
of the same value. Once a sequence is detected, it is replaced with a pair
consisting of the count of the consecutive values and the value itself. For
example, if a sequence of 10 zeros is found, it can be encoded as (10, 0)
(Dremio).
Example of RLE
Let's consider a simple example to illustrate how RLE works. Suppose we have
the following binary data string:
AAAAABBBCCCDDDD
Efficient for Repetitive Data: RLE is highly effective for compressing data that
contains long runs of repeated values.
Inefficient for Non-Repetitive Data: If the data does not contain many
sequences of repeated values, RLE may not achieve much compression. In fact,
in the worst case, RLE can actually increase the size of the data.
Not Suitable for Complex Data: RLE is not well-suited for compressing
complex data types like images or audio, which require more sophisticated
compression algorithms.
8.UDP HEADER
UDP Header
UDP header is an 8-byte fixed and simple header, while for TCP it may vary
from 20 bytes to 60 bytes. The first 8 Bytes contain all necessary header
information and the remaining part consists of data. UDP port number fields are
each 16 bits long, therefore the range for port numbers is defined from 0 to
65535; port number 0 is reserved. Port numbers help to distinguish different
user requests or processes.
UDP Header
Source Port: Source Port is a 2 Byte long field used to identify the port number
of the source.
Destination Port: It is a 2 Byte long field, used to identify the port of the
destined packet.
Length: Length is the length of UDP including the header and the data. It is a
16-bits field.
Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of
the one’s complement sum of the UDP header, the pseudo-header of
information from the IP header, and the data, padded with zero octets at the end
(if necessary) to make a multiple of two octets.
It is vertically It is horizontally
Approach
approached. approached.
10. SMTP
SMTP is an application layer protocol. The client who wants to send the mail
opens a TCP connection to the SMTP server and then sends the mail across the
connection. The SMTP server is an always-on listening mode. As soon as it
listens for a TCP connection from any client, the SMTP process initiates a
connection through port 25. After successfully establishing a TCP connection the
client process sends the mail instantly.
SMTP
SMTP Protocol
End-to-End Method
Store-and-Forward Method
In the SMTP model user deals with the user agent (UA), for example, Microsoft
Outlook, Netscape, Mozilla, etc. To exchange the mail using TCP, MTA is
used. The user sending the mail doesn’t have to deal with MTA as it is the
responsibility of the system admin to set up a local MTA. The MTA maintains a
small queue of mail so that it can schedule repeat delivery of mail in case the
receiver is not available. The MTA delivers the mail to the mailboxes and the
information can later be downloaded by the user agents.
SMTP Model
Components of SMTP
Mail User Agent (MUA): It is a computer application that helps you in sending
and retrieving mail. It is responsible for creating email messages for transfer to
the mail transfer agent(MTA).
Mail Transfer Agent (MTA): It is software that has the work to transfer mail
from one system to another with the help of SMTP.
Mail Delivery Agent (MDA): A mail Delivery agent or Local Delivery Agent is
basically a system that helps in the delivery of mail to the local system.
Working of SMTP
Below mentioned are the steps of the working of SMTP [Simple Mail Transfer
Protocol].
Communication between the sender and the receiver: The sender’s user agent
prepares the message and sends it to the MTA. The MTA’s responsibility is to
transfer the mail across the network to the receiver’s MTA. To send mail, a
system must have a client MTA, and to receive mail, a system must have a
server MTA.
Working of SMTP
HELO: Identifies the client to the server, fully qualified domain name, only sent
once per session
MAIL: Initiate a message transfer, the fully qualified domain of the originator