Medical

advertisement
Notes by Santosh Sir
Notes on DCN
Q. Application of FTP
1. It is very useful to send files securely
2. Its main application is in conjunction with BOOTP and DHCP protocols.
3. It is used along with the TCP in internet applications.
It can be easily configured in ROM or PROM.
Various FTP application software are:










FileZilla – Open source application
CuteFTP Pro- Light and compact
FTP Voyager – good connection and useful user tools
BulletProof FTP- flexible product with good import qualities
FTP Explorer – good drag and drop features
SmartFTP – secure, and fast transfer with good user tools
Wise-FTP – great connection and transfer tools
WS FTP Pro – offers support for an extra fee
CoffeCup Direct FTP – HTML editor and zip archiving tool
AceFTP Pro – exceptional on line and telephone support
Q. SNMP architecture
SNMP is based on the manager/agent model consisting of a manager, an agent, a
database of management information, managed objects and the network protocol.
The manager provides the interface between the human network manager and the
management system.
The agent provides the interface between the manager and the physical device(s) being
managed, such as bridges, hubs, routers or network servers, these managed objects might
be hardware, configuration parameters, performance statistics, and so on… These objects
are arranged in what is known as a virtual information database, called a Management
Information Base, also called MIB.
SNMP allows managers and agents to communicate for the purpose of
accessing these objects.
www.aaryaclasses.com
8976381939
1
Notes by Santosh Sir
Notes on DCN
SNMP uses five basic messages (Get, GetNext, GetResponse, Set, and Trap) to
communicate between the manager and the agent. The Get and GetNext messages allow
the manager to request information for a specific variable.
The agent, upon receiving a Get or GetNext message, will issue a GetResponse message
to the manager with either the information requested or an error indication as to why the
request cannot be processed.
A Set message allows the manager to request a change be made to the value of a specific
variable in the case of an alarm remote that will operate a relay.
The agent will then respond with a GetResponse message indicating the change has been
made or an error indication as to why the change cannot be made.
The Trap message allows the agent to spontaneously inform the manager of an
‘important’ event.
Most of the messages (Get, GetNext, and Set) are only issued by the SNMP manager.
Because the Trap message is the only message capable of being initiated by an agent, it is
the message used by Remote Telemetry Units (RTUs) to report alarms.
This notifies the SNMP manager as soon as an alarm condition occurs, instead of waiting
for the SNMP manager to ask. The small number of commands used is only one of the
reasons SNMP is "simple”.
www.aaryaclasses.com
8976381939
2
Notes by Santosh Sir
Notes on DCN
The other simplifying factor is its reliance on an unsupervised or connectionless
communication link. This simplicity has led directly to its widespread use, specifically in
the Internet Network Management Framework.
Within this framework, it is considered ‘robust’ because of the independence of the
managers from the agents,
e.g. if an agent fails, the manager will continue to function, or vice versa.
Applications of SNMP:





Monitoring device performance
Detecting device faults, or recovery from faults
Collecting long term performance data
Remote configuration of devices
Remote device control
Q. Describe Simplex, half duplex and full duplex.
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex as
Shown below:
www.aaryaclasses.com
8976381939
3
Notes by Santosh Sir
Notes on DCN
Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one
of the two devices on a link can transmit; the other can only receive
Keyboards and traditional monitors are examples of simplex devices. The keyboard
can only introduce input; the monitor can only accept output. The simplex mode
can use the entire capacity of the channel to send data in one direction.
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. :
When one device is sending, the other can only receive, and vice versa
The half-duplex mode is like a one-lane road with traffic allowed in both directions.
When cars are traveling in one direction, cars going the other way must wait. In a
half-duplex transmission, the entire capacity of a channel is taken over by whichever of
the two devices is transmitting at the time. Walkie-talkies and CB (citizens band) radios
are both half-duplex systems.
The half-duplex mode is used in cases where there is no need for communication
in both directions at the same time; the entire capacity of the channel can be utilized for
each direction.
Full-Duplex
In full-duplex (also called duplex), both stations can transmit and receive simultaneously
The full-duplex mode is like a 2 way street with traffic flowing in both directions
www.aaryaclasses.com
8976381939
4
Notes by Santosh Sir
Notes on DCN
at the same time. In full-duplex mode, signals going in one direction share the
capacity of the link: with signals going in the other direction. This sharing can occur in
two ways: Either the link must contain two physically separate transmission paths, one
for sending and the other for receiving; or the capacity of the channel is divided
between signals traveling in both directions.
One common example of full-duplex communication is the telephone network.
When two people are communicating by a telephone line, both can talk and listen at the
same time.
The full-duplex mode is used when communication in both directions is required
all the time. The capacity of the channel, however, must be divided between the two
directions.
Q. Difference between analog and digital signal.
Sr.
no.
1
Analog signal
Digital signal
It is a continuous signal
It is a discrete time signal.
2
This signal is easily affected by
noise
This signal is not affected by
noise.
3
Not degrades
4
This signal will degrades as time
progresses
Dgm refer class notes
5
It is used in microphone
It is used in CD burning
6
Difficult to transmit
Easy to transmit
7
More prone to errors
Less prone to errors.
8
Less productivity
Better productivity
9
Less strength signal
More strength signal.
Dgm refer class notes
Q. What are the types of messages of SNMP?
GetRequest
www.aaryaclasses.com
8976381939
5
Notes by Santosh Sir
Notes on DCN
A manager-to-agent request to retrieve the value of a variable or list of variables. Desired
variables are specified in variable bindings (values are not used). Retrieval of the
specified variable values is to be done as an atomic operation by the agent. A Response
with current values is returned.
SetRequest
A manager-to-agent request to change the value of a variable or list of variables. Variable
bindings are specified in the body of the request. Changes to all specified variables are to
be made as an atomic operation by the agent. A Response with (current) new values for
the variables is returned.
GetNextRequest
A manager-to-agent request to discover available variables and their values. Returns a
Response with variable binding for the lexicographically next variable in the MIB. The
entire MIB of an agent can be walked by iterative application of GetNextRequest starting
at OID 0. Rows of a table can be read by specifying column OIDs in the variable
bindings of the request.
GetBulkRequest
Optimized version of GetNextRequest. A manager-to-agent request for multiple iterations
of GetNextRequest. Returns a Response with multiple variable bindings walked from the
variable binding or bindings in the request. PDU specific non-repeaters and maxrepetitions fields are used to control response behavior. GetBulkRequest was introduced
in SNMPv2.
Response
Returns variable bindings and acknowledgement from agent to manager for GetRequest,
SetRequest, GetNextRequest, GetBulkRequest and InformRequest. Error reporting is
provided by error-status and error-index fields. Although it was used as a response to
both gets and sets, this PDU was called GetResponse in SNMPv1.
Trap
Asynchronous notification from agent to manager. Includes current sysUpTime value, an
OID identifying the type of trap and optional variable bindings. Destination addressing
for traps is determined in an application-specific manner typically through trap
configuration variables in the MIB. The format of the trap message was changed in
SNMPv2 and the PDU was renamed SNMPv2-Trap.
InformRequest
www.aaryaclasses.com
8976381939
6
Notes by Santosh Sir
Notes on DCN
Acknowledged asynchronous notification from manager to manager. This PDU uses the
same format as the SNMPv2 version of Trap. Manager-to-manager notifications were
already possible in SNMPv1 (using a Trap), but as SNMP commonly runs over UDP
where delivery is not assured and dropped packets are not reported, delivery of a Trap
was not guaranteed. InformRequest fixes this by sending back an acknowledgement on
receipt. Receiver replies with Response parroting all information in the InformRequest.
This PDU was introduced in SNMPv2.
Q. Explain procedure to construct fiber optic cable or
fiber fabrication. (8M)
There are two basic techniques used in the fabrication of optical fibers:
1) Fibers can be drawn directly from melts of silica in crucibles.
2) Vapor phase oxidation.
Double crucible method
The double crucible method can be used to make both silica and halide glass fibers. The
technique is simple and straightforward. One glass rod is made from silica powders for
the core and one for the cladding. The rods are then used as feedstock for each of two
concentric crucibles. The inner contains the molten core, while the outer contains the
cladding. In a continuous process, the fiber is drawn from the molten state. The
disadvantage of this method is the possibility of introducing contaminants during the
melting process. Figure illustrates the double-crucible drawing process.
www.aaryaclasses.com
8976381939
7
Notes by Santosh Sir
Notes on DCN
Double-crucible fiber drawing process
Vapor phase oxidation
With direct drawing, it is difficult to get pure and homogeneous fibers; therefore this
method is not commonly used. The vapor phase oxidation processes have proven to be
more successful. These processes are usually done in two steps:
1) The first being the preparation of the preform.
2) The second being the drawing of the fiber.
Preparation of the perform
The main reason a perform is prepared is to have a "drawable" material that is clean, low
in OH concentration, low in metallic-ion contaminants, and inexpensive. Many
techniques have been developed to prepare these preforms. Some common commercially
used methods are Outside Vapor-Deposition, Modified Chemical Vapor Deposition,
Vapor Phase Axial Deposition, and Plasma Chemical Vapor Deposition. They differ
mainly by the way the soot is deposited.
www.aaryaclasses.com
8976381939
8
Notes by Santosh Sir
Notes on DCN
The perform is made by vapor-phase oxidation, in which two gases, SiCl4 and O2, are
mixed at a high temperature to produce silicon dioxide (SiO2)
Outside Vapor-Deposition
Outside Vapor Deposition (OVD), also called the "soot process", was first developed by
Corning Incorporated. This fiber was the first to have a loss of less then 20dB/km. The
three main steps involved are laydown (Figure4-a), consolidation (Figure4-b), and
drawing. In the laydown process, several materials such as SiCl4, GeCl4, BCl3 and O2 are
allowed to react in a hot flame to produce soot (Figure 5).
Figure 4: Two phases of the OVD process: (a) Laydown; (b) consolidation.
www.aaryaclasses.com
8976381939
9
Notes by Santosh Sir
Notes on DCN
Figure 5: Outside Vapor-Deposition
Fiber Drawing
www.aaryaclasses.com
8976381939
10
Notes by Santosh Sir
Notes on DCN
Figure 9: Schematic of a typical drawing process.
The major steps of a typical drawing process are shown in Figure 9. The preform is put
into a draw furnace, where the bottom tip is heated to melting. This molten piece now
starts to fall, forming a fiber with a 125-µm outer diameter. Diameter-monitoring
equipment controls the actual fiber diameter by changing, if necessary, the rate of
drawing that is executed by a tractor assembly. A coating applicator applies a coating
over the cladding.
www.aaryaclasses.com
8976381939
11
Notes by Santosh Sir
Notes on DCN
Q. Applications of fiber optic
1. Optical fibers are used in transmission of the following signals:
 Telephone signals
 Telex signals
 Internet signals
2. They are used for interconnecting computers in the local area networks.
3. They are used I the defense communication
4. They are used in medical applications.
Q. Explain light propagation through fiber optic.
SIMPLE RAY MODEL
Figure 2 (optical fiber with core, cladding and total internally reflected ray)
For propagation of light inside the core there are two possibilities.
1. A light ray is launched in a plane containing the axis of the fiber. We can then see the
light ray after total internal reflection travels in the same plane i.e., the ray is confined to
the plane in which it was launched and never leave the plane. In this situation the rays
will always cross the axis of the fiber. These are called the Meridional rays. (Fig. 2)
2. The other possibility is that the ray is not launched in a plane containing the axis of
the fiber.
For example if the ray is launched at some angle such that it does not intersect the axis of
the fiber, then after total internal reflection it will go to some other plane. We can see that
in this situation the ray will never intersect the axis of the fiber. The ray essentially will
spiral around the axis of fiber. These rays are called the Skew rays.
So it can be concluded that if the light is to propagate inside an optical fiber it could be
through two types of rays
www.aaryaclasses.com
8976381939
12
Notes by Santosh Sir
Notes on DCN
a) Meridional rays: The rays which always pass through the axis of fiber giving high
optical intensity at the center of the core of the fiber.
b) Skew Rays: The rays which never intersect the axis of the fiber, giving low optical
intensity at the center and high intensity towards the rim of the fiber.
Q. What are the management components?
Management Components
To do management tasks, SNMP uses two other protocols: Structure of Management
Information (SMI) and Management Information Base (MIB). In other words,
management
on the Internet is done through the cooperation of the three protocols SNMP,
SMI, and MIB
Structure of Management Information
The Structure of Management Information, version 2 (SMIv2) is a component for
network
management. Its functions are
1. To name objects
2. To define the type of data that can be stored in an object
3. To show how to encode data for transmission over the network
SMI is a guideline for SNMP. It emphasizes three attributes to handle an object: name,
data type, and encoding method
Management Information Base (MIB)
The Management Information Base, version 2 (MIB2) is the second component used in
network management. Each agent has its own MIB2, which is a collection of all the
objects that the manager can manage. The objects in MIB2 are categorized under 10
different groups: system, interface, address translation, ip, icmp, tcp, udp, egp, transmission,
and snmp. These groups are under the mib-2 object in the object identifier tree. Each group
has defined variables and/or tables.
e.g.
www.aaryaclasses.com
8976381939
13
Notes by Santosh Sir
Notes on DCN
Q. What are the losses in fiber optic cable?
www.aaryaclasses.com
8976381939
14
Notes by Santosh Sir
Notes on DCN
www.aaryaclasses.com
8976381939
15
Notes by Santosh Sir
Notes on DCN
www.aaryaclasses.com
8976381939
16
Notes by Santosh Sir
Notes on DCN
www.aaryaclasses.com
8976381939
17
Notes by Santosh Sir
Notes on DCN
www.aaryaclasses.com
8976381939
18
Notes by Santosh Sir
Notes on DCN
www.aaryaclasses.com
8976381939
19
Notes by Santosh Sir
Notes on DCN
Q. Explain hidden station and Exposed station problem.
Hidden station problem:
www.aaryaclasses.com
8976381939
20
Notes by Santosh Sir
Notes on DCN
Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a
collection of nodes. Take a physical star topology with an access pointwith many nodes
surrounding it in a circular fashion: Each node is within communication range of the AP, but
the nodes cannot communicate with each other, as they do not have a physical connection
to each other. In a wireless network, it is likely that the node at the far edge of the access
point's range, which is known as A, can see the access point, but it is unlikely that the same
node can see a node on the opposite end of the access point's range, C. These nodes are
known as hidden. The problem is when nodes A and C start to send packets simultaneously
to the access point B. Because the nodes A and C are out of range of each other and so
cannot detect a collision while transmitting, Carrier sense multiple access with collision
detection (CSMA/CD) does not work, and collisions occur, which then corrupt the data
received by the access point. To overcome the hidden node problem, RTS/CTS handshaking
is implemented in conjunction with the Carrier sense multiple access with collision
avoidance (CSMA/CA) scheme. The same problem exists in a MANET.
The hidden node problem can be observed easily in widespread (>50m
radius) WLAN setups with many nodes that use directional antennas and have high upload.
This is why IEEE 802.11 is suited for bridging the last mile for broadband access only to a
very limited extent. Newer standards such as WiMAX assign time slots to individual stations,
thus preventing multiple nodes from sending simultaneously and ensuring fairness even in
over-subscription scenarios.
IEEE 802.11 uses 802.11 RTS/CTS acknowledgment and handshake packets to partly
overcome the hidden node problem. RTS/CTS is not a complete solutionand may
decrease throughput even further, but adaptive acknowledgments from the base station can
help too.
Exposed station problem:
In wireless networks, the exposed node problem occurs when a node is prevented
fromsending packets to other nodes due to a neighboring transmitter. Consider an example
of 4 nodes labeled R1, S1, S2, and R2, where the two receivers are out of range of each
other, yet the two transmitters in the middle are in range of each other. Here, if a
transmission between S1 and R1 is taking place, node S2 is prevented from transmitting to
R2 as it concludes after carrier sense that it will interfere with the transmission by its
neighbor S1. However note that R2 could still receive the transmission of S2 without
interference because it is out of range of S1.
IEEE 802.11 RTS/CTS mechanism helps to solve this problem only if the nodes are
synchronized and packet sizes and data rates are the same for both the transmitting nodes.
When a node hears an RTS from a neighboring node, but not the corresponding CTS, that
www.aaryaclasses.com
8976381939
21
Notes by Santosh Sir
Notes on DCN
node can deduce that it is an exposed node and is permitted to transmit to other neighboring
nodes.
Q. What are the types of physical links in Bluetooth?
Physical Links
Between master and slave(s), different types of links can be established:


Synchronous Connection-Oriented (SCO) link
Asynchronous Connection-Less (ACL) link
SCO LINK
The type of radio link used for voice data. An SCO link is a set of reserved
timeslots on an existing ACL link. Each device transmits encoded voice data in
the reserved timeslot. There are no retransmissions, but forward error
correction can be optionally applied. SCO packets may be sent every 1, 2 or 3
timeslots.
Enhanced SCO (eSCO) links allow greater flexibility in setting up links: they
may use retransmissions to achieve reliability, allow a wider variety of packet
types, and greater intervals between packets than SCO, thus increasing radio
availability for other links.
ACL LINK
In the slots not reserved for SCO links, the master can exchange packets with
any slave on a per-slot basis. The ACL link provides a packet-switched
connection between the master and all active slaves participating in the piconet.
Both asynchronous and isochronous services are supported. Between a master
www.aaryaclasses.com
8976381939
22
Notes by Santosh Sir
Notes on DCN
and a slave only a single ACL link can exist. For most ACL packets, packet
retransmission is applied to assure data integrity.
A slave is permitted to return an ACL packet in the slave-to-master slot if and
only if it has been addressed in the preceding master-to-slave slot. If the slave
fails to decode the slave address in the packet header, it is not allowed to
transmit.
ACL packets not addressed to a specific slave are considered as broadcast
packets and are read by every slave. If there is no data to be sent on the ACL
link and no polling is required, no transmission shall take place.
Q. Difference between FTP and TFTP.
Sr.
no.
1
FTP
TFTP
Special-purpose; much simpler
7
General-purpose and hence, a more complex
protocol
Needs more memory due to its complexity
Interactive
Greater overhead & reliable control needed.
Due to above, it depends on TCP transport
layerprotocol
Uses TCP port #20 as data port & port #21 as
the connection port
Used over the WWW
8
9
10
Control and data are separated
Authentication is present
Reliable data transfer
Control and data are not separated
Authentication is not present
Unreliable data transfer
2
3
4
5
6
Needs very small memory
Unidirectional
Less overhead and no control needed.
Due to above, it depends on UDP transport
layer protocol
Uses UDP port #69
Used only on local networks due to lack of
security
Q. Explain fiber optic cable connectors.
ST
ST (an AT&T Trademark) is probably still the most popular connector
for multimode networks (ca. 2005), like most buildings and campuses. It
has a bayonet mount and a long cylindrical 2.5 mm ceramic (usually) or
polymer ferrule to hold the fiber. Most ferrules are ceramic, but some
are metal or plastic
www.aaryaclasses.com
8976381939
23
Notes by Santosh Sir
Notes on DCN
SC
SC is a snap-in connector also with a 2.5 mm ferrule that is widely used
for it's excellent performance. It was the connector standardized in TIA568-A, but was not widely used at first because it was twice as
expensive as a ST. Now it's only a bit more expensive and much more
common It's a snap-in connector that latches with a simple push-pull
motion. It is also available in a duplex configuration.
FC
FC was one of the most popular singlemode connectors for many years.
It also uses a 2.5 mm ferrule, but some of the early ones use ceramic
inside stainless steel ferrules. It screws on firmly, but you must make
sure you have the key aligned in the slot properly before tightening. It's
been mostly replaced by SCs and LCs.
LC
LC is a small form factor connector that uses a 1.25 mm ferrule, half the
size of the SC. Otherwise, it's a standard ceramic ferrule connector,
easily terminated with any adhesive. Good performance, highly favored
for single mode.
FDDI - ESCON
Besides the SC Duplex, you may occasionally see the FDDI and
ESCON* duplex connectors which mate to their specific networks. They
are generally used to connect to the equipment from a wall outlet, but
the rest of the network will have ST or SC connectors. Since they both
use 2.5 mm ferrules, they can be mated to SC or ST connectors with
adapters.
MT-RJ
MT-RJ is a duplex connector with both fibers in a single polymer ferrule.
It uses pins for alignment and has male and female versions. Multimode
only, field terminated only by prepolished/splice method.
Opti-Jack
www.aaryaclasses.com
8976381939
24
Notes by Santosh Sir
Notes on DCN
The Panduit Opti-Jack is a neat, rugged duplex connector cleverly
designed aournd two ST-type ferrules in a package the size of a RJ-45.
It has male and female (plug and jack) versions.
Volition
3M's Volition is a slick, inexpensive duplex connector that uses no
ferrule at all. It aligns fibers in a V-groove like a splice. Plug and jack
versions, but field terminate jacks only.
LX-5
LX-5 is like a LC but with a shutter over the end of the fiber.
MT
MT is a 12 fiber connector for ribbon cable. It's main use is for
preterminated cable assemblies and cabling systems. Here is a 12 fiber
MT broken out into 12 STs.
This connector is sometimes called a MTP or MPO which are
commercial names.
MU
MU looks a miniature SC with a 1.25 mm ferrule. It's more popular in
Japan.
Q. What are the applications of LASER?
Scientific

A wide variety of interferometric techniques

Raman spectroscopy

Laser induced breakdown spectroscopy

Atmospheric remote sensing

Investigating nonlinear optics phenomena
www.aaryaclasses.com
8976381939
25
Notes by Santosh Sir
Notes on DCN

Holographic techniques employing lasers also contribute to a number of measurement techniques.

Laser based LIght Detection And Ranging (LIDAR) technology has application
in geology, seismology, remote sensing and atmospheric physics.

Lasers have been used aboard spacecraft such as in the Cassini-Huygens mission.

In astronomy, lasers have been used to create artificial laser guide stars, used as reference objects
for adaptive optics telescopes.
Military
Directly as an energy weapon
Directed energy weapons are being developed, such as Boeing's Airborne Laser which was constructed
inside a Boeing 747. Designated the YAL-1, it is intended to kill short- and intermediate-range ballistic
missiles in their boost phase.
Defensive countermeasures
Defensive countermeasure applications can range from compact, low power infrared countermeasures to
high power, airborne laser systems. IR countermeasure systems use lasers to confuse the seeker heads on
heat-seeking anti-aircraft missiles.
Disorientation
Some weapons simply use a laser to disorient a person.
Medical

Cosmetic surgery (removing tattoos, scars, stretch marks, sunspots, wrinkles, birthmarks, and hairs):
see laser hair removal. Laser types used in dermatologyinclude ruby (694 nm), alexandrite (755 nm),
pulsed diode array (810 nm), Nd:YAG (1064 nm), Ho:YAG (2090 nm), and Er:YAG (2940 nm).

Eye surgery and refractive surgery

Soft tissue surgery: CO2, Er:YAG laser

Laser scalpel (General surgery, gynecological, urology, laparoscopic)

Photobiomodulation (i.e. laser therapy)

"No-Touch" removal of tumors, especially of the brain and spinal cord.

In dentistry for caries removal, endodontic/periodontic procedures, tooth whitening, and oral surgery
www.aaryaclasses.com
8976381939
26
Notes by Santosh Sir
Notes on DCN
Q. Compare SVC and PVC.
Sr. No. SVC
1
A source and a destination
Connect when data are being
Transferred.
2
SVC creates a temporary, short
Connection.
3
An SVC require establishing
And terminating phases.
4
SVC is cheap cost as compare
With PVC.
5
SVC is on-demand circuit
Established by user signal.
6
A SVC is established by UNI
Signaling methods.
7
8
PVC
A source and a destination
May choose to have a PVC.
PVC create a permanent and
Continuous connection.
PVC connection setup is simple.
PVC is costly.
This virtual circuit values are
Manual.
A PVC in the usual meaning is a
VC that is not signaled by the
End points.
A switch in the path fails, the SVC Failure of a link causes a soft PVC
Is broken and would have to be
To route around the outage and
Reconnected.
Remain available.
E.g. ATM, X.25 etc.
E.g. Frame Relay, ATM, X.25, etc.
www.aaryaclasses.com
8976381939
27
Download