Pages

Saturday, July 3, 2010

CS 101 Introduction to Computing Assignment # 05

Deadline

Your assignment must be uploaded / submitted before or on July 02, 2010.

Upload Instructions

Please view the assignment submission process document provided to you by theVirtual University to upload the assignment.

Rules for Marking

Please note that your assignment will not be graded if:
· It is submitted after due date
· The file you uploaded does not open
· The file you uploaded is copied from some one else or from internet
· The file you uploaded is in a format other than .doc

Objective:

The assignment has been designed to enable you:
  • Understanding of Computer Networks




Assignment: Total Marks =10

Q.1 XYZ is an organization, wants to develop the network. Total numbers of computers are 7. Which topology is best suitable for the network? Justify your answer. 4 Marks

Answer:
bus topology :

  • Because easy to implement and extend...
  • Easy to install.....
  • Cheaper than other topology bcos no server is needed.....
  • Cost effective, because only a single cable is used....
  • Easy identification of cable fault.....
  • It works’’ best’’ with limited number of nodes......
  • Bus network topology uses a broadcast channels which means that all attached station can hear every transmission and all station have equal priority in using the network to transmit data.........
  • If any node is down, the overall functionality of network is not affected...................................................
  • I think star is not used in this case because there are limited computer ,and due to server its cost will be more,



Q.2 If computer A wants to transmit the data to computer F, then
6 Marks
What condition should A satisfy?
What protocol should be used?
And how the data will transmit?

Condition:

  • If computer A wants to send data it must have an empty token.
  • The network fail if a single node fails in ring network, so nodes should not fail during the process.
  • Messages propagate in one direction only, either clock wise OR counter clock. Wise. In this we take as an antic lock wise.

Protocol:


  • This is a ring network. So ring protocol will be used for that.
  • This protocol passes a special message called a token through the network .a computer that receives the token is given permission to send a packet of information.

  • If computer A wants to send data it must have an empty token.
  • It attaches data to the token. The token then proceeds around the ring until it comes to computer for which the data is meant.(i.e. F)

Transmit ion of data:

· Computer ‘A’ sends the message to its neighbor ‘H’.
· The computer ‘H’ will examine the message, because this data are not intended for H, so….
· It passes the message to next computer in the ring that is ‘G’.
· Computer ‘G’ also examines the message and sent it to next computer in the ring that is ‘’F’’.
· So in this way Computer ‘’’’F’’’ receives the data.

0 comments:

Post a Comment

Is this blog is useful for you?

Powered by Blogger.