StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advantages and Disadvantages of Datagram Network - Math Problem Example

Cite this document
Summary
"Advantages and Disadvantages of Datagram Network and Virtual Circuit Network" paper examines reasons why a destination device might not respond to address resolution protocol (ARP) requests and Manchester and Differential Manchester encoding schemes for 10011101…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful

Extract of sample "Advantages and Disadvantages of Datagram Network"

NETWORKS REPORT Name Course Tutor University City and State Date Question 1 a) There are two networks in the given diagram. The networks use a star topology. Star topology involves several devices connected to a central switch. In the case of the given diagram, despite only one client computer being sown, the presence of a switch means that other devices are connected to the client side network, hence leading to the conclusion that the topology used is of the star variant (Yadav, Kaushik & Verma 2014, p. 80). Regarding the number of networks, only two networks are in the diagram given. This is due to the presence of only one router. A router is used to connect to at least two networks by serving as gateways to each of the networks involved (Cisco). In the figure given, only the router connects the client side network to the server side network, making them two discrete networks connected through one router. b) Each layer contains the following I. Client device , in this case a computer, contains the physical, data link, application, presentation and session layers. II. Client side switch contains the network and transport layers III. The router contains the network and transport layers IV. Server side switch contains network and transport layers V. The server contains the physical, data link, application, presentation and session layers The server and client devices contain the physical layer due to their connection to ethernet cables and other physical components (Kumar, Dalal & Dixit 2014, p.463). They also have the data link layer that corrects errors in the physical layer. Additionally, the server and client devices run applications such as email and browsers. These applications deal with certain file formats that have to be converted to network compatible formats by the Presentation Layer. Finally, the network connection sessions of these applications is maintained by the Session layer. The router and the switch uses the Network Layer to decide the most appropriate virtual circuits that the packets are to be transported from one point to another (Kumar, Dalal & Dixit 2014, p.464). Transport layer then kicks in to take charge of the actual transportation of the data packets. c) When data is being sent through a network, it is directed based on the IP address. The router and the switch both use the IP address to determine the destination of the data. But once the data leaves Layer 3, Network layer and enters layer 2, the data link layer, it meets 2 sub layers. The first one is called the LLC, Logical Link Control Layer, and the second one is the MAC, Media Access Control layer. The LLC uses the IP addresses but the MAC layer uses MAC addresses. Every device connected to the network has a unique MAC address. The data link layer matches the IP addresses with their respective MAC addresses. Resultantly, data is then transmitted physically to the specific MAC address of the destination. Question 2 a) Different signals have varying transmission speeds due to the interference. Wireless transmission is prone to more interference than the wired variety. Wired transmissions are subject to electromagnetic interference and radio frequency interference (Cisco Systems 2003). Wireless transmissions on the other hand have more barriers due to their unguided nature. In addition to electromagnetic and radio frequency interference, wireless systems are affected by physical barriers such as houses, hills and trees make it difficult for signals to penetrate (Harwood 2009, p. 3). Moreover, environmental factors such as lightning and fog weaken signals too. b) The potential problems that can arise from increased voltage include increase in operating temperature. The temperature may have counter effective outcomes on the network. At extreme temperatures, network devices can be damaged. c) Propagation time is defined as how long it takes for data to travel at the speed of light from source to destination (O3B n.d). To reduce this delay, an administrator can start by replacing slow propagation media with high propagation ones for example replacing coaxial cables with fiber optic cables. Transmission time refers to the time taken for data to travel through media(O3B n.d).. To reduce this time and effectively reduce latency, the media involved in the transmission should have high transmission speeds. Optical fibre cables have higher speeds than the traditional twisted cables. In the same light, wired media has higher speeds than wireless media. Queuing time is the delay packets have to experience at the router before they are transmitted (O3B n.d).. This delay contributes to latency. To tackle this issue, the administrator can utilize a router with higher processing speeds. Also, having routers with higher buffer memory will reduce the potential of packets getting lost. Loss of packets occurs if more packets keep flowing to the router while it’s buffer memory is already filled. In such a scenario, some packets are discarded hence is lost. To reduce processing delay, make sure that the network has high priority on the processor. This end can be achieved by simply terminating all processes that are utilizing the processor, this way only network activities will be given full processing priority. Significant speed improvements can be experienced once the processor load is eased. d) Manchester and Differential Manchester encoding schemes for 10011101 Start 1 2 3 4 5 6 7 8 End Data Manchester Differential Manchester ii) In Manchester decoding, synchronization is achieved by the mid bit transition while on differential Manchester decoding, synchronization is realized through middle transitions which are also used for clock information (Atmel n.d, p. 4). However, in Manchester decoding, transitions are made following the given bits unlike in differential Manchester decoding which is guided by the form of data. iii) Since data is random, the voltage provided to DC components will also vary. These voltage variations cause the baseline to stutter a situation referred to as baseline wandering (Radzyner 2003, p. 27). The two schemes solve these problem by implementing self-synchronization. e) Frequency-division multiplexing (FDM) and time- division multiplexing (TDM) are both utilized in GSM technology for cellular networks. FDM is unique in that it carries signals that are of different radio frequencies (RF wireless world 2012). The frequencies distinctly separated to avoid overlapping issues. Each signal occupies a narrow bandwidth and they are all transported at the same time. On the other hand, TDM separates its signals on the grounds of time intervals. A single transmission media is used however; the multiplexed signals are separated by time intervals (RF wireless world 2012). This separation allows the signals to use the full bandwidth. In GSM, the frequency can be divided into several channels in accordance with FDM then, each channel can be divided further into time intervals using the principles of TDM. Question 3 a) Advantages of datagram network 1. If there is a link failure, then the protocol will automatically recalculate the routing tables effectively preventing data transmission errors (Thakur 2016). 2. The autonomy of re-computing routes saves the administrator the trouble of manually altering the routing algorithm whenever a link failure occurs. Disadvantages of datagram network 1. The network sends packets meant for the same host through the different routes. This behavior sometimes results to packets arriving out of order which would go against the key requirement of the network protocol being developed by the colleague in question (Thakur 2016). 2. The fact that packets can move through any route in the network leads to congestion and flow control issues that are not present in virtual circuits which have predetermined paths. Advantages of virtual circuit network 1. Each packet in a virtual circuit network has a circuit identifier that determines the route that packet has to follow. Consequently, packets that are destined to a common destination use similar paths, this leads to packets arriving in sequence which is the desired outcome of the network protocol being developed (Thakur 2016). 2. Virtual circuits have efficient resources management since no wastage is done when the network is not transmitting any packets, just like datagram networks (Thakur 2016). However the virtual circuit networks have an added advantage since the end systems do not have to reorganize packets which further increases the efficiency of these networks. Disadvantages of virtual circuit network 1. In the occurrence of a link failure, traffic engineering is required to avoid the interruption of transmission (Thakur 2016). 2. Each packet in this network has to have a circuit identifier, an added attribute that is not needed in datagram networks. b) Reasons why a destination device might not respond to address resolution protocol (ARP) requests 1. Host busy. ARP works by converting IP addresses to their corresponding MAC addresses (Reifschneider 2013). These two corresponding addresses are cached in an ARP table for future reference. If a given IP address is missing from the ARP table, then the protocol broadcasts a message to all connected devices. The device that matches the given IP address with its MAC address should then respond with its location and only after that may the packet transmission commence. However, if the destination device is busy, it might not be able to respond to the ARP request. 2. More than one machine has the same IP address. When this happens, the machines responses will keep overlapping each other and the ARP protocol will not be able to resolve the addresses. 3. Destination device is in a different network. If the destination device which owns the IP addresses that is being broadcasted is connected to a different network, then it will not be able to respond to the ARP requests. This outcome occurs because the destination device has no direct route to communicate with the ARP protocol. Therefore, the ARP request will not reach the device and similarly, the device will not return any response. c) 11101 11001101 1011 ______ 1111 1011 ______ 1001 1011 _______ 0100 1011 1111 1011 ________ 100 remainder d) 1100 1100 1100 1100 0101 1100 0101 1100 + ____________________ 10010 0001 0010 0000 0010 0001 0010 0001 0001 0001 0001 0001+ __________________ 0011 0010 0011 0010 Complement checksum = 1100 1101 1100 1101 References Atmel n.d, Manchester Coding Basics, Atmel.com, retrieved 26th July 2016,< http://www.atmel.com/images/atmel-9164-manchester-coding-basics_application-note.pdf> Cisco n.d, CCNA: Network Media Types, Cisco Systems, retrieved 26th July 2016,< http://www.ciscopress.com/articles/article.asp?p=31276> Cisco n.d, What is a Network Switch? Cisco Systems, retrieved 26th July 2016,< http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/connect_employees_and_offices/what_is_a_network_switch/index.html?referring_site=smartnavRD> Harwood,M 2009, Factors Affecting Wireless Signals. Pearson IT Certification, retrieved 26th July 2016,< http://www.pearsonitcertification.com/articles/article.aspx?p=1329709&seqNum=3> Kumar, S, Dalal, S & Dixit, V 2014, The OSI model: overview on the seven layers of computer networks, International Journal of Computer Science and Information Technology Research, vol. 2 , no. 3, pp. 461-466, retrieved 26th July 2016 O3b n.d, What is Network Latency and Why Does it Matter? O3b Networks, retrieved 26th July 2016, < http://www.o3bnetworks.com/wp-content/uploads/2015/02/white-paper_latency-matters.pdf&sa=U&ved=0ahUKEwjv95PGuI_OAhVEBBoKHchJBMcQFggNMAE&usg=AFQjCNG0P5JhB5KlRAopK1iS_vQvsR8afwn> Radzyner, R 2003, Base Line Wander and Line Coding, retrieved 26th July 2016,< http://midas.herts.ac.uk/helpsheets/tims/TIMS%20Experiment%20Manuals/Student_Text/Vol-D3/d3-04.pdf> Reifscneider, S 2013, Network Basics: How ARP works, Tummy.com, retrieved 26th July 2016, < https://www.tummy.com/articles/networking-basics-how-arp-works/?_e_pi_=7%2CPAGE_ID10%2C6363381898> RF wireless world 2012, FDM Versus TDM-Difference Between FDM and TDM Multiplexing, RF wireless world.com, retrieved 26th July 2016,< http://www.rfwireless-world.com/Terminology/FDM-versus-TDM.html> Thakur, D 2016, Distinguish Between Datagram Packet Switching and Virtual Circuit Switching, eComputer Notes, retrieved 26th July 2016,< http://ecomputernotes.com/computernetworkingnotes/switching/distinguish-between-datagram-packet-switching-and-virtual-circuit-switching> Yodav, V, Kaushk, A, & Verma, R 2014, Network topologies, IJIRT, vol. 1, no. 10, pp. 79-81, retrieved 26th July 2016 http://www.google.com/url?q=http://www.ijirt.org/vol1/paperpublished/IJIRT101541_PAPER.pdf&sa=U&ved=0ahUKEwiA2rfTypDOAhWJthoKHZdFBqoQFggLMAA&usg=AFQjCNHlbT0tRXC7mg1DjS03JEatM5V6Dw Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Networks Report Example | Topics and Well Written Essays - 1876 words, n.d.)
Networks Report Example | Topics and Well Written Essays - 1876 words. https://studentshare.org/logic-programming/2055134-networks-report
(Networks Report Example | Topics and Well Written Essays - 1876 Words)
Networks Report Example | Topics and Well Written Essays - 1876 Words. https://studentshare.org/logic-programming/2055134-networks-report.
“Networks Report Example | Topics and Well Written Essays - 1876 Words”. https://studentshare.org/logic-programming/2055134-networks-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advantages and Disadvantages of Datagram Network

Review of Telephone and Data Network

According to research findings of the paper 'Telephone and Data network', some of the workstations are outdated.... Hubs are demonstrating several network segments on each site of Riordan Manufacturing, creating a risk of disrupting services if anyone hub becomes faulty.... After analyzing the network, workstations are distributed into segments, as there are several hubs on the network each of one is indicating a gateway to the terminals connected to them....
12 Pages (3000 words) Research Paper

Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users

This paper evaluates and explains VoIP in detail in order to understand its functions, advantages, disadvantages, VoIP protocols and, best protocols for VoIP application.... This dissertation "Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users" surveys the literature on VoIP or voice over internet protocol telephony application....
39 Pages (9750 words) Dissertation

Evaluating benefits of networks and performing network management responsibilities

Advantages & disadvantages of Networks in an OrganizationThe following advantages follow from installing and managing efficiently, a LAN in an organization.... ome of the disadvantages of LANs include the risk of exposure to the evils of the Internet , namely Internet fraud, identity theft, and loss of useful data that was not backed up before a network fails.... Local Area Networks (LAN) can be described in various configurations and layouts referred to as network Topology....
7 Pages (1750 words) Essay

Local and Wide Area Network

This essay "Local and Wide Area network" presents LAN and WAN.... LAN (Local Area network) as a simple network that interconnects computers in a small area or distance usually one or a small number of buildings and is controlled by one network administrator.... The Local area network illustrated uses Ethernet technology and the switch to interconnect devices on the network to facilitate communication through forwarding of data....
7 Pages (1750 words) Essay

Application of Polling Models to Computer Networks

The disadvantage of polling in networks is that the network becomes unpredictable and undependable causing polling to occur at all times.... nswer #1(b)In a Token Bus network, every device has knowledge of its succeeding devices network address.... When done transmitting or when the transmission time specified by the network expires, the device sends the token packet to the successor device in the logical ring.... In Token Bus networks as the transmission speed increases, the network efficiency drops....
7 Pages (1750 words) Assignment

Computer Networks -Development of Ethernet

This assignment "Computer Networks -Development of Ethernet" presents SNMP that provides network managers and administrators the ability to poll their devices.... In modern switched Ethernet networks, it is not unusual for a router to receive more traffic than it is able to forward due to the relative speeds of the Ethernet network versus the ... olling as a way of network monitoring provides security risks.... Briefly describe how devices transmitted on a network using Token Bus (ignore token management) and discuss the performance token bus as transmission speed increases....
10 Pages (2500 words) Assignment

Transmission Control Protocol and User Datagram Protocol

It offers a limited amount of service when data are exchanged between computers that are in a network and make use of Internet Protocol.... n IP address can be defined as a unique address that is used to identify and locate a device (node) over a network.... Hence, this is the addressing that is used for the exchange of data packets over a network, which also utilizes IP protocol.... he network address is a portion of the Internet Protocol address....
6 Pages (1500 words) Assignment

Applied Data Communications and Networks by Buchanan

This book review "Applied Data Communications and Networks by Buchanan" discusses a computer network that is the connection of a group of computers together with the motive of data and information sharing.... Computer network topology, therefore, is the manner in which individual computers connect.... : Topologies for a five node network In-ring networks, each node is connected to two other nodes and the data circulates in a ring.... It consumes time since information travels around a ring and link failure can cause network failure....
8 Pages (2000 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us