Free Essay

Network

In:

Submitted By tibabu
Words 2723
Pages 11
Preface

A large class of routing protocols for MANETs, namely, reactive protocols, employs some form of caching to reduce the no. of route discoveries .the simplest form of caching is based on associating a timeout with each cache entry.

Such timer based cache scheme can increase the protocol efficiency. However the timeout is not well tuned, a sever performance degradation arises as entries are removed either too early or too late from the cache .

In this paper, we address the problem designing a proactive protocol scheme that does not rely on any timer-based mechanism. This scheme guarantees that valid cached routes are never removed while stale routes are removed aggressively .This proactive caching scheme has been embedded in the Zone Routing Protocol (ZRP) framework.

1: INTRODUCTION

The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time , without using any kind of fixed wired infrastructure. MNET are actually self organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration.

As for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission bandwidth battery power and CPU time and the requirement to cope with the frequent topological changes resulting from the mobility of the nodes. Nodes of a MANET cooperate in the task of routing packets to destination nodes since each node of the network is able to communicate only with those nodes located within its transmission radius R, while the source and destination nodes can be located at a distance much higher than R.

A first attempt to cope with the mobility is to use the specific techniques aimed to tailoring the conventional routing protocols to the mobile environment while preserving their nature. For this reason the protocol designed around such techniques are referred to as table-driven or proactive protocols. To guarantee that routing tables are up to date and reflect the actual network topology, nodes running a protocol continuously exchange route updates and re calculate paths to all possible destinations. The main advantage of the proactive protocols is that a route is immediately available when is needed for data transmissions. However if

The user traffic is not generated, and then resources are wasted due the proactive route update mechanism.

A different approach in the design of the routing protocol is to calculate a path only when it is necessary for data transmission. These types of protocols are called as the reactive protocols or on-demand routing protocols. A reactive protocol is characterized by a path discovery procedure and a maintenance procedure. Path discovery is based on a query –reply cycle that adopts flooding of queries. The destination is eventually reached by the query an at least one reply is generated. Path discovery procedure is called when there is a need for data transmission and the source does not the path to the destination. Discovered paths are maintained by the route maintance procedure until they are no longer in used.

The main advantage of the reactive protocol is that f data traffic is not generated by nodes, and then routing activity is totally absent. The main drawback is the network-wide path discovery required to obtain routing information. Since discovery is based on flooding, such a procedure is very costly. The main strategy to reduce the cost is to defer path discovery as much as possible so that non-optimal but available routes are preferred to the effort of finding the current best path. The natural solution is route caching.

Proactive and reactive approaches are merged in hybrid protocols that aim to combine he advantages of both approaches. The Zone routing protocol (ZRP) is a well example of a hybrid protocol. ZRP is based on the notion of the zone. Each node n is the center of a zone with radius of k hopes, denoted Zk(n).nodes at a distance greater than or equal to k from n belong to Zk(n). A reactive protocol is used by n to reach node outsides its zone .Practically k is set to value much smaller then the network diameter to get a fast convergence of proactive

Component of zone routing protocol. Again caching is useful in ZRP to reduce the path discoveries.

The simplest form of caching is based on timeouts associated with the cach entries. When an entry is cached a timer starts, when the timeout elapses, the entry is removed from the cache. Each time the entry is used, the timer restarts. Therefore the effectiveness of such a scheme depends upon the timeout value associated with a cached route. If the timeout is well tuned the protocol performance is increase; otherwise that will create a problem of removing the cache entry too early or too late from the cache.

So in this seminar report I propose a cache scheme which is based on the notion of a caching-zone whose center is a node called as the cach leader. The leader is responsible for advertising routes, detected during some route discovery, inside its caching zone.

The leader must grantee the correctness of the advertised routes. The leader monitors each advertised route proactively and it sends the control messages inside its caching zone as soon as a route becomes stale. In this report we present an implementation of this ZRP that is ZRP plus a proactive caching scheme and is known as C-ZRP.

2: An overview of the Zone Routing Protocol

ZRP is a hybrid routing protocol which aims to combine the advantages of both the proactive and the reactive approaches. Such a protocol is based on the notion of a routing zone or simply known as a zone. A zone Zk(n)

With radius k is define for each node n as the set of nodes at a distance at most k hopes from n Zk (n) = {i: H (n, i) k from the source node, ZRP invokes the IERP component to calculate an interzone path. An inter path from S to D is formed by a sequence of nodes B0 =S, B1, B2, B3, B4………….Bm, Bm+1 =D, in which node Bi+1is a node within Bi’s routing zone. The path is calculated on demand using a form of selective flooding that exploits the underlying zone structure generated by IARP.

Specifically, flooding is based on sending query packets only to the peripheral nodes (also called border nodes) , using a special kind of multicast transmission dubbed bordercast. When a node receives the query packet for a target node D, it can either reply to the source- if D is a member of its routing zone - or bordercast the query packet to its peripheral nodes. Eventually, the query packet reaches a node having D as a member of its zone so that a reply control packet is generated and send back to the source. A route to D can be accumulated in the query packet during forwarding or - to reduce the query packet length - stored temporarily at nodes and accumulated in the reply control packet during the reply phase.

In ZRP, zones heavily overlap due to the lack of coordination among nodes. As a result, a node can be a member as well as a border node of many zones. Thus, the basic query mechanism can perform even worse than in standard flooding since a node can forward the same query packet many times, while the same zone can be queried more than once.

ZRP provides several solutions to deal with this problem of stopping and controlling redundant query threads, as well as to prevent the sending of redundant queries. Loop back termination (LT) is a mechanism which is able to detect if a query thread returns to a routing zone that it previously queried and to discard the thread accordingly. The Query detection scheme (QD1 and QD2) detect and discard a query thread I it queries a zone already queried by other threads. The QD2 mechanism extends this capability also to nodes that are in the transmission range of the query transmitting node. Early termination extends the capacity t terminate threads also to nodes internal to a zone. Finally selective bordercast prevents thread overlap by using a modified IARP that provides network topology information for an extended zone with a radius of 2k.

A routing pat only contains the border nodes that have to be traversed . Forwarding along border nodes is table driven since the distance between border nodes is k. Route maintenance is responsible for maintaing interzone path.

3: The C-ZRP PRORTOCOL

In this section , we first give an overview of the proactive caching scheme and of the C-ZRP behavior. Then the implementation of the protocol.

1. Overview of the proactive caching scheme The proposed caching scheme is based on the notion of caching zone, cache leader, and active path. The caching zone with radius k* for a cache leader n is defined as the set o0f nodes at a distance at most k* hops from n an active path is created as a result of the discover phase and it is composed of a set of nodes, hereafter referred to as active nodes forming a path from source node S to a destination node D. cache leader nodes are a subset of the active nodes. The key consideration is to avoid the possibility that nodes can cache route information autonomously. Therefore a cache leader n is only the node which is authorized to advertise route information inside its caching zone which is written into caches. On receiving the advertising message, anode proactively maintains a path to n so that it can be used as the next hope node to any of the advertised routes. A cache leader is responsible for the validity of the advertised routes. Thus it monitors such routes and it forces each node in its caching zone to remove a route as soon as it becomes stale. So, the deletion policy is proactive

2. Implementation of the C-ZRP In the following we provide a description of a possible implementation of C-ZRP. For simplicity the implementation assumes the following aspects as on the next page:

A. All active nodes act as cache leader nodes and vice versa. B. Only paths to active nodes are advertised as external routes. C. Caches are managed using explicit injection / deletion message. D. k = k*. When a node S executes a route request for a node D, an interzone path from S to D is identified. A node Bi belonging to an interzone path is an active node for caching scheme (an example of interzone path between S and D formed by nodes b, e, p and t is shown in figure.) Thus, an interzone path is an active path. An interzone path is stored according to a distributed next hop fashion, where next-hop node is an active node. Bi stores Bi +1, as the next hop active node for all the downstream nodes from Bi+2 to Bm+1 and Bi-1 is the next hop active node for all the upstream nodes from B0 to Bi-2. These two active nodes will be referred to as companion nodes (as an example the companion nodes of node B with respect to the interzone path from S to D).

All routing information concerning node belonging to an interzone path is advertised inside the caching zone of each member of the path, which thus acts as cache leader for those information. Such routes are then maintained proactively by the IARP. If a new node joins Bi’s zone it acquires by means of IARP, all previously advertised routing information by Bi. Since a node may belong to more than one overlapping zone, it can acquire more than a single path to the same destination.

When a new node, say Bi+1 leaves Bi’s routing zone, not all the routing information gathered during the route request/reply is lost. Roughly, speaking two active paths from S to Bi-1 and from Bi+1 to D are still up. Hence, all the routing information concerning these sub-paths is still valid. However, nodes B0 … Bi-1 (Bi-1 … Bm+1) notify the nodes inside their own zones using a delete control message that the destination the Bi-1 … Bm+1 (B0 … Bi) are no longer reachable.

We remark that both delete and inject messages can be piggy backed on messages regularly exchanged by the proactive routing protocol. However, the use of explicit messages provides a faster reaction to topological changes.

3: Data structures Each node X uses the following local data structures:

• Internal zone routing Table (IZT). An entry of IZT is a triple (d, n, #h), where d is the destination node, n is the next hop node (located in the X’s transmission range) and #h is the path cost in no. of hops.

• External zone routing table (EZT): A row of EZT is a triple (d, n, #z), where d is the destination node, n is the next hop active node (n belongs to the X’s transmission range) and #z is the path cost from X to d given as the no. of active nodes that have to be traversed. For example, in Fig.1 node b sets node c as next-hop active node for p with cost two (node c and p).

• Interzone path table (IZP): An interzone path corresponds to an entry in X’s IZP table provided that X is an active node and (X(S, D). In this case let the path id be ID and X=Bi. The entry is the triple (ID, Bi-1, Bi+1).

• Reachable nodes (RN) list. This is a sequence of pairs (d, #z), where d is an active node belonging to an interzone path and #z is the cost of the path from X expressed as number of active nodes that must be transversed to reach d. A node X advertises RN to nodes belonging to Zk(X). RN includes the projection of EZT along the first and third components. For example, node b of Fig.1 will include the pairs (p, 2), (t, 3) and (D, 4) in RN.

• Unreachable nodes (UN) set. This set of nodes is used to advertise the destinations that become unreachable.

The following consistency relations are always guaranteed: (d, n, -)( EZT ((n,-,-) (IZT (ID,a,b) (IZP((a,-,-), (b,-,-) (IZT An example of EZT, IZT and IZP data structures is given in Fig.1

4: IERP and inter zone path management: When a node S has a new message m t send to a node D, it first checks if either IZT or EZT have an entry for D. if this is in the case , it invokes the IERP for calculating a new path and a new route discovery triggered as in fig 2. Interzone path creation: A single inter zone path from S to D is created during a route / request cycle by allowing only the destination D to send a single for a given request. The path is tagged with a unique identifier Id, for example, obtained by using increasing sequence numbers generated by the requesting node. When S triggers a new route discovery for a node D, it bordercast a query message to all its border nodes. The message contains the identifier ID and a route accumulation vector AV [0] =S .let M be the number of active nodes (not including S and D.).

1. When a border node X! =D receives a query message, if the message s received for the first time and the redundant query filter rules are satisfied: a: it adds its own identification into the accumulation vector as an Example, if the node X corrospond to node Bj in the interzone path, then AV[j]=X.

b: if D belongs to X's routing zone then the latter unicast the Query message to D. otherwise , it executes a bordercast. 2. When the destination node D receives a query message with an identifier ID for the first time: a: It stores the tupple (AV[i],AV[M],M+1-i),for 0

Similar Documents

Free Essay

Networks

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

Premium Essay

Network Infrastructure

... * How much growth is this network going to have to support? When planning for this, you want to make sure that the company is going to have room to grow, which may vary depending on the company. For example, Target is probably going to be a faster growing network than a local mom/pop shop. * Availability * How long your network is available to users. Basically: is your network and up and running all day, every day? * Network Performance * This includes categories that measure the throughput of data and how efficient your network actually is. (Optimum Utilization) * Security * Security design is one of the most important aspects of a network. Without proper security your network is vulnerable to online cyber attacks that can cripple and steal from your databases. * Manageability * This technical goal is going to vary based on company needs. Some customers are going to have more precise goals. The book talks about a company planning to record the number of bytes sent and received to each router. Other clients may have less specific goals than this, it just tends to vary based on company objectives. * Usability * Close to manageability, but different. Usability refers to people who are accessing and using the network you have setup. Your network needs to be easy to use for them (different from management. Easier To Use =/= Easier To Manage) * Adaptability * Design the network so that in can accept new technologies...

Words: 381 - Pages: 2

Premium Essay

Network Design

...Microsoft account Joseph Jackson  Westwood College Designing a Network Microsoft account Joseph Jackson  Westwood College Designing a Network Determining the networking requirements the designing of a network can be a difficult situation. Whether its data transfer rules that determine the number of channels needed and the priorities to be used. An alternate real issue is the most extreme size of data that can be sent and received leads to the need for segmentation at the sending end and reassembly at the receiving end. Networking design must reflect the objectives, attributes, and approaches of the associations in which they work. A decently planned network can help adjust these targets. At the point when legitimately executed, the network base can improve application accessibility and permit the savvy utilization of existing network assets. The primary step is to comprehend your networking necessities. (Cisco Systems, Inc.) There are two essential objectives when setting up a networking design and having the capacity to execute the design into a live environment. The principal objective is to have application accessibility. The system conveys application information between machines. On the off chance that the applications are not accessible to system clients, the system is not doing its occupying. Which can make trouble managing getting to applications over the system. The second of the essential objectives is the Cost of possession. The Information system (IS) plans...

Words: 874 - Pages: 4

Premium Essay

Network

...Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses. Write a one (1) page paper in which you: 1. Depict a network topology graphical model of the initial environment of 10 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 2. Depict a network topology graphical model of the current 100 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3. Depict a network topology graphical model for future growth to 200 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 4. Create a two-paragraph executive summary. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New...

Words: 378 - Pages: 2

Premium Essay

Network

...IT140-1302A-05: Introduction to Operating Systems and Client/Server Environments Group Assignment Carroll Backus, Sonia Crumbley, Willie Coffie, Jason Duggan, Christopher West 13 May 2013 Instructor: Dr. Betty Tipton Colorado Technical University Table of Contents Technology Analysis and Assessment Plan 3 Technology Analysis and Assessment Improvement Plan 6 Operating System Platform and Cost Containment 6 Architecture Assessment and Governance 9 Enterprise Authentication 11 Directory Services and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250...

Words: 5202 - Pages: 21

Premium Essay

Network

...Networks, Telecommunications, and Wireless Computing | | | Telecommunication systems enable the transmission of data over public or private networks. A network is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. Telecommunication systems and networks are traditionally complicated and historically ineffi cient. However, businesses can benefi t from today’s modern network infrastructures that provide reliable global reach to employees and customers. Businesses around the world are moving to network infrastructure solutions that allow greater choice in how they go to market—solutions with global reach. These alternatives include wireless, voice-over internet protocol (VoIP), and radio-frequency identification (RFID). | | | | | Knowledge Areas | Business Dilemma | | | Business Dilemma Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype...

Words: 2881 - Pages: 12

Premium Essay

Network

...Home » Resources » Networking Tutorials » Network Switching Tutorial Network Switching Tutorial Network Switching Switches can be a valuable asset to networking. Overall, they can increase the capacity and speed of your network. However, switching should not be seen as a cure-all for network issues. Before incorporating network switching, you must first ask yourself two important questions: First, how can you tell if your network will benefit from switching? Second, how do you add switches to your network design to provide the most benefit? This tutorial is written to answer these questions. Along the way, we’ll describe how switches work, and how they can both harm and benefit your networking strategy. We’ll also discuss different network types, so you can profile your network and gauge the potential benefit of network switching for your environment. What is a Switch? Switches occupy the same place in the network as hubs. Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports. Switches map the Ethernet addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass through the switch. When a packet is received by the switch, the switch examines the destination and source hardware addresses and compares them to a table of network segments and addresses. If the segments are the same, the packet is dropped or “filtered”; if the segments are different...

Words: 3115 - Pages: 13

Premium Essay

Networks

...Chapter 1 Analyzing Business Goals and Constraints This chapter serves as an introduction to the rest of the book by describing top-down network design. The first section explains how to use a systematic, top-down process when designing computer networks for your customers. Depending on your job, your customers might consist of other departments within your company, those to whom you are trying to sell products, or clients of your consulting business. After describing the methodology, this chapter focuses on the first step in top-down network design: analyzing your customer’s business goals. Business goals include the capability to run network applications to meet corporate business objectives, and the need to work within business constraints, such as budgets, limited networking personnel, and tight timeframes. This chapter also covers an important business constraint that some people call the eighth layer of the Open System Interconnection (OSI) reference model: workplace politics. To ensure the success of your network design project, you should gain an understanding of any corporate politics and policies at your customer’s site that could affect your project. The chapter concludes with a checklist to help you determine if you have addressed the business issues in a network design project. Using a Top-Down Network Design Methodology According to Albert Einstein: 000200010270745975 “The world we’ve made as a result of the level of thinking we have done...

Words: 8812 - Pages: 36

Premium Essay

Network

...Computer network From Wikipedia, the free encyclopedia "Computer networks" redirects here. For the periodical, see Computer Networks (journal). "Datacom" redirects here. For other uses, see Datacom (disambiguation). Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily Transitivity · Preferential attachment Balance · Network effect · Influence Types of Networks Information · Telecommunication Social · Biological · Neural · Semantic Random · Dependency · Flow Graphs Vertex · Edge · Component Directed · Multigraph · Bipartite Weighted · Hypergraph · Random Cycle · Loop · Path Neighborhood · Clique · Complete · Cut Data structure · Adjacency list & matrix Incidence list & matrix Metrics and Algorithms Centrality · Degree · Betweenness Closeness · PageRank · Motif Clustering · Degree distribution · Assortativity · Distance · Modularity Models Random · Erdős–Rényi Barabási–Albert · Watts–Strogatz ERGM · Epidemic · Hierarchical Browse Topics · Software · Network scientists Graph theory · Network theory v t e A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources...

Words: 7339 - Pages: 30

Premium Essay

Network

...2.1.1 Network History The history of computer networking is complex. It has involved many people from all over the world over the past 35 years. Presented here is a simplified view of how the Internet evolved. The processes of invention and commercialization are far more complicated, but it is helpful to look at the fundamental development. In the 1940s computers were large electromechanical devices that were prone to failure. In 1947 the invention of a semiconductor transistor opened up many possibilities for making smaller, more reliable computers. In the 1950s mainframe computers, which were run by punched card programs, began to be used by large institutions. In the late 1950s the integrated circuit that combined several, then many, and now millions, of transistors on one small piece of semiconductor was invented. Through the 1960s mainframes with terminals were commonplace, and integrated circuits were widely used. In the late 1960s and 1970s, smaller computers, called minicomputers came into existence. However, these minicomputers were still very large by modern standards. In 1977 the Apple Computer Company introduced the microcomputer, also known as the personal computer. In 1981 IBM introduced its first personal computer. The user-friendly Mac, the open-architecture IBM PC, and the further micro-miniaturization of integrated circuits led to widespread use of personal computers in homes and businesses. In the mid-1980s users with stand-alone computers...

Words: 2656 - Pages: 11

Premium Essay

Network

...Network Design Following the acquisition of new premises comprising a two-story office in Adeplhi, Maryland this provides UMUC with the ability to revise and improve their network topology accordingly and ensure that not only is connectivity provided in a consistent fashion but also to provide the required security for information accordingly. One of the fundamental requirements is to ensure that data is segregated in terms of staff and students so this will require the creation of dedicated subnets accordingly to follow through and implement the solution, while there is also a requirement to provide wireless connectivity for students in the lobby area. Given that there is a specific opportunity to develop a comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected utilization...

Words: 1451 - Pages: 6

Premium Essay

Network+

...XelPharm owns a large distribution warehouse approximately four miles away from the headquarters. Until now, its networks have relied entirely on wired connections. The company’s CIO (chief information officer) decided long ago that he would wait until wireless technology “settled down” before investing in it. 1. What can you tell him about the wireless standards that might convince him that now is the time to adopt wireless technology? Ans: Since 1997 after IEEE released its first wireless network standard, wireless network has evolved into several distinct standards. Most attracting thing about Wireless connection is the absence of wire. Addition to that, the newer technology of wireless network can provide maximum downlink throughput to120 Mbps and maximum uplink throughput to 60 Mbps (WiMax 2). This technology is being considered to be an alternative to DSL and T-carrier services for homes and businesses. It achieves much faster throughput than T-carriers at a lower cost for end users. This type of technology can transmit and receive signals up to 50 km, or approximately 30 miles, when antennas are fixed or up to 15 km, or approximately 10 miles, when they are mobile with QoS (quality of service) provisions. 2. Also, what can you tell him to convince him that wireless networking could improve the company’s productivity? Ans: Wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With...

Words: 747 - Pages: 3

Premium Essay

Networks

...would be sharing only data files and accessing servers on the network. It is more flexible and less expensive if they use wireless a network than a wire network. However, for building number 3, I would recommend to use bound transmission media because people on this building would be sharing files that contain videos. As we know sharing videos require a lot of data bandwidth; therefore, bounded transmission media is the best transmission media that we can use for the network on this building. For building number 4, I would recommend wire transmission media too. As they mention on the book, in building four, 50 shipping and packing will be riding up and down every day. This building needs a lot of bandwidth because it will be transmitting a lot of data. What type of media would you recommend using to connect the buildings and why? I would recommend using a bounded connection to connect these buildings. Even though two of these building would be using wireless networks, some of the data that will be shared by these building require a lot of bandwidth. It’s better if we use a wire network to connect these buildings. Also, the distance between building four and the other buildings might cause problems if we used a wireless network. What kind of media should the company request from its ISP for connecting the corporate WAN to the Internet? Public IP Block, this block could be in the form of /29, /28, or /27 network; depending on which plan or subnet you choose to have. Moreover...

Words: 685 - Pages: 3

Free Essay

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Free Essay

Network

...Analysis and Review Questions 1. Compare the currents obtained from calculation and simulation. Comment on the findings of the values. | Calculation | Simulation using Multisim | Simulation using Pspice | Current when RL = 50 ohms | 2.994 < 69.91 A | 2.994 A | 4.273 A | Current when RL = 200 ohms | 2.306 < 47.92 A | 2.306 A | 3.277 A | Table above show the results of current obtained from the experiment and simulation. There is a different result between simulation using pspice and simulation using multisim and calculation.From calculation, the value of current used in the calculation and multisim is rms current while value of current used in pspice simulation is peak current.The value of rms current if converted to peak current have to multiply by 2 . Current when RL = 50Ω from calculation if multiply by 2 will get 4.234 A which is almost the same with Pspice simulation. Same goes when RL = 200, from calculation 2.306 x 2 = 3.261 A, which give the value almost the same with current from Pspice simulation. In calculation method, the value of current through RL is obtained using the Norton’s theorem. Each RL is calculated using the equivalent Norton’s circuit. Norton theorem is used to simplify the circuit to make the calculation easier. Below show the equivalent circuit using Norton theorem to obtain the current through RL. Norton equivalent circuit Based on the table above, the results through simulation and calculation are similar which proves...

Words: 927 - Pages: 4