Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Topic A: Topology How does the logical topology differ from the physical topolog

ID: 667374 • Letter: T

Question

Topic A: Topology

How does the logical topology differ from the physical topology? Why can a single physical topology support multiple logical topologies?

How does SSH differ from Telnet? How does HTTPS differ from HTTP?

What is the difference between connectionless and connection-oriented services?

Topic B: Protocols

Why are protocols important for networking?

How does SSH differ from Telnet? How does HTTPS differ from HTTP?

What is the difference between connectionless and connection-oriented services?

Explanation / Answer

-----------------------------------------------------------------
How does the logical topology differ from the physical topology? Why can a single physical topology support multiple logical topologies?
-----------------------------------------------------------------

-------
Ans:
-------
   Topology
is a network arrangement,connecting various nodes by lines of connection.
  
   Physical Topology : The physical layout of devices on a network, every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other. The way that the workstations are connected to the network through the actual cables that transmit data the physical structure of the network is called the physical topology.

   Logical Topology : The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices.

Because multipoint topologies share a common channel, each device needs a way to identify itself and the device to which it wants to send information. The method used to identify senders and receivers is called addressing. Four types of physical topologies are frequently used in computer networking.

1. Star : all the computers are connected to a single hub through a cable.
2. Bus : every computer and network device is connected to single cable.
3. Ring : each computer is connected to another computer, with the last one connected to the first
4. Hybrid : a mixture of two or more topologies.


----------------------------------
How does SSH differ from Telnet?
----------------------------------
-> SSH (Secure Shell) and Telnet are two network protocols.

-> They are both used to connect to remote servers in some sort of communication.
-> The primary difference is in security. SSH offers security mechanisms that protect the users against anyone with malicious intent while Telnet has no security measures whatsoever.
-> Telnet is designed to work within a private network and not across a public network.
-> In Telnet all the data is transmitted in plain text, including passwords hence it is major security issue.
-> Where is SSH uses encryptions to make it harder for other people to track the password and other relevant confidential information.
-> Telnet omits authentication where SSH uses a public key to authenticate the source of the data.
-> SSH adds a bit more overhead to the bandwidth compared to Telnet

----------------------------------
How does HTTPS differ from HTTP?
----------------------------------
-> HTTP standa for Hyper Text Transfer protocol.

-> It is the system for transmitting and receiving information across server and the client.
-> In HTTP there no is data encryption to transmit the data.

-> Where HTTPS or Secure HTTP some may call it is a combination of Hypertext Transfer Protocol with SSL/TLS.
-> In HTTPS data will be sent and received in encrypted form.
-> Using HTTPS, the computers agree on a "code" between server, and then they scramble the messages using that "code" so that no one in transmit can read them.

---------------------------------------------  
Why are protocols important for networking?
---------------------------------------------  
Protocol:
Protocols are sets of rules for exchanging information between computer.

Significance: Without a set of rules, computers would not have the capability of "talking" to each other across the Internet.
Certain protocols help computers identify themselves on the Internet.

----------------------------------------------------------------------------------
What is the difference between connectionless and connection-oriented services?
----------------------------------------------------------------------------------

-> In connection oriented service has to establish a connection before starting the communication. When connection is established we send the message or the information and then we release the connection.
-> Connection oriented service is more reliable than connectionless service.
   Example:TCP (Transmission Control Protocol).
-> In Connectionless service is similar to the postal services, as it carries the full address where the message (letter) is to be carried.
-> In Connectionless service each message is routed independently from source to destination. The order of message sent can be different from the order received.
-> In connectionless the data is transferred in one direction from source to destination without checking that destination.
-> In connectionless authentication is not needed.
   Example: UDP (User Datagram Protocol).

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote