Advertisement
Guest User

tlcakashlatex

a guest
Jul 10th, 2018
646
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
JSON 56.32 KB | None | 0 0
  1. \documentclass[11pt]{article}
  2. \usepackage{ragged2e}
  3. \usepackage[left=1 in, right=.5 in, top=.5 in , bottom= .5 in]{geometry}
  4. \usepackage{graphicx,wrapfig,lipsum }
  5. \usepackage{tabu}
  6. \usepackage{array}
  7. \usepackage{newcent}
  8. \usepackage{listings}
  9.  
  10. \renewcommand{\baselinestretch}{1.2}
  11.  
  12. \begin{document}
  13.     \begin{center}
  14.     \textbf{\LARGE{Jatiya kabi Kazi Nazrul Islam University }\linebreak}    \\
  15.         \large{Trishal,Mymensingh}\linebreak\linebreak\linebreak
  16.     \end{center}
  17.    
  18.     \begin{figure}[h]
  19.     \hspace{2.5cm}  \includegraphics{logo}
  20.     \end{figure}
  21.     \begin{center}
  22.     \textbf{Technical Writing}\\Course Code: GED-372
  23.     \end{center}
  24.  
  25.     \begin{flushleft}
  26.     \large{\textbf{Mst Jannatul Ferdous}}    \\
  27.         Associate Professor\\
  28.         Dept. of CSE,JKKNIU
  29.     \end{flushleft}
  30.     \begin{flushleft}
  31.     \large{\textbf{Sirsendu Biswas}} \\
  32.         Roll: 15102012\\
  33.         Session: 2014-15\\
  34.         Dept. of CSE,JKKNIU
  35.     \end{flushleft}
  36.     \newpage
  37.    
  38.     \tableofcontents
  39.     %\thispagestyle{empty}
  40.    
  41.     \clearpage
  42.     %Writing cover letetr
  43.  
  44.     \section{Cover latter}
  45.     \setcounter{page}{1}
  46.         \begin{flushright}
  47.             \textbf{\LARGE {Sirsendu Biswas}}\\
  48.             \large{5, Kalishankar Guha Road, Sadar, Mymensingh\\+8801960132939\\
  49.                 \textbf{tlcakash1@gamil.com}}      
  50.         \end{flushright}
  51.        
  52.         \begin{flushleft}
  53.             July 2,2018\\
  54.             The General Manager\\
  55.             Defttech Systems\\
  56.             31/2, Mouchak Dhaka,Bangladesh. \linebreak\linebreak
  57.             Dear Sir,
  58.            
  59.         \end{flushleft}
  60.         \justify
  61.         As the enclosed resume attests, the project incharge position advertised in ‘The Daily Star’ daily newspaper is a perfect fit with my qualifications. My experience working as a software developer in the RedMark Software Company in Dhaka and my vast experience in the programming field has prepared me for the this job requires, making me an ideal candidate for this position.\\\\
  62.         As my resume highlights, I have offered high-responsibility computer and software support for software development. I am quite expert in \textbf{ C++, JAVA, Python, PHP, CSS, ASP.net} and other web programming languages. I have also experience of  handling various operating systems including the Windows, LINUX, Microsoft Office, and Dreamweaver. In addition, I can master new skills quickly and complete tasks efficiently.\\\\
  63.         Please take the time to look over my resume, and feel free to contact my references.  I would love to further discuss this position in person.  I will follow up with you in a few days to answer any preliminary questions you might have. In the meantime, please do not hesitate to contact me at \textbf{tlcakash1@gmail.com} \\
  64.        
  65.         \justify
  66.         Thank you for your time and consideration.\\\\\
  67.         Your's Sincerely,\\
  68.         Sirsendu Biswas
  69.         \clearpage
  70.                
  71.        
  72.     %  CV
  73.         \section{CV}
  74.         \begin{center}
  75.             \textbf{\Huge Curriculum Vitae\\}
  76.             \rule{8cm}{2pt}\\
  77.         \end{center}
  78.         %\begin{flashleft}
  79.         \begin{figure}[h]
  80.             \hspace{14cm}
  81.             \includegraphics[width=3.5cm]{akash}
  82.         \end{figure}
  83.         %\end{flashleft}   
  84.         \begin{flushleft}
  85.         \textbf{Personal Information:}
  86.        
  87.         \textbf{Name: }{Sirsendu Biswas}\\
  88.         \textbf{Address: }{5, Kalishankar Guha Road, Sadar, Mymensingh.}\\
  89.         \textbf{Telephone: }{+8801960132939}\\
  90.         \textbf{Email: }{tlcakash1@gmail.com}\\
  91.         \textbf{Gender: }{Male}\\
  92.         \textbf{Date of Birth: }{11 July, 1997}\\
  93.         \textbf{Religion: }{Hinduism}\\
  94.         \textbf{Marital Status: }{Unmarried}\\
  95.         \textbf{Blood Group: }{B+}\\
  96.        
  97.         \end{flushleft}
  98.         \vspace{.5cm}
  99.         \par               
  100.         \noindent \textbf{\Large Career Objective:} \\Seeking a position to utilize my skills and abilities in the field of computer science and engineering that offers professional growth while being resourceful ,innovative and flexible.
  101.         \vspace{.8cm}
  102.         \par               
  103.         \noindent \textbf{\Large Education:}
  104.         \begin{table}[h]
  105.            
  106.             \begin{tabular}{|m{2cm}|m{2cm}|m{2cm}|m{3cm}|m{1.3cm}|m{1.2cm}|}
  107.                 \hline
  108.                 \textbf{NAME OF THE EXAM} & \textbf{PASSING YEAR} & \textbf{SUBJECT/ GROUP} & \textbf{UNIVERSITY/ BOARD} & \textbf{CGPA/ GPA} & \textbf{Letter Grade}\\
  109.                 \hline
  110.                 B.Sc(Eng.) & 2018 & CSE & Jatiya Kabi Kazi Nazrul Islam University & 3.47 & B+\\
  111.                 \hline
  112.                 H.S.C & 2014 & Science & Dhaka & 5.00 & A+\\
  113.                 \hline
  114.                 S.S.C & 2012 & Science & Dhaka & 5.00 & A+\\
  115.                 \hline
  116.             \end{tabular}
  117.            
  118.         \end{table}
  119.        
  120.         %\vspace{.8cm}
  121.         \par
  122.                        
  123.         \noindent \textbf{\Large Knowledge and Competencies: }
  124.        
  125.         \begin{itemize}
  126.             \item   Theoretical and practical knowledge acquired in the various subject of B.S.C engineering in (CSE) especially Computer Fundamental, Computer Architecture, Structured programming, Data structure, Object Oriented Programming,Databage management,Algorithms,Internet and Web programming, Operating System, Data Communication, Automata Theory, Autocade, Compiler Design..
  127.             \item   Ability to make official correspondences in both the English , Bengali languages correctly
  128.             and lucidly.
  129.             \item Possess ownership of responsibility.
  130.            
  131.         \end{itemize}
  132.        
  133.        
  134.         %\vspace{.8cm}
  135.         \par               
  136.         \noindent \textbf{\Large Technical Experience: }
  137.        
  138.         \begin{itemize}
  139.             \item Languages: C ,C++ , JAVA , HTML , PHP,CSS,ASP,JSP,VBS.
  140.             \item Database Systems: Mysql , SQL server.
  141.             \item Platforms: Windows7, Windows 10, Linux.
  142.             \item Concepts: Networking, Operating systems, AI.
  143.            
  144.         \end{itemize}
  145.         \par               
  146.         \noindent \textbf{\Large Project Experience: } \\
  147.         Final Semester Project as Part of the B.TECH Curriculum.
  148.         Project Name: "Software Development Project."
  149.         Description: The powerful web server that enhances java based applications and provides authentication.
  150.        
  151.         \vspace{.5cm}
  152.         \par               
  153.         \noindent \textbf{\Large Projects: }
  154.         \begin{enumerate}
  155.             \item Creating a Tic-Tac-Toe Game
  156.             \item Creating a program that will calculate the GPA.
  157.         \end{enumerate}
  158.         \vspace{.5cm}
  159.         \par                               
  160.         \noindent \textbf{\Large Achievements and Awards: }
  161.         \begin{enumerate}
  162.            
  163.             \item ACM-ICPC Dhaka Regional Onsite Contestant 2017 ( $68^{th}$ Place)
  164.            
  165.             \item CSE, JKKNIU Programming Contest, August 2017 ( $1^{st}$ Place)\\
  166.            
  167.         \end{enumerate}
  168.        
  169.        
  170.         \par               
  171.         \noindent \textbf{\Large Publications: }\\
  172.         \\ No Publications Yet. \newline
  173.  
  174.         \vspace{.3cm}
  175.         \par               
  176.         \noindent \textbf{\Large Skills and Experience: }\\
  177.         \textbf{Language Skills: }
  178.         English, Hindi\\
  179.         \textbf{Programming Skills: }
  180.         C++, JAVA, HTML, CSS, JavaScript, Python\\
  181.         \textbf{Working Experience: }
  182.         No Working Experience Yet.
  183.        
  184.         \vspace{.5cm}
  185.         \par
  186.         \noindent\textbf{\Large Projects and Repositories:}
  187.         \newline
  188.         \begin{enumerate}
  189.            
  190.             \item https://github.com/tlcakash/Mid-Day-Algorithms\\
  191.            
  192.         \end{enumerate}
  193.        
  194.            
  195.         \vspace{.2cm}
  196.         \par               
  197.         \noindent \textbf{\Large Extra Curricular Activities: }
  198.         \newline
  199.         \textbf{*} Cricketer at Dipu-Sayem Memorial Cricket Club (Mymensingh Premier League)
  200.        
  201.         \clearpage
  202.        
  203.         \vspace{.5cm}
  204.         \par               
  205.         \noindent \textbf{\Large Language Proficiency: }\\
  206.         Good command over speaking, reading, listening and writing on both Bengali and English.
  207.        
  208.         \vspace{.5cm}
  209.         \par               
  210.         \noindent \textbf{\Large Commitment: }\\
  211.         For my educational qualification, acquired knowledge, and experience I am confident that I am quite fit for this post offered. I am hereby committed that I shall perform all duties and responsibilities assigned to me related to my job.
  212.        
  213.         \vspace{.5cm}
  214.         \par               
  215.         \noindent \textbf{\Large References: }
  216.         \begin{enumerate}
  217.        
  218.         \item A.H.M Kamal, Head of the Department, Dept. of CSE, JKKNIU
  219.        
  220.         \item Kazi Mahmudul Hasan Munna, Lecturer, Dept. of CSE, JKKNIU
  221.        
  222.         \item Md Jakir Hasan, Divisional Coach, Dhaka North
  223.        
  224.         \end{enumerate}
  225.        
  226.         \vspace{.5cm}
  227.         \par               
  228.         \noindent \textbf{\Large Declaration: }\\
  229.         I hereby declare that the above written particulars are true to the best of my knowledge and belief.
  230.        
  231.         \vspace{1cm}
  232.         \par               
  233.         \noindent \textbf{\Large Signature }
  234.         \rule{4cm}{1px}
  235.    
  236.    
  237.     %project proposal
  238.     \clearpage
  239.     \section{Proposal(project/research)}
  240.        
  241.        
  242.         \begin{center}
  243.             \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge A Project Proposal on\\ \vspace{1cm} \LARGE Network Topology \\  \vspace{1cm} \Large Group members: Shah Toufiqur Rahman , Sirsendu Biswas , Abdullah Al Faisal , MD. Mahin Hossain
  244.             }
  245.         \end{center}
  246.    
  247.        
  248.         \clearpage
  249.         \justify
  250.         \underline{ \noindent \textbf{\large Objectives:  }}  Our objective  is to know and analysis the characteristics of  the network topology.Here we will learn and know the characteristics of the different network topologies  such as Mesh,Star,Bus and Ring Topology
  251.        
  252.         \vspace{.5cm}
  253.         \noindent \underline{    \textbf{\large Introduction:  }}     Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network.Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to one another.\newline   
  254.         There are two basic categories of network topologies:
  255.         \begin{enumerate}
  256.             \item   Physical topologies
  257.             \item   Logical topologies
  258.         \end{enumerate}
  259.         The shape of the cabling layout used to link devices is called the physical topology of the network.The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology.\newline
  260.         The study of network topology recognizes four basic topologies:
  261.         The study of network topology recognizes four basic topologies:
  262.         \begin{itemize}
  263.             \item   Mesh Topology
  264.             \item   Star Topology
  265.             \item   Bus Topology
  266.             \item   Ring Topology
  267.         \end{itemize}
  268.         \begin{figure}[h]
  269.             \centering  \includegraphics[width=5cm]{NT1}
  270.            
  271.         \end{figure}
  272.         \vspace{.5cm}
  273.         \noindent \underline{ \textbf{\large Method: }}
  274.         \textbf{\newline \newline Mesh Topology:}  In a mesh topology ,every device has a dedicated point-to-point link to every other device. The number of connections in a full mesh = n(n - 1) / 2.The following figure is showing the mesh topology.
  275.         \begin{figure}[h]
  276.             \centering \includegraphics[width=5cm]{NT2}
  277.             \caption{Mesh Topology}
  278.             \label{fig:mesh}
  279.         \end{figure}
  280.         \textbf{\newline \newline Star Topology:}   In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. The following figure is showing the star topology.
  281.         \begin{figure}[h]
  282.             \centering \includegraphics[width=5cm]{NT3}
  283.             \caption{ Star Topology}
  284.             \label{fig:star}
  285.         \end{figure}
  286.        
  287.         \textbf{\newline \newline Bus Topology:} In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. The following figure is showing the bus topology.
  288.         \begin{figure}[h]
  289.             \centering \includegraphics[width=5cm]{NT4}
  290.             \caption{ Bus Topology}
  291.             \label{fig:Bus}
  292.         \end{figure}
  293.        
  294.         \textbf{\newline \newline Ring Topology:}  A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The following figure is showing the ring topology.
  295.         \begin{figure}[h]
  296.             \centering \includegraphics[width=5cm]{NT5}
  297.             \caption{ Ring Topology}
  298.             \label{fig:Ring}
  299.         \end{figure}
  300.        
  301.         \vspace{.5cm}
  302.         \noindent \underline{ \textbf{\large Result and Discussion: }} A computer network is designed to send information from one point to another. This information needs to be converted to either a digital signal or an analog signal for transmission.
  303.         \begin{figure}[h]
  304.             \centering \includegraphics[width=5cm]{NT6}
  305.             \caption{ A heterogeneous network made of four WAns and tow LANs}
  306.             \label{fig:NT6}
  307.         \end{figure}
  308.         In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths between them to provide redundant paths to be used in case the link providing one of the paths fails. This decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A multi-dimensional ring has a toroidal topology, for instance.
  309.         Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications . Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications.
  310.        
  311.         \vspace{.5cm}
  312.         \noindent \underline{ \textbf{\large Conclusion: }}  The network topology is not the ultimate standard for data communications and it was never fully implemented . Hence to implement this project has been quite difficult but I have tried my level best to complete this project successfully.After finishing this project I can say that I am successful in this project.I have successfully analized the characteristics of different types of network topology.Inspite of having some problem,finally I  have successfully completed this project.
  313.        
  314.         \vspace{.5cm}
  315.         \noindent \underline{ \textbf{\large Time frame: }} I will complete the task of  logical\cite{9tut} implementation within 4-5 weeks and will complete the task of  physical implementation within next 4-5 weeks.
  316.        
  317.         \vspace{.5cm}
  318.         \begin{thebibliography}{9}
  319.             \bibitem{Forouzan}
  320.             Behrouz A Forouzan. \textit{Data Communications And Networking}. 4th ed. New Delhi: Education
  321.         \bibitem{deniweb} www.deniweb.com
  322.         \bibitem{9tut} www.9tut.com
  323.         \end{thebibliography}
  324.  
  325.     \clearpage
  326.        
  327.     %thesis report
  328.     \section{Thesis Report}
  329.     %\clearpage
  330.     \begin{center}
  331.         \textbf{\LARGE A STUDY ON NETWORK TOPOLOGY}
  332.     \end{center}
  333.     \vspace{2cm}
  334.     A dissertation submitted to the Jatiya Kabi Kazi Nazrul Islam University in partial fulfillment of the requirement of the Degree of B.SC in Computer Science And Engineering.\newline \newline \newline
  335.    
  336.     \begin{figure}[h]
  337.         \hspace{2.5cm}  \includegraphics{logo}
  338.     \end{figure}
  339.    
  340.     \begin{center}
  341.         \textbf{\LARGE \newline Submitted By:}\\
  342.         \textbf{Sirsendu Biswas}\\Roll No: 15102012\\ Registration No: 4087\\ Session: 2014-15
  343.     \end{center}
  344.    
  345.     \vspace{1.5cm}
  346.     \begin{center}
  347.         \LARGE Department Of Computer Science And Engineering
  348.         \\  Jatiya Kabi Kazi Nazrul Islam University
  349.             \\Trishal,Mymensingh.
  350.     \end{center}
  351.    
  352.     \clearpage
  353.    
  354.     \begin{center}
  355.         \textbf{\LARGE \newline \newline \newline Certification of thesis work}\\  
  356.     \end{center}
  357.     \par
  358.     \noindent The thesis field title \textbf{ Network Topology}  by  Sirsendu Biswas, Examination Roll no: 15102012, Registration no:4087, Session: 2014-15 has been accepted as satisfactory in partial fulfillment of the requirement  for the degree of B.SC in Computer Science And Engineering.
  359.     \begin{center}
  360.         \textbf{\LARGE \newline \newline \newline Board of Examiner }  
  361.     \end{center}
  362.    
  363.     \textbf{\LARGE  \newline  \newline Supervisor:\\}
  364.     \textbf{ \large Mst. Jannatul Ferdous}\\
  365.     Associate Professor\\
  366.     Dept. of Computer Science and Engineering\\
  367.     Jatiya Kabi Kazi Nazrul Islam University\\
  368.     Trishal,Mymensingh.\\
  369.    
  370.     \textbf{\LARGE  \newline  \newline Assistant  Supervisor:\\}
  371.     \textbf{    Md. Sujan Ali\\}
  372.     Associate Professor\\
  373.     Dept. of Computer Science and Engineering\\
  374.     Jatiya Kabi Kazi Nazrul Islam University\\
  375.     Trishal,Mymensingh.\\
  376.     \clearpage
  377.      
  378.      
  379.      \begin{center}
  380.        
  381.         \textbf{\Huge \newline \newline \newline \newline \newline \newline Declaration}\\ 
  382.      \end{center}
  383.     \par
  384.     \vspace{2cm}
  385.     \noindent \Large It is hereby declared that this thesis or any part of it has not been submitted elsewhere for the award of any degree or diploma.
  386.    
  387.     \par
  388.     \vspace{8cm}
  389.     \noindent
  390.     \begin{flushright}
  391.         \textbf{\LARGE Signature of The Candidate}\\
  392.         \vspace{1.5cm}
  393.         \rule{8cm}{.1 cm}
  394.     \end{flushright}
  395.    
  396.     \clearpage
  397.    
  398.     \begin{center}
  399.        
  400.         \textbf{\Huge \newline \newline \newline \newline \newline \newline Acknowledgement}\\ 
  401.     \end{center}
  402.     All praise are to Almighty God for giving me such capabilities for the successful completion of this thesis.I would like to express my heartly gratitude to my thesis supervisor, Mst Jannatul Ferdous, Lecturer,Department of Computer Science and Engineering,Jatiya Kabi Kazi Nazrul Islam University,Trishal,Mymensingh, for her guidance and supervision during the entire thesis work.
  403.    
  404.     \noindent I strongly acknowledge to my thesis Assistant supervisor, Md.Sujan Ali, Assistant Professor, Department of Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam University and Mr.Tushar Kanti Saha, Lecturer, Department of Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam Univeristy,Trishal, Mymensingh for their valuable instruction,constant guidance,encouragement and valuable discussion thoughout this work.
  405.    
  406.     \noindent I wish to express thanks to Engr. AHM. Kamal, Head, Department of Computer Science and Engineering ,Jatiya Kab Kazi Nazrul Islam University for providing me lab opportunities with lab materials related to my thesis work.
  407.     I also thank all of my friends, group member and lab assistant and my family for helping to complete the thesis on network topology.
  408.     Finally,To everybody here, pleasures receive from me my deep gratitude.
  409.     \clearpage
  410.    
  411.     \begin{abstract}
  412.         \par
  413.         \noindent \Large Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network . Essentially, it is the topological structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.A good example is a local area network (LAN): Any given node in the LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network. Conversely, mapping the data flow between the components determines the logical topology of the network.
  414.     \end{abstract}
  415.     \clearpage
  416.     \subsection{List of Figures}
  417.     \begin{center}
  418.        
  419.         \textbf{\Huge  \newline \newline \newline \newline \newline \newline List of Figures}\\
  420.     \end{center}
  421.    
  422.     Figure \ref{fig: th1}: Point-to-Point Connection\\
  423.    
  424.     Figure \ref{fig: th2}: Multipoint Connection\\
  425.    
  426.     Figure \ref{fig: NT1}: Classification of Topology\\
  427.    
  428.     Figure \ref{fig: NT2}: Fully connected Mesh Topology\\
  429.    
  430.     Figure \ref{fig: NT3}: Star Topology\\
  431.    
  432.     Figure \ref{fig: NT4}: Bus Topology\\
  433.    
  434.     Figure \ref{fig: NT5}: Ring Topology\\
  435.    
  436.     Figure \ref{fig: NT7}: Hybrid Topology\\
  437.    
  438.     Figure \ref{fig: NT6}: A heterogeneous network made of four WANs and two LANs \\
  439.     \clearpage
  440.    
  441.    
  442.     \begin{center}
  443.         \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-1\\ \rule{12cm}{.2 cm} \linebreak \LARGE Introduction
  444.         }
  445.     \end{center}
  446.    
  447.    
  448.     \clearpage
  449.     \subsection{Chapter-1 : \\ Intruduction}
  450.     \textbf{\Huge    Introduction}\\ \small network is a set of devices(often referred to as nodes) connected by communication links.A node can be a computer,printer,or any other device capable of sending and/or receiving data generated by other nodes on the network.Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network.Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to one another.
  451.     \subsubsection{Objective of the Present Work}The \large objective of this thesis is to study and analysis the characteristics of  Network Topology. To do this in this paper I will do -
  452.     \begin{enumerate}
  453.         \item Fully describe the Network Topology and its architecture.
  454.         \item  Describe the advantages and disadvantages of each topology.
  455.     \end{enumerate}
  456.     \subsubsection{Previous Research Work}
  457.     A lot of research work has carried on Network Topology.But there are some disadvantages of each network topology.Today also various research work are going on to overcome the disadvantages of each network topology.
  458.     \subsubsection{Organization of the Thesis}
  459.     The outline of the thesis as follows-
  460.     \begin{itemize}
  461.         \item Chapter one described the introductory concept of network and network topology,  
  462.         also the objective of the present work, previous research work.    
  463.         \item  Chapter two described the various Network Topology, it’s architecture,  
  464.         advantages and disadvantages of  those network topology.                        
  465.         \item Chapter three described result and discussion.
  466.         \item Chapter four gives  the conclusion of the thesis.
  467.         \item Chapter five contains the references.
  468.     \end{itemize}
  469.     \clearpage
  470.    
  471.     \begin{center}
  472.         \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-2\\ \rule{12cm}{.2 cm} \linebreak \LARGE Method
  473.         }
  474.     \end{center}
  475.     \clearpage
  476.  
  477.     \subsection{ chapter-2\\Method}
  478.         Networks are distributed processing,in which a task is divided among multiple computers.Instead of one single large machine being responsible for all aspects of a process,separate computers (usually a personal computer or workstation) handle a subset.
  479.     \subsubsection{Network Criteria}
  480.     A network must be able to meet a certain number of criteria.The most important of these are performance,reliability,and security.
  481.    
  482.     \textbf{Performance:}Performance can be measured in many ways,including transit time and response time.Transit time is the amount of time required for a message to travel from one device to anther.Response time is the elapsed time between an inquiry and a responed.
  483.    
  484.     \textbf{Reliability:}In addition to accuracy of delivery,network reliability is measured  by the frequency of  failure,the time it takes a link to recover from a failure,and the network’s robustness in a catastrophe.
  485.    
  486.     \textbf{Security:}Network security issues include protecting data from unauthorized access,protecting data from damage and development, and implementing policies and procedures for recovery from breaches and losses.
  487.     Before discussing network and network topology,we need to define some network attributes.
  488.      \subsubsection{Type of Connection}
  489.      A network is two or more devices connected through links.A links is a communications pathway that transfers data from one device to another.
  490.      There are two possible types of  connections:Point-to-point and Multipoint.
  491.      \begin{itemize}
  492.         \item Point-to-point:A point-to-point connection provides a dedicated link between two devices.Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other options,such as microwave or satellite links,are also possible.The following figure shows the point-to-point connection.
  493.              \begin{figure}[h]
  494.                 \centering \includegraphics[width=5cm]{th1}
  495.                 \caption{ Point-to-point Connection}
  496.                 \label{fig: th1}
  497.              \end{figure}
  498.         \item    A multipoint connection is one which more than two specific devices share a single link. The following figure shows the Multipoint connection.
  499.                 \begin{figure}[h]
  500.                     \centering \includegraphics[width=5cm]{th2}
  501.                     \caption{ Multipoint Connection}
  502.                     \label{fig: th2}
  503.                 \end{figure}
  504.          \end{itemize}
  505.      \subsection{Topology}
  506.     Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network .There are two basic categories of network topologies:
  507.     \begin{enumerate}
  508.         \item   Physical topologies
  509.         \item   Logical topologies
  510.     \end{enumerate}
  511.    
  512.     \subsubsection{Physical topology}
  513.     The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling.The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits.
  514.    
  515.    
  516.     \subsubsection{logical topology}
  517.     The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example, the original twisted pair Ethernet using repeater hubs was a logical bus topology with a physical star topology layout. Token Ring is a logical ring topology, but is wired a physical star from the Media Access Unit.
  518.    
  519.     \noindent The study of network topology recognizes four  basic topologies such as Mesh,Star,Bus,and Ring. The following figure is showing  the classification of topology:
  520.    
  521.     \begin{figure}[h]
  522.         \centering \includegraphics[width=5cm]{NT1}
  523.         \caption{ Classification of Topology}
  524.         \label{fig: NT1}
  525.     \end{figure}
  526.    
  527.     \subsection{Mesh Topology}
  528.     \subsubsection{Fully Connected}
  529.     The number of connections in a full mesh = n(n - 1) / 2.
  530.     Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected.
  531.    
  532.     Figure \ref{fig: NT2}  gives the Fully connected Mesh Topology.
  533.     \begin{figure}[h]
  534.         \centering \includegraphics[width=5cm]{NT2}
  535.         \caption{ Fully Connected Mesh topology}
  536.         \label{fig: NT2}
  537.     \end{figure}
  538.     \subsubsection{Partially Connected}
  539.     The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.
  540.    
  541.     \noindent Note: In networks that are based upon the partially connected mesh topology, the                                      data that is transmitted between nodes in the network takes many shortest paths between nodes using a technology like Shortest Path Bridging, except in the case of a failure or break in one of the links, in which case the network uses the remaining alternative paths to the destination. This requires that the nodes of the network possess some type of algorithm to determine the correct path to use at any particular time.
  542.     \subsubsection{Advabntage of Mesh Topology}A mesh offers several advantages over other network topologies.First,the use of dedicated links guarantees that each connection can carry its own data load,thus eliminating the traffic problems that can occur when links must be shared by multiple devices.Second,a mesh topology is robust.If one link becomes unusable,it does not incapacitate the entire system.Third,there is the advantage of  privacy or security.Finally,point-to-point links make fault identification and fault isolation easy.
  543.     \subsubsection{Disadvabntage of Mesh Topology} The main disadvantages of a mesh topology are related to the amount of cabling and the number of  I/O ports required.First,because every device must be connected to every other device,installation and reconnection are difficult.Second,the sheer bulk of  the wiring can be greater than the available space (in walls ceilings,or floors ) can accommodate.Finally,the hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
  544.     \subsubsection{Example of Mesh Topology}One practical example of a mesh topology is the connection of telephone regional offices in which each regional office needs to be connected to every other regional office.
  545.     \subsection{Star Topology}
  546.     In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to one central device. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement.The figure of  the star topology is given in the below-
  547.     \begin{figure}[h]
  548.         \centering \includegraphics[width=5cm]{NT3}
  549.         \caption{ Star topology}
  550.         \label{fig: NT3}
  551.     \end{figure}
  552.    
  553.     \subsubsection{Advantage of Star Topology}Disadvantage of a star topology is the dependency of the whole topology on one single point,the hub.If the hub goes down,the whole system is dead.
  554.         \subsubsection{Disadvantage of Star Topology}Disadvantage of a star topology is the dependency of the whole topology on one single point,the hub.If the hub goes down,the whole system is dead.
  555.             \subsubsection{Application of Star Topology}
  556.     The star topology is used in local area networks(LANs) .High-speed LANs often use a star topology with a central hub.
  557.     \subsection{Bus Topology}
  558.     A bus topology is multipoint.One long cable acts as a backbone to link all the devices in a network.Figure \ref{fig: NT4} shows the bus topology:
  559.         \begin{figure}[h]
  560.             \centering \includegraphics[width=5cm]{NT4}
  561.             \caption{ Bus topology}
  562.             \label{fig: NT4}
  563.         \end{figure}
  564.     Nodes are connected to the bus cable by drop lines and taps.A drop line is a connection running between the device and the main cable.A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core.As a signal travels along the backbone,some of its energy is transformed into heat.Therefore,it  becomes weaker and weaker as it travels farther and farther.For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
  565.     \subsubsection{Advantage of Bus Topology}
  566.     There are some advantages of  bus topology are given below-
  567.     \begin{enumerate}
  568.         \item A bus topology includes ease of installation.
  569.         \item   A bus topology uses less cabling than mesh or star topology.
  570.         \item In a star,for example,four network devices in the same room require four lengths of cable reaching all way to the hub.In a bus,this redundancy is eliminated.Only the backbone cable stretches through the entire facility.Each drop line has to reach only as far as the nearest point on the backbone.
  571.     \end{enumerate}
  572.    
  573.    
  574.         \subsubsection{Disavantage of Bus Topology}
  575.         Disadvantages of bus topology are given below-
  576.         \begin{enumerate}
  577.             \item A bus topology includes difficult reconnection and fault isolation.
  578.             \item A bus is usually designed to be optimally efficient at installation.It can therefore be difficult to add new devices.
  579.             \item  Signal reflection at the taps can cause degradation in quality.
  580.         \end{enumerate}
  581.        
  582.        
  583.        
  584.     \subsubsection{Use of Bus Topology}
  585.         Bus topology was the one of the first topologies used in the design of early local area networks(LANs).Ethernet LANs can use a bus topology, but they are less popular now.
  586.    
  587.     \subsection{Ring Topology}
  588.     A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.The figure: \ref{fig: NT5} shows the  Ring topology which is drawn below-
  589.     \begin{figure}[h]
  590.         \centering \includegraphics[width=5cm]{NT5}
  591.         \caption{ Ring topology}
  592.         \label{fig: NT5}
  593.     \end{figure}
  594.     \subsubsection{Advantage of Ring Topology}
  595.     The advantages of Ring topology are given in the below-
  596.     \begin{enumerate}
  597.         \item A ring is relatively easy to install and reconfigure.
  598.         \item A fault isolation is simplified.
  599.     \end{enumerate}
  600.  
  601.    
  602.     \subsubsection{Disadvantage of Ring Topology}
  603.     Disadvantages of Ring topology are given below-
  604.    
  605.     \begin{enumerate}
  606.         \item Unidirectional traffic is a disadvantage of ring topology.
  607.         \item In a ring, a break in the ring can disable the entire work.
  608.     \end{enumerate}
  609.         \subsubsection{Use of Ring Topology}
  610.     Ring topology was prevalent when IBM introduced its local area network Token Ring.Today,the need for higher-speed LANs has made this topology less popular.
  611.    
  612.     \subsection{Hybrid Topology}
  613.    
  614.     A network can be hybrid. Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.)..For example,we can have a main star topology with each branch connecting several stations in a bus topology as shown in Figure \ref{fig: NT7}
  615.         \begin{figure}[h]
  616.             \centering \includegraphics[width=5cm]{NT7}
  617.             \caption{ Hybrid topology}
  618.             \label{fig: NT7}
  619.         \end{figure}
  620.         \clearpage
  621.    
  622.    
  623.    
  624.     \begin{center}
  625.         \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-3\\ \rule{12cm}{.2 cm} \linebreak \LARGE Result and Discussion
  626.         }
  627.     \end{center}
  628.    
  629.    
  630.     \clearpage
  631.    
  632.     \subsection{Chapter-3\\Result and Discussion}
  633.     A computer network is designed to send information from one point to another. This information needs to be converted to either a digital signal or an analog signal for transmission.
  634.         \begin{figure}[h]
  635.             \centering \includegraphics[width=5cm]{NT6}
  636.             \caption{ heterogeneous network made of four WARNs and two LANs}
  637.             \label{fig: NT6}
  638.         \end{figure}
  639.         In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths between them to provide redundant paths to be used in case the link providing one of the paths fails. This decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A multi-dimensional ring has a toroidal topology, for instance.
  640.        
  641.     \noindent   Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications.
  642.     \clearpage
  643.    
  644.    
  645.    
  646.     \begin{center}
  647.         \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-4\\ \rule{12cm}{.2 cm} \linebreak \LARGE Conclusion
  648.         }
  649.     \end{center}
  650.    
  651.    
  652.     \clearpage
  653.    
  654.     \subsection{Chapter-4\\Conclusion} 
  655.     The network topology is not the ultimate standard for data communications and it was never fully implemented . Hence to implement this thesis has been quite difficult but I have tried my level best to complete this thesis successfully.In this thesis work I have successfully analized the characteristics of  the different types of  network topologies .Within the limited facilities of the software and hardware lab,many basic characteristics of  these network topologies were studied to implement Network in real world. After finishing this thesis I can say that I am successful in this thesis.
  656.     \clearpage
  657.    
  658.    
  659.    
  660.     \begin{center}
  661.         \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-5\\ \rule{12cm}{.2 cm} \linebreak \LARGE References
  662.         }
  663.     \end{center}
  664.    
  665.    
  666.     \clearpage 
  667.        
  668.     \subsection{Chapter-5\\ References}    
  669.     \begin{thebibliography}{9}
  670.         \bibitem{Behrouz} \textbf{Behrouz A Forouzan.} Data Communications And Networking. 4th ed. New Delhi: Education Private Limited; 2006.31p.
  671.        
  672.         \bibitem{deni}\textbf{http:/www.deniweb.com}
  673.         \bibitem{9tut}\textbf{http:/www.9tut.com}
  674.         \bibitem{Davida and Toby} \textbf{Groth, David; Toby Skandier}(2005). Network+ Study Guide, Fourth Edition'. Sybex, Inc.. ISBN 0-7821-4406-3.
  675.         \bibitem{PRQC} \textbf{ATIS committee }PRQC. "\textit{network topolog}y". ATIS Telecom Glossary 2007. Alliance for Telecommunications Industry Solutions. Retrieved 2008-10-10.
  676.         \bibitem{Proulxa and Promislow}\textbf{Proulx, S. R.; Promislow}, D. E. L.; Phillips, P. C. (2005). "\textit{Network thinking in ecology and evolution}". Trends in Ecology and Evolution 20 (6): 345–353. DOI:10.1016/j.tree.2005.04.004. PMID 16701391.
  677.     \end{thebibliography}
  678.        
  679.    
  680.     \clearpage
  681.    
  682.     %project
  683.     \section{Project}
  684.     \begin{center}
  685.         \textbf{\Huge \newline\newline
  686.             \newline Student Projects in Computer Networking: Simulation versus Coding}\\
  687.         \par
  688.         \vspace{4cm}
  689.         Leann M. CHRISTIANSON\\
  690.         California State University, East Bay\\
  691.         Department of Mathematics and Computer Science\\
  692.         Hayward, CA 94542-3092, USA\\
  693.         and\\
  694.         Kevin A. BROWN\\
  695.         California State University, East Bay\\
  696.         Department of Mathematics and Computer Science\\
  697.         Hayward, CA 94542-3092, USA\\
  698.     \end{center}
  699.     \clearpage
  700.     \begin{abstract}
  701.         \textit{ \LARGE In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experience developing laboratory exercises for classroom use in both realms. Two case studies, TCP versus UDP protocol performace, and routing algorithm convergence are described. For both studies, students either wrote a program that implemented the protocols being tested or created a simulation using the OPNET Modeler package. Issues specific to these projects are discussed. Student opinion reflected that simulation software allows more focus on the performance of the protocol and visualization of results. Programming, though viewed by students as more difficult, allows them to practice and gain skills that will be useful in their future careers. The authors feel that a balance of both programming and simulation activities is the best practice.}
  702.     \end{abstract}
  703.     \clearpage
  704.     \subsection{Introduction}
  705.     When teaching computer networking it is important to design activities for students that illustrate the concepts covered in lecture. In this
  706.     paper, we consider the pros and cons of using network simulators to teach computer networking concepts versus having students write programs. The authors have experience developing laboratory exercises for classroom use in both realms [1-3]. Issues that impact the development of effective networking assignments are presented along with case studies and student feedback.
  707.    
  708.     \noindent Computer networking is an integral part of computer science education today. Creating practical and compelling student assignments in networking, however, is challenging. This is due to the fact that networking concepts and algorithms often involve many entities or are designed to work in environments that are not readily available for classroom use. Some of the issues to consider when designing computer-networking exercises are listed below:
  709.     \begin{enumerate}
  710.          \item Many protocols differ in how they respond to corruption, errors, and loss, which occur uncommonly and inconsistently in real networks making replication of results difficult.
  711.      
  712.          \item The performance of data-link layer algorithms may only be apparent under high load which may negatively impact other users of the network.
  713.         \item The differences in the performance of transport algorithms may only be apparent if the transmitter and receiver nodes are separated by large distances or if a large number of machines are linked to the network.
  714.         \item Routing algorithms require communication with tens to hundreds of other nodes.
  715.         \item Security concerns within a university may make it difficult to provide access to live servers with which to interact (e.g., to test a student web client).
  716.          \item Super-user access may be needed to use commands that report on network performance
  717.         \item Much network code is at the kernel-level requiring recompilation of the kernel in order to modify.
  718.     \end{enumerate}
  719.  
  720.     Computer networking algorithms are complex, therefore, it is beneficial to provide more than a description and explanation of them in a lecture setting. Students often learn more by experimenting on their own, by poking and prodding an algorithm to see how it reacts to different stimuli. The ability to experiment may be provided in (at least) two ways. Students can be supplied with a simulation environment, or they can be asked to implement an algorithm themselves and run it on real machines.
  721.      
  722.      \subsection{Simulation Versus Programming}
  723.     In the computer networking area, as in much of Computer Science, it is not considered sufficient to simply teach the theory of a concept. Computer Science may be considered engineering, and as such, Computer Scientists should be able to apply what they learn by building an artifact or program which embodies the concept. In much the same way that a person who builds an automobile will have a better understanding of its workings than a person who only knows how to drive it, our students will understand algorithms more deeply by implementing them. In addition, undergraduate students should be given every opportunity to improve their coding and widen the application of their skills.
  724.    
  725.     \noindent There are many practical considerations in computer networking, however, which may preclude a project’s successful creation and testing in a real environment. Even with a completely dedicated network laboratory in which students are given super-user access, many experiments may not be conducted due to the need for additional nodes at a distance to act as correspondents. Without a dedicated lab, students may be unable to modify network algorithms residing in the kernel. Due to security concerns, students may not be able to run network interfaces in promiscuous mode in order to monitor packet arrivals on the local LAN.
  726.    
  727.     \subsection{Case Study: TCP Versus UDP}
  728.     The effect of packet size on Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) round-trip delay is a concept presented in most beginning network courses. We have assigned this exercise as both a simulation and a programming assignment. Using simulation software such as OPNET Modeler [4], students can easily “drag and drop” networking components to a workspace to create a network model. Components can be linked together using a variety of link speeds, and nodes can be configured to use the TCP or UDP protocol via drop down menus. Figure 1 illustrates a wide area network with a File Transfer Protocol (FTP) client and FTP server. A base packet size and traffic pattern can be configured from a list of options. The end nodes can be configured with a drop-down menu to use TCP or UDP packets when simulating a file request.
  729.    
  730.         \begin{figure}[h]
  731.             \centering \includegraphics[width=5cm]{PP1}
  732.             \caption{ OPNET model of a wide area netwok with an FTP client and FTP server}
  733.             \label{fig: PP1}
  734.         \end{figure}
  735.    
  736.     \begin{figure}[h]
  737.         \centering \includegraphics[width=5cm]{PP2}
  738.         \caption{ Graph of TCP versus UDP packet delay for a file transfer}
  739.         \label{fig: PP2}
  740.     \end{figure}
  741.     Student comments reflect that the experiment’s goals and outcomes are clearer when simulation software is used. Students enjoy playing with the simulation and tweaking model components. The students do feel, however, that the experience of coding and using sockets for program communication is worthwhile. For many, this is the first time that they have been exposed to socket programming. Though students do enjoy flexibility, some problem issues of this exercise can assuaged by having all the students use the same programming language, operating system and network.
  742.     \subsection{Case Study: Routing Convergence}
  743.     Routing algorithm convergence time is another lesson that students can explore through simulation or programming. Convergence time is the time it takes for routes within a routing table to stabilize after start up or after a link has gone down. Common routing algorithms such as Open Shortest Path First (OSPF), the Routing Information Protocol (RIP), or others can be used. Using OPNET Modeler to simulate this exercise is straightforward. A group of routing nodes can be connected into a network of a given topology. Figure 3 illustrates a simple topology with five nodes. Each node can be configured to run the routing protocol of choice.
  744.    
  745.     \noindent OPNET provides the capability to export routing tables to a file as well as to allow the student to “break a link” after a certain amount of simulation time. Students can then study the routing tables to find the new path that was propagated to the routing tables after the link went down. This exercise gives the student experience with router interfaces and interpretation of routing tables. Students can then study the simulation and routes and calculate the convergence time for the original network and then again for the network after one link goes down. Figure 4 illustrates a routing table for node 0 at 8 seconds into the simulation.
  746.    
  747.     \begin{figure}[h]
  748.         \centering \includegraphics[width=3cm]{PP3}
  749.         \caption{ Simple topology for routing convergence}
  750.         \label{fig: PP3}
  751.     \end{figure}
  752.    
  753.     \begin{figure}[h]
  754.         \centering \includegraphics[width=3cm]{PP4}
  755.         \caption{ Routing table for node 0 after 8 second of simulation time}
  756.         \label{fig: PP4}
  757.     \end{figure}
  758.    
  759.     \subsection{Conclusion}
  760.     We have discussed the advantages and disadvantages of simulation versus programming for computer networking courses. Two case study activities were described: the first, compares the round-trip packet delay time for both TCP and UDP protocols, the second looks at routing protocol convergence time. For both studies, students either wrote a program that implemented the protocols being tested or created a simulation using OPNET Modeler. Student opinion reflects that simulation software allows more concentration on the performance of the protocol and allows for an easier visualization of results. With simulations, students are more apt to “play” with their simulations and experiment beyond the bounds of the assignment. Programming, though viewed by students as more difficult, allows them to practice and gain skills that will be useful in their future careers. The authors feel that a balance of both programming and simulation activities is the best practice.
  761.     \clearpage
  762.     \subsection{References}
  763.     \begin{thebibliography}{9}
  764.         \bibitem{Christianson and Brown,}\textbf{ Christianson and Brown}, OPNET Lab Manual to
  765.         Accompany Business \textit{Data Communications by
  766.             William Stallings}, 5th Edition, Pearson Prentice Hall
  767.         2005.
  768.         \bibitem{Brown and Christianson} \textit{OPNET Lab Manual to
  769.             Accompany Data and Computer Communications 7th
  770.             Edition and Computer Networking with Internet
  771.             Protocols and Technology,}4th Edition, by William
  772.         Stallings, 5th Edition, Pearson Prentice Hall 2005.
  773.         \bibitem{Brown and Christianson,}
  774.         \textbf{Brown and Christianson}, Networking Lab Exercise
  775.         for \textit{The Networking and Data Communications
  776.             Laboratory Manual}, edited by
  777.         \bibitem{OPNET} OPNET IT Guru http://www.opnet.com
  778.     \end{thebibliography}
  779.    
  780.     \clearpage
  781.    
  782.    
  783.     %personal Statement
  784.    
  785.     \section{Personal Statement}
  786.    
  787.         \begin{center}
  788.             \large{\bf University of Cambridge}\\
  789.             \small{\textbf {Mishigan,USA\\
  790.                     Telephone +44 (0)1223 767600 Fax‎: ‎+44 (0)1223 767602\\
  791.                     Email reception@educ.cam.ac.uk}}
  792.         \end{center}
  793.         \noindent July 5, 2018\\
  794.         \newline   
  795.         \noindent Dear David Willey,\\
  796.        
  797.         \noindent I have completed my B.Sc. Computer Science Engineering from Jatiya Kabi Kazi Nazrul Islam University,Trishal,Mymensingh. There were sixty subjects consisting of twenty-two credit hours. I did course projects during the four years of study individually as well as in a group which created self-confidence as well as ability to work in team environment. My final project was Web Mining System for a private company.  Basically, I was interested in developing web applications because it's my passion.\\
  798.        
  799.         \noindent I have still great thirst for more education. My aims are to do a PhD in Computer Science. I know that according to the rules and regulations of Universities of Cambridge. I have to readmit and complete Masters program first and then apply  for the PhD in Computer Science if I fulfill the rules and regulations of the US Government and its Educational Institutions. So I am applying for the same and I believe that this Masters program would polish my skills more and will enable me to get starting the PhD accordingly.\\
  800.        
  801.         \noindent USA is education friendly country which is promoting higher education in every possible manner without discrimination of race, gender and religion. USA has one of World’s most comprehensive quality education systems. The University of Cambridge puts USA among the world’s top investors in education. Investment has helped produce a vibrant, creative and student-centered system, one in which much of the work is left to the student’s own initiative.These are the reasons for which I choose USA for my higher education.\\
  802.        
  803.         \noindent In Bangladesh, while getting a reasonable job any foreign qualified person is always preferred and paid well. Also Bangladesh is in a desperate need for foreign qualified persons and their skills for its development. So in future when I’ll return I am sure to get a good position to serve my country.\\
  804.         \newline
  805.         \noindent Sincerely yours\\
  806.         \newline
  807.         \noindent \textbf{Sirsendu Biswas}
  808.    
  809.         \clearpage
  810.        
  811.     %Oral presentation
  812.            
  813.     \section{Oral Presentation}
  814.         \begin{center}
  815.             \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge Welcome To ORAL PRESENTATION
  816.             }
  817.            
  818.             \par
  819.             \vspace{6cm}
  820.             \Large BY\\
  821.             \LARGE Sirsendu Biswas \\
  822.             Dept. OF CSE, JKKNIU
  823.         \end{center}
  824.         \clearpage
  825.        
  826.         \subsection{Road map}
  827.         \begin{itemize}
  828.         \item   What is oral presentation?
  829.         \item   Planning
  830.         \item   Preparation
  831.         \item   Practice
  832.         \item   Giving the presentation
  833.         \item   Questions
  834.         \item   Why does an audience get distracted?
  835.         \item   Tips for a successful presentation
  836.         \end{itemize}
  837.        
  838.         \subsection{What is Oral Presentation}
  839.         \begin{itemize}
  840.             \item Brief discussion of a focused topic delivered to audience
  841.             \item Is a way to show your knowledge on a particular subject
  842.             \item Similar to short paper with an introduction, main body and conclusion
  843.         \end{itemize}
  844.         \subsection{Planning}
  845.             \begin{itemize}
  846.                 \item Who are you talking to?\item Why are you talking to them?\item How long have you got? \item What story are you going to tell?
  847.             \end{itemize}
  848.         \subsection{Preparation}
  849.             \begin{itemize}
  850.                 \item Outline
  851.                 \item Preparing slides
  852.                  \item Preparing handouts
  853.             \end{itemize}
  854.         \subsection{Preparation-Outline}
  855.             \begin{itemize}
  856.                 \item Obtain and carefully follow instructions.
  857.                     \item Include much less detail than in a paper to publish.
  858.                     \item Stick to the main idea.
  859.                     \item Give the presentation a beginning, a middle, and an end.
  860.                     \item If feasible, structure the presentation largely as a story.
  861.             \end{itemize}
  862.         \subsubsection{Preparation-Outline(cont.)}
  863.             \begin{itemize}
  864.                 \item Remember: People must be able to understand you as you say it.
  865.                 \item Minimize use of abbreviations/acronyms.
  866.                 \item In general, prepare notes, not a full text.
  867.             \end{itemize}
  868.         \subsection{Preparation-Preparing Slides}
  869.             \begin{itemize}
  870.                 \item At most one slide per minute, on average
  871.                 \item One theme or idea per slide
  872.                 \item Simple and uncrowded
  873.                 \item Thus, usually no published graphs/tables
  874.                 \item Bullet points (not paragraphs) for most text
  875.                 \item Large enough lettering to red
  876.                 \item Use images and graphics
  877.                 \item Minimize text and numbers
  878.             \end{itemize}
  879.         \subsubsection{Preparation-Preparing Slides(cont.)}
  880.             \begin{itemize}
  881.                 \item Light text on dark background
  882.                     \item Void distracting background
  883.                 \item Use large sans serif fonts
  884.                 \item Mixture upper and lower case
  885.                 \item Use color to highlight text
  886.                 \item Keep figures simple
  887.                 \item Thick lines and large symbol
  888.             \end{itemize}
  889.         \subsection{Preparation-Preparing handouts}
  890.             \begin{itemize}
  891.                 \item It is optional
  892.                 \item It serve s record of the presentation
  893.                 \item Handouts provide structure to the presentation
  894.                 \item Should be attractively laid out and inviting to read
  895.                 \item Should be 1-2 pages long.
  896.             \end{itemize}
  897.         \subsection{Practice}  
  898.             \begin{itemize}
  899.                 \item Time the presentation carefully
  900.             \item Try to make the presentation slightly shorter than the allotted time
  901.         \item Perhaps rehearse for others
  902.                 \item Perhaps have others ask you questions
  903.             \end{itemize}
  904.             \subsubsection{Practice(cont.)}
  905.                 \begin{itemize}
  906.                     \item Do a test run in front of a mirror
  907.                 \item Memorize the content of the presentation
  908.                 \item Delete unnecessary content from the presentation
  909.                     \item Use notes
  910.                 \end{itemize}
  911.         \subsection{Giving the Presentation}   
  912.             \begin{itemize}
  913.                 \item Arrive early
  914.             \item Make sure audiovisuals are working
  915.             \item Speak slowly enough
  916.             \item Speak clearly
  917.             \item Look at the audience
  918.             \end{itemize}
  919.         \subsubsection{Giving the Presentation(cont.)}
  920.             \begin{itemize}
  921.                 \item Show enthusiasm
  922.             \item Avoid distracting habits
  923.                 \item Relax and try to have fun
  924.                 \item Do not Read directly from a script
  925.     \item Do not chew gum, eat, or drink
  926.                 \item Do not go over time,
  927.             \end{itemize}  
  928.         \subsection{Question}
  929.             \begin{itemize}
  930.                 \item Lay the groundwork for relevant questions
  931.             \item Perhaps have the moderator or a colleague to ask the first question
  932.                 \item Briefly repeat each question
  933.                 \item Keep answer brief
  934.                 \item Focus on the questioner
  935.             \end{itemize}
  936.         \subsubsection{Question (cont.)}
  937.             \begin{itemize}
  938.             \item If you don’t know the answer, say so.
  939.             \begin{itemize}
  940.                 \item Offer to find out
  941.                 \item Suggest how to find out, or
  942.                 \item See if someone present has the answer
  943.             \end{itemize}
  944.            
  945.             \item If a question seems irrelevant, offer to answer it later, or move to a related item
  946.             \item If a question is hostile, answer it politely and briefly; perhaps offer to talk later
  947.             \item Make note of questions. Use them to help shape future presentations and publications about the work.
  948.             \end{itemize}
  949.         \subsection{Tips For a successful Presentation}
  950.             \begin{itemize}
  951.                 \item Start in time.
  952.                 \item The Message
  953.                 \item Excellent figures have the highest impact
  954.                 \item Timing: Absolutely Necessary
  955.                 \item Communication in stead of performing
  956.             \end{itemize}
  957.        
  958.                                                
  959.                
  960.        
  961.         \clearpage
  962.        
  963.         \section{IEEE Format}
  964.            
  965.    
  966. \end{document}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement