Tuesday, January 31, 2012

Network topologies describe the ways in which the elements of a network are mapped. They describe the physical and logical arrangement of the network nodes. Let us look at the advantages the different network topologies offer and get to know their shortfalls.

Bus Topology

Advantages of Bus Topology
It is easy to handle and implement.
It is best suited for small networks.

Disadvantages of Bus Topology
The cable length is limited. This limits the number of stations that can be connected.
This network topology can perform well only for a limited number of nodes.

Ring Topology

Advantage of Ring Topology
The data being transmitted between two nodes passes through all the intermediate nodes. A central server is not required for the management of this topology.

Disadvantages of Ring Topology
The failure of a single node of the network can cause the entire network to fail.
The movement or changes made to network nodes affects the performance of the entire network.

Mesh Topology

Advantage of Mesh Topology
The arrangement of the network nodes is such that it is possible to transmit data from one node to many other nodes at the same time.

Disadvantage of Mesh Topology
The arrangement wherein every network node is connected to every other node of the network, many of the connections serve no major purpose. This leads to the redundancy of many of the network connections.

Star Topology

Advantages of Star Topology
Due to its centralized nature, the topology offers simplicity of operation.
It also achieves an isolation of each device in the network.

Disadvantage of Star Topology
The network operation depends on the functioning of the central hub. Hence, the failure of the central hub leads to the failure of the entire network.

Computer Networking Cables - Types and Usage FAQ

Many kinds of network cables are used for establishing different computer networks. These cables are used as per the diverse requirements of various kinds of computer network. Before setting up a network, you must learn about the varieties of networking cables.

For setting up a computer network, you need to understand several basic terms. Using switches, hubs and cables in a computer network is common but to gain maximum efficiency, the right kind of devices and cables are required. The cables are different from one another in terms of speed for transmission of data, reduction of crosstalk and modes of installation. Find answers to your Frequently Asked Questions (FAQ's) about different kinds of networking cables and their uses.

Q. What is an unshielded network cable?

A. Unshielded Twisted Pair cables are widely used with the Ethernet networks. The twisted wire pairs in the cable, as suggested by the name, are not shielded. Eight individual copper wires (22 or 24 gauge) are twisted to make four pairs that restrict the signal corruption due to electromagnetic interference. UTP cables must adhere to the specifications regulating the number of twists that are permitted in defined length. A relatively smaller diameter of this cable is beneficial during installation. The speed and throughput of this cable is 10 to 1000 Mbps and is the most cost effective networking cable. This cable is extremely popular because it can be effectively used with most of the major networking infrastructure.

Q. What is a shielded network cable?

A. In the Shielded Twisted Pair cables, a metallic foil is used for wrapping each pair of copper wire which are then blanketed altogether in a metallic braid. STP not only reduces the outside disturbance like the EMI and RFI radiations but also the electrical noises in the cables like crosstalk and pair-to-pair to coupling. It is generally installed with the STP data connector but can also use RJ connector base. Unlike UTP, number of twisted pairs in this cable are only two and are comparatively more difficult to install. When installing, you must ensure that the metallic shield on both the ends is properly grounded.

Q. When do I need a shielded cable and which type do I need?

A. The main use of shielded cable is to strengthen the signal transmission via the cable and protect it from disturbances like crosstalk, Electromagnetic Interference (EMI) and Radio Frequency Interference. This interference usually occurs when there are any kinks or crimps from the neighbouring structures. These cause the transmission of data to slowdown. Common sources causing the disturbances are large motors and generators, radio towers and high-voltage lighting fixtures.

Q. What is a crossover cable?

A. A crossover cable, also known as cross wired cable, is a network cable that is used for the connection of two network devices without the need of any hub or switch. These cables are terminated distinctively on one of its ends with pairs switched green and orange. This cable also enables you to directly access the hardware on the same network.

Q. What is a solid cable?

A. Within the jacket of a solid cable, also known as one strand cable, there's only one solid piece of copper wire. Solid cables give mechanical ruggedness and because it's a single conductor, this cable can be used for structured wiring inside a building. In an insulation displacement connector, it's easier to place solid cables.

Q. What is a stranded cable?

A. A stranded cable consists of numerous thin copper wires bundled within a jacket. Each one of these thin strands within the cable can be bent and flexed conveniently. Owing to their flexibility, these cables are mainly to make patch cables that can easily be plugged, unplugged and installed. Even if the stranded cables are twisted frequently, these neither corrupt nor affect the signal strength.

Q. Which type do I need, solid or stranded?

A. Though both the cables, solid and stranded have the same signal strengths, stranded cables are considered better for short lengths due to their flexibility. On the other hand, solid cables are much better for long cable runs.

Q. What is the maximum length?

A. The maximum recommended length for networking cables is 330ft (100m) which is based upon the solid cable as it's the preferred choice for maximum length. Always make it a point to use repeaters at the length of patch cables. The distance between two of the patch cords should be 30ft (8m). another thing you have to pay heed to is the bending of the cables. Since these are rated with the least bending capacities, the signals are slowed down in case of a severe bending.

Q. What is RJ45?

A. Just like the lines on the road control the traffic, connectors, at the end of cables, line up the wires in physical locations inside themselves. In network installation, RJ45 connectors are used specifically for connecting the Ethernet devices.

This article has been written by an expert associated with cat5cablingjobs.co.uk, a premier network installation company providing services like data cabling, voice cabling and other network installations.

Computer Networks Basics Types and Benefits of a Network

A computer network is a connection of computers and other associated devices. These devices are connected with the aim of communicating with each other and also sharing files and other resources. Computer networks have become an indispensable asset today in businesses, homes, hospitals and everywhere.

Network access

A computer network can allows a patient have access to his doctor who is physically thousands of miles away, a manager can access important document . on his office computer, even when he is not in the office. One interesting use of a computer network is in the banking sector. A customer can have access to his bank accounts, transfer, withdraw and check his account balance in the comfort of his home and office. Students can also have access to library facilities and learning platforms, thanks to computer networks.

Network components

A computer network consists of devices such as computers, printers, scanners, and connecting devices. These connecting devices facilitate the connection among the devices. Each of these devices, some of which include gateway, router, bridge, switch, hub and a repeater, play a role in the network. A gateway device acts as the interface between networks using different protocols. A router determines the point to which to forward a data packet towards its destination. The bridge connects multiple network segments. A switch allocates traffic to its destination. A hub connects several Ethernet segments and makes them act as a single network.

Types of networks

Networks can also be classified into types depending on the size and geographical coverage. A personal area network (PAN) is the smallest considerable type of network. It consists of a computer connected to other information technology devices such as a printer, fax, telephone, scanner and PDA, mostly connected by cable or Bluetooth. Local Area Networks (LAN) are the larger compared to the PAN. A typical LAN consists of ten or less computers and other devices. They cover a small area, such as a small office or building.

Another type of a computer network that is bigger than the LAN is the is the Metropolitan Area Network (WAN). This network consists of more than ten computers and devices and covers a Metropolitan area. The next largest network is the Wide Area Network (WAN). A WAN covers a large geographic area such as a country or continent, using communication channels such as cables, air waves and cables. The internet is the largest of all networks. It is the world - wide connection of all other networks.

Benefits of network

A computer network brings a lot of benefits. It allows sharing of files and documents located on a computer on the same network. It also allows the sharing of devices such as printers, scanners and other devices connected to the network. It also allows the sharing of internet connection on a network. If only one or a few computers on the network are connected to the internet, other computers can connect through them. Information and program installation can be done on only one computer, and other users can access from this computer. This saves space and other computing resources.

Understanding Types of Computer Network

A computer network is basically defined as the interconnected collection of autonomous computers. The word ‘interconnected’ here means that the computers are able to exchange the information between them. The word ‘autonomous’ here means that the interconnected computers do not bear a master slave relationship that is one computer does not control the other. Further there are various types of computer networks. Computer networks are basically classified under three categories:

1.Transmission Technology
2.Size
3.Topology


Types of Computer Networks on the Basis of Transmission Technology

1.Broadcast Networks


It is one of the most popularly used computer networks. In this type of network, there exists a single communication channel or cable to which all the machines are connected on the network. When a short message, known as packet, is send by one machine, it is received by all other machines on the network. An address field is specified within each packet which tells to which machine the packet is actually intended. On receiving the packet, each machine examines the address field of the packet. If the packet is intended to the machine, it processes the packet. However, if the packet is intended to some other machine, it is just ignored. Usually, smaller or geographical localized networks make use of broadcast networks.


2.Point-to-Point Networks


In case of the point to point networks, it consists of many connections between individual pair of machines. The packet on this type of network has to first visit one or more intermediate machines to go from source to destination. As a rule, larger networks often use point-to-point networks.



Types of Computer Networks on the Basis of Size


1.Local Area Networks (LAN’s)


Local Area Networks are widely used to connect personal computers and workstations in company, schools, colleges, factories etc. to share the resources like printers and exchange information. LAN’s are privately owned networks within a single building or campus of a few kilometers in size. LAN’s basically employs broadcast transmission technology. Traditional LAN’s run at speed up to 10 to 100 megabits/second. Newer LAN’s operate at higher speeds, up to hundreds of megabits/second. IEEE 802.3 or Ethernet is the best example of LAN.


2.Metropolitan Area Networks (MAN’s)


It is a network that covers a larger area as compared to LAN. Metropolitan Area Network is basically a bigger version of LAN normally using the same technology. It can be either public or private. It may cover a group of nearby corporate offices or the entire city. A standard has been adopted for MAN, which distinguishes it from other networks. It is called Distributed Queue Dual Bus (DQDB) . It consists of two unidirectional buses to which all the computers are connected. Each bus has a device that initiates the transmission activity called the head-end. Traffic coming to the right of sender follows the upper bus while the traffic coming to the left of the sender follows the lower bus.


3.Wide Area Networks (WAN’s)


It is the largest of all the networks in terms of size. It covers a large geographical area, usually a country or a continent. Internet is the best example of Wide Area Network. It contains a collection of machines for running the user programs. These machines are known as the hosts. The hosts are connected by communications subnets. The main purpose of the subnet is to carry the messages from host to host. The subnets consist of two distinct components: transmission lines and switching elements. Transmission lines moves the bits while the switching elements connect two or more transmission lines. Routers and transmission lines (not the hosts) together constitute the subnet. Such a network when extended forms the WAN.



Types of Computer Networks on the Basis of Topology


1.Bus Topology


In case of the linear cable or bus topology, at any instant only machine is the master and is allowed to transmit message or packet of information. All the other machines must refrain from sending at this particular moment. However in case of any conflict when two or more machine wants to transmit the message simultaneously, an arbitrary mechanism is employed.


2.Ring Topology


In case of the ring topology, each bit moves around on its own, not waiting for the rest of the packet to which it belongs.

What Does a Computer Network Technician Do?

A computer network technician will typically perform a number of different tasks and duties related to the implementation and maintenance of various computer networks for a company. This can include setting up local area networks (LANs) and wide area networks (WANs), as well as the establishment of connections to the Internet and organizing how these various networks are maintained. Once these networks are properly created and in place, then the technician will continue to deal with any support issues that may arise, as well as dealing with a number of potential security issues. A computer network technician will also often work with customers or other employees at a company to assist them with technical support issues.

In general, a computer network technician works on creating and maintaining computer networks, usually for a business or similar organization. This typically begins with considering the needs of a company and then deciding on various networking solutions that will satisfy those needs. Depending on the company a computer network technician is employed by, this can include a variety of different network setups including LANs, often though physical or wireless connections, and WAN setup to a larger corporate network. This can also include the setup and maintenance of servers and routers that connect multiple computers on a network.

Once a computer network technician has established the networks needed by a company, then he or she will typically continue to work to ensure the efficiency of those networks. Any hardware or software issues that arise will usually be solved by the technician, as well as integrating new equipment into the system. Security issues are also typically handled by the computer network technician through a variety of methods. This usually includes the use of security programs, such as firewalls and antivirus software, as well as working with employees to ensure that proper security protocols are followed.

While a computer network technician often has a strong background in computer information technology, the other people he or she works with often do not. One of the major tasks this type of technician often has to perform is helping other workers at a company understand how they can best interact with the established network. This can include leading group discussions on security risks and protocols that should be followed, as well as explaining issues and solutions to management in an effective way. A computer network technician may also need to select hardware and software to solve problems, and make invoices and billing requests for internal use when purchasing new equipment for the company.

What is a Network Switch?

A network switch is a device that manages the sharing of multiple computers or networks on the same data connection. Another name for a network switch is a network bridge, which is a physical device responsible for routing and processing data within the open systems interconnection model. A network switch does not include hubs or repeaters, as these devices do not include any type of logical processors.

A network switch can support 10/100 Mbit/s (Megabits per second) or 10/100/1000 Mbit/s port transfer rates. It is possible to have multiple network switches operating at different speeds on the same network. However, this type of setup lends itself to bottlenecks and restricts the possible routes available for the flow of data.

A network switch is absolutely critical in the management of a computer network. The network switch functions as the traffic management system within the network, directing data packets to the correct destination. These devices are used to connect peripheral devices to the network and ensure maximum cost effectiveness and the ability to share resources.

A typical setup of a network switch is two computers, one printer, and a wireless router. All the devices are connected to the network switch, and each item must be clearly identified and connection rules created.


Once the setup is done, any computer on the network, can use the same printer. All computers can transfer files to each other and anyone with a wireless card can access the network, print and transfer files. The network switch is designed to allow the resources to be shared without reducing performance.

A simple analogy for a network switch is a policeman at a four-way stop. The cars are the data packets that are sent from each device as it attempts to communicate with the other devices in the network. The policeman, or network switch, directs traffic, sending the data to the right location, without having any collisions.

There are four main types of network switches. The four types are unmanaged switches, managed switches, smart switches, and enterprise managed switches. Each different types has its own strengths and weaknesses that need to be considered.

An unmanaged switch is the cheapest option and is typically used in a small office or business. These network switches perform the basic functions of managing the data flow between a shared printer and multiple computers. They can either be desktop models or rack mounted.

A managed switch has a user interface or software offering that allows users to modify the settings of the switch. There are multiple methods for updating the network switch, ranging from a serial console to an Internet based application. This type of network switch requires a knowledgeable user to adjust the settings as needed.

A smart switch is the middle product offering between a unmanaged and managed switch. The user interface is web-based and set with the most popular default settings. Adjustments to one setting result in an automatic adjustment to the related setting.

An enterprise-managed network switch has a wide range of adjustable settings to allow use within a large company or organization. These types of network switches are usually managed by network specialists and are constantly monitored, due to the size and complexity of the network.

Monday, January 30, 2012

Network effect

In economics and business, a network effect (also called network externality or demand-side economies of scale) is the effect that one user of a good or service has on the value of that product to other people. When network effect is present, the value of a product or service is dependent on the number of others using it.

Overview

The classic example is the telephone. The more people own telephones, the more valuable the telephone is to each owner. This creates a positive externality because a user may purchase a telephone without intending to create value for other users, but does so in any case. Online social networks work in the same way, with sites like Twitter, Facebook, and Google+ being more useful the more users join.

The expression "network effect" is applied most commonly to positive network externalities as in the case of the telephone. Negative network externalities can also occur, where more users make a product less valuable, but are more commonly referred to as "congestion" (as in traffic congestion or network congestion).

Over time, positive network effects can create a bandwagon effect as the network becomes more valuable and more people join, in a positive feedback loop.


Origins

Network effects were a central theme in the arguments of Theodore Vail, the first post patent president of Bell Telephone, in gaining a monopoly on US telephone services. In 1908, when he presented the concept in Bell's annual report, there were over 4000 local and regional telephone exchanges, most of which were eventually merged into the Bell System. The economics of network effects were presented in a paper by Bell employee N. Lytkins in 1917.

The economic theory of the network effect was advanced significantly between 1985 and 1995 by researchers Michael L. Katz, Carl Shapiro, Joseph Farrell and Garth Saloner.

Network effects were popularized by Robert Metcalfe, stated as the Metcalfe's law. Metcalfe was one of the co-inventors of Ethernet and a co-founder of the company 3Com. In selling the product, Metcalfe argued that customers needed Ethernet cards to grow above a certain critical mass if they were to reap the benefits of their network.

According to Metcalfe, the rationale behind the sale of networking cards was that (1) the cost of cards was directly proportional to the number of cards installed, but (2) the value of the network was proportional to the square of the number of users. This was expressed algebraically as having a cost of N, and a value of N². While the actual numbers behind this definition were never firm, the concept allowed customers to share access to expensive resources like disk drives and printers, send e-mail, and access the Internet.

Rod Beckstrom presented a mathematical model for describing networks that are in a state of positive network effect at BlackHat and Defcon in 2009 and also presented the "inverse network effect" with an economic model for defining it as well.

Benefits

Network effects become significant after a certain subscription percentage has been achieved, called critical mass. At the critical mass point, the value obtained from the good or service is greater than or equal to the price paid for the good or service. As the value of the good is determined by the user base, this implies that after a certain number of people have subscribed to the service or purchased the good, additional people will subscribe to the service or purchase the good due to the value exceeding the price.

A key business concern must then be how to attract users prior to reaching critical mass. One way is to rely on extrinsic motivation, such as a payment, a fee waiver, or a request for friends to sign up. A more natural strategy is to build a system that has enough value without network effects, at least to early adopters. Then, as the number of users increases, the system becomes even more valuable and is able to attract a wider user base.

Beyond critical mass, the increasing number of subscribers generally cannot continue indefinitely. After a certain point, most networks become either congested or saturated, stopping future uptake. Congestion occurs due to overuse. The applicable analogy is that of a telephone network. While the number of users is below the congestion point, each additional user adds additional value to every other customer. However, at some point the addition of an extra user exceeds the capacity of the existing system. After this point, each additional user decreases the value obtained by every other user. In practical terms, each additional user increases the total system load, leading to busy signals, the inability to get a dial tone, and poor customer support. The next critical point is where the value obtained again equals the price paid. The network will cease to grow at this point, and the system must be enlarged. The congestion point may be larger than the market size. New Peer-to-peer technological models may always defy congestion. Peer-to-peer systems, or "P2P," are networks designed to distribute load among their user pool. This theoretically allows true P2P networks to scale indefinitely. The P2P based telephony service Skype benefits greatly from this effect (though market saturation will still occur).

Network effects are commonly mistaken for economies of scale, which result from business size rather than interoperability. To help clarify the distinction, people speak of demand side vs. supply side economies of scale. Classical economies of scale are on the production side, while network effects arise on the demand side. Network effects are also mistaken for economies of scope.

The network effect has a lot of similarities with the description of phenomenon in reinforcing positive feedback loops described in system dynamics. System dynamics could be used as a modelling method to describe phenomena such as word of mouth and Bass model of marketing.


Technology lifecycle

Technology lifecycle
If some existing technology or company whose benefits are largely based on network effects starts to lose market share against a challenger such as a disruptive technology or open standards based competition, the benefits of network effects will reduce for the incumbent, and increase for the challenger. In this model, a tipping point is eventually reached at which the network effects of the challenger dominate those of the former incumbent, and the incumbent is forced into an accelerating decline, whilst the challenger takes over the incumbent's former position.

Lock-in

Not surprisingly network economics became a hot topic after the diffusion of the Internet across academia. Most people know only of Metcalfe's law as part of network effects. Network effects are notorious for causing lock-in with the most-cited examples being Microsoft products and the QWERTY keyboard.

Network effects are a source of, but distinct from, lock-in. Lock-in can result from network effects, and network effects generate increasing returns that are associated with lock-in. However, the presence of a network effect does not guarantee that lock-in will result. For example, if the network standards are open, enabling competitive implementation by different vendors, there is no vendor lock-in. One example of this would be email, which has a considerable network effect but there is interoperability between different email providers.

Lock-in can also result because users perceive that their switching costs do not cover the value of switching to the new service. For example, relationships developed in one service do not transfer to the new service. In other words, you are not willing to use a possibly better service because you have vested data in the service you are locked into.

Types of network effects

There are many ways to classify networks effects. One popular segmentation views network effects as being of four kinds

Two-sided network effects: An increase in usage by one set of users increases the value to and participation of a complementary and distinct set of users, and vice versa. An example is developers choosing to code for an operating system with many users, with users choosing to adopt an operating system with many developers. This is a special case of a two-sided market.

Direct network effects: An increase in usage leads to a direct increase in value for other users. For example, telephone systems, fax machines, and social networks all imply direct contact among users. In two-sided networks, a direct network effect is called a same-side network effect. An example is online gamers who benefit from participation of other gamers as distinct from how they benefit from game developers.

Indirect network effects: Increases in usage of one product or network spawn increases in the value of a complementary product or network, which can in turn increase the value of the original. Examples of complementary goods include software (such as an Office suite for operating systems) and DVDs (for DVD players). This is why Windows and Linux might compete not just for users, but for software developers. This is more accurately called a cross-side network effect in order to distinguish network benefits that cross distinct markets.

Local network effects: The structure of an underlying social network affects who benefits from whom. For example, a good displays local network effects when rather than being influenced by an increase in the size of a product's user base in general, each consumer is influenced directly by the decisions of only a typically small subset of other consumers, for instance those he or she is "connected" to via an underlying social or business network. Instant messaging is an example of a product that displays local network effects.

Additionally, there are two sources of economic value that are relevant when analyzing products that display network effects:
Inherent value: I derive value from my use of the product
Network value: I derive value from other people's use of the product

Negative network effects

There are negative network effects beyond lock-in.
Congestion occurs when the efficiency of a network decreases as more people use it, and this reduces the value to people already using it. Traffic congestion that overloads the freeway and network congestion over limited bandwidth both display negative network externalities.

Interoperability

Open versus closed standards

In communication and information technologies, open standards and interfaces are often developed through the participation of multiple companies and are usually perceived to provide mutual benefit. But, in cases in which the relevant communication protocols or interfaces are closed standards the network effect can give the company controlling those standards monopoly power. The Microsoft corporation is widely seen by computer professionals as maintaining its monopoly through these means. One observed method Microsoft uses to put the network effect to its advantage is called Embrace, extend and extinguish.

Mirabilis is an Israeli start-up which pioneered instant messaging (IM) and was bought by America Online. By giving away their ICQ product for free and preventing interoperability between their client software and other products, they were able to temporarily dominate the market for instant messaging. Because of the network effect, new IM users gained much more value by choosing to use the Mirabilis system (and join its large network of users) than they would using a competing system. As was typical for that era, the company never made any attempt to generate profits from their dominant position before selling the company.

Examples
Financial exchanges
Stock exchanges and derivatives exchanges feature a network effect. Market liquidity is a major determinant of transaction cost in the sale or purchase of a security, as a bid-ask spread exists between the price at which a purchase can be done versus the price at which the sale of the same security can be done. As the number of buyers and sellers on an exchange increases, liquidity increases, and transaction costs decrease. This then attracts a larger number of buyers and sellers to the exchange. See, for example, the work of Steve Wunsch (1999).
The network advantage of financial exchanges is apparent in the difficulty that startup exchanges have in dislodging a dominant exchange. For example, the Chicago Board of Trade has retained overwhelming dominance of trading in US Treasury Bond futures despite the startup of Eurex US trading of identical futures contracts. Similarly, the Chicago Mercantile Exchange has maintained a dominance in trading of Eurobond interest rate futures despite a challenge from Euronext.Liffe.

Software
There are very strong network effects operating in the market for widely used computer software.
Take, for example, Microsoft Office. For many people choosing an office suite, prime considerations include how valuable having learned that office suite will prove to potential employers, and how well the software interoperates with other users. That is, since learning to use an office suite takes many hours, they want to invest that time learning the office suite that will make them most attractive to potential employers (or consulting clients, etc.), and they also want to be able to share documents. (Additionally, an example of an indirect network effect in this case is the notable similarity in user-interfaces and operability menus of most new software - since that similarity directly translates into less time spent learning new environments, therefore potentially greater acceptance and adoption of those products.)

Similarly, finding already-trained employees is a big concern for employers when deciding which office suite to purchase or standardize on. The lack of cross-platform user-interface standards results in a situation in which one firm is in control of almost 100% of the market.
Microsoft Windows is a further example of network effect. The most-vaunted advantage of Windows, and that most publicised by Microsoft, is that Windows is compatible with the widest range of computer hardware and software. Although this claim is justified, it is in reality the result of network effect: hardware and software manufacturers ensure that their products are compatible with Windows in order to have access to the large market of Windows users. Thus, Windows is popular because it is well supported, but is well supported because it is popular.

However, network effects need not lead to market dominance by one firm, when there are standards which allow multiple firms to interoperate, thus allowing the network externalities to benefit the entire market. This is true for the case of x86-based personal computer hardware, in which there are extremely strong market pressures to interoperate with pre-existing standards, but in which no one firm dominates in the market. Also, it is true for the development of enterprise software applications where the Internet (HTTP), databases (SQL), and to a moderate degree, service-oriented message buses (SOA) have become common interfaces. Further up the development chain there are network effects as well in language back-end base platforms (JVM, CLR, LLVM), programming models (FP, OOP) and languages themselves.[11]

Telecommunications
The same holds true for the market for long-distance telephone service within the United States. In fact, the existence of these types of networks discourages dominance of the market by one company, as it creates pressures which work against one company attempting to establish a proprietary protocol or to even distinguish itself by means of product differentiation.

Web sites
Many web sites also feature a network effect. One example is web marketplaces and exchanges, in that the value of the marketplace to a new user is proportional to the number of other users in the market. For example, eBay would not be a particularly useful site if auctions were not competitive. However, as the number of users grows on eBay, auctions grow more competitive, pushing up the prices of bids on items. This makes it more worthwhile to sell on eBay and brings more sellers onto eBay, which drives prices down again as this increases supply, while bringing more people onto eBay because there are more things being sold that people want. Essentially, as the number of users of eBay grows, prices fall and supply increases, and more and more people find the site to be useful.

The collaborative encyclopedia Wikipedia also benefits from a network effect. The theory goes that as the number of editors grows, the quality of information on the website improves, encouraging more users to turn to it as a source of information; some of the new users in turn become editors, continuing the process.

Social networking websites are also good examples. The more people register onto a social networking website, the more useful the website is to its registrants.
By contrast, the value of a news site is primarily proportional to the quality of the articles, not to the number of other people using the site. Similarly, the first generation of search sites experienced little network effect, as the value of the site was based on the value of the search results. This allowed Google to win users away from Yahoo! without much trouble, once users believed that Google's search results were superior. Some commentators mistook the value of the Yahoo! brand (which does increase as more people know of it) for a network effect protecting its advertising business.

Alexa Internet uses a technology that tracks users' surfing patterns; thus Alexa's Related Sites results improve as more users use the technology. Alexa's network relies heavily on a small number of browser software relationships, which makes the network more vulnerable to competition.
Google has also attempted to create a network effect in its advertising business with its Google AdSense service. Google AdSense places ads on many small sites, such as blogs, using Google technology to determine which ads are relevant to which blogs. Thus, the service appears to aim to serve as an exchange (or ad network) for matching many advertisers with many small sites (such as blogs). In general, the more blogs Google AdSense can reach, the more advertisers it will attract, making it the most attractive option for more blogs, and so on, making the network more valuable for all participants.

Network effects were used as justification for some of the dot-com business models in the late 1990s. These firms operated under the belief that when a new market comes into being which contains strong network effects, firms should care more about growing their market share than about becoming profitable. This was believed because market share will determine which firm can set technical and marketing standards and thus determine the basis of future competition.

2010 Anna University Chennai B.E Computer Science and Engineering Ec 1008 – high speed networks Question paper

Question Paper Code: D 2173

B.E/B.Tech. DEGREE EXAMINATION, APRIL/MAY 2010.

Eighth Semester

Computer science and engineering

EC 1008 – HIGH SPEED NETWORKS

(REGILATION 2004)

(COMMON TO SEVENTH SEMESTER ELECTRONICS AND COMMUNICATION ENGINEERING)

(COMMON TO B.E.(PART TIME)SIXTH SEMESTER ELECTRONICS AND COMMUNICATION ENGINEERING REGULATION 2005)

TIME: THREE HOURS MAXIMUM MARKS:100


ANSWER ALL QUESTIONS

Part A—(10*2=20 marks)

1. What IS the need for high speed LAN?

2. Mention the advantages and disadvantages of wireless LAN.

3. What are the types of queuing models?

4. What are the causes for congestion?

5. What are features of GFR traffic?

6. What is the need for window management?

7. Mention the features of Integrated Services.

8. List the limitations of WFQ queuing discipline.

9. What is label stacking?

10. What are the goals of RSVP?


PART B—(5*16 = 80 MARKS)

11. (a) Discuss the features of ATM and which aspects of the ATM network architecture depend on the fixed length nature of ATM cells? What happens if ATM cells are allowed to be variable in length?

Or

(b) Discuss the main features of fast Ethernet and compare them with other types of high speed LAN.

12. (a) Describe the queuing analysis and the various queuing models in the
Network traffic management system.

Or

(b) Explain in detail the effects of congestion and the techniques to be
followed in the network layer to deal with congestion.

Or

13. (a) (i) Discuss in detail the various algorithms to improve the timer
management mechanism of TCP.

(ii) Explain the performance of TCP over ATM.

Or

(b) Discuss the traffic control, traffic management in ATM networks.

14. (a) Explain, with neat diagram, the significance, components, services
and the architecture of Integrated services.

Or

(b) Explain the various queuing discipline and its limitations.]


15. (a) Discuss in detail Data flow, operations and protocol mechanism of RSVP.

Or

(b) Explain the following:
(i) RTP
(ii) MPLS

2010 Anna University Chennai B.E Computer Science and Engineering Cs2302 - computer networks Question paper

B.E/B.Tech. DEGREE EXAMINATION, NOVEMBER 2010
Fifth Semester
Computer Science and Engineering
CS2302 - COMPUTER NETWORKS
(Common to Information Technology)
(Regulation 2008)

Time: Three hours Maximum : 100 Marks

Answer ALL questions
PART A - (10 X 2 = 20 Marks)
1. What are the two types of line configuration?
2. What do you mean by error control?
3. What are the functions of bridges?
4. What is the advantage of FDDI over a basic token ring?
5. What is meant by circuit switching?
6. What is multicasting?
7. What is the function of a router?
8. What are the advantages of using UDP over TCP?
9. What is SMTP?
10. What is PGP?

PART B- (5 X 16 = 80 Marks)

11. (a) Explain in detail the error detection and error corrections. (16 Marks)
(Or)
(b) Discuss in detail about the layers of OSI model. (16 Marks)

12. (a) Name the four basic network topologies and explain them giving all the relevant features. (16 Marks)
(Or)
(b) Explain the functioning of wireless LAN in detail. (16 Marks)

13. (a) Write notes on the following:
(i) Internet protocol.
(ii) Routers. (16 Marks)
(Or)
(b) Discuss in detail the various aspects of IPV6. (16 Marks)

14. (a) With neat architecture, explain TCP in detail. (16 Marks)
(Or)
(b) Explain adaptive flow control in detail and its uses. (16 Marks)

15. (a) Explain the SMTP and HTTP. Give their uses, state strengths and weaknesses. (16 Marks)
(Or)
(b) Explain the role of a DNS on a computer network. (16 Marks)

2010 Anna University Chennai B.E Computer Science and Engineering Cs 2302 — computer networks - november/december 2010 Question paper

B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2010
Fifth Semester

Computer Science and Engineering
CS 2302 — COMPUTER NETWORKS

(Common to Information Technology)
(Regulation 2008)

Time : Three hours Maximum : 100 Marks
Answer ALL questions
PART A — (10 × 2 = 20 Marks)

1. What are the two types of line configuration?
2. What do you mean by error control?
3. What are the functions of Bridges?
4. What is the advantage of FDDI over a basic Token Ring?
5. What is meant by circuit switching?
6. What is multicasting?
7. What is the function of a router?
8. What are the advantages of using UDP over TCP?
9. What is SMTP?
10. What is PGP?

PART B — (5 × 16 = 80 Marks)

11. (a) Explain in detail the error detection and error corrections. [Marks 16]
Or
(b) Discuss in detail about the layers of OSI model. [Marks 16]

12. (a) Name the four basic network Topologies and explain them giving all the
relevant features. [Marks 16]
Or
(b) Explain the functioning of wireless LAN in detail. [Marks 16]

13. (a) Write notes on the following :
(i) Internet protocol
(ii) Routers. [Marks 16]
Or
(b) Discuss in detail the various aspects of IPv6. [Marks 16]

14. (a) With neat architecture, explain TCP in detail. [Marks 16]
Or
(b) Explain adaptive flow control in detail and its uses. [Marks 16]

15. (a) Explain the SMTP and HTTP. Give their uses, state strengths and
weaknesses. [Marks 16]
Or
(b) Explain the role of a DNS on a computer network. [Marks 16]