IgniTech Logo

IgniTech Logo
Vinoth

Wednesday, December 30, 2009

Project Management

A new vacuum cleaner salesman knocked on the door on the first house of the street.. A tall, mid-aged lady
answered the door.
Before she could speak, the enthusiastic salesman barged into the Living Room and opened a big black plastic bag
and poured all the cow dung (droppings) onto the carpet.
"Madam, if I could not clean the mess up with this new, excellent and powerful Vacuum cleaner, I will EAT all this
shit!" exclaimed the eager salesman.
"Do you need chili sauce or ketchup with that" asked the lady.
The bewildered salesman asked, "Why, madam?"

"There's no electricity in the house..." said the lady.

MORAL: Gather all resources before working on any project and committing to the client...!!!

Sunday, July 19, 2009

NARUMUGAIYE___IRUVAR


NARUMUGAIYE___IRUVAR

Iruvar (The Duo) (1997) is a Tamil language Indian film directed and co-written by Mani Ratnam, with music composed by A. R. Rahman. The film is a fictionalized account of the lives of 1980s Tamil Nadu political icons M. G. Ramachandran and M. Karunanidhi, continuing the tryst between Tamil cinema and Dravidian politics. Mohanlal and Prakash Raj played lead roles in the film. Tabu, Gouthami, Revathi Menon and Nasser star in supporting roles. The film also saw the movie debut of Aishwarya Rai.

Tuesday, June 30, 2009

What Is WiMax?




A wireless technology based on the IEEE 802.16 standard providing metropolitan area network connectivity for fixed wireless access at broadband

Saturday, May 30, 2009

Hide your files in jpeg format

Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.
1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. 
6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .


Lock any folder without using any software

Paste it in notepad:

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Save it as batch file(with extension .bat).Any name will do.
Now you see a batch file.
Double click it to create a folder locker.
A new folder named Locker would be formed at the same location.
Now brings all the files you want to hide in the locker folder.
Now double click the batch file to lock the folder namely Locker.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.
The password here is "pass"

Create desktop icon for restart and shutdown

Do the following:
1. Right click on your desktop
2. Then in NEW click on SHORTCUT
3. A shortcut wizard will appear
4. Type this in the box:
shutdown -s -t 00
5. Your done now right click on the folder>properties>Change Icon
And then choose any appropriate icon
For restart instead of -s type -r

To Make ur more protected system

Many wud know about BIOS password and logon password

There is also another startup password for more protection

1)Open Run and type syskey
2)A "Securing the windows....." window will open.
3)Click on update button and in the opening window select password start password
4)Give a password.

This will create another password for statrup


More bandwidth in ur network connection

Most of the ppl dont know that they use only 80% of their bandwidth of their network connection....

Microsoft utilise the other 20% for its own purposes....
To use all the bandwidth follow the instructions
1)Open "run" and type "gpedit.msc"
2)It will open Group Policy editor window
3)There select Computer configuration
4)Select Administrative Templates
5)Select Network
6)Select QoS Packet Scheduler
7)There select "Limit Reservable Bandwidth"
8)It will open a New window
9)By default It would b set to "not configured"
10)Click on "enabled" and change 20 to 0
11)Then apply the settings...

Now u'll have full utilisation of ur bandwidth.....

U can have ur own Invisible folder for hiding ur stuff in ur PC

U can have ur own Invisible folder for hiding ur stuff in ur PC

1)Create a new folder anywher in u want...
2)Then hold "Alt" key and using numeric keypad type"255"
3)This will create a folder without a name
4)Then ryt click on the folder and click properties...
5)Goto customize tab......Click change icon....
6)There select an empty icon for ur folder(It 'll be in the 13th column)
7)Click apply and ok......
8)Ur invisible folder is ready for ur use!!!

Break the rapidshare waiting time .!

1. Goto the page you want to download. (the rapidshare address of your download)
2. Select FREE button
3. In the address bar put the following: javascript:alert(c=0) OR javascript:alert(c=1) 
4. Click on the "go to" button
5. Click OK to the pop-up box
6. Enter the captcha ( if asked )
7. Download Your File. Enjoy!

RFID Chips Gain Computing Skills


                              Smarter Than It Looks: RFID chips can do complex calculations

One way to do long computations with short bursts of power


In the 2000 movie Memento, the main character tries to solve the mystery of his wife’s murder, despite suffering from amnesia that causes his brain to effectively “reboot” every 5 minutes. In the world of computing, “passive” radio-frequency identification (RFID) chips have a similar problem. Dependent for power on infrequent, scavenged RF energy from a reading device, RFID chips may reboot more than once per second and then lie dormant indefinitely, waiting for the next reader to come along.

But computer scientists in Massachusetts are working on software, aptly named Mementos, that could allow an RFID to perform computations that span many power losses and reboots. The software may enable the chip to compute cryptographic protocols, leading to more secure signals. And it might allow RFID chips to be more than just data collectors. They could analyze and possibly take action based on changes to the stress on a “smart” bridge or to trends in a person’s vital signs, for instance. Such computational RFIDs could play a role in the transformation of the Internet from a network of computers to a network of things—appliances, cars, smart clothes, and so on.

“We’re working on software to make it possible to actually compute, given that our power is going to be disappearing and reappearing,” says Kevin Fu, assistant professor of computer science at the University of Massachusetts Amherst.

Mementos does two things: It makes sure that the RFID keeps working toward finishing a computation, and it also keeps the chip in a state such that if it loses power, it can quickly resume work when the power returns. One way the software does that is to have the chip perform energy-intensive tasks, such as writing data to flash memory, only when ample power (more than 2.2 milliwatts) is available. 

Ravi Pappu, cofounder of the RFID company ThingMagic, based in Cambridge, Mass., says that the work of Fu’s team is very important. 

“We have millions of computers everywhere, but computers have been chained to desks and server racks and other kinds of ­infrastructure,” Pappu says. “Rather than being constrained by dragging computers of various shapes and sizes into the real world, could we equip the real world with computing? I think what Kevin and his guys have done is an advance in that direction.”

Fu and his colleagues developed their RFID computing software on Intel’s prototype Wireless Identification and Sensing Platform (WISP), a postage-stamp-size RFID chip with specs suited for a 1980s home-brew computing enthusiast: a 16‑megahertz microprocessor, 512 bytes of RAM, and 8 kilobytes of storage (in the form of flash memory).

The amount of RF power WISP picks up, Fu says, can vary drastically. And Mementos must make programs run on WISP perform under each scenariosleep (0.2 to 2.5 microwatts); midrange (1.8 to 3.6 mW), which allows it to read from memory and compute; and active (2.2 to 25.2 mW) in which it can even write to flash memory.

“As much as possible we’d like to protect programmers from the underlying problems” of fluctuating power and regular reboots, says Benjamin Ransford, a graduate student in Fu’s lab.

Jason Flinn, associate professor of computer science and engineering at the University of Michigan, says he’s impressed by Mementos but thinks that it still has a long way to go. 

The University of Massachusetts work “asks some very interesting questions and has some preliminary ideas,” he says. “But I don’t know that they’ve solved those problems or fully validated it yet.”

Tuesday, April 14, 2009

Allowing Network Access with Blank Passwords

Although you can log in locally without a password, but by default Windows XP does not allow network users to access the computer without a password. 
Typically you will get 'Unknown error 31' or 'Access denied' errors. To override this problem follow the below steps.
Go to Start -> Run and type gpedit.msc and then press enter. 
Wait for the Group Policy Editor,
 go to Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options and then double click on Accounts: Limit local account use of blank passwords to console login only and Disable it.

Sunday, March 29, 2009

.NET Remoting Interview Questions

  1. What’s a Windows process?
    It’s an application that’s running and had been allocated memory. 
     
  2. What’s typical about a Windows process in regards to memory allocation?
    Each process is allocated its own block of available RAM space, no process can access another process’ code or data. If the process crashes, it dies alone without taking the entire OS or a bunch of other applications down. 
     
  3. Explain what relationship is between a Process, Application Domain, and Application?
    A process is an instance of a running application. An application is an executable on the hard drive or network. There can be numerous processes launched of the same application (5 copies of Word running), but 1 process can run just 1 application. 
      
  4. What are possible implementations of distributed applications in .NET?
    .NET Remoting and ASP.NET Web Services. If we talk about the Framework Class Library, noteworthy classes are in System.Runtime.Remoting and System.Web.Services. 
     
  5. What are the consideration in deciding to use .NET Remoting or ASP.NET Web Services?
    Remoting is a more efficient communication exchange when you can control both ends of the application involved in the communication process.  Web Services provide an open-protocol-based exchange of informaion.  Web Services are best when you need to communicate with an external organization or another (non-.NET) technology.
      
  6. What’s a proxy of the server object in .NET Remoting?
    It’s a fake copy of the server object that resides on the client side and behaves as if it was the server. It handles the communication between real server object and the client object. This process is also known as marshaling
     
  7. What are remotable objects in .NET Remoting?
    Remotable objects are the objects that can be marshaled across the application domains. You can marshal by value, where a deep copy of the object is created and then passed to the receiver. You can also marshal by reference, where just a reference to an existing object is passed. 
     
  8. What are channels in .NET Remoting?
    Channels represent the objects that transfer the other serialized objects from one application domain to another and from one computer to another, as well as one process to another on the same box. A channel must exist before an object can be transferred. 
     
  9. What security measures exist for .NET Remoting in System.Runtime.Remoting?
    None. Security should be taken care of at the application level. Cryptography and other security techniques can be applied at application or server level. 
     
  10. What is a formatter?
    A formatter is an object that is responsible for encoding and serializing data into messages on one end, and deserializing and decoding messages into data on the other end. 
     
  11. Choosing between HTTP and TCP for protocols and Binary and SOAP for formatters, what are the trade-offs?
    Binary over TCP is the most effiecient, SOAP over HTTP is the most interoperable. 
     
  12. What’s SingleCall activation mode used for?
    If the server object is instantiated for responding to just one single request, the request should be made in SingleCall mode. 
     
  13. What’s Singleton activation mode?
    A single object is instantiated regardless of the number of clients accessing it. Lifetime of this object is determined by lifetime lease. 
     
  14. How do you define the lease of the object?
    By implementing ILease interface when writing the class code. 
     
  15. Can you configure a .NET Remoting object via XML file?
    Yes, via machine.config and application level .config file (or web.config in ASP.NET). Application-level XML settings take precedence over machine.config. 
     
  16. How can you automatically generate interface for the remotable object in .NET with Microsoft tools?
    Use the Soapsuds tool.

ASP.NET Interview Questions

  1. Describe the role of inetinfo.exe, aspnet_isapi.dll andaspnet_wp.exe in the page loading process.
    inetinfo.exe is theMicrosoft IIS server running, handling ASP.NET requests among other things.When an ASP.NET request is received (usually a file with .aspx extension), the ISAPI filter aspnet_isapi.dll takes care of it by passing the request tothe actual worker process aspnet_wp.exe.
     
  2. What’s the difference between Response.Write() andResponse.Output.Write()?
    Response.Output.Write() allows you to write formatted output. 
     
  3. What methods are fired during the page load?
    Init() - when the page is instantiated
    Load() - when the page is loaded into server memory
    PreRender() - the brief moment before the page is displayed to the user as HTML
    Unload() - when page finishes loading. 
     
  4. When during the page processing cycle is ViewState available?
    After the Init() and before the Page_Load(), or OnLoad() for a control. 
     
  5. What namespace does the Web page belong in the .NET Framework class hierarchy?
    System.Web.UI.Page 
     
  6. Where do you store the information about the user’s locale?
    System.Web.UI.Page.Culture 
     
  7. What’s the difference between Codebehind="MyCode.aspx.cs" andSrc="MyCode.aspx.cs"?
    CodeBehind is relevant to Visual Studio.NET only. 
     
  8. What’s a bubbled event?
    When you have a complex control, like DataGrid, writing an event processing routine for each object (cell, button, row, etc.) is quite tedious. The controls can bubble up their eventhandlers, allowing the main DataGrid event handler to take care of its constituents. 
     
  9. Suppose you want a certain ASP.NET function executed on MouseOver for a certain button.  Where do you add an event handler?
    Add an OnMouseOver attribute to the button.  Example:btnSubmit.Attributes.Add("onmouseover","someClientCodeHere();"); 
     
  10. What data types do the RangeValidator control support?
    Integer, String, and Date. 
     
  11. Explain the differences between Server-side and Client-side code?
    Server-side code executes on the server.  Client-side code executes in the client's browser. 
     
  12. What type of code (server or client) is found in a Code-Behind class?
    The answer is server-side code since code-behind is executed on the server.  However, during the code-behind's execution on the server, it can render client-side code such as JavaScript to be processed in the clients browser.  But just to be clear, code-behind executes on the server, thus making it server-side code. 
     
  13. Should user input data validation occur server-side or client-side?  Why?
    All user input data validation should occur on the server at a minimum.  Additionally, client-side validation can be performed where deemed appropriate and feasable to provide a richer, more responsive experience for the user. 
     
  14. What is the difference between Server.Transfer and Response.Redirect?  Why would I choose one over the other?
    Server.Transfer transfers page processing from one page directly to the next page without making a round-trip back to the client's browser.  This provides a faster response with a little less overhead on the server.  Server.Transfer does not update the clients url history list or current url.  Response.Redirect is used to redirect the user's browser to another page or site.  This performas a trip back to the client where the client's browser is redirected to the new page.  The user's browser history list is updated to reflect the new address. 
     
  15. Can you explain the difference between an ADO.NET Dataset and an ADO Recordset?
    Valid answers are:
    ·  
    A DataSet can represent an entire relational database in memory, complete with tables, relations, and views.
    ·  A DataSet is designed to work without any continuing connection to the original data source.
    ·  Data in a DataSet is bulk-loaded, rather than being loaded on demand.
    ·  There's no concept of cursor types in a DataSet.
    ·  DataSets have no current record pointer You can use For Each loops to move through the data.
    ·  You can store many edits in a DataSet, and write them to the original data source in a single operation.
    ·  Though the DataSet is universal, other objects in ADO.NET come in different versions for different data sources. 
     
  16. What is the Global.asax used for?
    The Global.asax (including the Global.asax.cs file) is used to implement application and session level events. 
     
  17. What are the Application_Start and Session_Start subroutines used for?
    This is where you can set the specific variables for the Application and Session objects. 
     
  18. Can you explain what inheritance is and an example of when you might use it?
    When you want to inherit (use the functionality of) another class.  Example: With a base class named Employee, a Manager class could be derived from the Employee base class. 
     
  19. Whats an assembly?
    Assemblies are the building blocks of the .NET framework. Overview of assemblies from MSDN 
     
  20. Describe the difference between inline and code behind.
    Inline code written along side the html in a page. Code-behind is code written in a separate file and referenced by the .aspx page. 
     
  21. Explain what a diffgram is, and a good use for one?
    The DiffGram is one of the two XML formats that you can use to render DataSet object contents to XML.  A good use is reading database data to an XML file to be sent to a Web Service. 
     
  22. Whats MSIL, and why should my developers need an appreciation of it if at all?
    MSIL is the Microsoft Intermediate Language. All .NET compatible languages will get converted to MSIL.  MSIL also allows the .NET Framework to JIT compile the assembly on the installed computer. 
     
  23. Which method do you invoke on the DataAdapter control to load your generated dataset with data?
    The Fill() method. 
     
  24. Can you edit data in the Repeater control?
    No, it just reads the information from its data source. 
     
  25. Which template must you provide, in order to display data in a Repeater control?
    ItemTemplate. 
     
  26. How can you provide an alternating color scheme in a Repeater control?
    Use the AlternatingItemTemplate. 
     
  27. What property must you set, and what method must you call in your code, in order to bind the data from a data source to the Repeater control?
    You must set the DataSource property and call the DataBind method. 
     
  28. What base class do all Web Forms inherit from?
    The Page class. 
     
  29. Name two properties common in every validation control?
    ControlToValidate property and Text property. 
     
  30. Which property on a Combo Box do you set with a column name, prior to setting the DataSource, to display data in the combo box?
    DataTextField property. 
     
  31. Which control would you use if you needed to make sure the values in two different controls matched?
    CompareValidator control. 
     
  32. How many classes can a single .NET DLL contain?
    It can contain many classes.
     

Web Service Questions

  1. What is the transport protocol you use to call a Web service?
    SOAP (Simple Object Access Protocol) is the preferred protocol. 
     
  2. True or False: A Web service can only be written in .NET?
    False 
     
  3. What does WSDL stand for?
    Web Services Description Language. 
     
  4. Where on the Internet would you look for Web services?
    http://www.uddi.org 
     
  5. True or False: To test a Web service you must create a Windows application or Web application to consume this service?
    False, the web service comes with a test page and it provides HTTP-GET method to test.
     

State Management Questions

  1. What is ViewState?
    ViewState allows the state of objects (serializable) to be stored in a hidden field on the page.  ViewState is transported to the client and back to the server, and is not stored on the server or any other external source.  ViewState is used the retain the state of server-side objects between postabacks. 
     
  2. What is the lifespan for items stored in ViewState?
    Item stored in ViewState exist for the life of the current page.  This includes postbacks (to the same page). 
     
  3. What does the "EnableViewState" property do?  Why would I want it on or off?
    It allows the page to save the users input on a form across postbacks.  It saves the server-side values for a given control into ViewState, which is stored as a hidden value on the page before sending the page to the clients browser.  When the page is posted back to the server the server control is recreated with the state stored in viewstate. 
     
  4. What are the different types of Session state management options available with ASP.NET?
    ASP.NET provides In-Process and Out-of-Process state management.  In-Process stores the session in memory on the web server.  This requires the a "sticky-server" (or no load-balancing) so that the user is always reconnected to the same web server.  Out-of-Process Session state management stores data in an external data source.  The external data source may be either a SQL Server or a State Server service.  Out-of-Process state management requires that all objects stored in session are serializable.

C# Interview Questions

General Questions

  1. Does C# support multiple-inheritance? 
    No.
     
  2. Who is a protected class-level variable available to? 
    It is available to any sub-class (a class inheriting this class).
     
  3. Are private class-level variables inherited? 
    Yes, but they are not accessible.  Although they are not visible or accessible via the class interface, they are inherited. 
     
  4. Describe the accessibility modifier “protected internal”. 
    It is available to classes that are within the same assembly and derived from the specified base class. 
     
  5. What’s the top .NET class that everything is derived from? 
    System.Object. 
     
  6. What does the term immutable mean?
    The data value may not be changed.  Note: The variable value may be changed, but the original immutable data value was discarded and a new data value was created in memory.
     
     
  7. What’s the difference between System.String and System.Text.StringBuilder classes?
    System.String is immutable.  System.StringBuilder was designed with the purpose of having a mutable string where a variety of operations can be performed. 
     
  8. What’s the advantage of using System.Text.StringBuilder over System.String?
    StringBuilder is more efficient in cases where there is a large amount of string manipulation.  Strings are immutable, so each time a string is changed, a new instance in memory is created.
     
  9. Can you store multiple data types in System.Array?
    No. 
     
  10. What’s the difference between the System.Array.CopyTo() and System.Array.Clone()?
    The Clone() method returns a new array (a shallow copy) object containing all the elements in the original array.  The CopyTo() method copies the elements into another existing array.  Both perform a shallow copy.  A shallow copy means the contents (each array element) contains references to the same object as the elements in the original array.  A deep copy (which neither of these methods performs) would create a new instance of each element's object, resulting in a different, yet identacle object.
     
  11. How can you sort the elements of the array in descending order?
    By calling Sort() and then Reverse() methods. 
     
  12. What’s the .NET collection class that allows an element to be accessed using a unique key?
    HashTable. 
     
  13. What class is underneath the SortedList class?
    A sorted HashTable. 
     
  14. Will the finally block get executed if an exception has not occurred?
    Yes. 
     
  15. What’s the C# syntax to catch any possible exception?
    A catch block that catches the exception of type System.Exception.  You can also omit the parameter data type in this case and just write catch {}. 
     
  16. Can multiple catch blocks be executed for a single try statement?
    No.  Once the proper catch block processed, control is transferred to the finally block (if there are any). 
     
  17. Explain the three services model commonly know as a three-tier application.
    Presentation (UI), Business (logic and underlying code) and Data (from storage or other sources). 
     

Class Questions

  1. What is the syntax to inherit from a class in C#? 
    Place a colon and then the name of the base class.
    Example: class MyNewClass : MyBaseClass 
     
  2. Can you prevent your class from being inherited by another class? 
    Yes.  The keyword “sealed” will prevent the class from being inherited. 
     
  3. Can you allow a class to be inherited, but prevent the method from being over-ridden?
    Yes.  Just leave the class public and make the method sealed. 
     
  4. What’s an abstract class?
    A class that cannot be instantiated.  An abstract class is a class that must be inherited and have the methods overridden.  An abstract class is essentially a blueprint for a class without any implementation. 
     
  5. When do you absolutely have to declare a class as abstract?
    1. When the class itself is inherited from an abstract class, but not all base abstract methods have been overridden. 
    2.  
    When at least one of the methods in the class is abstract. 
     
  6. What is an interface class?
    Interfaces, like classes, define a set of properties, methods, and events. But unlike classes, interfaces do not provide implementation. They are implemented by classes, and defined as separate entities from classes. 
     
  7. Why can’t you specify the accessibility modifier for methods inside the interface?
    They all must be public, and are therefore public by default. 
     
  8. Can you inherit multiple interfaces?
    Yes.  .NET does support multiple interfaces. 
     
  9. What happens if you inherit multiple interfaces and they have conflicting method names?
    It’s up to you to implement the method inside your own class, so implementation is left entirely up to you. This might cause a problem on a higher-level scale if similarly named methods from different interfaces expect different data, but as far as compiler cares you’re okay. 
    To Do: Investigate 
     
  10. What’s the difference between an interface and abstract class?
    In an interface class, all methods are abstract - there is no implementation.  In an abstract class some methods can be concrete.  In an interface class, no accessibility modifiers are allowed.  An abstract class may have accessibility modifiers. 
     
  11. What is the difference between a Struct and a Class?
    Structs are value-type variables and are thus saved on the stack, additional overhead but faster retrieval.  Another difference is that structs cannot inherit. 
     

Method and Property Questions

  1. What’s the implicit name of the parameter that gets passed into the set method/property of a class? 
    Value.  The data type of the value parameter is defined by whatever data type the property is declared as. 
     
  2. What does the keyword “virtual” declare for a method or property? 
    The method or property can be overridden. 
     
  3. How is method overriding different from method overloading? 
    When overriding a method, you change the behavior of the method for the derived class.  Overloading a method simply involves having another method with the same name within the class. 
     
  4. Can you declare an override method to be static if the original method is not static? 
    No.  The signature of the virtual method must remain the same.  (Note: Only the keyword virtual is changed to keyword override) 
     
  5. What are the different ways a method can be overloaded? 
    Different parameter data types, different number of parameters, different order of parameters. 
     
  6. If a base class has a number of overloaded constructors, and an inheriting class has a number of overloaded constructors; can you enforce a call from an inherited constructor to a specific base constructor?
    Yes, just place a colon, and then keyword base (parameter list to invoke the appropriate constructor) in the overloaded constructor definition inside the inherited class.
     

Events and Delegates

  1. What’s a delegate? 
    A delegate object encapsulates a reference to a method. 
     
  2. What’s a multicast delegate? 
    A delegate that has multiple handlers assigned to it.  Each assigned handler (method) is called.
     

XML Documentation Questions

  1. Is XML case-sensitive? 
    Yes. 
     
  2. What’s the difference between // comments, /* */ comments and /// comments? 
    Single-line comments, multi-line comments, and XML documentation comments. 
     
  3. How do you generate documentation from the C# file commented properly with a command-line compiler? 
    Compile it with the /doc switch.
     

Debugging and Testing Questions

  1. What debugging tools come with the .NET SDK?
    1.   CorDBG – command-line debugger.  To use CorDbg, you must compile the original C# file using the /debug switch. 
    2.   DbgCLR – graphic debugger.  Visual Studio .NET uses the DbgCLR. 
     
  2. What does assert() method do? 
    In debug compilation, assert takes in a Boolean condition as a parameter, and shows the error dialog if the condition is false.  The program proceeds without any interruption if the condition is true. 
     
  3. What’s the difference between the Debug class and Trace class? 
    Documentation looks the same.  Use Debug class for debug builds, use Trace class for both debug and release builds. 
     
  4. Why are there five tracing levels in System.Diagnostics.TraceSwitcher? 
    The tracing dumps can be quite verbose.  For applications that are constantly running you run the risk of overloading the machine and the hard drive.  Five levels range from None to Verbose, allowing you to fine-tune the tracing activities. 
     
  5. Where is the output of TextWriterTraceListener redirected? 
    To the Console or a text file depending on the parameter passed to the constructor. 
     
  6. How do you debug an ASP.NET Web application? 
    Attach the aspnet_wp.exe process to the DbgClr debugger. 
     
  7. What are three test cases you should go through in unit testing? 
    1.       Positive test cases (correct data, correct output).
    2.       Negative test cases (broken or missing data, proper handling).
    3.       Exception test cases (exceptions are thrown and caught properly). 
     
  8. Can you change the value of a variable while debugging a C# application? 
    Yes.  If you are debugging via Visual Studio.NET, just go to Immediate window. 
     

ADO.NET and Database Questions

  1. What is the role of the DataReader class in ADO.NET connections? 
    It returns a read-only, forward-only rowset from the data source.  A DataReader provides fast access when a forward-only sequential read is needed. 
     
  2. What are advantages and disadvantages of Microsoft-provided data provider classes in ADO.NET? 
    SQLServer.NET data provider is high-speed and robust, but requires SQL Server license purchased from Microsoft. OLE-DB.NET is universal for accessing other sources, like Oracle, DB2, Microsoft Access and Informix.  OLE-DB.NET is a .NET layer on top of the OLE layer, so it’s not as fastest and efficient as SqlServer.NET. 
     
  3. What is the wildcard character in SQL? 
    Let’s say you want to query database with LIKE for all employees whose name starts with La. The wildcard character is %, the proper query with LIKE would involve ‘La%’. 
     
  4. Explain ACID rule of thumb for transactions.
    A transaction must be:
    1.       Atomic - it is one unit of work and does not dependent on previous and following transactions.
    2.       Consistent - data is either committed or roll back, no “in-between” case where something has been updated and something hasn’t.
    3.       Isolated - no transaction sees the intermediate results of the current transaction).
    4.       Durable - the values persist if the data had been committed even if the system crashes right after. 
     
  5. What connections does Microsoft SQL Server support? 
    Windows Authentication (via Active Directory) and SQL Server authentication (via Microsoft SQL Server username and password). 
     
  6. Between Windows Authentication and SQL Server Authentication, which one is trusted and which one is untrusted? 
    Windows Authentication is trusted because the username and password are checked with the Active Directory, the SQL Server authentication is untrusted, since SQL Server is the only verifier participating in the transaction. 
     
  7. What does the Initial Catalog parameter define in the connection string? 
    The database name to connect to. 
     
     
  8. What does the Dispose method do with the connection object? 
    Deletes it from the memory.
    To Do: answer better.  The current answer is not entirely correct. 
     
  9. What is a pre-requisite for connection pooling? 
    Multiple processes must agree that they will share the same connection, where every parameter is the same, including the security settings.  The connection string must be identical.
     

Assembly Questions

  1. How is the DLL Hell problem solved in .NET? 
    Assembly versioning allows the application to specify not only the library it needs to run (which was available under Win32), but also the version of the assembly. 
     
  2. What are the ways to deploy an assembly? 
    An MSI installer, a CAB archive, and XCOPY command. 
     
  3. What is a satellite assembly? 
    When you write a multilingual or multi-cultural application in .NET, and want to distribute the core application separately from the localized modules, the localized assemblies that modify the core application are called satellite assemblies. 
     
  4. What namespaces are necessary to create a localized application? 
    System.Globalization and System.Resources.
     
  5. What is the smallest unit of execution in .NET?
    an Assembly.
     
  6. When should you call the garbage collector in .NET?
    As a good rule, you should not call the garbage collector.  However, you could call the garbage collector when you are done using a large object (or set of objects) to force the garbage collector to dispose of those very large objects from memory.  However, this is usually not a good practice.
     
  7. How do you convert a value-type to a reference-type?
    Use Boxing.
     
  8. What happens in memory when you Box and Unbox a value-type?
    Boxing converts a value-type to a reference-type, thus storing the object on the heap.  Unboxing converts a reference-type to a value-type, thus storing the value on the stack.

 


Wednesday, March 25, 2009

Job interview preparation

Job interview preparation

Most often candidates find themselves tongue-tied at interviews when confronted with certain issues. There are candidates who can rattle off for hours on end about their job but become absolutely speechless when the question is directed at him - the person.

It pays to do an introspection and self-analysis about oneself - experiences in life that have molded him, helped him in certain critical situations, etc. One needs to think about one's life style, what he has learned through the years whether academically, professionally or personally. This not only helps him to clearly speak about himself but he is also in touch with himself

Candidates need to be prepared well enough about the organization that they have been to for an interview. Research the company on the Internet, or by reading its own promotional literature and annual report. Read newspapers daily.

First impression is the best impression. A firm handshake, constant eye contact and other sort of body language speak louder than words. Good dressing is also very important.

Interviews usually consist of one or more of the following steps: aptitude test, group discussion, psychological test, and personal interview. Useful tips for each stage are given below.

Aptitude Test

  • Most aptitude tests for nursing professionals check for quantitative, reasoning and verbal abilities. They will usually be multiple choice type question papers.
  • Reading up mathematics textbooks and dictionaries just before the test will not help much. These abilities are cultivated over a long period of time - most questions are based on what you studied in high school.
  • Practice tests can help a lot. Get hold of a few practice tests and do them 2-3 days before the actual test.
  • Don't panic on the day of the test - you will do your best if you are not worried. Aim at achieving as much as you did in the practice tests.
  • Try to finish as many questions as possible, if you are stuck on a difficult problem - leave it aside and proceed to the next one.

Group Discussion

  • Group discussions are meant to judge your communication and interpersonal abilities. The observers will be looking for verbal and non-verbal skills, clarity of thought, leadership abilities and other interpersonal skills.
  • Usually a current topic will be taken up and a group of 8-12 people will be asked to discuss the topic.
  • There is no need to prepare on specific topics. If you read the newspapers - it should be enough.
  • You do not have to be the first to speak out to be noticed. It is often better for someone else to begin the discussion. However, if you are very well informed on the topic it might be a good idea to set the ball rolling.
  • Listen carefully to what others are saying. It is a good idea to quote others when you speak while supporting, building or even criticising them.
  • Be natural and talk normally and be yourself - it always gives the best results.

Psychological Tests

  • Psychological tests are used to mainly determine your personal attributes. They will usually be multiple choice type question papers.
  • There are no right or wrong answers to psychological tests - it is your opinion!
  • Avoid trying to fool tests, they are usually designed to ask the same questions in different ways again and again. If you are manipulating the results will show inconsistencies and the observer might choose to ignore the test or administer another test.

Personal Interview

Personal interviews are usually conducted by Human Resources professionals. They will be trying to understand you as a person and your motivation for joining the company.

  • "Tell us something about yourself" is perhaps the most common first question asked in interviews. It might be a good idea to prepare a brief opening statement and be ready for the question. It will be a good idea to mention your education, jobs and interest in applying in your opening statement.
  • Interviewers will often have gone through your resume in detail, be prepared to explain any statement made in your resume.
  • Answer all questions directly and honestly, it is not a trial!
  • Don't try to mask all your weaknesses - all human beings have them and so does the person interviewing you.
  • "Why do you want to change a job" is another common question, be prepared for it. Honestly answer the question, if you are trying to get a better salary - say so. The lesser you conceal your motives - the easier it will be for the interviewer to make a decision. Keeping the interviewer in suspense will only lead to a postponement in decision - not a favourable decision.
  • Appearance is important - dress formally or as you will usually for an important occasion.
  • Appear at least 10 minutes before the interview. It makes a good impression and you also get some time to get used to the surroundings.

 

Tips on interviews and Group Discussions

Tips on interviews and Group Discussions

 

In a group discussion what should my objectives be and how should I achieve them?

In order to succeed at any unstructured group discussion, you must define what your objective in the group is. A good definition of your objective is - to be seen to have contributed meaningfully in an attempt to achieve the right consensus.

The key words in this definition are 'seen', 'meaningfully', and 'attempt'. Let us understand what each of these imply in terms of action points :

The first implication is that merely making a meaningful contribution in an attempt to achieve consensus is not enough. You have to be seen by the evaluator to have made a meaningful contribution in an attempt to build the right consensus.

In other words you must ensure that you are heard by the group. If the group hears you so will the evaluator. You must get at least some airtime. If you are not a very assertive person you will have to simply learn to be assertive for those 15 minutes. If you get cowed down easily in an aggressive group, you can say goodbye to the business school admission.

Many GD participants often complain that they did not get a chance to speak. The fact of the matter is that in no GD do you get a chance to speak. You have to make your chances.

The second important implication is that making just any sort of contribution is not enough. Your contribution has to be meaningful.

A meaningful contribution suggests that you have a good knowledge base, are able to structure arguments logically and are a good communicator. These are qualities that are desired by all evaluators.

Many GD participants feel that the way to succeed in a GD is by speaking frequently, for a long time and loudly. This is not true. The quality of what you say is more important than the quantity. Don't be demoralized if you feel you have not spoken enough. If you have spoken sense and have been heard, even if only for a short time, it is usually good enough. You must have substance in your arguments. Therefore, think things through carefully.

Always enter the room with a piece of paper and a pen. In the first two minutes jot down as many ideas as you can. It pays to think laterally. Everybody else will state the obvious. Can you state something different? Can you take the group ahead if it is stuck at one point? Can you take it in a fresh and more relevant direction? You may like to dissect the topic and go into the underlying causes or into the results.

One way of deciding what sort of contribution is meaningful at what point of time is to follow two simple rules. First, in times of chaos a person who restores order to the group is appreciated. Your level of participation in a fish market kind of scenario can be low, but your degree of influence must never be low. In other words you must make positive contributions every time you speak and not speak for the sake of speaking. The second rule is applicable when the group is floundering. In this situation a person who provides a fresh direction to the group is given credit.

The third implication is that you must be clearly seen to be attempting to build a consensus. Nobody expects a group of ten people, all with different points of view on a controversial subject to actually achieve a consensus. But did you make the attempt to build a consensus?

The reason why an attempt to build a consensus is important is because in most work situations you will have to work with people in a team, accept joint responsibilities and take decisions as a group. You must demonstrate the fact that you are capable and inclined to work as part of a team.

What are the ways that you can try to build consensus?

First, you must not just talk, you should also listen. You must realize that other people also may have valid points to make. You should not only try to persuade other people to your point of view, but also come across as a person who has an open mind and appreciates the valid points of others.

You must try and resolve contradictions and arguments of others in the group. You must synthesize arguments and try and achieve a unified position in the group. Try to think of the various arguments of your's and others' as parts of a jigsaw puzzle or as building blocks of a larger argument for or against the topic.

Try and lay down the boundaries or the area of the discussion at the beginning. Discuss what the group should discuss before actually beginning your discussion. This will at least ensure that everyone is talking about the same thing.

Try and summarize the discussion at the end. In the summary do not merely restate your point of view; also accommodate dissenting viewpoints. If the group did not reach a consensus, say so in your summary.

You must carry people with you. So do not get emotional, shout, invade other people's private space. Do not bang your fist on the table except in extreme circumstances.

If you have spoken and you notice that someone else has tried to enter the discussion on a number of occasions and has not had the chance to do so maybe you could give him a chance the next time he tries. But do not offer a chance to anyone who is not trying to speak. He may not have anything to say at that point and you will just end up looking foolish.

The surest way of antagonizing others in the GD as well as the examiner is to appoint yourself as a de facto chairperson of the group. Do not try to impose a system whereby everyone gets a chance to speak in turn. A GD is meant to be a free flowing discussion. Let it proceed naturally. Do not ever try to take a vote on the topic. A vote is no substitute for discussion.

Do not address only one or two persons when speaking. Maintain eye contact with as many members of the group as possible. This will involve others in what you are saying and increase your chances of carrying them with you. Do this even if you are answering a specific point raised by one person.

One last point. You must not agree with another participant in the group merely for the sake of achieving consensus. If you disagree, say so. You are not there to attempt to build just any consensus. You have to attempt to build the right consensus. 

Is it wise to take a strong stand either in favour or against the topic right at the start of a Group Discussion ?

In theory yes. If you believe something why shouldn't you say so? If we are convinced about something our natural response is to say so emphatically.

However in practice what is likely to happen if you take a very strong and dogged stance right at the beginning of the interview is that you will antagonise the people in the group who disagree with you and will be unable to carry them with you and convince them of the validity of your argument. We therefore recommend that after you hear the topic you think about it for a minute with an open mind and note down the major issues that come to your mind. Don't jump to any conclusions. Instead arrive at a stand in your own mind after examining all the issues in a balanced manner. Only then begin to speak. And when you do so outline the major issues first and only then state your stand. In other words give the justification first and the stand later. If you were to state your stand first chances are that the others in the group who disagree with your stand will interrupt to contradict you before you can elaborate on the reasons why you have taken that stance. In this situation the evaluator will only get an impression of what you think and not how you think. Remember you are being evaluated on how you think and not what you think.

 

Is it a good strategy to try and be the first speaker on the topic in a GD?

In most GD's the opening speaker is the person who is likely to get the maximum uninterrupted airtime. The reason is simple - at the start most other participants in the GD are still trying to understand the basic issues in the topic, or are too nervous to speak and are waiting for someone else to start. Therefore the evaluators get the best chance to observe the opening speaker. Now this is a double edged sword. If the opening speaker talks sense naturally he will get credit because he opened and took the group in the right direction. If on the other hand the first speaker doesn't have too much sense to say, he will attract the undivided attention of the evaluators to his shortcomings. He will be marked as a person who speaks without thinking merely for the sake of speaking. As someone who leads the group in the wrong direction and does not make a positive contribution to the group.

So remember speaking first is a high risk high return strategy. It can make or mar your GD performance depending how you handle it. Speak first only if you have something sensible to say. Otherwise keep shut and let someone else start.

 

In an interview how does one handle the question "Tell us about yourself?".

An often asked opening question. Perhaps the most frequently asked question across interviews. Your opening statement needs to be a summary of your goals, overall professional capabilities, achievements, background (educational and family), strengths, professional objectives and anything about your personality that is relevant and interesting. This question represents an opportunity to lead the interviewer in the direction you want him to go e.g., your speciality or whatever else you may wish to highlight.

Your intention should be to try to subtly convince the interviewers that you are a good candidate, you have proved that in the past, and have a personality that fits the requirement.

Remember that the first impression you create will go a long way in the ultimate selection. Keep in mind, most candidates who are asked this question just blurt out their schooling, college, marks and qualifications. All this is already there in the CV. Why tell the interviewer something he already knows?

A final word on approaching this question. Once you have said what you have to say - shut up. Don't drone on for the sake of speaking for you just might say something foolish. Sometimes interviewers don't interrupt in order to give the candidate the impression that he has not spoken enough. This is just a stress inducing tactic. Don't fall for it, if you feel you have spoken enough. In case the pause gets too awkward for you just add something like, "Is there something specific that you wish to know about me?"

 

 Is it better to have a longer selection interview or a shorter one?

The length of an interview in no way is an indicator of how well an interview went. This is especially so when there are a number of candidates to be interviewed for example in the civil services interview or the MBA entrance interview. In the past a number of candidates have reported varying lengths of interviews. Nothing positive or negative should be read into this. An interview is only a device whereby the panel seeks information about the candidate. Information that will help the panel decide whether or not the candidate should be selected. If the panel feels that it has gathered enough information about the candidate in 15 minutes of the interview commencing and that it has no further questions to ask the interview will be terminated in 15 minutes. If on the other hand the panel takes an hour to gather the information required to take a decision the interview will last for an hour. In either case the decision could be positive or negative. It is a fallacy to believe that interview panels take longer interviews of candidates whom they are more interested in. No panel likes to waste its time. If an interview is lasting longer than usual then it only means that the panel is seeking more information about the candidate in order to take a decision.

 

In the MBA entrance interview how do I justify my decision to pursue the MBA programme?

When you are asked this for God's sake don't tell the panel that you are looking for a "challenging job in a good firm with lots of money, status and glamour". That is the first answer that most candidates think of. Unfortunately it is the last answer that will get you admission. In the answer to a direct question on this subject you must convey to the interview panel that you have made a rational and informed decision about your career choice and your intended course of higher study. There are broadly six areas which your answer could touch upon :

Career Objectives : You could talk about your career objectives and how the two year MBA programme will help you achieve them. This implies that you have a clear idea of what your career objectives are and how you wish to achieve them. For example you may want to be an entrepreneur and wish to set up your independent enterprise after doing your MBA and then working for a few years in a professionally managed company. You could explain to the panel that the MBA programme will provide you with the necessary inputs to help you run your business enterprise better. But then you must be clear about what the inputs you will receive in the MBA programme are.

Value Addition : That brings us to the second area that your answer should touch upon. What is the value you will add to yourself during your two year study of management. Value addition will essentially be in two forms knowledge and skills. Knowledge of the various areas of management e.g. marketing, finance, systems, HRD etc. and skills of analysis and communication. You will find it useful to talk to a few people who are either doing their MBA or have already done it. They will be able to give you a more detailed idea of what they gained from their MBA.

Background : Remember, there must be no inconsistency between your proposed study of management and your past subject of study or your past work experience. If you have studied commerce in college then management is a natural course of higher studies. If you are an engineer this is a tricky area. You must never say that by pursuing a career in management you will be wasting your engineering degree. Try and say that the MBA course and your engineering degree will help you do your job better in the company that you will join. But then you should be able to justify how your engineering qualification will help.

Opportunities and Rewards : You could also at this stage mention the opportunities that are opening up in organizations for management graduates. Highlight with examples. At the end you may mention that while monetary rewards are not everything they are also important and MBAs do get paid well. You must not mention these reasons as your primary motivators even if that may be the case. 

Tuesday, March 24, 2009

Computer network

computer network is a group of interconnected computers. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of some types and categories and also presents the basic components of a network.

Introduction

A network is a collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information. The Advance Research Projects Agency (ARPA) designed "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first computer network in the world in late 1960's and early 1970's.[1]

Network classification

The following list presents categories used for classifying networks.


Connection method

Computer networks can also be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as Optical fiberEthernetWireless LANHomePNAPower line communication or G.hn.

Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers.

Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium.

ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.


Scale

Networks are often classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), Virtual Private Network (VPN), Campus Area Network (CAN), Storage Area Network (SAN), etc. depending on their scale, scope and purpose. Usage, trust levels and access rights often differ between these types of network - for example, LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations (such as a building), while WANs may connect physically separate parts of an organization to each other and may include connections to third parties.


Functional relationship (network architecture)

Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active NetworkingClient-server and Peer-to-peer (workgroup) architecture.


Network topology

Computer networks may be classified according to the network topology upon which the network is based, such as bus networkstar network,ring networkmesh networkstar-bus networktree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.


Types of networks

Below is a list of the most common types of computer networks in order of scale.


Personal area network

personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are printers, fax machines, telephones, PDAs and scanners. The reach of a PAN is typically about 20-30 feet (approximately 6-9 meters), but this is expected to increase with technology improvements.


Local area network

local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)[2].

For example, a library may have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnected devices and eventually connect to the Internet. The cables to the servers are typically on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b, 802.11g or possibly 802.11n. The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.

Typical library network, in a branching tree topology and controlled access to resources


All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.

The defining characteristics of LANs, in contrast to WANs (wide area networks), include their higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 400 Gbit/s.


Campus area network

campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting.

In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).

The main aim of a campus area network is to facilitate students accessing internet and university resources. This is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, office building, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.


Metropolitan area network

metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network.


Wide area network

wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose communications links cross metropolitan, regional, or national boundaries [1]). Less formally, a WAN is a network that uses routers and public communications links [1]. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet. A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.


Global area network

global area networks (GAN) specification is in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN).[3]


Virtual private network

virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.


Internetwork

Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). Two or more networks or network segments connected using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork.

In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them:

  • Intranet
  • Extranet
  • Internet

Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.


Intranet

An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.


Extranet

An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g., a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.


Internet

The Internet is a specific internetwork. It consists of a worldwide interconnection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network(ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to distinguish it from other generic internetworks.

Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.


Basic hardware components

All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fiber"). An ethernet card may also be required.


Network interface cards

network cardnetwork adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses.


Repeaters

repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable which runs longer than 100 meters.


Hubs

A hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address.[4]


Bridges

network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.

Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

  1. Local bridges: Directly connect local area networks (LANs)
  2. Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers.
  3. Wireless bridges: Can be used to join LANs or connect remote stations to LANs.


Switches

A switch is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets.[5] This is distinct from a hub in that it only forwards the packets to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (OSI Layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.[6]

Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physicaldata linknetwork, ortransport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch.

Overemphasizing the ill-defined term "switch" often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real-world design concept.


Routers

Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets. Routers work at the network layer .




Diagram of different network topologies.


Network topology is the study of the arrangement or mapping of the elements(links,nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes.[1][2] A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN will have one or more links to one or more other nodes in the network and the mapping of these links and nodes onto a graph results in a geometrical shape that determines the physical topology of the network. Likewise, the mapping of the flow of data between the nodes in the network determines the logical topology of the network. The physical and logical topologies might be identical in any particular network but they also may be different.

Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. LAN Network Topology is, therefore, technically a part of graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.


Basic types of topologies

There are six basic types of topology in networks:

  1. Bus topology
  2. Star topology
  3. Ring topology
  4. Mesh topology
  5. Tree topology
  6. Hybrid topology

Classification of network topologies

There are also three basic categories of network topologies:

  • physical topologies
  • signal topologies
  • logical topologies

The terms signal topology and logical topology are often used interchangeably even though there is a subtle difference between the two and the distinction is not often made between the two.

Physical topologies

The mapping of the nodes of a network and the physical connections between them – i.e., the layout of wiringcables, the locations of nodes, and the interconnections between the nodes and the cabling or wiring system[1].

Classification of physical topologies

Point-to-point

The simplest topology is a permanent link between two endpoints. Switched point-to-point topologies are the basic model of conventionaltelephony. The value of a permanent point-to-point network is the value of guaranteed, or nearly so, communications between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of potential pairs of subscribers, and has been expressed as Metcalfe's Law.

Permanent (dedicated)
Easiest to understand, of the variations of point-to-point topology, is a point-to-point communications channel that appears, to the user, to be permanently associated with the two endpoints. Children's "tin-can telephone" is one example, with a microphone to a single public address speaker is another. These are examples of physical dedicated channels.Within many switched telecommunications systems, it is possible to establish a permanent circuit. One example might be a telephone in the lobby of a public building, which is programmed to ring only the number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a physical circuit between the two points. The resources in such a connection can be released when no longer needed, as, for example, a television circuit from a parade route back to the studio.Switched:Using circuit-switching or packet-switching technologies, a point-to-point circuit can be set up dynamically, and dropped when no longer needed. This is the basic mode of conventional telephony.

Bus:

Linear bus 
The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) – all data that is transmittedbetween nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously (disregarding propagation delays)[1].
Note: The two endpoints of the common transmission medium are normally terminated with a device called a terminator that exhibits the characteristic impedance of the transmission medium and which dissipates or absorbs the energy that remains in the signal to prevent the signal from being reflected or propagated back onto the transmission medium in the opposite direction, which would cause interference with and degradation of the signals on the transmission medium (See Electrical termination).

Distributed bus
The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium – the physical distributed bus topology functions in exactly the same fashion as the physical linear bus topology (i.e., all nodes share a common transmission medium).
Notes:1.) All of the endpoints of the common transmission medium are normally terminated with a device called a 'terminator' (see the note under linear bus).2.) The physical linear bus topology is sometimes considered to be a special case of the physical distributed bus topology – i.e., a distributed bus with no branching segments.3.) The physical distributed bus topology is sometimes incorrectly referred to as a physical tree topology – however, although the physical distributed bus topology resembles the physical tree topology, it differs from the physical tree topology in that there is no central node to which any other nodes are connected, since this hierarchical functionality is replaced by the common bus.

Star
The type of network topology in which each of the nodes of the network is connected to a central node with a point-to-point link in a 'hub' and 'spoke' fashion, the central node being the 'hub' and the nodes that are attached to the central node being the 'spokes' (e.g., a collection of point-to-point links from the peripheral nodes that converge at a central node) – all data that is transmitted between nodes in the network is transmitted to this central node, which is usually some type of device that then retransmits the data to some or all of the other nodes in the network, although the central node may also be a simple common connection point (such as a 'punch-down' block) without any active device to repeat the signals.
Notes:1.) A point-to-point link (described above) is sometimes categorized as a special instance of the physical star topology – therefore, the simplest type of network that is based upon the physical star topology would consist of one node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which node is the 'spoke' being arbitrary[1].2.) After the special case of the point-to-point link, as in note 1.) above, the next simplest type of network that is based upon the physical star topology would consist of one central node – the 'hub' – with two separate point-to-point links to two peripheral nodes – the 'spokes'.3.) Although most networks that are based upon the physical star topology are commonly implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to implement a network that is based upon the physical star topology using a computer or even a simple common connection point as the 'hub' or central node – however, since many illustrations of the physical star network topology depict the central node as one of these special devices, some confusion is possible, since this practice may lead to the misconception that a physical star network requires the central node to be one of these special devices, which is not true because a simple network consisting of three computers connected as in note 2.) above also has the topology of the physical star.4.) Star networks may also be described as either broadcast multi-access or nonbroadcast multi-access (NBMA), depending on whether the technology of the network either automatically propagates a signal at the hub to all spokes, or only addresses individual spokes with each communication.

Extended star
A type of network topology in which a network that is based upon the physical star topology has one or more repeaters between the central node (the 'hub' of the star) and the peripheral or 'spoke' nodes, the repeaters being used to extend the maximum transmission distance of the point-to-point links between the central node and the peripheral nodes beyond that which is supported by the transmitter power of the central node or beyond that which is supported by the standard upon which the physical layer of the physical star network is based.
Note: If the repeaters in a network that is based upon the physical extended star topology are replaced with hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies.

Distributed Star
A type of network topology that is composed of individual networks that are based upon the physical star topology connected together in a linear fashion – i.e., 'daisy-chained' – with no central or top level connection point (e.g., two or more 'stacked' hubs, along with their associated star connected nodes or 'spokes').

Ring
The type of network topology in which each of the nodes of the network is connected to two other nodes in the network and with the first and last nodes being connected to each other, forming a ring – all data that is transmitted between nodes in the network travels from one node to the next node in a circular manner and the data generally flows in a single direction only.

Dual-ring
The type of network topology in which each of the nodes of the network is connected to two other nodes in the network, with two connections to each of these nodes, and with the first and last nodes being connected to each other with two connections, forming a double ring – the data flows in opposite directions around the two rings, although, generally, only one of the rings carries data during normal operation, and the two rings are independent unless there is a failure or break in one of the rings, at which time the two rings are joined (by the stations on either side of the fault) to enable the flow of data to continue using a segment of the second ring to bypass the fault in the primary ring.

Mesh

The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law.

FullFully connected
The type of network topology in which each of the nodes of the network is connected to each of the other nodes in the network with a point-to-point link – this makes it possible for data to be simultaneously transmitted from any single node to all of the other nodes.
Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected.

PartialPartially connected
The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.Note: In most practical networks that are based upon the physical partially connected mesh topology, all of the data that is transmitted between nodes in the network takes the shortest path (or an approximation of the shortest path) between nodes, except in the case of a failure or break in one of the links, in which case the data takes an alternate path to the destination. This requires that the nodes of the network possess some type of logical 'routing' algorithm to determine the correct path to use at any particular time.

Tree

Also known as a hierarchical network.

The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other node above it in the hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the number, being referred to as the 'branching factor' of the hierarchical tree.

Notes:1.) A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the physical topology of a star.2.) A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be classified as a physical linear topology.3.) The branching factor, f, is independent of the total number of nodes in the network and, therefore, if the nodes in the network require ports for connection to other nodes the total number of ports per node may be kept low even though the total number of nodes is large – this makes the effect of the cost of adding ports to each node totally dependent upon the branching factor and may therefore be kept as low as required without any effect upon the total number of nodes that are possible.4.) The total number of point-to-point links in a network that is based upon the physical hierarchical topology will be one less than the total number of nodes in the network.5.) If the nodes in a network that is based upon the physical hierarchical topology are required to perform any processing upon the data that is transmitted between nodes in the network, the nodes that are at higher levels in the hierarchy will be required to perform more processing operations on behalf of other nodes than the nodes that are lower in the hierarchy.

Hybrid network topologies

The hybrid topology is a type of network topology that is composed of one or more interconnections of two or more networks that are based upon the same physical topology, but where the physical topology of the network resulting from such an interconnection does not meet the definition of the original physical topology of the interconnected networks (e.g., the physical topology of a network that would result from an interconnection of two or more networks that are based upon the physical star topology might create a hybrid topology which resembles a mixture of the physical star and physical bus topologies or a mixture of the physical star and the physical tree topologies, depending upon how the individual networks are interconnected, while the physical topology of a network that would result from an interconnection of two or more networks that are based upon the physical distributed bus network retains the topology of a physical distributed bus network).

Star-bus
A type of network topology in which the central nodes of one or more individual networks that are based upon the physical star topology are connected together using a common 'bus' network whose physical topology is based upon the physical linear bus topology, the endpoints of the common 'bus' being terminated with the characteristic impedance of the transmission medium where required – e.g., two or more hubs connected to a common backbone with drop cables through the port on the hub that is provided for that purpose (e.g., a properly configured 'uplink' port) would comprise the physical bus portion of the physical star-bus topology, while each of the individual hubs, combined with the individual nodes which are connected to them, would comprise the physical star portion of the physical star-bus topology.

Star-of-starsHierarchical star
A type of network topology that is composed of an interconnection of individual networks that are based upon the physical star topology connected together in a hierarchical fashion to form a more complex network – e.g., a top level central node which is the 'hub' of the top level physical star topology and to which other second level central nodes are attached as the 'spoke' nodes, each of which, in turn, may also become the central nodes of a third level physical star topology.
Notes:1.) The physical hierarchical star topology is not a combination of the physical linear bus and the physical star topologies, as cited in some texts, as there is no common linear bus within the topology, although the top level 'hub' which is the beginning of the physical hierarchical star topology may be connected to the backbone of another network, such as a common carrier, which is, topologically, not considered to be a part of the local network – if the top level central node is connected to a backbone that is considered to be a part of the local network, then the resulting network topology would be considered to be a hybrid topology that is a mixture of the topology of the backbone network and the physical hierarchical star topology.2.) The physical hierarchical star topology is also sometimes incorrectly referred to as a physical tree topology, since its physical topology is hierarchical, however, the physical hierarchical star topology does not have a structure that is determined by a branching factor, as is the case with the physical tree topology and, therefore, nodes may be added to, or removed from, any node that is the 'hub' of one of the individual physical star topology networks within a network that is based upon the physical hierarchical star topology.3.) The physical hierarchical star topology is commonly used in 'outside plant' (OSP) cabling to connect various buildings to a central connection facility, which may also house the 'demarcation point' for the connection to the data transmission facilities of a common carrier, and in 'inside plant' (ISP) cabling to connect multiple wiring closets within a building to a common wiring closet within the same building, which is also generally where the main backbone or trunk that connects to a larger network, if any, enters the building.

Star-wired ring
A type of hybrid physical network topology that is a combination of the physical star topology and the physical ring topology, the physical star portion of the topology consisting of a network in which each of the nodes of which the network is composed are connected to a central node with a point-to-point link in a 'hub' and 'spoke' fashion, the central node being the 'hub' and the nodes that are attached to the central node being the 'spokes' (e.g., a collection of point-to-point links from the peripheral nodes that converge at a central node) in a fashion that is identical to the physical star topology, while the physical ring portion of the topology consists of circuitry within the central node which routes the signals on the network to each of the connected nodes sequentially, in a circular fashion.
Note: In an 802.5 Token Ring network the central node is called a Multistation Access Unit (MAU).

Hybrid meshA type of hybrid physical network topology that is a combination of the physical partially connected topology and one or more other physical topologies the mesh portion of the topology consisting of redundant or alternate connections between some of the nodes in the network – the physical hybrid mesh topology is commonly used in networks which require a high degree of availability.

Signal topology

The mapping of the actual connections between the nodes of a network, as evidenced by the path that the signals take when propagating between the nodes.

Note: The term 'signal topology' is often used synonymously with the term 'logical topology', however, some confusion may result from this practice in certain situations since, by definition, the term 'logical topology' refers to the apparent path that the data takes between nodes in a network while the term 'signal topology' generally refers to the actual path that the signals (e.g., optical, electrical, electromagnetic, etc.) take when propagating between nodes.Example

Logical topology

The mapping of the apparent connections between the nodes of a network, as evidenced by the path that data appears to take when traveling between the nodes.

Classification of logical topologies

The logical classification of network topologies generally follows the same classifications as those in the physical classifications of network topologies, the path that the data takes between nodes being used to determine the topology as opposed to the actual physical connections being used to determine the topology.

Notes:1.) Logical topologies are often closely associated with media access control (MAC) methods and protocols.2.) The logical topologies are generally determined by network protocols as opposed to being determined by the physical layout of cables, wires, and network devices or by the flow of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely match the logical flow of data, hence the convention of using the terms 'logical topology' and 'signal topology' interchangeably.3.) Logical topologies are able to be dynamically reconfigured by special types of equipment such as routers and switches.

Daisy chains

Except for star-based networks, the easiest way to add more computers into a network is by daisy-chaining, or connecting each computer in series to the next. If a message is intended for a computer partway down the line, each system bounces it along in sequence until it reaches the destination. A daisy-chained network can take two basic forms: linear and ring.

  • linear topology puts a two-way link between one computer and the next. However, this was expensive in the early days of computing, since each computer (except for the ones at each end) required two receivers and two transmitters.
  • By connecting the computers at each end, a ring topology can be formed. An advantage of the ring is that the number of transmitters and receivers can be cut in half, since a message will eventually loop all of the way around. When a node sends a message, the message is processed by each computer in the ring. If a computer is not the destination node, it will pass the message to the next node, until the message arrives at its destination. If the message is not accepted by any node on the network, it will travel around the entire ring and return to the sender. This potentially results in a doubling of travel time for data.

Centralization

The star topology reduces the probability of a network failure by connecting all of the peripheral nodes (computers, etc.) to a central node. When the physical star topology is applied to a logical bus network such as Ethernet, this central node (traditionally a hub) rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission linelinking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the remaining peripheral nodes will be unaffected. However, the disadvantage is that the failure of the central node will cause the failure of all of the peripheral nodes also.

If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way round trip transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.

tree topology (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy. This tree has individual peripheral nodes (e.g. leaves) which are required to transmit to and receive from one other node only and are not required to act as repeaters or regenerators. Unlike the star network, the functionality of the central node may be distributed.

As in the conventional star network, individual nodes may thus still be isolated from the network by a single-point failure of a transmission path to the node. If a link connecting a leaf fails, that leaf is isolated; if a connection to a non-leaf node fails, an entire section of the network becomes isolated from the rest.

In order to alleviate the amount of network traffic that comes from broadcasting all signals to all nodes, more advanced central nodes were developed that are able to keep track of the identities of the nodes that are connected to the network. These network switches will "learn" the layout of the network by "listening" on each port during normal data transmission, examining the data packets and recording the address/identifier of each connected node and which port it's connected to in a lookup table held in memory. This lookup table then allows future transmissions to be forwarded to the intended destination only.

Decentralization

In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths between them to provide redundant paths to be used in case the link providing one of the paths fails. This decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A multi-dimensional ring has a toroidal topology, for instance.

fully connected networkcomplete topology or full mesh topology is a network topology in which there is a direct link between all pairs of nodes. In a fully connected network with n nodes, there are n(n-1)/2 direct links. Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications. However, it can also be seen in the file sharing protocol BitTorrent in which users connect to other users in the "swarm" by allowing each user sharing the file to connect to other users also involved. Often in actual usage of BitTorrent any given individual node is rarely connected to every single other node as in a true fully connected network but the protocol does allow for the possibility for any one node to connect to any other node when sharing files.

Hybrids

Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network connected to a tree network is still a tree network, but two star networks connected together exhibit a hybrid network topology. A hybrid topology is always produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network

  • A Star ring network consists of two or more star topologies connected using a multistation access unit (MAU) as a centralized hub.
  • A Star Bus network consists of two or more star topologies connected using a bus trunk (the bus trunk serves as the network's backbone).

While grid networks have found popularity in high-performance computing applications, some systems have used genetic algorithms to design custom networks that have the fewest possible hops in between different nodes. Some of the resulting layouts are nearly incomprehensible, although they function quite well.