0% found this document useful (0 votes)
8 views

Computer Algorithm & Flowchart

Computer Algorithm & flowchart
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Algorithm & Flowchart

Computer Algorithm & flowchart
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
oy =, Basic Computer Skil ~ Programming Language machine PTOBtamming. Language is a formal computer language designed to communicate instructions to Of aritt, Particularly a computer, Programming languages can be used to create programs to contrl the behavior ‘8 machine or to express algorih in hms. In other words, we can say its a vocabulary and a grammatical set of rules Or instructing computer system to perform a specific task. All Programming languages are broadly classified into following types: a, Machine Level Language ia ‘Assembly Level Language High Level Language Machine Level Language “yg She loves and frst generation programming language It consss of ony two conitons: ete 0" or 1 socalled a5 Binary language also, The languages which use only primitive operation ofthe computer are ‘Known as tow language. these languages, programs are writen by means ofthe memory and registers avalible on the computer. The machine direty understands this language by virtue ofits circuit design so these programs are irelyexceuable on the computer without any ransations, This makes the program execution very fst. A cl owe insti cons eset of wo pas A Operation Par 1 pets operation to be permed by he comput alo kno as Open, An Address Part: a e _ anion I pees lation fh ta on which operation sto be pried + Advantages 7 hey can det trate eompute > Noneed of Convene, > Never ft + Diaatantages They we machine Us toobard to udersand. Ivetineconsming Debugging is very tough. iisnot perl anguage yyyyy Assomblv Level Language I's a Middle level and second generation programming language. It contains same instruction as of ‘machine language but instructions and variables have specific nam, called as command instead of binary numbers. ‘That is. we can use mnemonics for all opcodes, registers and for the memory locations, “These languages require a translator known as “Assembler” for translating the program code written in assembly language fo machine language. Because computer'can interpret only the machine code instruction, once the translation is completed the program can be executed. Advantages Easily understood by the human a it uses commands. takes less time to develop a program. Itisa portable language. : Debugging is easy. + Disadvantages > They are machine dependant; program designed for use machine cannot be used other machine. > Sometimes it’s hard to understand some commands, veer igh Love Language a “This isthe upper level and third generation programming languages, Programs are written in statements” like English language. Thats, the hgh level anguages use natural language like stetures. These languages equice Drafted By Jayanta Pal, Assistant Professor, Dept.of 7, Tripura University Page 1018 f f i i Basic Computer Skil ‘ ——— : yuage can be ported translators (compilers and interpreters) for execution, The programs written in a high level languags y ‘nany computer that is why knowm they are known as machine independent SgRE samples are: FORTRAN, Pascal. C, C+, Java, COBOL Lisp, Prolog ee + Advantages % Commands and instructions are easier to remember by humans. & Logicand Structure are easier to understand Iisa portable language Debugging is easier compared tocthers. Less time required to codea prope avantages > Wakes more spice compared to other languages, > Sometimes ths proganting lnguge eee soy vvy Interpreters pr ereram that snot writen in machine laiguage has tobe wanslated in machine language eae “Sosa ye computer. There are thee type af toner props eke eaten ere a Assembler @ b. Interpreter, \ © Compiler Assembler ‘Sssembler isa computer program which i used to translate rogram written in Assembly Language in to ‘machine language, The translated Program is called as object program. Assembler checks each instruction for its “reine an Senses agnostic mesages there memisher nthe racemes hi rs on compute and prods theme ces forth same compute thn it called self assembler or resident ri nb : ‘odes for other computer then itis called Cross Assembler, Assemblers are further divided into two types: 1. One Pass Assembler 7 {isthe assembler which assigns the memory adresses othe variables and transite the source ode into machine code in the frst pass simultaneously, ‘Two Pass Assembler, © aa ak Assenbler the assembler which reads the source code twice. Inthe fst past Seat. Ae variables and esigs them memory addresses. Inthe seca pas, ‘source code and translates the code into abject code, The steps of assembling are: 1; Input source program in Assembly Language through an input device, 2, Use Assembler to produce abject program in machine language 3. Execute the program, epeated uni the program is mistake free and translated toan object cade {Ca-compier runs on a computer and produces the machine codes forthe sme compier then its known 32 felt compiler resident compiler. On the other hand, if compiler runs on a compe av Produces the ‘machine codes for other computer then itis known asa cross compiler. ‘Thus the job of a complier includes the following: 1. To translate HLL source program to machine codes, 4 2. To trace variables in the program : Drafted By: Jayant Pal Assistant Professor, Dep. of If, Tripura University Pige20f18 " Basic Computer Skil 3. To allocate memory for storage of program and variables. 4. To generate ervar messages, ifthere are errors in the program. Interpreter i “An interpreter i a program which translates programme written in High Level Language (HLL) into machine eode, It translates oly one statement ofthe program at a time. It reads only one statement of progra ext statement ofthe peogram again transates it and executes it, In this translates itand executes it. Then it reads tl sway it proceeds further il ll the statements are translated and executed. 7 Every time the program is executed, the interpreter translates each diagnostic capabilities However, it has some disadvantages as below: 1. Instructions repeated in program must be translated each time they are executed. the source program is translated fresh every time it is used, it is slow process or takes more time, struction freshly. It also has program ‘The difference between Compiler & Interpreter Conpier Taterproter 6 Compiler Takes Entire program as input | Talerpreter Takes Single instruction as Taput Intermediate Objet Cad is Generated | No Intermediate Objet Code is Generated Memnare Requirement MortSinee OW | Memory Requirement Les in eae of interpreter Errors are displayed for ene Codes Generated) rors are displayed alter entire programm 7 checked instruction interpreted (tan) 3 Programming language Programming language like Pyihon, Ruby use) Sax compilers. interpreters _[A compiler, executes faster Tnlerpreter consumesa Tot of imme In high level fanguages, some built in header files or libraries are stored. These libraries are predefined and these contain basic functions which are essential for executing the program. These functions are linked to the libraries by a program called Linker. If linker does not find a library of a function then it informs to compiler and then compiler generates an error. The compiler automatically invokes the linker as the last step in compiling a provram, ‘Not built in libraries, it also links the user defined functions tothe user defined libraries. Usually a longer program is divided into smaller subprograms called modules. And these modules must be combined to execute the program. ‘The process of combining the modules is done by the linker. Loader: Loader is a program that loads machine codes of a program into the system memory. In Computing, loader is the part of an Operating System that is responsible for loading programs. It is one of the essential stages in the process of starting a program. Because it places programs into memory and prepares them for execution. Loading a program involves reading the contents of executable file into memory. Once loading is complete, the operating system starts the program by passing control to the loaded program code. All operating. systems that ‘support program loading have loaders. In many operating systems the loader is permanently resident in memory. Generation of Programming languages | Zeenecation of programming tangunges Machine language is the only programming language thatthe computer can understand directly without translation, It isa language made up of entirely 1s and Os. There is not, however, one universal machine language because the language must be written in accordance with the special characteristics ofa given processor. Ench type or family of processor requires its own machine language. For this reason, machine language is said to be machine- dapendent (also called hardware-dependent). Drafted By: Jayanta Pa, Assistant Professor, Dept. of Mf, Tripura University Page 30f 18 Basic Computer Skill - 1 a case nooner option was Inde camper rs gern, pogne a use nace lange este cet SHE a, available, Machine language programs have the nvenage of very ft exestion sess and MACS eS immory Us omatne inns wy elo ie nd ne cnsing med of roaring Img owe! gg, ine prin am esi every dat of an oeaion ONE, [ann res ththe ogre tne i tego i the computer works, epranes nw 9 rea a so he commer’ no fein, As ae ogee were puna acces Ta maue png singe creer sone rogram MBAS No Sco ested Tce lmgangc, meer mt intl bent ose ansn on ides ant we wl 2 Goueraton of progenmnming nen of Assembly ig ist sp in moking salvar development cser and more efit was the craton of Assembly league They areas lsd free ve symbolic addresses in place Fearon spre 1950, Assen tanginges use mnsnoneoperain codes and symbole adresses in plac eons progetto codes, A ancmoni an aptial abbreviation wsed as memory aT Cra ycerammer ean use abbreviation instead of having to remember lengthy binary instruction co¢ he binary Shuvateats cau easier to remember Lor Load, A for Add, B for Branch, and C for Compare than the Binary Saale dfs’ combinations of Os and ts ing process beenuse 9 a anguage uses syinbolc addressing capabilities that simplify the programming process been ailing ca eee 9 Mow a rena thee! torag xno naruto at Syma | t renee the ait to cxpres an addres inten of symbols chosen Uy Ine propammer rate than nce cress of natal losston, Therefor, itis nat necessary to assign and vember a number that identi he auaress of plese of dat messes ce ta tesembly languoges represented an improvement, they had obvious limitations. Only computer Se mila wih the architecture of the computer being used can tse them, And because they AF also, ‘machine dependent, assinbly languages are not easly converted tran on ones pe ot commuter, Fefere they can be used by the computer, assembly languages must be tansated into machine language. A {pasunge ansltor program called an assembler does this conversion, Assembly languages povide an easier aod eke eMcient vay to program than machine languages while til maintaining contra over te inleral anton OF 4 computer atthe most basic lve. The advantages of programming with assensly languages ae tha they proce, Programs that are efficient, useless storage, and execute much faster than programs designed using hiheienel languages. of pro sunges ‘Third generation langunges, also known as high-level language, are very much lke everyday text and ‘athematical formulas in appearance, They are designed to run on a number of diferent computers with few or no changes. Objectives oF high-tevel languages ‘To relieve te programmer of the detailed and sssembly languages, {,Teprovide programs that can be used on more than one ype of machine wth very few changes To allow the programmer more time to focus on understanding the users needs ned design he software required meeting those neds, Most high level languages are considered tobe procedute-oriente, or Procedural languages, because th Program instructions comprise lists of steps, procedures, that ell the compute no only what te ds but how de High-level language statements generate, when translated, a comparatively greater numberof assembly Inegose instructions and even more machine language instructions. The programmer spends les tive developing sotere with a high level language than with assembly or machine language because fewer instuctions have vo fe eres, A language translator is required o convert a high-level language program into machine language Two ‘ypes of language translators ae used with high level languages: compilers and interpreters, 4 Generation of programming languages Fourth generation languages are als known as very high level languages. They ae non-procedural language, so named because they allo programmers and uses to specify what the compris supposed 0.40, ‘without having to spesify how the computer is suppased to doit. Consequently, fourth generation languages need approximately one tenth the numberof statements that a high level languages needs to achieve the same reslls. tedious task of writing programs in machine language and 9 Drafted By: Jayanta Pal:Assistant Professor, Dept. of I, Tripura University Pages of 8 — Basic Computer Skill - I Because they are so much easier to use than tied generation langage fourth generation languages allow users. OF nnon-computer professionals, to develop software Objectives of fourth generation Inngwnges Increasing the speod of developing programs 2 Minimizing user effort to obtain information f 1 Mian oil evel requted of ses sot they cam concentrate oe APP Dacre ng ts solve thei cw robles without the ad ofa proves nal programmer. imei ttsrnnance by reducing vers and making programs that ae 28) to chaos Depending on the language the sophisteaton of fourth genera jon languages varies widely. These language ate say wien contin wi a database and its dat dictionary, ypes of language tools fall nto the fourth generation language category. computer. ive bas 1. Query languages 2. Repost generators. Aplications generators. Decision support systems and financial planning languages. 5, Some microcomputer application software. Query languages Query’ languages allow the user to ask questions about, o ret forming requests in normal human language statements (such as Englis {quar language and for database management systems software fs light hat most Wee he ste, Query languages do have a specific grammar vocabulary, and syntax t {S usuallya simple task for both users and programmers. ‘Report generators evan feertorsaresinilarto query languages in that they allow users to ask questions fom dle and tie eaten fom it for a eport (ie pl); however, n case ofa report generator the usr f nate 10 and rete inert aaabase le. And with a report generator, te wir has much greater control over what he ae Wok ke The user oF report generator cn spesify thatthe software automaticaly determine Nom the sat should Took or ean create his or her own custontized output reports using Special report Generator ‘command instructions. ‘Application generators Janiation generators allow the user to reduce the time it takes to design an entire software appriction chat accep put ensures data has been input accurately, performs complex ealutations and processing logic, a8 araputs infomation in the form of eports. The user mist key into computer-useble form the specification fo what {harogram i supposed to do, The resulting fle is input tothe applications generator, which determine how to perfor the tasks and which then produces the necessary instructions forthe software program Decision suppot systems and financial planning languages combine special interactive computer programs and some special hardware t0 allow high level managers to bring data and information together from different ‘Sources and manipulate it in new ways ‘Some microcomputer applications software can also be used to ereate speci eve information from database files by sh), The difference between the defi people consider the defini that must be mastered, but this ized applications ~in other words, to create new software. Microcomputer software packages that fall into this category include many Spreadsheet programs (such as Lotus 1-2-3, database managers (Such as dBase IV), and integrated packages (such a Symphony). 'S® Generation of programming languas Slaural Languages represent the next step in the development of programming languages -e fifth generation languages. The text ofa natural language statement very closely resembles human speech, In fact, one arty rord a satement in several Way’ perhaps even misspelling some words or changing the order of the words Ghd ge the same result. These languages are also designed to make the computer “smarter”. Natural languages ‘lresdy available for microcomputers include Clout, Q&A, and Savvy Retriever (For use with databases) and HAL, (iuman Access Language). ‘The use of natural language touches on expert ystems, computerized collection ofthe knowledge of many thurman experts ina given field, and artificial intelligence, independently smart computer systems. Drafted By: Jayanta Pal, Assistant Professor, Dept of, Tripura University Page 5 of 18 Basic Computer Skill -1 < _ 6 oar on : unm Flow CUI a eet oor are devon Se ng are Ue es it could be @ POSES oF proBram at useful ire the eps 8 Fea i hr dan Though flowcharts ae teshneaoriented, note document or peeect managemen eee us includes eaeulaions, condition Sees gorithms Tics sey sep polo hing process which ins cleo, or eudocode. Algo ve caf expres and analyzed through Hoshi een I rae han om SS gl find also nt computer programs and interes2 sh language for deserbing the loge st as -v eaneep then you should opt fr algorithm processing of tasks. The alge fre very eney and every step involved Igoithns can be converted into Moweha ‘of any computer Ianguage and i uses Ei Inaswnew concept and wants to explain z 4 1. Sequence emeans each step ofthe algorithm is executed in the specifi order. Example 1: Algorithm to Add two numbers Step 1: Input the frst number as A ‘Step 2: Input the second number as B Step 3: Set SUM= A+B Step 5: Print SUM. Step 6: End Example: Algorithm to Interchange two numt Input the first number as A Input the second number as B ‘Step 3: See temp = A r Step 42 A= B Step S: B= temp Step 6: Print A, B Step 7: End Decision Itis used when the execution of a process depends on the outcome some other conditions. Example 1: Algorithm to test test equality of two numbers Step 1: Input the first umber as A Step 2: input the second number as B Step 3: IFA. then Print “Equal else Print “Not Equal” Step 4: End Example 2: Algorithm to find largest of two numbers Step 1: Input the first number as A ‘Step 2: Input the second number as B Step 3: IFA>B then Print “A is Greater” elseif As they do with proprictary software, ustrs must aceapt the terms ofl Setiware but the legal terms of open source licenses fer dramatically Ron Open tource licenses aft the way people can wie study, modi, and dese general, open source Heenan a computer wsere permission fa use open sure sofware rans prone en rc Some open source licenses—what some people call “copyleft” anyone who releases a medifed open source progriun must also release the sou ieside i, Moreover, some open source licenses stipulate that anyone who alters bothers must also share that program's source ode without charging a licensing fee fo [tS authors make its source code lable to others who would like 10 | Alter it, or share it. Libre Office and the GM 1U Image Manipulation Program are icense when they use open source ‘those of proprietary licenses. Advantage of using n Source Software \ Fee aoe SaaS Salar mer of reasons. nein: antl. Many people preter open source softwere Decne they here nea ~s exalt cle 2 make sre snoring anys Wea ee et they don tke ; aa ‘Teatn,Getase ope sures ead is publ aces, ste can aly sly ts hy lm tomte Wher spl Suen cna nt wu was, lt enmeat andra sh op Security. Some people prefer open source sftare because thy sonudss ers eee ane moron software " 4 Sti Mo wars te open sre ero rope agsem ject: Dae } Progranivers publicly dstibute the source cde fr ape sore sofware soe eying oe ee aR cee ee 4 tasks canbe sre oats want sper fino depth eign rns sree ee nd of software, They | | | an cage paid of i Oo To. This ta conimon misconception about what "pen Source™ sre no oly eeenomies ; +t open source Sftare they creat ort which ‘pen source software programmers cen charge money fr te open sowee so they cont, Bun some cates because an open serclicoe Miphteque ea eee eee when hey sll software to others, some programmers ind that charging users money for software services aad =ppot (athe than forthe sofvare lel snore lurve Tis vay, Le stave renee hee once nk they make money helping others instal ut, and oublashot i implies, and the concepts implications 4 Computer Netw ‘A.computer network is an interconnection of varios computers to share soar, hardware, resources and data vough a communication medium between then " AConpte Nesciipiocat satenomets Soni pcs atid peut te nine and data and increased Communication ofresources Drafted By: syanta Pal, Assistant Professor, Dept of IF, Tripura University Page 90f38 — Basic Computer” Skill - 1 Uses of Computer Networks ‘The computer networks are useful to the organizations int 1, Resource sharing. 2. For providing high rel 3. It can provide a power! Pi oan 2. Person to person communication 3. Interactive entertainment. the following ways: ibility. ; fal communication medium. Advantages of Networ! ‘The following are the distinct notes in favor of computer network. 1. The computers, stafFand information can be well managed b. A network provides the means to exchange data among the computers and fo make programs and data available to people «. Itpermits the sharing of the resources of the machine 4. Networking also provides the function of back-up, 7 « Raworking provides a flexible newworking environment, Employees can work at home by using through ‘networks ties through networks into the computer at office. {PEs of computer networks. Computer networks can be characterized by their size as The size ofa network can Pav ofthe network. devices spread weross Some ofthe diferent n be expressed by the geographic area Networks ean cover anything (rom a hand he ante globe. etworks Based on size are: Personal area network, or PAN, Local area network, or LAN Metropolitan area network, of MAN Wide arca network, or WAN Personal Arca Network A personal area network, of building, This could be intia: they occupy and the number of computers that are ful of devices within a singh le room to millions of PAN, is a computer network organized © a small office or residence. A typical ; dco game consoles and other personal enterainavent devices lie vaareridectheesirk Ssometinesrefredtoasahomeary rnd neeas Single wird Intemet connection connecied we iple devices. The network ig dual person within'a single PAN would include one or more computers, Alocal area network, or LAN, consists of fa computer network at a single site, STAN PF Ageit for sharing resources, such ns cain stereos printers. LANs can be bathe sas rete Ieseses drs sea Re il atone nd rent: te cate ant epi st Prolene ay nud Basic Computer Skill - J ‘The smallest LAN may only use two computers, while larger LANs can accommodate thousands of computers. A LAN typically relies mostly on wired connections for increased speed and security, but wireless connections can also be part of'a LAN. High speed and relatively low cost are the defining characteristics of LANS, LAN are typically used for single sites where people need to share resources among themselves but not with the rest of the outside world. Think of an office building where everybody should be able to access files on a cesitral server or be able to print a document to one or more central printers, Those tasks should be easy for everybody ‘working in the same office, but you would not want somebody just walking outside to be able to send a document to ‘the printer from their cell phone! If local area network, or LAN, is entirely wireless, i is referred to as a wireless local area network, or WLAN. “Metropolitan Area Network A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus oF small region. A MAN is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can cover an area from several miles {0 tens of miles. A MAN is often used to connect scveral LANs together to form a bigger network. When this type of network is specifically designed for a college campus, it is sometimes referred to as a campus area network, of CAN. Wide Area Network, A.wide ares network, or WVAN, occupies a very large area, such as an entire country or the entire world. A WAN, ‘can contain multiple smaller jetworks, such as LANs or MANS. The Internet is the best-known example of a public WAN. Network Devices 1, Repeater: = A repeater operates at the physical layer. Its job is to regenerate the signal over the same network can betransmitted | fy the signal. When Iisa2 port ‘before the signal becomes too weak or corrupted so as te extend the length to which the sige over the same network, An important point 10 be noted about repeaters is that they do no a the signal becomes weak, they copy the signal bit by bit ané regenerate it the original ste devi i ub — A hub is basically « miltiport repeater. A hub connects multiple wires centing feo xuamgle, the connestor in star tepology which connects different stations. Hubs cannot filter fata, so data packets fare sent to all connected devices, In ether words, collision domain ofall hosts connected th gh Hub rains os sta hap do sot have ltelligenceto find out best path fr data packets which leads to inefficiencies and wastage. 3. Bridge A bridge operates at data link layer. A bridge i repeater, with addon functionality of fitering content by reading the MAC addresses of source and destination. [is also used for g tivo LANs working on the same protocol. Ithas a single input and single output por, uhus making it a2 port device. 44. Switel— A switch is a multi port bridge with a butfer and a design that can boost its effiieney(large number of ports inp less trafic) and performance. Switch is data link ayer device. Switch ean perform error checking before forwarding data, that makes it very efficient sit does not forvard packets that have errors and forward good pedkets selectively to correct port only. In other words switch divides collision domain of hosts, but broadeast domain remains same. ‘5. Routers — A router is device like a switch that rontes data packets based on their IP addresses. Router is mainly a Neiwork Layer device, Routers normally connect LANs and WANs together and have a dynamically updating outing table based on which they make decisions on routing the data packets, Router divide brondcast domains of hosts eonnected through Dafted By: Jayanta Pal. Assistant Professor, Dept. of I, Tripura University Page 12 of 18 is that may work upon 6, Gateway ~ A gateway, as the name suggests, is a passage to connect two networks together i different network. models, They basically works as the messenger agents that take data from one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and can operate at any network: layer. Gateways are generally more complex than switch or router. Network Topology, ‘Network Topology is the schematic description of a network arrangement, connecting various nodes(sender and receiver) through lines of connection. BUS Topology Bus topotogy is a network iype in which every: ‘colnputer and network device is connected to single cable. When it has exactly two erdpoints.then ii called Linear Bus topology, cae cabled T [erotic Fonte] | Pcptne | : soy 4 ps Sa ~ a Features af Bus Topology 1, Ittransmits data only in one direction, 2. Every device is connected toa single cable Advantages of Bus Topology 1. Itis cost effective. 2. Cable required is least compared to other network topology. € 3. Used in small networks, 4. Itis easy to understand, 5. Eesy to expand joining two cables together. Disadvantages cf Bus Topology 1 Cables fils then witole network fils. 2. Ifnetwork trafic is heavy or nodes are more the performance of the network decr 3. Cable has a limited tenath, the network decreases. 4. {Wis slower than the ring topology. RING Topology It is called ring topology because it forms a ring as each computer ‘one connected to the first. Exactly two neighbours for each devi ‘Connected to another computer, with the last rate yr layanta Pal AsItant Profesor Dept of, Tp Univers a L Page 12 0F 18 Basic Computer Skill Fentures of Ring Topology ed for Ring topology with large number of nodes, because if someone wants (© then the data will have to pass through 1. Anumber of repeaters are us Send some data to the last node in the ring topology with 100 nodes, oss repeaters are used in the network. 99 nodes to reach the 100th node. Hence to prevent da 2, ‘The wansmission is unidirectional, but it ean be made bidirectional by having 2 connections between cacly Network Node, it is called Duat Ring Topology. ‘med, and data flow is in opposite direction in them. Also, 3. In Dual Ring Topology, two ring networks are for if one ring fails, the second ring ean act as a backup, to keep the network up. pass through each node / Data is transferred in # sequential manner that is bit by bit, Data transmitted, has to of the network, till the destination node. Advantages of Ring Topology ia. network is not affected by high traffic or by adding more nodes, asjonly the nodes having | tokens ean transmit data. \ 2, Cheap to install and expand Disndvantages of Ring Topolozy 1. "Troubleshooting is difficult in ring topology. } turbs the whole network, puters are connected 10a siigle hub through a eable, This hub is the central nolte “STAR Tepotogy In this type of topotogy alll the comy ‘and alt others ntodes are connected to the central node, Features of Star Topology 1, Bvery node has its own dedicated connection to the hub. 2) Hub acts as a repeater for data flow. 3. Can be used with twisted pair, Optical Advantages of Star Topology 1. Fast performance with few nodes and low network traiTic, 2. Hub ean be upgraded easily. 3. Easy to troubleshoot, 4, Easy to setup and modify. Only that node is affected which has failed, rest of the nodes can work smoothly. \ Disudvantages of Star Topology 1. Cost of installation is high ibre or coaxial cable. Drafted By: Jayanta Pal, Assistant Professor, Dept. of IT, Tripura University Page 13 of 38 puters disturbs the network activity. Basic Computer Skill BRN. nts net stoped teste al the nodes depend on the hub MESH Topot This a point-to-point connection to other nodes or de ss. All the network nodes are connected to each other. Mesh has nee i channels link n devices There arts technigues 10 transmit data over the Mesh topology, they are: 1. eons 2, Flooding Routing In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct the data to reach the destination using the shortest distance, Or, routing logic which has information about the broken links, and itavoids these node etc. We can even have routing logic, to re-configure the failed nodes. Flooding {in Alocding, the same data is transmitted to all the network nodes, hence no routing logic is required. The network is robust, and the its very unlikely to lose the data, But it leads to unwanted load over the network. r “Types of Mesh Topotony 1. Partial Mesh Topotogy : In this to topotony but come devi 2. Full Mesh Fopotog: Features of Mesh Topology 1. Fully connected. 2. Robust, 3. Not flexible. Advantages of Mesh Topotogy 1. Each connection can carry its own data load. 2 Wis robust 3. Fault is diagnosed easily, 4. Provides security and privacy. \dvantazes of Mesh Topology ‘ {sctallation and configuration is difficult. 2. Cubling cost is more. 3. Bulk wiring is required, pology some of the systems are connected in the same fashion as mesh "es are only connected to two or three devices. fach and every nodes"ar devices are connected 1 tach other. Internet Internet is a global network of inter-connected cor nipaters, where one computer can be connected to any other computer (or Computerized device) in any portion of the world, 7 ernet uses various internst per Protocol technologies. The recent introduction of mobile intemet have been equally internet surfing is very easy. Inter: possible t0 Surf through Internet wi ‘Uses of Iuternet The key fo SUCCESS Of Internet is the information, The better the quality, is available in all major villages, towns. cities of almost every country. I the help of internet browsers such as Wit oe ma indows explorer, Google chrom the more usage of Intemet operations. rafted py: Jayanta Pal, Assistant Professor, Dept of 17, Tipu University Pee 29 of 18

You might also like