Topic 2 Midterm Notes
Topic 2 Midterm Notes
Routing Algorithms
Used by routers to find optimal paths between sender & receiver.
Common algorithms:
o Distance Vector (e.g., RIP) → Based on hop count (shortest path).
o Link-State (e.g., OSPF) → Considers network conditions
(bandwidth, congestion).
o Hybrid (e.g., EIGRP) → Mix of both for efficiency.
✔ Example:
If a fiber-optic link fails, the router reroutes traffic via an alternative
path using OSPF.
Network Performance
Throughput & Bandwidth
Throughput: The actual amount of error-free data transmitted per second.
Bandwidth: The maximum capacity of a network link.
Example:
A 1 Gbps Ethernet link might only achieve 800 Mbps due to network
congestion or errors.
Delay (Latency)
Definition: The time it takes for a data packet to travel from sender to
receiver.
Types of Delay:
1. Processing Delay (time to process data at a node).
2. Transmission Delay (time to send bits over the link).
3. Propagation Delay (time for bits to travel across the medium).
Example:
Sending a 1500-byte packet over a 100 Mbps network:
1500×8100,000,000=120 microseconds\frac{1500 \times 8}
{100,000,000} = 120 \text{ microseconds}100,000,0001500×8
=120 microseconds
Response Time
Definition: The time between a request and a response in a network service.
Example: A web server responding in 200 ms to a user request.
Scalability
Definition: A network’s ability to grow and adapt without degrading
performance.
Example:
A company expands from 100 users to 500 users, and the network is
designed to handle this growth.
Cloud-based solutions allow dynamic resource allocation based on
demand.
Security
Three Key Principles:
1. Confidentiality – Prevent unauthorized access to data.
2. Integrity – Ensure data is not altered during transmission.
3. Availability – Ensure network services are always accessible.
✔ Security Strategies:
Firewalls to block unauthorized traffic.
Encryption (SSL, TLS, VPNs) for secure data transmission.
Intrusion Detection Systems (IDS) to detect suspicious activity.
1️.Host-Based Architecture
✔ All five functions are handled by a central mainframe (host computer).
✔ The client (terminal) is only used for displaying results.
Example:
Banking systems in the 1970s where branch terminals connected to a
mainframe for transaction processing.
Pros:
Simple management & security since everything is on one machine.
Cons:
Scalability issues – the host is a bottleneck when user demand
increases.
Comparison of Architectures
Architectur
Pros Cons Example Use Case
e
Simple, good for small Small business
Two-Tier Not scalable
systems DBs
Scalable, better Requires more E-commerce
Three-Tier
performance resources websites
Highly scalable, better
N-Tier Expensive, complex Netflix, YouTube
security
Thin Client
✔ Minimal application logic on the client.
✔ Most processing happens on the server.
✔ The client is mainly for display and user input.
Example:
Google Docs – You only need a browser, all processing happens on
Google’s servers.
Virtual Desktop Infrastructure (VDI) – Citrix, Remote Desktop.
Pros:
Easier maintenance (only update the server).
Cheaper devices (no powerful CPU or storage needed).
Cons:
Relies on a constant network connection.
Performance depends on server speed.