Tuesday, December 27, 2016

What is computer Network? Difference between packet switching and Circuit switching.



What is computer Network? Difference between packet switching and Circuit switching.



A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices.

Computer networking or Data communications (Datacom) is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology and/or computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines. The three types of networks are: the Internet, the intranet, and the extranet.

Advantages of Computer Networks

  • File Sharing: The major advantage of a computer network is that is allows file sharing and remote file access. A person sitting at one workstation of a network can easily see the files present on the other workstation, provided he is authorized to do so. It saves the time which is wasted in copying a file from one system to another, by using a storage device. In addition to that, many people can access or update the information stored in a database, making it up-to-date and accurate.
  • Resource Sharing: Resource sharing is also an important benefit of a computer network. For example, if there are four people in a family, each having their own computer, they will require four modems (for the Internet connection) and four printers, if they want to use the resources at the same time. A computer network, on the other hand, provides a cheaper alternative by the provision of resource sharing. In this way, all the four computers can be interconnected, using a network, and just one modem and printer can efficiently provide the services to all four members. The facility of shared folders can also be availed by family members.
  • Increased Storage Capacity: As there is more than one computer on a network which can easily share files, the issue of storage capacity gets resolved to a great extent. A standalone computer might fall short of storage memory, but when many computers are on a network, memory of different computers can be used in such case. One can also design a storage server on the network in order to have a huge storage capacity.
  • Increased Cost Efficiency: There are many softwares available in the market which are costly and take time for installation. Computer networks resolve this issue as the software can be stored or installed on a system or a server and can be used by the different workstations.

Disadvantages of Computer Networks


Following are some of the major disadvantages of computer networks.
  • Security Issues: One of the major drawbacks of computer networks is the security issues involved. If a computer is a standalone, physical access becomes necessary for any kind of data theft. However, if a computer is on a network, a computer hacker can get unauthorized access by using different tools. In case of big organizations, various network security softwares are used to prevent the theft of any confidential and classified data.
  • Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus.
  • Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected. Costly devices like routers, switches, hubs, etc., can add up to the bills of a person trying to install a computer network. He will also have to buy NICs (Network Interface Cards) for each of the workstations, in case they are not inbuilt.
  • Dependency on the Main File Server: In case the main File Server of a computer network breaks down, the system becomes useless. In case of big networks, the File Server should be a powerful computer, which often makes it expensive.
  • Expensive to set up
  • All the wires can get in the way
  • If something goes wrong, the whole network could go down with it
  • Lower security



What is flow control and compare and contrast stop and wait flow control method with sliding window method.





The primary advantage of the sliding window protocol over the stop-and-wait protocol is efficiency. The sliding window protocol does not waste network bandwidth, while the stop-and-wait protocol does waste network bandwidth. When using the stop-and-wait protocol, the sender must wait after every frame to receive acknowledgement from the receiver before sending the next frame. This protocol only allows for one frame being on the channel at a time. However, a sliding window protocol utilizes pipelined communication so that the full capacity of the bandwidth is used. Thus, the sliding window protocol offers better performance and higher throughput than the stop-and-wait protocol.

Explain Leaky Bucket Algorithm.


Policing
       Network monitors traffic flows continuously to ensure they meet their traffic contract. The process of monitoring and enforcing the traffic flow is called policing.
       When a packet violates the contract, network can discard or tag the packet giving it lower priority
       If congestion occurs, tagged packets are discarded first
       Leaky Bucket Algorithm is the most commonly used policing mechanism o Bucket has specified leak rate for average contracted rate o Bucket has specified depth to accommodate variations in arrival rate o Arriving packet is conforming if it does not result in overflow
Leaky Bucket algorithm can be used to police arrival rate of a packet stream
Let X = bucket content at last conforming packet arrival
Let ta be last conforming packet arrival time = depletion in bucket
Leaky Bucket Algorithm
       The above figure shows the leaky bucket algorithm that can be used to police the traffic flow.
       At the arrival of the first packet, the content of the bucket is set to zero and the last conforming time (LCT) is set to the arrival time of the first packet.
       The depth of the bucket is L+I, where l depends on the traffic burstiness.

       At the arrival of the kth packet, the auxiliary variable X’ records the difference between the bucket content at the arrival of the last conforming packet and the interarrival time between the last conforming packet and the kth packet.
       If the auxiliary variable is greater than L, the packet is considered as nonconforming, otherwise the packet is conforming. The bucket content and the arrival time of the packet are then updated.
Leaky Bucket Example: - The operation of the leaky bucket algorithm is illustrated in the below figure.
       Here the value I is four packet times, and the value of L is 6 packet times.
       The arrival of the first packet increases the bucket content by four (packet times).
       At the second arrival the content has decreased to three, but four more are added to the bucket resulting in total of seven.
       The fifth packet is declared as nonconforming since it would increase the content to 11 , which would exceed L+I  (10).
       Packets 7, 8, 9 and 10 arrive back to back after the bucket becomes empty. Packets 7, 8 and 9 are conforming, and the last one is nonconforming.
       Non-conforming packets not allowed into bucket & hence not included in calculations.



Examination Question



Different between switch and hub.

 

Solution Of Computer architecture


What is data link layer in OSI reference model? What is CRC? Explain.



The data link layer is responsible for data framing, error control and physical addressing. When data is received at this layer, the packet is "framed" for transmission. A parity bit or a Cyclic Redundancy Check (CRC) field can be added for data error checking. Each system, connected to the network has a unique physical address. This address is usually "burnt-in" into the computer’s network card. It is a physically established number and therefore considered the computer’s physical address. Again, each system must have a unique physical address. Sometimes, this physical address is referred to as the Media Access Control (MAC) address.