Beruflich Dokumente
Kultur Dokumente
Multiple data signals are multiplexed over a single high data rate link then
demultiplexed at the othr end
There are tow main basic basic techniques in multiplexing:
text is stored using the ASCII code hen ce any message containing
recorded or broadcasted.
Video Data representation in form of movies or pictures.
6. Define dataflow?
Path taken by data within a device, network as it moves from source to
data repository or user
7. List and distinguish various types of data flow in detail.
There are three ways in which data flows in two devices are communication
with each other. This includes:
a) Simplex - This is where the communication is in one direction. One
of the devices is the sender while the other is the receiver.
b) Full duplex - This is where communication happens simultaneously
between two different devices e.g. telephone.
c) Half duplex - Communication between two devices does not happen
simultaneously. One device has to wait to receive information before
transmitting and vice versa.
8. What is computer network topology?
Computer network topology refers to the various ways in which
components are arranged in a computer network.
9. List and describe6types of physical network topologies in detail.
Physical network topology refers to the arrangement of network cables and
interconnection between the nodes and the cabling. The various physical
network topologies include
a) Bus topology
This is the simplest network topology. All the nodes are connected to a single
cable referred to as the bus; which is the backbone of the network. All the
computers in this network topology communicate through this cable. It is
easy to setup and cheap compared to other networks. It is preferred for small
networks such as the LAN. Some of the drawbacks of this network topology
include:
network.
Efficiency reduces when devices connected to it increase.
It is not preferred for networks with heavy traffic.
There is dependency on the central cable.
There is no data security since all computers receive the same
network.
Failure of one node does not affect the entire network
Drawbacks of the star topology include:
Failure of the central device affects the entire network.
The use of hub, a router or a switch as central device increases
c) Ring topology
In ring network, every device is connected to two other devices on either
sides forming a loop. Data travels around the network in one direction.
Sending and receiving of data takes place by help of token.
A token contains a piece of information which along with data is sent by the
source computer. This token then passes to next node, which checks if the
signal is intended to it. It receives it and passes the empty to into the
network, otherwise passes token along with the data to next node. This
process continues until the signal reaches its intended destination.
d) Mesh Topology:
Each computer and network device is interconnected with one another,
making most transmission distributed, thus even if on connection goes down
the network is up and running.
e) Tree Topology:
This connects one star network to another star network. If the main trunk
connecting the two star networks fail then the two networks will not be able
to communicate, but computers within the star network can still
communicate with each other.
f) Hybrid Topology:
This is a combination of more than one topology mentioned above. This kind
of topology is best applied in a wide area network. Since each topology has
its own strengths and weaknesses this topology can be applied to maximize
on effectiveness
10.
100001111 100001110
010101110 010101111
Odd 101011100000101101110
Even- 011011110000101001110
14. In a block code, a dataword is 20 bits and the corresponding
codeword is 25 bits. What are the values of k, r, and n according
to the definitions in the text? How many redundant bit are added
to each dataword.
n = size of the code word
k = size of the dataword
r = the redundant bits
n=k+r
n=25
k=20
r=n-k
25-20 redundant bits = 5
15.
TCP/IP suite.
a. Specific Address: defines an instance of a process e.g. gtalk
b. Port Address: It decodes TCP communications made between a host
port and external network.
c. Logical Address: Its also called IP address. This is the address at
which a device appears to reside from the perspective of a running
program.
d. Physical Address: its also known as link addressing. It is local to the
network to which the device is connected and unique inside it. It
includes the frame and its used at the data link layer. Example of a
physical address is a MAC
17. Explain layers in the TCP/IP protocol suite in detail.
a) Application Layer It is the top layer of the TCP/IP model. It is
concerned with providing network services to applications. At this layer
sockets and port numbers are used to differentiate the path and
sessions which applications operate. A couple of protocols work in this
layer but the most common protocols include: HTTP. Telnet, DNS, SMTP,
FTP
b) Transport Layer This layer is concerned in the transmission or transfer
of data from one location to another. There are two main protocols that
are used in this layer. UDP and TCP. UDP is connectionless, no
windowing, there is no error detection and it is unreliable whereas TCP
is connection-oriented, there is error detection via seq, has windowing
and is reliable.
c) Data Link Layer / Network Interface Layer This is the second layer on
the TCP/IP model and it defines the protocols and hardware required to
connect a host to a physical network and to transmit data across it.
This layer performs the following tasks: Mapping, data framing,
Addressing, error detection and handling, media access control as well
as logical link control.
d) Physical Layer - This layer covers the interface between a data
transmission device and the transmission medium/network. This layer
is concerned with specifying the characteristics of the transmission
medium, the nature of the signal, the data rate and the message.
18. Compare TCP/IP protocol suite with OSI model in detail.
a) In OSI model the transport layer guarantees the delivery of packets
while in TCP/IP there is no guarantee.
b) OSI follows a horizontal approach while TCP/IP follows a vertical
approach.
c) Protocols are hidden in OSI model and are easily replaced as the
technology changes while in TCP/IP protocols is not easily replaced.
d) OSI has 7 layers while TCP/IP has 4 layers.
e) OSI model defines services, interfaces and protocols very clearly and
makes clear distinction between them while TCP/IP is not clearly
separated its services, interface and protocols.