Professional Documents
Culture Documents
Midterm Hints
List Four of Computer Network topology and explain each of them with example.
Answer:
BUS Topology: Bus topology is a network type in which every computer and network device
is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus
topology.
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
RING Topology: It is called ring topology because it forms a ring as each computer is
connected to another computer, with the last one connected to the first. Exactly two
neighbours for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring topology with
100 nodes, then the data will have to pass through 99 nodes to reach the 100th node.
Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the
network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to
pass through each node of the network, till the destination node.
1. Transmitting network is not affected by high traffic or by adding more nodes, as only
the nodes having tokens can transmit data.
2. Cheap to install and expand
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
Features of Star Topology
There are two techniques to transmit data over the Mesh topology, they are:
1. Routing
2. Flooding
1. Partial Mesh Topology : In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two or three
devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust(strong).
3. Not flexible.
TREE Topology
It has a root node and all other nodes are connected to it forming an order. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
Mode of transmission of It Transmits data in the form of It Transmits data in the form of
data packets. frames.
Address used for the It makes use of IP address for the It makes use of MAC address for
purpose of data purpose of data transmission. the purpose of data transmission.
transmission.
Layer of OSI Model It makes use of layer 3 of OSI It makes use of layer 2 of OSI
model. Layer 3 is the network model. Layer 2 is the Data Link
layer. Layer.
Ports Routers contain 2 Ports by default Switches, on the contrary, are
like fast Ethernet Ports. However, available with different Ports i.e –
we can add serial ports explicitly. 8, 16, 24, 48 and 64.
Table It makes use of the Routing Table It makes use of CAM (Content
for routes to get to the destination addressable Memory) table for
IP. MAC address.
Broadcast domain Routers break the broadcast Switches allow the broadcast
domain and it does not propagate domain and contain per port
broadcast domain. collision domain.
Used for It is used for both WAN/LAN It is only used for the LAN
networks. networks.
Mode of Transmission By default, Router is in full duplex Switches are used in half as well as
mode. However, we can change full duplex mode. However, we
them manually into half-duplex. can also make them in auto-
negotiation.
a method of data collision detection in which a node connected to the network listens (that is,
has carrier sense) to determine that no other nodes are currently transmitting data signals;
short for Carrier Sense Multiple Access with Collision Detection.
Duplication Control sequence numbers allow the receiver to identify
10. Which of the following 802.11x standards provides data transmission speeds up to
54Mbps?
Answer: 802.11g/802.11a
One of the following devices can be used to enlarge the area covered by a single LAN
segment?
Answer: Hub and Repeater
Functions of the Transport Layer
Answer:
->Multiplexing / DE multiplexing : Normally the transport layer will create distinct network
connection for each transport connection required by the session layer.
–> Fragmentation and Re assembly: The data accepted by the transport layer from the
session layer is split up into smaller units if needed and then passed to the network layer.
Which portion of the network layer address does a router use to forward packets?
Answer: network portion
11. When SSL and HTTP are used together, what does the beginning of a site address
become?
Answer: https://
12. To increase security, you decide to use your firewall to block the Telnet protocol. Which
port will you need to block to prevent Telnet from being used?
Answer: TCP port 23(not sure)
What devices transfer packets across multiple networks and use tables to store network
addresses to determine the best destination? Explain your answer.
Answer: Routing is the process of forwarding IP packets from one network to another. A
router is a device that joins networks together and routes traffic between them. They are able
to do this routing, and determine the best path to take, based on internal routing tables they
maintain. A router can connect any number of networks together.