Академический Документы
Профессиональный Документы
Культура Документы
When Station B sends a packet to another station on the LAN, it passes by all of the stations connected to
that LAN. The electrical signal representing the packet travels away from the sending station in both the
directions on the shared cable. All stations will see the packet, but only the station it is addressed to will
pay attention to it. In a shared media network, when one station wishes to send a message to another
station, it uses the software in the station to put the message in an envelope. This envelope, called a
packet, consists of the message data surrounded by a header and trailer that carry special information used
by the network software to identify the destination station. One piece of information placed in the packet
header is the address of the destination station.
A bus topology has the following advantage:
Cabling costs are minimized because of the common trunk.
Disadvantages of bus topology are as follows:
It is difficult to troubleshoot because no central distribution points exist.
If the cable breaks, it can disable the entire segment of the network because they remove the required
termination from each of the two cable fragments.
2 Explain how the time slots are allotted in time division multiplexing.
Answer:
For digital sources, two alternative technologies have evolved for multiplexing. These are Time Division
Multiplexing (TDM) and Code Division Multiplexing (CDM). TDM offers a way to merge data from
multiple sources into a single channel for communication over telephone lines, satellite system or a
microwave system. TDM can be implemented in two ways. These are synchronous TDM and
asynchronous TDM. Asynchronous TDM is popularly known as Statistical
TDM (STDM). In synchronous TDM, a single channel is broken into time slots and each transmitting
device is given or alotted at least one of the time slots for its transmission.
Time slots are assigned in such a way that each transmitting device gets its required share of the available
bandwidth. TDMs are not sensitive to protocol and have the capability to combine various protocols onto
a single high-speed transmission link. Because of this, time-bandwidth multiplexing technique,
irrespective of whether the device is active or idle, the multiplexer allocates similar time slots to each
device at all times. Voice and video systems as well as other similar devices may need more slots to
ensure that when the data arrives at the distant link-end, it is not distorted from slower data rates. In case
of TDM, time slots are allocated to channels, even if they have no information to transmit. This is just
wastage of the bandwidth and to overcome this inefficiency of standard TDM, a technique known as
STDM has been developed where time is allocated to lines only when it is required. This is achieved with
the use of intelligent devices that are capable of identifying when a terminal is idle. The intelligent device
statistically compensates for normal idle time and hence more lines can be connected to a transmission
medium.
During the peak traffic period, a buffer memory temporarily stores the data; so high-speed line time can
be effectively utilized with active channels. It adopts a methodology where each transmission has an
identification information
(a channel identifier). This increases the overheads, which are handled by grouping a number of
characters for each channel together for transmission. It is also referred as Intelligent TDM. In this case,
data rate capacity is a lot lower than the sum of connected capacity of each channel because it utilizes the
idle time very effectively. Since it is digital, more complicated framing of data is required.
It is commonly used for remote communications with multiple terminals.
The additional services such as data compression, line priority, mixed speed lines, host ports sharing,
network port control, automatic speed detection, etc., are available with STDM techniques.
Many a times extra wires are needed to control the flow of data across the interface. The other issue is
with the nature of the bits or voltages itself. When there is change in the state of the bit/voltage from a one
to zero or vice versa, it happens at the rate of nanoseconds (one billionth of a second). A crucial part of
the data transfer is the abruptness. The changes that occur slowly, i.e., between zero and one are not
accepted as data.
Serial Transmission
Data is sent over a single wire as shown in Figure 10.10. Therefore, sending one byte does not require 8
wires. These are sent one after the other. In this transmission, it is necessary to detect where each bit is
separated from the next and also where each block is separated from the next. Serial transmission is
suitable for long distance data transmission because it is less costly and more resistant to noise. Therefore,
almost all transmission lines for data communication systems are serial transmission lines.
Transmitting eight individual bits one after the other involves eight times more than the time required for
transmitting them all at the same time parallely.
This speed limit does not prove to be significant for several applications. Compared to the internal speed
of the microprocessors, serial peripheral mechanisms are slower. They involve long, mechanical
processes which restrict their speed: the speeds of their print-heads often limit the printers; the frequency
limitations of the telephone lines affect the modems and time-consuming rotational speed limits the disk
drives. The speed that is built within the process of parallel data transfer is a waste on such peripheral
mechanisms. The serial method thus, sacrifices a part of the speed while sufficiently servicing the
peripheral devices. In such situations, the sacrifice in speed is unimportant compared to the added
transmission range and reliability.
are instantly delivered. With the improvement of network technologies and increase in broadband, not
only can you use text messages but also graphics, audio and video for communication with other people.
Facilitating online shopping: Logically, the Internet has removed all barriers of distance and
nationality. You can shop for products and services across the world by logging on to a Web portal. You
can also pay your bills online using credit and debit cards. You can also transfer money between different
accounts with the click of a mouse.
Facilitating distance education: The Internet provides a perfect medium for knowledge sharing and
information dissemination. Courses are available on the Internet. You can register and pay online and
complete a course on different interest areas. You can also pursue specialized higher studies now in the
comfort of your own office or home.
Increasing knowledge base: The Internet provides a rich information base that people from across the
globe can access. In fact, it is one of the richest information bases that can be accessed at the click of a
mouse.
Using search engines, you can search for detailed information on any topic of your interest.
Smoothening banking services: Banks are using information technology to provide online banking
facilities to their customers. Using the Internet, you can now view your account details, get drafts made,
request for cheque books and transfer money from one account to another. The use of ATMs has shifted
the mundane back-office work to the customer himself.
Instead of hiring an army of bank clerks, banks can now uses ATMs to considerably reduce time and
operational costs.
Helping travel sector: Using the Internet, travel agencies can publish their services on the Web along
with the latest discounts, packages and availability details, so that customers can compare rates, make
online bookings and avail discounts without having to run around multiple offices.
Easing bill payments: The government sector has also realized the benefits of IT. Now you can make
online payments for public utilities such as water, electricity and phones, using credit cards as the
payment medium.
the introduction of the ATMs, customer interaction with the bank staff was drastically reduced and
customers had the privilege of 247 banking.
Application in Telecommunication
Use of computer network has made voice communication very easy and at affordable cost. Revolution has
come in conventional telephone industries as well as in mobile telephony.
Telephone Exchanges: The conventional telephones had to be directly connected by telephone wire in
order to make a call. This system was adequate when the number of phone users was very few and the
scale of the telephone network was very small but the consequences of implementing this system on a
larger scale became apparent very quickly.
Now telephone exchanges are automated and computerized not only for switching calls but also for
passing information to a user regarding the status of their call. They can switch and connect numerous
calls at a time with no delays or mistakes. These systems removed the need for human operators to
connect calls or perform other related services. In fact modern telephone networks would cease to
function if they relied on a human component for switching or connection. Computerization and
digitization of telephone exchanges have allowed the integration of other systems into the telephone
network making a variety of services and functionality available to users.
Mobile Phones: The perfect solution for providing connectivity is a mobile phone.
It works on the fundamental concept of a radio. Increased coverage can be provided while keeping cost
and power expenditure at a minimum by dividing coverage area into cells. Each cell contains a base
station within its area of coverage. The base station hosts an antenna and other radio equipment which
wirelessly connects with the mobile phones located in its proximity. Mobility beyond the coverage of a
cell is achieved by allowing inter-cell communication and transfer of connection from one cell to another.
____
Hash Address 2260
In this technique, there are chances that the records with different key values may Hash to the same
address, for example, with folding technique the keys
891473995 and 473995891 will generate the same address, i.e., 2260.
Such mapping of keys to the same address is known as a collision and the keys are called as synonyms.
A separate overflow area is reserved in the disk for record storage when a collision occurs. When a record
is to be stored, the Hashing function is applied on the key of the record and an address is generated.
The program accesses that storage area, and, if it is used, the record is stored there. If there is already a
record stored, the new record is written in the overflow area. When the record is to be retrieved, the same
process is repeated. The record is checked at the address generated. If it is not the desired one, the system
looks for the record in the overflow area and retrieves the record from there.
Access Mode
Direct access by the way of establishing a relationship between the desired record key field and the
corresponding address of the record, i.e., find the address and access directly from the location.