It is desired to connect five computers that are joined at a single point called central node. i) Draw the setup. ii) Name the topology. iii) State two advantages and disadvantages of this topology.

1 Answer

Answer :

i. Setup: 

image

ii. Name of topology: Star topology

iii. Advantages of Star Topology

1) As compared to Bus topology it gives far much better performance, signals don’t necessarily get transmitted to all the workstations. A sent signal reaches the intended destination after passing through no more than 3-4 devices and 2-3 links. Performance of the network is dependent on the capacity of central hub.

2) Easy to connect new nodes or devices. In star topology new nodes can be added easily without affecting rest of the network. Similarly components can also be removed easily.

3) Centralized management. It helps in monitoring the network.

4) Failure of one node or link doesn’t affect the rest of network. At the same time, it is easy to detect the failure and troubleshoot it.

Disadvantages of Star Topology

1) Too much dependency on central device has its own drawbacks. If it fails whole network goes down.

2) The use of hub, a router or a switch as central device increases the overall cost of the network.

3) Performance and as well number of nodes which can be added in such topology is depended on capacity of central device.

Related questions

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : List any two disadvantages of bus topology. 

Last Answer : Disadvantages of bus topology. 1. Heavy network traffic slows down the bus speed .In bus topology only one computer can transmit & other have to wait till their turn comes & there ... connectors will cause reflections & bring down the whole network causing all network activity to stop.

Description : State two advantages of Mesh topology.

Last Answer : Network Topology refers to layout of a network. Network topology specifically refers to the physical layout of the network especially the locations of the computers & how the cable is run ... to Point Connection: Point-to-point links make fault identification and fault isolation easy.

Description : If all devices are connected to a central hub, then topology is called

Last Answer : C) Star Topology

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch

Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch. 

Description : Two unpedauces given by Z1 = 10 + j5 and Z2 = 8 + j9 are joined in parallel and connected across a voltage of V = 200 + j0. Calculate the circuit current and branch currents. Draw the vector diagram.

Last Answer : Solution: Given, Z1=10+j5, Z2=8+j9, V=200+j0

Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B

Last Answer : C) Star

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : In star topology which device is preferable as a star device between switch and hub? Justify. 

Last Answer : Switch in star Topology: Switch is used as a central device to connect different nodes in star topology. Switch is an intelligent device. When switch receives a data packet it reads destination ... whose destination address matches with the address contained in the data packet. Diagram:

Description : Discuss hybrid topology with suitable diagram. 

Last Answer : Discuss hybrid topology with suitable dig. Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In this case, the bus, star & ring topologies are used to ... many networks are quite complex but they can be reduced to some form of hybrid topology.

Description : Give any four selection criteria for selecting network topology.

Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration. 

Description : For R-C series circuit draw (i) Circuit diagram (ii) Vector diagram (iii) Waveform of voltage and current

Last Answer : i) Circuit diagram ii)Vector diagram iii)Waveform of voltage and current

Description : State the functions of i. Repeater ii. Switch iii. Gateway iv. Bridges

Last Answer : i) Repeater: Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this signal at its output. It ensures that the signals are not distorted or weak before it ... and decides whether to forward or discard it. It sends packets between two networks of same type.

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : Give any two disadvantages of unshielded twisted pair cable.

Last Answer : Disadvantages of unshielded twisted pair cable. 1. Highly prone to crosstalk. 2. Unable to provide secured transmission of data.

Description : Define LAN. Write any two disadvantages of LAN.

Last Answer : Definition of LAN: LAN is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings. Disadvantages: 1. Power - a good LAN is required ... - if all computers running at once, can reduce speed for each. 6. Area covered is limited.

Description : Draw and explain fiber optic cable.

Last Answer : As shown in the figure, at the center is the glass core through which the light propagates. In multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core is ... be fused to form a solid connection. A fusion splice is almost as good as a single drawn fiber.

Description : Draw and explain Co-axial cable.

Last Answer : Coaxial cable (also called as coax) has an inner central copper conductor surrounded by an insulating sheath, which in turn is enclosed in the metal mesh. This outer conductor (shield) acts not ... building where a number of twists and turns are required.  4. limited to size of network.

Description : Draw – (i) Practical voltage source (ii) Ideal current source

Last Answer : i) Practical voltage source  ii) Ideal current source Where, Is = Current Source Rs = internal resistance of source

Description : Which of the following is correct about Star Topology: a) Data on a star network passes through the hub, swithc or concentrator before continuing to its destination. b) The hub, switch or concentrator manages and ... connecting all of the systems to a central node. d) All of Above e) None of These

Last Answer : d) All of Above

Description : An a.c series circuit has resistance of 10ohm, inductance of 0.1H and capacitance of 10µf, voltage applied to circuit is 200V. find (i) Resonant frequency (ii) Current at resonance (iii) Power at resonance 

Last Answer : Solution: For RLC series circuit

Description : A series combination of resistance 100 ohm and capacitance 50µf is connected in series to a 230 V, 50HZ supply. Calculate (i) Capacitive reactance (ii) Current (iii) Power factor (iv) Power consumed 

Last Answer : For RC series circuit

Description : Compare series and parallel resonance on the basis of (i) Resonating frequency (ii) Impedance (iii) Current (iv) Magnification

Last Answer : S. No . Parameter Series Circuit Parallel Circuit 1 Resonating frequency 2 Impedance Minimum, Z = R Maximum, Z = L/CR 3 Current Maximum, I ... , I = V/(L/CR)  4 Magnification Voltage magnification takes place Current magnification takes place

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The any cast service is included in IPV6. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Explain following protocols: I. PPP II. SLIP

Last Answer : (i)PPP:-PPP means point to point protocol. It is a much more developed protocol than SLIP(which is why it is replacing it).It transfers additional data, better suited to data transmission over the ... character(the END character, the ASCII code of which is 192).A SLIP frame looks like:

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : State four features of Wi-Fi.

Last Answer : Wi-Fi 1. Wi-Fi stands for wireless fidelity. 2. Wi-Fi typically provides local network access for around a few hundred feet with speeds of up to 54 Mbps. 3. Wi-Fi based on IEEE 802.11 standards. 4. High Capacity Load Balancing 5. Scalability 6. Network Management System

Description : State the need for computer networks. 

Last Answer : Need for computer network: File/Folder Sharing Hardware Sharing (Resource sharing) Application sharing User Communication (Email, Remote Access)

Description : State the reason for keeping uplink and downlink frequency different in satellite communication.

Last Answer : Uplink frequency is used for transmission of signals from earth station transmitter to satellite. Downlink frequency is used for transmission of signals from satellite to earth station receiver. ... the same antenna to be used for both receiving and transmitting simplifying satellite hardware.

Description : State features of any one network control devices. 

Last Answer : A hardware device that are used to connect computers, printers, fax machine and other electronic devices to a network are called network devices. These devices transfer data in a fast, ... transforms incoming analog signals into their digital equivalents. A two way communication is established.

Description : State the situations under which gateways are necessary in the network.

Last Answer : Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have same function of communication. Situation where gateways are necessary ... case of different frame sizes, data rates, format, acknowledgement schemes, and priority schemes tec.

Description : State the factors to be considered for selecting transmission media.

Last Answer : Eight factors to be considered:  1. Type of medium.  2. No of conductors/connectors.  3. Flexibility.  4. Durability.  5. Bandwidth.  6. Reliability of connection  7. Required ... parallel wires  12. Resistance to external EMI outside the cable.  13. Attenuation characteristics  14. Cost

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame