Computer Science and Technology

In: Computers and Technology

Submitted By aisyah1234
Words 1432
Pages 6
TMC1254 Communication and Computer Network Semester 2 2013/2014

Switching

1

Learning Unit Objectives
• Understand the concept of switching. • Understand and able to differentiate between different types of switching.

2

• How many connection per device?

3

Introduction
• A network is a set of connected devices • How to connect them for communication?
– Using mesh topology but wasteful – Used switching

• Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices)

4

Switched network

3

Simple Switching Network

6

Taxonomy of switched networks

7

Circuit Switched Networks
Three Phases Efficiency Delay

8

9

CIRCUIT-SWITCHED NETWORKS
• consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM.

10

How circuit-switched network works?
• Consist of three phases: 1. Setup phase:
– When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed

2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down.
– Circuit is terminated, de-allocation of resources
11

Several points need to be emphasized
• Circuit switching takes place at physical layer • Before starting communication, the stations must make a reservation for the resources to be used during the communication • Data transferred btw the two stations are not packetized • There is no addressing involved during data transfer. The switches route the data based on their…...

Similar Documents

Computer Science

...1112-90912 -V1 Level L Computer Science AMS Sample Questions Exam Page 1 of 3 1. What is a file? 2. What is a record? 3. What is a field? 4. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 How many records are shown? 5. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 How many fields are shown? 6. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 What field is the best to use as a key field? 1112-90912 -V1 Level L Computer Science......

Words: 590 - Pages: 3

Science and Technology

...progressed through science and technology. Today science has made the impossible things possible. He had reached on the moon. He had made difficult works easy through technology. Science and technology have made the life safe, secure and comfortable. Today we are totally depended on science whether it is inside or outside the home. Now we can enjoy every second of our life through them. Technology have totally changed the field of entertainment. Now we can entertain ourselves through computers, Games, TV and so on. Electric light, Air conditioner, fan, and all the electronic gadgets are all gift of science. We can enjoy cold coffee, mango shakes, cold drinks during summer season through refreigeratos. All these things are possible through science and technology. Today travelling have become very fast. We can travel a long distance in minutes through aeroplanes. All this is possible through science. The railway is the another way of comfort travelling. Cars, buses, scooters are other means of travelling which we use day and night. These things made our life trouble free. It is all the wonder of science. Modern world is more and more dependent on them. It is said that "Science is a good and useful servant but it is a bad destructive master." I am saying this thing because today we are misusing it. Today atomic energy is used for war and fight purpose. Why we are not using it for peaceful purposes? Our aim should be constructive not destructive. Today we are using science and......

Words: 508 - Pages: 3

National Conference on Research Trends in Computer Science and Technology

...Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) Email: ecemurthy@gmail.com MR. M. MADDHUSUDHAN REDDDY M.TECH Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is associated with the technologies of......

Words: 2126 - Pages: 9

Computer Science

...Computer science is challenging, and yet dynamic. It requires people in the field to keep learning and pushing the limit. That fast-pacing innovation of technology never stops amazing me, which excites my innate curiosity even more. I, however, had never thought about pursuing computer science as a career until I took an AP Computer Science class in my senior year. It sparked my interest and changed my thoughts after seeing what I could do with some simple line of codes. Despite many countless times staring into the monitor trying to figure out how to solve a problem, those “Aha” moments were more precious and exciting for me. For every minute like that, I was exhilarating and smiled as if I have just won an Olympics’ gold medal in a 100-meter racing swim lap. It fed my hunger for exploration to see what else I could do, maybe something beyond my imagination. Computer science gradually became my hobby in my senior year. I searched many online resources to finally find CodingBat, which allowed me to expand my Java knowledge.These experiences slowly pulled me into the course of a new career, computer science, and at The University of North Carolina at Greensboro pursuing a degree in computer science can provide me knowledge and skills to bring change to people’s daily lives starting from mobile application. I want to be a part of this evolution of technology and I hope to meet other creative, friendly, and ambitious people. My dream is to start my own business partnership......

Words: 293 - Pages: 2

Science and Technology

...The first pocket calculator came onto the market in 1971 (the Bowmar 901B), more commonly known as The Bowmar Brain. It cost a massive $240, but within a decade the prices of similar pocket calculators had fallen to a mere $10. During this time the technology involved progressed enormously: Scientific calculators started to emerge with more and more functions. Programmable pocket calculators came on to the market, capable of storing programmes and instructions. As the years went by, calculators had more and more features and were capable of a great deal. The Ethernet was a step forward from the Arpanet. It was developed in the early 1970s as a method of transferring data over Local Area Networks (LANs). Its emergence is usually attributed to Robert Metcalfe, who wrote a paper with his assistant David Boggs entitled ‘Ethernet: Distributed Packet-Switching for Local Computer Networks'. The next advancement was the creation of the internet. A major step forward in 1986 was the NSFNet (National Science Foundation Network), created as the backbone of a university network. Even in the 1990s, people had to sign an agreement with them in order to access large parts of the public internet. Tim Berners-Lee (whose parents were both mathematicians on the Manchester Mark 1 project) is the man responsible for the creation of the World Wide Web (WWW). He saw the potential of hypertext coupled with the internet and in August 1991 he created the first ever website, which has been......

Words: 347 - Pages: 2

Computer Science

...(Passwords) One of windows vulnerabilities is that user accounts may have weak, nonexistent or unprotected passwords. The operating system and some third-party applications may create accounts with weak or nonexistent passwords. This in turn causes data to be vulnerable and with respect to user data it could be very damaging to a user’s organization if data is lost or removed without warning by an attacker. Also the connection of these systems to a shared network or perhaps the internet in the scenario of a business organization leaves the system vulnerable to an attacker. With respect to the data that is being sent across the network, there are certain countermeasures that could be taken, such as encrypting data that resides on the computer by using some well-known cryptographic algorithms currently being implemented to secure the system data even after password has been bypassed. Encrypting data provides a level of assurance that even if data is compromised, it is impractical to access the plaintext without significant resources, however controls should also be put in place to mitigate the threat of data exfiltration in the first place. Many attacks occur across a network, while others involve physical theft of laptops and other equipment holding sensitive information. Yet, in most cases, the victims are not aware that the sensitive data are leaving their systems because they are not monitoring data outflows. The movement of data across network boundaries both......

Words: 2126 - Pages: 9

Computer Science

...Computer architecture covers the design of system software, such as the operating system (the program that controls the computer), as well as referring to the combination of hardware and basic software that links the machines on a computer network. Computer architecture refers to an entire structure and to the details needed to make it functional. Thus, computer architecture covers computer systems, microprocessors, circuits, and system programs. Typically the term does not refer to application programs, such as spreadsheets or word processing, which are required to perform a task but not to make the system run. In designing a computer system, architects consider five major elements that make up the system's hardware: the arithmetic/logic unit, control unit, memory, input, and output. The arithmetic/logic unit performs arithmetic and compares numerical values. The control unit directs the operation of the computer by taking the user instructions and transforming them into electrical signals that the computer's circuitry can understand. The combination of the arithmetic/logic unit and the control unit is called the central processing unit (CPU). The memory stores instructions and data. The input and output sections allow the computer to receive and send data, respectively. Different hardware architectures are required because of the specialized needs of systems and users. One user may need a system to display graphics extremely......

Words: 752 - Pages: 4

Database Revision Questions for Computer Science and Technology

...schema, external schema, data independence, DOL, OML, SOL, VOL, query language, host language, data sublanguage, database utility, catalog, client/server architecture. 2.2. Discuss the main categories of data models. 2.3. What is the difference between a database schema and a database state? 2.4. Describe the three-schema architecture. Why do we need mappings between? Schema levels? How do different schema definition languages support this architecture? 2.5. What is the difference between logical data independence and physical data independence? 2.6. What is the difference between procedural and nonprocedural DMLs? 2.7. Discuss the different types of user-friendly interfaces and the types of users who typically use each. 2.8. With what other computer system software does a DBMS interact? 2.9. What is the difference between the two-tier and three-tier client/server architectures? 2.10. Discuss some types of database utilities and tools and their functions. Exercises 2.11. Think of different users for the database of Figure 1.2. What types of applications? Would each user need? To which user category would each belong, and what type Of interface would each need? 2.12. Choose a database application with which you are familiar. Design a schema and Show a sample database for that application, using the notation of Figures 2.1 and 1.2. What types of additional information and constraints would you like to represent In the schema? Think of several users for your database, and......

Words: 803 - Pages: 4

Computer Science

...Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer Science Computer......

Words: 425 - Pages: 2

Computer Science

...theSAX or DOM API's nor about XSL.) 6. Agent negotiation. Zero Sum games, prisoner's dilemma, problem of dishonesty and defection. Remember, highlights are just that. You are responsible for the whole course! http://www.ryerson.ca/~dgrimsha/courses/cps720/examreadme2000.html (1 of 2) [7/24/2002 9:54:47 PM] cps720 Exam Readme Fall 2000 Test Response Sheets You will be given your test response sheet in class, or you can pick them up from Camille in V331. Take good care of it and bring it to the exam together with an HB pencil. [top] [previous] [next] Questions? http://www.ryerson.ca/~dgrimsha/courses/cps720/examreadme2000.html (2 of 2) [7/24/2002 9:54:47 PM] Ryerson Polytechnic University Ryerson Polytechnic University School of Computer Science Final Examinations, Fall 1999 CPS 720 Artificial Intelligence Topics Examiner: D. Grimshaw Time: 2 hours Closed Book Part 1. Answer any four (4) questions (9 marks each). 1. What is an agent? Discuss from different perspectives. 2. What is an ontology? Define and discuss in relation to inter-agent communication. 3. Classify agents into 4 categories and discuss the Wall Following Agent in terms of one of these categories. 4. Describe the Aglet Mobile Agent Model. Discuss the principal components and mechanisms of Aglets. 5. Describe the InfoSleuth agent architecture. 6. Briefly describe the basic components of XML. Include a discussion of the DTD and DOM in your answer. To illustrate your answer, create a short XML file......

Words: 278775 - Pages: 1116

Computer Science?

...Computer science is the scientific and practical approach to computation and its applications. It is the systematic study of the feasibility, structure, expression, and mechanization of the methodical procedures that underlie the acquisition, representation, processing, storage, communication of, and access to information, whether such information is encoded as bits in a computer memory or transcribed in genes and protein structures in a biological cell. An alternate, more succinct definition of computer science is the study of automating algorithmic processes that scale. A computer scientist specializes in the theory of computation and the design of computational systems. Its subfields can be divided into a variety of theoretical and practical disciplines. Some fields, such as computational complexity theory, are highly abstract, while fields such as computer graphics emphasize real-world visual applications. Still other fields focus on the challenges in implementing computation. For example, programming language theory considers various approaches to the description of computation, while the study of computer programming itself investigates various aspects of the use of programming language and complex systems. Human–computer interaction considers the challenges in making computers and computations useful, usable, and universally accessible to humans. Computer science deals with the theoretical foundations of information and computation, together with practical......

Words: 2765 - Pages: 12

Computer Technology

...Computer technology is advancing at a rapid rate, causing the diversity and availability of assistive technology computer resources to have a tremendous impact for special education students across the United States. Assistive technology provides an opportunity for students with physical, emotional, and mental disabilities to acquire universal access to tools and opportunities for learning. Despite studies showing the benefits of assistive technology, many school districts fail to achieve the fullest potential that assistive technology can offer. This paper will define assistive technology, identify several obstacles of effective implementation, and present various approaches to overcoming those obstacles.  Assistive technology is defined as "any item, piece of equipment, or product system, whether acquired commercially off the shelf, modified, or customized, that issued to increase, maintain, or improve functional capabilities of individuals with disabilities" (Individuals with Disabilities Education Act, 1997). “Is society too dependent on technology?” Tom thought to himself as he drove to Colorado. He was on a family trip to visit his parents. It was a long trip and he had never been there before so he decided to use his navigation system to get there. He typed in his destination and headed to Colorado. On the way, his four-year-old son threw a juice cup, which spilled all over the navigation system. He did not think he would need a map, and now his family and he are......

Words: 1746 - Pages: 7

Computer Science

...____________________________________ Computer Science, An Overview ------------------------------------------------- Chapter 00 Introduction Read the introduction to the text. The answers to the following questions will appear in order as you read. What is computer science? ------------------------------------------------- The Role of Algorithms What is an algorithm? What are some examples of algorithms? What is a program? What is programming? What is software? What is hardware? Where did the study of algorithms come from? Once you discover an algorithm, do others need to understand it? When does the solution of a problem lie beyond the capabilities of machines? ------------------------------------------------- The History of Computing What are some of the ancestors of the Computer? Eventually, people began using gears for computing. Who are some of the people involved? Which of the men above produced something that was programmable? What were (and are) some uses of holes punched in cards? What kinds of devices replaced gears? What were some early computers? According to the text, what were the first commercially viable computers, and who built them? What happened in 1981? Who wrote the underlying software for the PC? What important development in computers happened as the Twentieth century was closing? What were two big developments for the Internet? (hint, look for the next two bolded phrases) As......

Words: 406 - Pages: 2

Computer Science

...Positive and Negative Impact of Computer in Society The Social Impact of Computer in Our Society From the time of the invention of the computers to the present day, computers have met tremendous changes. Time to time incorporation of the latest technical achievement has made the use of computer easier. More and more application have been developed and almost all the areas of the professions have been computerized. Computerization is continuously becoming an important part of many organizations. Computer have proved almost all the fields whether related to numeric processing or non numeric processing or document processing in the developed countries and all the walks of life. Computers have become the part of every organization.  Beneficial or Positive Impact of Computer in our Society * Any professional individual like doctors, engineers, businessmen etc. undergo a change in their style or working pattern after they get the knowledge of computer. * An individual becomes more competent to take a decisions due to the computer because all the information required to take the decision is provided by the computer on time. As a result, any individuals or institutions get success very fast.  * The person working at the managerial level becomes less dependent on low level staff like clerks and accountants. Their accessibility to the information increases tremendously. This improves their working patters and efficiency, which benefit the organization and ultimately affects......

Words: 2409 - Pages: 10

Science and Technology

...Science and Technology Essay 4 (250 words) Science and technology has become a debated topic in the society. On one hand, it is necessary for the modern life where other countries are continuously developing in the field of science and technology. It becomes very necessary for other countries too to grow in the same way to be strong and well developed like other countries for the future safety and security. It is science and technology which helps other weak countries to develop and be strong. We have to take support of science and technology forever to improve the way of life for the betterment of mankind. If we do not take the help of technologies such as computer, internet, electricity, etc we cannot be economically strong in the future and would be backward forever even we cannot survive in such a competitive and technological world. Advancement in the field of medical, agriculture, education, economy, sports, games, jobs, tourism, etc are the examples of science and technology. All such advancements show us that how both are equally beneficial for our life. We can see a clear difference in our life style while matching the ancient and modern way of life. High level of scientific and technological advancement in the field of medicine has made easy the treatment of various lethal diseases which was earlier not possible. It has helped a lot to the doctors to find effective ways to cure diseases through medicine or operations as well as research vaccines to cure diseases......

Words: 261 - Pages: 2

英雄联盟单机版 | 鬼泣4特别版紫罗兰常春藤但丁美化MOD | Spider-Man: Into the Spider-Verse