-->

Differentiate between POP and OOPs.


Differentiate between POP and OOPs.
ans:
Here.we are going to understand about structured programming /also called procedure oriented programming and object oriented programming with the help of following description.


Concept of POP (procedural oriented programming):- Conventional programming using high level languages such as COBOL,FORTRAN and C, is commonly known as procedure oriented programming(POP).
                                       Procedure oriented programming basically consists of writing a list of instructions(or actions) for the computer to follow, and organizing these instructions into groups known as functions.While we concentrate on the development , very little attention is given to the data that are being used by various functions.
           Diagrammatically we can show POP as

Some characteristics (features) of Procedure Oriented Programming are :-
1) Emphasis is on doing things(algorithms).
2) Large programs are divided into smaller programs known as functions.
3) Most of the functions share global data.
4) Data more openly around the system from function to function.
5) Functions transform data from one form to another.
6) Employs top-down approach in program design.

OOP (Object Oriented Programming)concepts:-
The major motivating factor in the invention of object oriented is to remove some of the flaws encountered in the procedural oriented approach. Object oriented programming uses concept of “Object” and treats data as a critical element in the program development and does not allow it to flow freely around the system. It ties data more closely to the functions that operate on it, and protects it from accidental modifications from outside functions.
Some characteristics (features) of Object Oriented Programming are :-
1) Emphasis is on data rather than procedures or algorithms.
2) Programs are divided into what are known as objects.
3) Data structures are designed such that characterize the objects.
4) Functions that operate on the data are tied together in the data structure.
5) Data is hidden and cannot be accessed by external functions.
6) Objects may communicate with each other through functions.
7) New data and functions can be easily added whenever necessary.

8) Follows bottom-up approach in program design.

Explain about OSI model of networking.

Explain about OSI model of networking.
ans:-
OSI model:-
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

Image result for osi model
image courtesy:
https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017

---------------------->Application (Layer 7)

  • This layer supports application and end-user processes.
  • Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified.
----------------------->Presentation layer (layer 6):-
  • This layer provides independence from differences in data representation (encryption) by translating from application to network format, and vice versa.
  • The presentation layer works to transform data into the form that the application layer can accept.

------------------------>Session (Layer 5)

  • This layer establishes, manages and terminates connections between applications.

----------------------->Transport (Layer 4)

  • This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control.
  • It ensures complete data transfer.

------------------------->Network (Layer 3)

  • This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node

------------------------>Data Link (Layer 2)

  • At this layer, data packets are encoded and decoded into bits.
  • It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization

------------------------->Physical (Layer 1)


  • This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
  • It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects

Explain about client-server and peer-to-peer networking



Explain about client-server and peer-to-peer networking.

ans:-
Lets understand client-server and peer-to-peer networking with the help of following description .

They are types of networking on the basis of architecture:
Peer to peer(P2P):
  • In this all the computers are treated equally.
  • No one computer is server or client.
  • All computers can be said working as client or server.
  • Computers have self processing capability and do not rely on others.
  • Computers have or can run with normal operating system like, XP, Me etc and application.
  • Easy sharing of files and allows us to have chatting.
  • failure of one does not mean others are down; networking goes on.
  • If heavy load is given, they may not give same performance. etc
  • low level security.
Client –server:
  • In this, one or two computers work as server and left all work as clients.
  • Clients computers give request to server for a task to be performed.
  • Clients computers may or may not have self processing capability. they rely on server.
  • Mostly servers use a powerful operating system like, Linux or Unix or Win advanced server2008 etc.
  • Through server, the sharing of files is done.
  • Everything is controlled by server so in the case of down, services can not be completed.
  • under heavy load, many servers share the tasks.
  • there is high level security in networking.
  • High traffic towards servers while processing.

Differentiate between Internet and Intranet.

Differentiate between Internet and Intranet.

ans:-
Differences are given in following paragraph.


Internet:-
1) It contains large number of computers.It is completely open/global.
2) Its access is not limited to particular organization.
3)It has/occupies large area.
4) It is not that much secured as Intranet is.
5) It uses/contains different media and technologies.
6)To access Internet, only password from ISP is needed; no more authentication is needed.
7)It is decentralized system with many hosts..
etc.
Intranet:
1)An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization.
2)Its access is limited to an organization.
3)It has  small coverage.
4)It is safe to access personal information.
5)Locals of intranet can access Internet; and Internet requirement is not mandatory for communication.
6) Employees of an organization can access their intranet by using authorized password by using Internet; otherwise not possible.
7)We can say it as a “Centralized controlling system”.

Explain any two communication channel.



Explain any two communication channel.

ans:-Lets know about guided medium.
Coaxial cable, or coax,
  • It is an electrical cable with an inner conductor surrounded by a flexible, tubular insulating layer, surrounded by a tubular conducting shield.
  • The term coaxial comes from the inner conductor and the outer shield sharing the same geometric axis.
  • Coaxial cable is used as a transmission line for radio frequency signals, in applications such as connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and distributing cable television signals and uses many connectors.
  • It is available in two types thin (10base2; means 100 MBPS and upto 200 meter) and thick (10base5 coax;means 10 MBPS, and upto 5oo meter). They are different in diameter and bandwidth. Most of television operators use this. They are obsolete and no longer in use for computer networking
UTP:-
  • Unshielded Twisted pair cabling is a type of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. Different pairs(colour) have different function.It has 4-pairs of copper wires.
  • UTP cable is also the most common cable used in computer networking. Modern Ethernet, the most common data networking standard, utilizes UTP cables.
  • Twisted pair cabling is often used in data networks for short and medium length connections because of its relatively lower costs compared to optical fiber and coaxial cable.
  • It has bandwidth up to 100mbps but can be increased up to 10000 mbps.
  • The rate at which signal moves is ⅔ of velocity of light.
  • It is available in different categories like CAT5,CAT6 ,CAT7 etc.

Explain advantages of networking.



Explain advantages of networking

ans:-
Networking:
computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics.
Purpose of networking:-
      • Networking for communication medium (have communication among people;internal or external)
      • Resource sharing (files, printers, hard drives, cd-rom/)
      • Higher reliability ( to support a computer by another if that computer is down)
      • Higher flexibility( different system can be connected without any problems)
      • Scalable (computers and devices can be added with time without changing original network.
      • provides distributed and centralized management system for enterprise.
      • increase productivity.
      • cost reduction by sharing one application/hardware etc.
Application of networking in our daily life:
-E-mail (to send or get mails electronically worldwide)
- Scheduling programs and having meetings at same time across world.
- Video conferencing with sound without delay.
-teleconferencing for people.
-Automate banking facility
-to surf Internet facility
-telecommuting to work at home by accessing remote computer
-doing business and marketing

Explain about LAN topologies.

q)Explain about LAN topologies.

ans:-

Topology:
When we go for networking, we connect some computers in particular layout or design. This design or pattern of connection is called topology.
There are many types;
Bus topology:
A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable.

Fig. 1. Linear Bus topology

Advantages of a Linear Bus Topology

  • Installation is easy and cheap to connect a computer or peripheral to a linear bus.
  • Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

  • Entire network shuts down if there is a break in the main cable.
  • Difficult to identify the problem if the entire network shuts down.
  • Not meant to be used as a stand-alone solution in a large building.

Star topology:-

  • A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator (See fig. 2).
  • Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network.
  • It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.


              Fig. 2. Star topology

Advantages of a Star Topology

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

  • Requires more cable length than a linear topology.
  • If the hub, switch, or concentrator fails, nodes attached are disabled.

Mesh topology
  • The mesh topology incorporates a unique network design in which each computer on the network connects to every other, creating a point-to-point connection between every device on the network. The purpose of the mesh design is to provide a high level of redundancy.
  • It needs/uses n(n-1)/2 channels(paths) and n-1 input/ output ports.
  • If one network cable fails, the data always has an alternative path to get to its destination. Figure 6 shows the mesh topology.
  • As you can see from Figure 6, the wiring for a mesh network can be very complicated.
  • It is used mostly in telephone network.This allows computer to balance the load by providing alternative paths. It creates a redundant point-to-point network connection between only specific network devices.

Figure 6. Mesh topology.

Advantages
Disadvantages
Provides redundant paths between devices
Requires more cable than the other LAN topologies.
The network can be expanded without disruption to current users.
more devices needed.