Mba 111-1
Mba 111-1
BUS Topology
Bus topology is a network type in which every computer and network
device is connected to single cable. When it has exactly two
endpoints, then it is called Linear Bus topology .
Figure of bus topology
RING Topology
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring
Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act
as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data
transmitted, has to pass through each node of the network, till the
destination node.
STAR Topology
In this type of topology all the computers are connected to a single hub through
a cable. This hub is the central node and all others nodes are connected to the
central node.
MESH Topology
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest
distance. Or, routing logic which has information about the broken links, and it
avoids those node etc. We can even have routing logic, to re-configure the
failed nodes.
In flooding, the same data is transmitted to all the network nodes, hence no
routing logic is required. The network is robust, and the its very unlikely to lose
the data. But it leads to unwanted load over the network.
Types of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
It has a root node and all other nodes are connected to it forming a hierarchy. It
is also called hierarchical topology. It should at least have three levels to the
hierarchy.
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
HYBRID Topology
1. Complex in design.
2. Costly.
What is the use of encryption? discuss public and private key encryption
methods.
symmetric and
asymmetric
Asymmetric Encryption uses two distinct, yet related keys. One key, the
Public Key, is used for encryption and the other, the Private Key, is for
decryption. As implied in the name, the Private Key is intended to be private so
that only the authenticated recipient can decrypt the message.
Private key encryption is the form of encryption where only a single private
key can encrypt and decrypt information. It is a fast process since it uses a
single key. However, protecting one key creates a key management issue
when everyone is using private keys. The private key may be stolen or leaked.
Key management requires prevention of these risks and necessitates changing
the encryption key often, and appropriately distributing the key.
Many private key encryption methods use public key encryption to transmit
the private key for each data transfer session.
If Bob and Alice want to use private key encryption to share a secret message,
they would each use a copy of the same key. Bob writes his message to Alice
and uses their shared private key to encrypt the message. The message is then
sent to Alice. Alice uses her copy of the private key to decrypt the message.
Private key encryption is like making copies of a key. Anyone with a copy can
open the lock. In the case of Bob and Alice, their keys would be guarded closely
because they can both encrypt and decrypt messages.
Public key encryption uses two keys - one to encrypt, and one to decrypt. The
sender asks the receiver for the encryption key, encrypts the message, and
sends the encrypted message to the receiver. Only the receiver can then
decrypt the message - even the sender cannot read the encrypted message.
When Bob wants to share a secret with Alice using public key encryption, he
first asks Alice for her public key. Next, Bob uses Alice's public key to encrypt
the message. In public key encryption, only Alice's private key can unlock the
message encrypted with her public key. Bob sends his message to Alice. Alice
uses her private key to decrypt Bob's message.
The things that make public key encryption work is that Alice very closely
guards her private key and freely distributes her public key. She knows that it
will unlock any message encrypted with her public key.
The global nature of the web makes the world a lot smaller, making it more
efficient for companies to do business on the international realm. Through the
Internet, companies can stay in touch with their partners, investors, clients, and
customers, regardless of their locations. Email, web conferences, and VoIP
make the transmission of important data more seamless. For instance,
companies can quickly communicate with suppliers via chat or email to make
sure deliveries and payments are covered. The Internet can save the company a
lot of time and money as it reduces the need for additional paperwork.
Customer Contact
Access to Data
The Internet is very rich in information. Anything you need, you can find on the
web. For companies doing research in products, markets, industries, new ideas,
and other topics, the Internet is an effective tool to use. Individuals can even
join forums where they can interact with people from the same industry and
exchange ideas.
Businesses can conduct market research through the Internet. They can use
online surveys to study their market. They can directly ask consumers what they
think about a particular product or service. It is a very cheap and effective way
of doing market research.
The Internet offers a new medium for advertising. Mailings, newspapers ads,
and fliers are slowly becoming obsolete as the Internet has become a more cost-
effective way to reach consumers. E-newsletters can now be sent directly to the
in-boxes of customers with just a few clicks of a mouse button.
Since the Internet spans the entire globe, a business’ market increases as anyone
from anywhere in the world becomes a potential customer. This increases
market reach, thereby boosting product recognition.
As you can see, the benefits of internet in business are many… so it is time to
get your business online today.