Computer Science and Technology

In: Computers and Technology

Submitted By aisyah1234
Words 1432
Pages 6
TMC1254 Communication and Computer Network Semester 2 2013/2014

Switching

1

Learning Unit Objectives
• Understand the concept of switching. • Understand and able to differentiate between different types of switching.

2

• How many connection per device?

3

Introduction
• A network is a set of connected devices • How to connect them for communication?
– Using mesh topology but wasteful – Used switching

• Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices)

4

Switched network

3

Simple Switching Network

6

Taxonomy of switched networks

7

Circuit Switched Networks
Three Phases Efficiency Delay

8

9

CIRCUIT-SWITCHED NETWORKS
• consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM.

10

How circuit-switched network works?
• Consist of three phases: 1. Setup phase:
– When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed

2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down.
– Circuit is terminated, de-allocation of resources
11

Several points need to be emphasized
• Circuit switching takes place at physical layer • Before starting communication, the stations must make a reservation for the resources to be used during the communication • Data transferred btw the two stations are not packetized • There is no addressing involved during data transfer. The switches route the data based on their…...

Similar Documents

Computer Science

...1112-90912 -V1 Level L Computer Science AMS Sample Questions Exam Page 1 of 3 1. What is a file? 2. What is a record? 3. What is a field? 4. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 How many records are shown? 5. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 How many fields are shown? 6. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 What field is the best to use as a key field? 1112-90912 -V1 Level L Computer Science AMS...

Words: 590 - Pages: 3

Computer Science

... Alice's PIN? Question 3 A bank wants to store the account number of its customers (an 8-digit number) in encrypted form on magnetic stripe ATM cards. Discuss the security of the following methods for storing the account number against an attacker who can read the magnetic stripe: (1) store a cryptographic hash of the account number; (2) store the ciphertext of the account number encrypted with the bank's public key using a public-key cryptosystem; (3) store the ciphertext of the account number encrypted with the bank's secret key using a symmetric cryptosystem. Question 4 As soon as Barack took office, he decided to embrace modern technology by communicating with cabinet members over the Internet using a device that supports cryptographic protocols. In a first attempt, Barack exchanges with Tim brief text messages, encrypted with public-key cryptography, to decide the exact amounts of bailout money to give to the largest 10 banks in the country. Let pB and pT be the public keys of Barack and Tim, respectively. A message m sent by Barack to Tim is transmitted as EpT (m) and the reply r from Tim to Barack is transmitted as EpB(r). The attacker can eavesdrop the communication and knows the following information: _ Public keys pB and pT and the encryption algorithm, such that there is exactly one ciphertext for each plaintext. _ The total amount of bailout money authorized by congress is $900B _ The names of the largest 10 banks _ The amount each bank will get is...

Words: 937 - Pages: 4

National Conference on Research Trends in Computer Science and Technology

...International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) Email: ecemurthy@gmail.com MR. M. MADDHUSUDHAN REDDDY M.TECH Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is...

Words: 2126 - Pages: 9

Computer Science

... Standardization (ISO) | Correct Answer: |    International Organization for Standardization (ISO) | | | | |  Question 15 0.5 out of 0.5 points | | | For those in information technology, perhaps the best-known ISO standard is the ________________________________. This internationally accepted framework of standards governs how separate computer systems communicate using networks.Answer | | | | | Selected Answer: |    Open Systems Interconnection (OSI) reference model | Correct Answer: |    Open Systems Interconnection (OSI) reference model | | | | |  Question 16 0.5 out of 0.5 points | | | What is the World Wide Web Consortium (W3C)?Answer | | | | | Selected Answer: |    An organization formed in 1994 to develop and publish standards for the World Wide Web. | Correct Answer: |    An organization formed in 1994 to develop and publish standards for the World Wide Web. | | | | |  Question 17 0.5 out of 0.5 points | | | Which phrase best describes the Technology Innovation Program?Answer | | | | | Selected Answer: |    Another national program that offers awards to organizations and universities to support potentially revolutionary technologies that apply to critical needs of national interest. | Correct Answer: |    Another national program that offers awards to organizations and universities to support potentially revolutionary technologies that apply to critical needs of national interest...

Words: 12833 - Pages: 52

Computer Science

...Von Neumann was a founding figure in computer science.[49] Von Neumann's hydrogen bomb work was played out in the realm of computing, where he and Stanislaw Ulam developed simulations on von Neumann's digital computers for the hydrodynamic computations. During this time he contributed to the development of the Monte Carlo method, which allowed solutions to complicated problems to be approximated using random numbers. He was also involved in the design of the later IAS machine. Because using lists of "truly" random numbers was extremely slow, von Neumann developed a form of making pseudorandom numbers, using the middle-square method. Though this method has been criticized as crude, von Neumann was aware of this: he justified it as being faster than any other method at his disposal, and also noted that when it went awry it did so obviously, unlike methods which could be subtly incorrect. While consulting for the Moore School of Electrical Engineering at the University of Pennsylvania on the EDVAC project, von Neumann wrote an incomplete First Draft of a Report on the EDVAC. The paper, whose public distribution nullified the patent claims of EDVAC designers J. Presper Eckert and John William Mauchly, described a computer architecture in which the data and the program are both stored in the computer's memory in the same address space.[50] John von Neumann also consulted for the ENIAC project, when ENIAC was being modified to contain a stored program. Since the modified ENIAC...

Words: 625 - Pages: 3

Computer Science

... baseline will be kept under good maintenance and updated after major software upgrades and operating system updates. Server Certificates Managing the server’s certificates is a delicate but necessary matter, if done thoroughly he server will be more secure. All certificate date ranges will be kept in check to make sure that they are valid, we will also ensure that certificates are used for the right purposes. Service Packs Microsoft is as active at fixing its vulnerabilities as the users themselves are. So an active method of keeping our system safe is by keeping an eye of for hot fixes, patches and services packs that are sent from Microsoft to further fine tune the windows server. References https://www.ontariomd.ca/portal/server.pt/gateway/PTARGS_0_3897_0_0_18/Server_Hardening_Checklist.pdf http://www.sans.org/reading-room/whitepapers/win2k/windows-2000-vulnerabilities-fixes-185 http://www.sans.org/reading-room/whitepapers/win2k/securing-windows-2000-server-189 VALLEY VIEW UNIVERSITY FACULTY OF SCIENCE DEPARTMENT OF INFORMATION TECHNOLOGY AND DEPARTMENT OF COMPUTER SCIENCE INFT 452 / COSC 325: COMPUTER SECURITY / ENTERPRISE INFORMATION SECURITY ASSIGNMENT III STUDENT NAME: DESMOND PAA-OBENG JOHNSON JOELON ERIC STUDENT ID: 211IT02007335 211IT02007305 LECTURER: MR. EBENEZER LARYEA SUBMISSION DATE: 17TH APRIL 2014...

Words: 2126 - Pages: 9

Computer Science

... and other documents that were gleaned from the federal court cases. This was an attempt to monitor the NEDA’s efforts procurement of components that could or may be needed for creation of a nuclear weapon program. Once the stuxnet had penetrated into the system, it had the ability to destroy or degrade the software on which it was operating. The worm covertly tries to identify and exploit some or all of the equipment’s that controls a nation’s critical infrastructure. According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society. According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by Siemens and used in many automated systems like chemical plants, nuclear power plants, refineries and many others. If the computer that has been infected by the virus did not have a PLC software then the software did not have any effect. However if the target software was available, it would...

Words: 1594 - Pages: 7

Computer Science

... are combined in one instruction, then six of the steps that fetch instructions are eliminated and the computer spends less time processing that operation. Computers that combine several instructions into a single operation are called complex instruction set computers. However, most programs do not often use complex instructions, but have mostly simple instructions. When these simple instructions are run on CISC architectures they slow down processing because each instruction—whether simple or complex—takes longer to decode in a CISC design. An alternative strategy is to return to designs that use only simple, single-operation instruction sets and make the most frequently used operations faster in order to increase overall performance. Computers that follow this design are called reduced instruction set computers. RISC designs are especially fast at the numerical computations required in science, graphics, and engineering applications. DISC designs are commonly used for nonnumeric computations because they provide special instruction sets for handling character data, such as text in a word processing program. Specialized CISC architectures, called digital signal processors, exist to accelerate processing of digitized audio and video signals. The CPU of a computer is connected to memory and to the outside world by means of either an open or a closed architecture. An open architecture can be expanded after the system has been......

Words: 752 - Pages: 4

Computer Science and Technology

...TMC1254 Communication and Computer Network Semester 2 2013/2014 Switching 1 Learning Unit Objectives • Understand the concept of switching. • Understand and able to differentiate between different types of switching. 2 • How many connection per device? 3 Introduction • A network is a set of connected devices • How to connect them for communication? – Using mesh topology but wasteful – Used switching • Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices) 4 Switched network 3 Simple Switching Network 6 Taxonomy of switched networks 7 Circuit Switched Networks Three Phases Efficiency Delay 8 9 CIRCUIT-SWITCHED NETWORKS • consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM. 10 How circuit-switched network works? • Consist of three phases: 1. Setup phase: – When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed 2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down. – Circuit is terminated, de...

Words: 1432 - Pages: 6

Database Revision Questions for Computer Science and Technology

... independence, DOL, OML, SOL, VOL, query language, host language, data sublanguage, database utility, catalog, client/server architecture. 2.2. Discuss the main categories of data models. 2.3. What is the difference between a database schema and a database state? 2.4. Describe the three-schema architecture. Why do we need mappings between? Schema levels? How do different schema definition languages support this architecture? 2.5. What is the difference between logical data independence and physical data independence? 2.6. What is the difference between procedural and nonprocedural DMLs? 2.7. Discuss the different types of user-friendly interfaces and the types of users who typically use each. 2.8. With what other computer system software does a DBMS interact? 2.9. What is the difference between the two-tier and three-tier client/server architectures? 2.10. Discuss some types of database utilities and tools and their functions. Exercises 2.11. Think of different users for the database of Figure 1.2. What types of applications? Would each user need? To which user category would each belong, and what type Of interface would each need? 2.12. Choose a database application with which you are familiar. Design a schema and Show a sample database for that application, using the notation of Figures 2.1 and 1.2. What types of additional information and constraints would you like to represent In the schema? Think of several users for your database, and design a view for Each. Chapter 3...

Words: 803 - Pages: 4

Computer Science

...................................................................................................................................... 22 Preface and Introduction Purpose This document will focus on the network design of CCTV video surveillance systems, specifically by highlighting the key considerations and recommended network design of a CCTV video surveillance system. This information is intended for system integrators and network solution providers. Approach In this paper, we will first describe a typical customer scenario for an IP-based video surveillance system in an airport facility. We will complete a network design for this hypothetical system, and use this case study to illustrate the key network considerations and design concepts involved in creating this network. Additional Notes • An IP video surveillance system includes several components, including cameras, encoders/decoders, data storage, video management software, and network equipment. This document focuses on the network itself, so component descriptions, video or storage product selection, storage design, video management software planning, video related technology, etc. are beyond the scope of this document. • • The reader should possess a basic understanding of networking basics, e.g. Ethernet, LAN, switching and routing technology, etc. The specific case study in this document is fictional; however, it does include many requirements and details inspired by actual customers. Design practices......

Words: 1499 - Pages: 6

Computer Science

... you to enter data and instructions into a computer or mobile device. 2. Which of the following is not an example of an output device? SCANNER 3. MEMORY consists of electronic components that store instructions waiting to be executed and the data needed by those instructions. 4. A MEMORY CARD is removable flash memory, usually no bigger than 1.5 inches in heights or width, that you insert in and remove from a slot in a computer, mobile device, or card reader/writer. 5. A computer that delivers requested webpages to your computer or mobile device is a WEB SERVER. 6. APPLICATION software consists of program designed to make users more productive and/ or assist them with personal tasks. 7. WI-FI uses cellular network to enable high speed Internet connections to devices with built in compatible technology, such as smart phones. 8. A WIKI is a collaborative website that allows users to create, add to, modify, or delete the content via their browser. Matching Laptop – thin, lightweight mobile computer with a screen in its lid and a keyboard in its base. Server – computer that is dedicated to providing one or more services to other computers or devices on a network. Picture Message – a photo or other image, sometimes along with sound and text, sent to or from a smartphone or mobile device. Convergence – term that describes the trend of computers and devices with technologies that overlap. Touchpad – small, flat, rectangular...

Words: 808 - Pages: 4

Computer Science

...Homework #1 for CSC 100 Name: ____________________________________ Computer Science, An Overview ------------------------------------------------- Chapter 00 Introduction Read the introduction to the text. The answers to the following questions will appear in order as you read. What is computer science? ------------------------------------------------- The Role of Algorithms What is an algorithm? What are some examples of algorithms? What is a program? What is programming? What is software? What is hardware? Where did the study of algorithms come from? Once you discover an algorithm, do others need to understand it? When does the solution of a problem lie beyond the capabilities of machines? ------------------------------------------------- The History of Computing What are some of the ancestors of the Computer? Eventually, people began using gears for computing. Who are some of the people involved? Which of the men above produced something that was programmable? What were (and are) some uses of holes punched in cards? What kinds of devices replaced gears? What were some early computers? According to the text, what were the first commercially viable computers, and who built them? What happened in 1981? Who wrote the underlying software for the PC? What important development in computers happened as the Twentieth century was closing? What were two big developments for the Internet? (hint, look for...

Words: 406 - Pages: 2

Computer Science

... transactions, and encrypting or erasing data files and criminal records (Go, 2008). The last category that the author would like to cover is crimes associated with the prevalence of computers. This is basically a sub-set of computer crime that relies on the relatively new computer and information industry (Taylor, Fritsch, Liederbach, & Holt, Digital Crime and Digital Terrorism, Second Edition, 2011). These crimes include intellectual property theft, component theft, counterfeiting, identity theft, and corporate offenses. This category of crimes is committed simply due to the presence of computers. These types of crimes are occurring as a result of modern advancements of technology and widespread use of computers. Some examples include software piracy, copyright violation of computer programs, manufacturing counterfeit computer equipment and other peripherals such as modems and hard disks and selling of original computer equipment, peripherals and programs at far reduced prices in a black market (Go, 2008). Now that the author has identified the main categories of cyber-crime, he would like to point out what he believes to be the most prevalent type of cyber-crime that we face today. According to a 2010 article addressing cyber-crimes, identity theft was said to be the most prevalent. Identity theft falls under the “Crimes Associated with the Prevalence of Computers” umbrella. In America alone there are almost 9 million victims of identity theft every year. The......

Words: 1361 - Pages: 6

Computer Science

... the society positively.  * In common life also, an individual gets benefited with computer technology. When airports, hospitals, banks, departmental stores have been computerized, people get quick service due to the computer system.  * Computers have created new fields of employment. These employments are in the field of designing, manufacturing, teaching, etc.   Harmful or Negative Impact of Computer in Our Society * Due to any reasons, if the data stored in the computer is lost, the person responsible for handling the computer will have to tolerate a lot.  * People do not use their mind for common arithmetic, which gradually results in loss of their numerical ability.  * Today, any person who does not have the knowledge of computer is considered the second class citizens.  * People have fear that growing children may lose their common sense abilities like numerical ability due to total dependence on computers.  * Due to the computerization workload for the employees reduces many times. As a result, many organization may require to remove some of its employees. It produces the dissatisfaction and lack of security among the employees. Due to this, employees do not corporate the organization. As a result, the output can be disastrous.  * As a result of introduction of new technology in an organization, the organization may need to spend a tremendous amount on the training of its employees.  Positive and Negative Impact of Computer in Society Almost a...

Words: 2409 - Pages: 10