Professional Documents
Culture Documents
Group Member
1. Samuel Yonas UU77345
2. Mikias Aytenfisu UU65074
3.
4.
5.
August 10 2021
Instruction: For the questions below provide a detailed answer
1. Consider yourself as a Network Engineer hired by Unity University for a project that
aims in interconnecting the computers found inside the campus. The college has the
following number of computers in different labs.
IT-lab 80
Surveying-lab 35
Secretarial-lab
20
The network is characterized as a network with low data traffic and security is a big issue. Which
kind of LAN is appropriate for the above situation? Elaborate your answer with example?
The network is characterized as a network with low data traffic and security is a big issue. The number of computers going to be
connected is 80+35+20 = 135. Peer to peer network is a very bad choice to go with because of the two characteristics mentioned
above. We might consider hybrid however ,the second characteristics security is a big issue. Hybrid network’s capability to allow
peers to share resource will treepass our security requirement. Therefore client/server lan will be our choice.
2. How do networks affect the way we interact, learn, work and play?
Some of the newest home trends include Smart Home Technology. Smart home devices provide integration into
compatible appliances, switches, outlets, and entertainment devices. Other devices allow the ability to communicate
with the installed smart technology through touch or voice commands.
Some of the technologies are
o Powerline networking : is an emerging trend for home networking that uses existing electrical wiring
to connect devices.
o Wireless broadband: DSL and cable are common technologies used to connect homes and small
businesses to the internet.
o Security solutions:
4. To minimize the chance of collision and to increase the performance, Carrier Sense
Multiple Access (CSMA) method was developed. Explain CSMA and also discuss the
various persistence methods.
Carrier Sense Multiple Access (CSMA) is a network protocol that listens to or senses network signals on the
carrier/medium before transmitting any data. CSMA is implemented in Ethernet networks with more than one
computer or network device attached to it. CSMA is part of the Media Access Control (MAC) protocol in which a
node verifies the absence of other traffic before transmitting on a shared transmission medium like electrical bus.
Persistence methods
1-Persistent CSMA is an aggressive transmission algorithm. When the transmitting node is ready to
transmit, it senses the transmission medium for idle or busy.
Non persistent CSMA is a non-aggressive transmission algorithm. When the transmitting node is ready to
transmit data, it senses the transmission medium for idle or busy.
P-persistent is an approach between 1-persistent and non-persistent CSMA access modes. When the
transmitting node is ready to transmit data, it senses the transmission medium for idle or busy. If idle, then it
transmits immediately. If busy, then it senses the transmission medium continuously until it becomes idle,
then transmits with probability p. p-persistent CSMA is used in CSMA/CA systems including WI-FI and
other packet radio systems
O-persistent Each node is assigned a transmission order by a supervisory node. When the transmission
medium goes idle, nodes wait for their time slot in accordance with their assigned transmission order. The
node assigned to transmit first transmits immediately. O-persistent CSMA is used
by CobraNet, LonWorks and the controller area network