Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- \documentclass[11pt]{article}
- \usepackage{ragged2e}
- \usepackage[left=1 in, right=.5 in, top=.5 in , bottom= .5 in]{geometry}
- \usepackage{graphicx,wrapfig,lipsum }
- \usepackage{tabu}
- \usepackage{array}
- \usepackage{newcent}
- \usepackage{listings}
- \renewcommand{\baselinestretch}{1.2}
- \begin{document}
- \begin{center}
- \textbf{\LARGE{Jatiya kabi Kazi Nazrul Islam University }\linebreak} \\
- \large{Trishal,Mymensingh}\linebreak\linebreak\linebreak
- \end{center}
- \begin{figure}[h]
- \hspace{2.5cm} \includegraphics{logo}
- \end{figure}
- \begin{center}
- \textbf{Technical Writing}\\Course Code: GED-372
- \end{center}
- \begin{flushleft}
- \large{\textbf{Mst Jannatul Ferdous}} \\
- Associate Professor\\
- Dept. of CSE,JKKNIU
- \end{flushleft}
- \begin{flushleft}
- \large{\textbf{Sirsendu Biswas}} \\
- Roll: 15102012\\
- Session: 2014-15\\
- Dept. of CSE,JKKNIU
- \end{flushleft}
- \newpage
- \tableofcontents
- %\thispagestyle{empty}
- \clearpage
- %Writing cover letetr
- \section{Cover latter}
- \setcounter{page}{1}
- \begin{flushright}
- \textbf{\LARGE {Sirsendu Biswas}}\\
- \large{5, Kalishankar Guha Road, Sadar, Mymensingh\\+8801960132939\\
- \textbf{tlcakash1@gamil.com}}
- \end{flushright}
- \begin{flushleft}
- July 2,2018\\
- The General Manager\\
- Defttech Systems\\
- 31/2, Mouchak Dhaka,Bangladesh. \linebreak\linebreak
- Dear Sir,
- \end{flushleft}
- \justify
- As the enclosed resume attests, the project incharge position advertised in ‘The Daily Star’ daily newspaper is a perfect fit with my qualifications. My experience working as a software developer in the RedMark Software Company in Dhaka and my vast experience in the programming field has prepared me for the this job requires, making me an ideal candidate for this position.\\\\
- As my resume highlights, I have offered high-responsibility computer and software support for software development. I am quite expert in \textbf{ C++, JAVA, Python, PHP, CSS, ASP.net} and other web programming languages. I have also experience of handling various operating systems including the Windows, LINUX, Microsoft Office, and Dreamweaver. In addition, I can master new skills quickly and complete tasks efficiently.\\\\
- Please take the time to look over my resume, and feel free to contact my references. I would love to further discuss this position in person. I will follow up with you in a few days to answer any preliminary questions you might have. In the meantime, please do not hesitate to contact me at \textbf{tlcakash1@gmail.com} \\
- \justify
- Thank you for your time and consideration.\\\\\
- Your's Sincerely,\\
- Sirsendu Biswas
- \clearpage
- % CV
- \section{CV}
- \begin{center}
- \textbf{\Huge Curriculum Vitae\\}
- \rule{8cm}{2pt}\\
- \end{center}
- %\begin{flashleft}
- \begin{figure}[h]
- \hspace{14cm}
- \includegraphics[width=3.5cm]{akash}
- \end{figure}
- %\end{flashleft}
- \begin{flushleft}
- \textbf{Personal Information:}
- \textbf{Name: }{Sirsendu Biswas}\\
- \textbf{Address: }{5, Kalishankar Guha Road, Sadar, Mymensingh.}\\
- \textbf{Telephone: }{+8801960132939}\\
- \textbf{Email: }{tlcakash1@gmail.com}\\
- \textbf{Gender: }{Male}\\
- \textbf{Date of Birth: }{11 July, 1997}\\
- \textbf{Religion: }{Hinduism}\\
- \textbf{Marital Status: }{Unmarried}\\
- \textbf{Blood Group: }{B+}\\
- \end{flushleft}
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large Career Objective:} \\Seeking a position to utilize my skills and abilities in the field of computer science and engineering that offers professional growth while being resourceful ,innovative and flexible.
- \vspace{.8cm}
- \par
- \noindent \textbf{\Large Education:}
- \begin{table}[h]
- \begin{tabular}{|m{2cm}|m{2cm}|m{2cm}|m{3cm}|m{1.3cm}|m{1.2cm}|}
- \hline
- \textbf{NAME OF THE EXAM} & \textbf{PASSING YEAR} & \textbf{SUBJECT/ GROUP} & \textbf{UNIVERSITY/ BOARD} & \textbf{CGPA/ GPA} & \textbf{Letter Grade}\\
- \hline
- B.Sc(Eng.) & 2018 & CSE & Jatiya Kabi Kazi Nazrul Islam University & 3.47 & B+\\
- \hline
- H.S.C & 2014 & Science & Dhaka & 5.00 & A+\\
- \hline
- S.S.C & 2012 & Science & Dhaka & 5.00 & A+\\
- \hline
- \end{tabular}
- \end{table}
- %\vspace{.8cm}
- \par
- \noindent \textbf{\Large Knowledge and Competencies: }
- \begin{itemize}
- \item Theoretical and practical knowledge acquired in the various subject of B.S.C engineering in (CSE) especially Computer Fundamental, Computer Architecture, Structured programming, Data structure, Object Oriented Programming,Databage management,Algorithms,Internet and Web programming, Operating System, Data Communication, Automata Theory, Autocade, Compiler Design..
- \item Ability to make official correspondences in both the English , Bengali languages correctly
- and lucidly.
- \item Possess ownership of responsibility.
- \end{itemize}
- %\vspace{.8cm}
- \par
- \noindent \textbf{\Large Technical Experience: }
- \begin{itemize}
- \item Languages: C ,C++ , JAVA , HTML , PHP,CSS,ASP,JSP,VBS.
- \item Database Systems: Mysql , SQL server.
- \item Platforms: Windows7, Windows 10, Linux.
- \item Concepts: Networking, Operating systems, AI.
- \end{itemize}
- \par
- \noindent \textbf{\Large Project Experience: } \\
- Final Semester Project as Part of the B.TECH Curriculum.
- Project Name: "Software Development Project."
- Description: The powerful web server that enhances java based applications and provides authentication.
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large Projects: }
- \begin{enumerate}
- \item Creating a Tic-Tac-Toe Game
- \item Creating a program that will calculate the GPA.
- \end{enumerate}
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large Achievements and Awards: }
- \begin{enumerate}
- \item ACM-ICPC Dhaka Regional Onsite Contestant 2017 ( $68^{th}$ Place)
- \item CSE, JKKNIU Programming Contest, August 2017 ( $1^{st}$ Place)\\
- \end{enumerate}
- \par
- \noindent \textbf{\Large Publications: }\\
- \\ No Publications Yet. \newline
- \vspace{.3cm}
- \par
- \noindent \textbf{\Large Skills and Experience: }\\
- \textbf{Language Skills: }
- English, Hindi\\
- \textbf{Programming Skills: }
- C++, JAVA, HTML, CSS, JavaScript, Python\\
- \textbf{Working Experience: }
- No Working Experience Yet.
- \vspace{.5cm}
- \par
- \noindent\textbf{\Large Projects and Repositories:}
- \newline
- \begin{enumerate}
- \item https://github.com/tlcakash/Mid-Day-Algorithms\\
- \end{enumerate}
- \vspace{.2cm}
- \par
- \noindent \textbf{\Large Extra Curricular Activities: }
- \newline
- \textbf{*} Cricketer at Dipu-Sayem Memorial Cricket Club (Mymensingh Premier League)
- \clearpage
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large Language Proficiency: }\\
- Good command over speaking, reading, listening and writing on both Bengali and English.
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large Commitment: }\\
- For my educational qualification, acquired knowledge, and experience I am confident that I am quite fit for this post offered. I am hereby committed that I shall perform all duties and responsibilities assigned to me related to my job.
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large References: }
- \begin{enumerate}
- \item A.H.M Kamal, Head of the Department, Dept. of CSE, JKKNIU
- \item Kazi Mahmudul Hasan Munna, Lecturer, Dept. of CSE, JKKNIU
- \item Md Jakir Hasan, Divisional Coach, Dhaka North
- \end{enumerate}
- \vspace{.5cm}
- \par
- \noindent \textbf{\Large Declaration: }\\
- I hereby declare that the above written particulars are true to the best of my knowledge and belief.
- \vspace{1cm}
- \par
- \noindent \textbf{\Large Signature }
- \rule{4cm}{1px}
- %project proposal
- \clearpage
- \section{Proposal(project/research)}
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge A Project Proposal on\\ \vspace{1cm} \LARGE Network Topology \\ \vspace{1cm} \Large Group members: Shah Toufiqur Rahman , Sirsendu Biswas , Abdullah Al Faisal , MD. Mahin Hossain
- }
- \end{center}
- \clearpage
- \justify
- \underline{ \noindent \textbf{\large Objectives: }} Our objective is to know and analysis the characteristics of the network topology.Here we will learn and know the characteristics of the different network topologies such as Mesh,Star,Bus and Ring Topology
- \vspace{.5cm}
- \noindent \underline{ \textbf{\large Introduction: }} Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network.Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to one another.\newline
- There are two basic categories of network topologies:
- \begin{enumerate}
- \item Physical topologies
- \item Logical topologies
- \end{enumerate}
- The shape of the cabling layout used to link devices is called the physical topology of the network.The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology.\newline
- The study of network topology recognizes four basic topologies:
- The study of network topology recognizes four basic topologies:
- \begin{itemize}
- \item Mesh Topology
- \item Star Topology
- \item Bus Topology
- \item Ring Topology
- \end{itemize}
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT1}
- \end{figure}
- \vspace{.5cm}
- \noindent \underline{ \textbf{\large Method: }}
- \textbf{\newline \newline Mesh Topology:} In a mesh topology ,every device has a dedicated point-to-point link to every other device. The number of connections in a full mesh = n(n - 1) / 2.The following figure is showing the mesh topology.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT2}
- \caption{Mesh Topology}
- \label{fig:mesh}
- \end{figure}
- \textbf{\newline \newline Star Topology:} In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. The following figure is showing the star topology.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT3}
- \caption{ Star Topology}
- \label{fig:star}
- \end{figure}
- \textbf{\newline \newline Bus Topology:} In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. The following figure is showing the bus topology.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT4}
- \caption{ Bus Topology}
- \label{fig:Bus}
- \end{figure}
- \textbf{\newline \newline Ring Topology:} A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The following figure is showing the ring topology.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT5}
- \caption{ Ring Topology}
- \label{fig:Ring}
- \end{figure}
- \vspace{.5cm}
- \noindent \underline{ \textbf{\large Result and Discussion: }} A computer network is designed to send information from one point to another. This information needs to be converted to either a digital signal or an analog signal for transmission.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT6}
- \caption{ A heterogeneous network made of four WAns and tow LANs}
- \label{fig:NT6}
- \end{figure}
- In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths between them to provide redundant paths to be used in case the link providing one of the paths fails. This decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A multi-dimensional ring has a toroidal topology, for instance.
- Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications . Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications.
- \vspace{.5cm}
- \noindent \underline{ \textbf{\large Conclusion: }} The network topology is not the ultimate standard for data communications and it was never fully implemented . Hence to implement this project has been quite difficult but I have tried my level best to complete this project successfully.After finishing this project I can say that I am successful in this project.I have successfully analized the characteristics of different types of network topology.Inspite of having some problem,finally I have successfully completed this project.
- \vspace{.5cm}
- \noindent \underline{ \textbf{\large Time frame: }} I will complete the task of logical\cite{9tut} implementation within 4-5 weeks and will complete the task of physical implementation within next 4-5 weeks.
- \vspace{.5cm}
- \begin{thebibliography}{9}
- \bibitem{Forouzan}
- Behrouz A Forouzan. \textit{Data Communications And Networking}. 4th ed. New Delhi: Education
- \bibitem{deniweb} www.deniweb.com
- \bibitem{9tut} www.9tut.com
- \end{thebibliography}
- \clearpage
- %thesis report
- \section{Thesis Report}
- %\clearpage
- \begin{center}
- \textbf{\LARGE A STUDY ON NETWORK TOPOLOGY}
- \end{center}
- \vspace{2cm}
- A dissertation submitted to the Jatiya Kabi Kazi Nazrul Islam University in partial fulfillment of the requirement of the Degree of B.SC in Computer Science And Engineering.\newline \newline \newline
- \begin{figure}[h]
- \hspace{2.5cm} \includegraphics{logo}
- \end{figure}
- \begin{center}
- \textbf{\LARGE \newline Submitted By:}\\
- \textbf{Sirsendu Biswas}\\Roll No: 15102012\\ Registration No: 4087\\ Session: 2014-15
- \end{center}
- \vspace{1.5cm}
- \begin{center}
- \LARGE Department Of Computer Science And Engineering
- \\ Jatiya Kabi Kazi Nazrul Islam University
- \\Trishal,Mymensingh.
- \end{center}
- \clearpage
- \begin{center}
- \textbf{\LARGE \newline \newline \newline Certification of thesis work}\\
- \end{center}
- \par
- \noindent The thesis field title \textbf{ Network Topology} by Sirsendu Biswas, Examination Roll no: 15102012, Registration no:4087, Session: 2014-15 has been accepted as satisfactory in partial fulfillment of the requirement for the degree of B.SC in Computer Science And Engineering.
- \begin{center}
- \textbf{\LARGE \newline \newline \newline Board of Examiner }
- \end{center}
- \textbf{\LARGE \newline \newline Supervisor:\\}
- \textbf{ \large Mst. Jannatul Ferdous}\\
- Associate Professor\\
- Dept. of Computer Science and Engineering\\
- Jatiya Kabi Kazi Nazrul Islam University\\
- Trishal,Mymensingh.\\
- \textbf{\LARGE \newline \newline Assistant Supervisor:\\}
- \textbf{ Md. Sujan Ali\\}
- Associate Professor\\
- Dept. of Computer Science and Engineering\\
- Jatiya Kabi Kazi Nazrul Islam University\\
- Trishal,Mymensingh.\\
- \clearpage
- \begin{center}
- \textbf{\Huge \newline \newline \newline \newline \newline \newline Declaration}\\
- \end{center}
- \par
- \vspace{2cm}
- \noindent \Large It is hereby declared that this thesis or any part of it has not been submitted elsewhere for the award of any degree or diploma.
- \par
- \vspace{8cm}
- \noindent
- \begin{flushright}
- \textbf{\LARGE Signature of The Candidate}\\
- \vspace{1.5cm}
- \rule{8cm}{.1 cm}
- \end{flushright}
- \clearpage
- \begin{center}
- \textbf{\Huge \newline \newline \newline \newline \newline \newline Acknowledgement}\\
- \end{center}
- All praise are to Almighty God for giving me such capabilities for the successful completion of this thesis.I would like to express my heartly gratitude to my thesis supervisor, Mst Jannatul Ferdous, Lecturer,Department of Computer Science and Engineering,Jatiya Kabi Kazi Nazrul Islam University,Trishal,Mymensingh, for her guidance and supervision during the entire thesis work.
- \noindent I strongly acknowledge to my thesis Assistant supervisor, Md.Sujan Ali, Assistant Professor, Department of Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam University and Mr.Tushar Kanti Saha, Lecturer, Department of Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam Univeristy,Trishal, Mymensingh for their valuable instruction,constant guidance,encouragement and valuable discussion thoughout this work.
- \noindent I wish to express thanks to Engr. AHM. Kamal, Head, Department of Computer Science and Engineering ,Jatiya Kab Kazi Nazrul Islam University for providing me lab opportunities with lab materials related to my thesis work.
- I also thank all of my friends, group member and lab assistant and my family for helping to complete the thesis on network topology.
- Finally,To everybody here, pleasures receive from me my deep gratitude.
- \clearpage
- \begin{abstract}
- \par
- \noindent \Large Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network . Essentially, it is the topological structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.A good example is a local area network (LAN): Any given node in the LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network. Conversely, mapping the data flow between the components determines the logical topology of the network.
- \end{abstract}
- \clearpage
- \subsection{List of Figures}
- \begin{center}
- \textbf{\Huge \newline \newline \newline \newline \newline \newline List of Figures}\\
- \end{center}
- Figure \ref{fig: th1}: Point-to-Point Connection\\
- Figure \ref{fig: th2}: Multipoint Connection\\
- Figure \ref{fig: NT1}: Classification of Topology\\
- Figure \ref{fig: NT2}: Fully connected Mesh Topology\\
- Figure \ref{fig: NT3}: Star Topology\\
- Figure \ref{fig: NT4}: Bus Topology\\
- Figure \ref{fig: NT5}: Ring Topology\\
- Figure \ref{fig: NT7}: Hybrid Topology\\
- Figure \ref{fig: NT6}: A heterogeneous network made of four WANs and two LANs \\
- \clearpage
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-1\\ \rule{12cm}{.2 cm} \linebreak \LARGE Introduction
- }
- \end{center}
- \clearpage
- \subsection{Chapter-1 : \\ Intruduction}
- \textbf{\Huge Introduction}\\ \small network is a set of devices(often referred to as nodes) connected by communication links.A node can be a computer,printer,or any other device capable of sending and/or receiving data generated by other nodes on the network.Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network.Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to one another.
- \subsubsection{Objective of the Present Work}The \large objective of this thesis is to study and analysis the characteristics of Network Topology. To do this in this paper I will do -
- \begin{enumerate}
- \item Fully describe the Network Topology and its architecture.
- \item Describe the advantages and disadvantages of each topology.
- \end{enumerate}
- \subsubsection{Previous Research Work}
- A lot of research work has carried on Network Topology.But there are some disadvantages of each network topology.Today also various research work are going on to overcome the disadvantages of each network topology.
- \subsubsection{Organization of the Thesis}
- The outline of the thesis as follows-
- \begin{itemize}
- \item Chapter one described the introductory concept of network and network topology,
- also the objective of the present work, previous research work.
- \item Chapter two described the various Network Topology, it’s architecture,
- advantages and disadvantages of those network topology.
- \item Chapter three described result and discussion.
- \item Chapter four gives the conclusion of the thesis.
- \item Chapter five contains the references.
- \end{itemize}
- \clearpage
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-2\\ \rule{12cm}{.2 cm} \linebreak \LARGE Method
- }
- \end{center}
- \clearpage
- \subsection{ chapter-2\\Method}
- Networks are distributed processing,in which a task is divided among multiple computers.Instead of one single large machine being responsible for all aspects of a process,separate computers (usually a personal computer or workstation) handle a subset.
- \subsubsection{Network Criteria}
- A network must be able to meet a certain number of criteria.The most important of these are performance,reliability,and security.
- \textbf{Performance:}Performance can be measured in many ways,including transit time and response time.Transit time is the amount of time required for a message to travel from one device to anther.Response time is the elapsed time between an inquiry and a responed.
- \textbf{Reliability:}In addition to accuracy of delivery,network reliability is measured by the frequency of failure,the time it takes a link to recover from a failure,and the network’s robustness in a catastrophe.
- \textbf{Security:}Network security issues include protecting data from unauthorized access,protecting data from damage and development, and implementing policies and procedures for recovery from breaches and losses.
- Before discussing network and network topology,we need to define some network attributes.
- \subsubsection{Type of Connection}
- A network is two or more devices connected through links.A links is a communications pathway that transfers data from one device to another.
- There are two possible types of connections:Point-to-point and Multipoint.
- \begin{itemize}
- \item Point-to-point:A point-to-point connection provides a dedicated link between two devices.Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other options,such as microwave or satellite links,are also possible.The following figure shows the point-to-point connection.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{th1}
- \caption{ Point-to-point Connection}
- \label{fig: th1}
- \end{figure}
- \item A multipoint connection is one which more than two specific devices share a single link. The following figure shows the Multipoint connection.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{th2}
- \caption{ Multipoint Connection}
- \label{fig: th2}
- \end{figure}
- \end{itemize}
- \subsection{Topology}
- Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network .There are two basic categories of network topologies:
- \begin{enumerate}
- \item Physical topologies
- \item Logical topologies
- \end{enumerate}
- \subsubsection{Physical topology}
- The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling.The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits.
- \subsubsection{logical topology}
- The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example, the original twisted pair Ethernet using repeater hubs was a logical bus topology with a physical star topology layout. Token Ring is a logical ring topology, but is wired a physical star from the Media Access Unit.
- \noindent The study of network topology recognizes four basic topologies such as Mesh,Star,Bus,and Ring. The following figure is showing the classification of topology:
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT1}
- \caption{ Classification of Topology}
- \label{fig: NT1}
- \end{figure}
- \subsection{Mesh Topology}
- \subsubsection{Fully Connected}
- The number of connections in a full mesh = n(n - 1) / 2.
- Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected.
- Figure \ref{fig: NT2} gives the Fully connected Mesh Topology.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT2}
- \caption{ Fully Connected Mesh topology}
- \label{fig: NT2}
- \end{figure}
- \subsubsection{Partially Connected}
- The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.
- \noindent Note: In networks that are based upon the partially connected mesh topology, the data that is transmitted between nodes in the network takes many shortest paths between nodes using a technology like Shortest Path Bridging, except in the case of a failure or break in one of the links, in which case the network uses the remaining alternative paths to the destination. This requires that the nodes of the network possess some type of algorithm to determine the correct path to use at any particular time.
- \subsubsection{Advabntage of Mesh Topology}A mesh offers several advantages over other network topologies.First,the use of dedicated links guarantees that each connection can carry its own data load,thus eliminating the traffic problems that can occur when links must be shared by multiple devices.Second,a mesh topology is robust.If one link becomes unusable,it does not incapacitate the entire system.Third,there is the advantage of privacy or security.Finally,point-to-point links make fault identification and fault isolation easy.
- \subsubsection{Disadvabntage of Mesh Topology} The main disadvantages of a mesh topology are related to the amount of cabling and the number of I/O ports required.First,because every device must be connected to every other device,installation and reconnection are difficult.Second,the sheer bulk of the wiring can be greater than the available space (in walls ceilings,or floors ) can accommodate.Finally,the hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
- \subsubsection{Example of Mesh Topology}One practical example of a mesh topology is the connection of telephone regional offices in which each regional office needs to be connected to every other regional office.
- \subsection{Star Topology}
- In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to one central device. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement.The figure of the star topology is given in the below-
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT3}
- \caption{ Star topology}
- \label{fig: NT3}
- \end{figure}
- \subsubsection{Advantage of Star Topology}Disadvantage of a star topology is the dependency of the whole topology on one single point,the hub.If the hub goes down,the whole system is dead.
- \subsubsection{Disadvantage of Star Topology}Disadvantage of a star topology is the dependency of the whole topology on one single point,the hub.If the hub goes down,the whole system is dead.
- \subsubsection{Application of Star Topology}
- The star topology is used in local area networks(LANs) .High-speed LANs often use a star topology with a central hub.
- \subsection{Bus Topology}
- A bus topology is multipoint.One long cable acts as a backbone to link all the devices in a network.Figure \ref{fig: NT4} shows the bus topology:
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT4}
- \caption{ Bus topology}
- \label{fig: NT4}
- \end{figure}
- Nodes are connected to the bus cable by drop lines and taps.A drop line is a connection running between the device and the main cable.A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core.As a signal travels along the backbone,some of its energy is transformed into heat.Therefore,it becomes weaker and weaker as it travels farther and farther.For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
- \subsubsection{Advantage of Bus Topology}
- There are some advantages of bus topology are given below-
- \begin{enumerate}
- \item A bus topology includes ease of installation.
- \item A bus topology uses less cabling than mesh or star topology.
- \item In a star,for example,four network devices in the same room require four lengths of cable reaching all way to the hub.In a bus,this redundancy is eliminated.Only the backbone cable stretches through the entire facility.Each drop line has to reach only as far as the nearest point on the backbone.
- \end{enumerate}
- \subsubsection{Disavantage of Bus Topology}
- Disadvantages of bus topology are given below-
- \begin{enumerate}
- \item A bus topology includes difficult reconnection and fault isolation.
- \item A bus is usually designed to be optimally efficient at installation.It can therefore be difficult to add new devices.
- \item Signal reflection at the taps can cause degradation in quality.
- \end{enumerate}
- \subsubsection{Use of Bus Topology}
- Bus topology was the one of the first topologies used in the design of early local area networks(LANs).Ethernet LANs can use a bus topology, but they are less popular now.
- \subsection{Ring Topology}
- A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.The figure: \ref{fig: NT5} shows the Ring topology which is drawn below-
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT5}
- \caption{ Ring topology}
- \label{fig: NT5}
- \end{figure}
- \subsubsection{Advantage of Ring Topology}
- The advantages of Ring topology are given in the below-
- \begin{enumerate}
- \item A ring is relatively easy to install and reconfigure.
- \item A fault isolation is simplified.
- \end{enumerate}
- \subsubsection{Disadvantage of Ring Topology}
- Disadvantages of Ring topology are given below-
- \begin{enumerate}
- \item Unidirectional traffic is a disadvantage of ring topology.
- \item In a ring, a break in the ring can disable the entire work.
- \end{enumerate}
- \subsubsection{Use of Ring Topology}
- Ring topology was prevalent when IBM introduced its local area network Token Ring.Today,the need for higher-speed LANs has made this topology less popular.
- \subsection{Hybrid Topology}
- A network can be hybrid. Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.)..For example,we can have a main star topology with each branch connecting several stations in a bus topology as shown in Figure \ref{fig: NT7}
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT7}
- \caption{ Hybrid topology}
- \label{fig: NT7}
- \end{figure}
- \clearpage
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-3\\ \rule{12cm}{.2 cm} \linebreak \LARGE Result and Discussion
- }
- \end{center}
- \clearpage
- \subsection{Chapter-3\\Result and Discussion}
- A computer network is designed to send information from one point to another. This information needs to be converted to either a digital signal or an analog signal for transmission.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{NT6}
- \caption{ heterogeneous network made of four WARNs and two LANs}
- \label{fig: NT6}
- \end{figure}
- In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths between them to provide redundant paths to be used in case the link providing one of the paths fails. This decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A multi-dimensional ring has a toroidal topology, for instance.
- \noindent Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications.
- \clearpage
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-4\\ \rule{12cm}{.2 cm} \linebreak \LARGE Conclusion
- }
- \end{center}
- \clearpage
- \subsection{Chapter-4\\Conclusion}
- The network topology is not the ultimate standard for data communications and it was never fully implemented . Hence to implement this thesis has been quite difficult but I have tried my level best to complete this thesis successfully.In this thesis work I have successfully analized the characteristics of the different types of network topologies .Within the limited facilities of the software and hardware lab,many basic characteristics of these network topologies were studied to implement Network in real world. After finishing this thesis I can say that I am successful in this thesis.
- \clearpage
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge CHAPTER-5\\ \rule{12cm}{.2 cm} \linebreak \LARGE References
- }
- \end{center}
- \clearpage
- \subsection{Chapter-5\\ References}
- \begin{thebibliography}{9}
- \bibitem{Behrouz} \textbf{Behrouz A Forouzan.} Data Communications And Networking. 4th ed. New Delhi: Education Private Limited; 2006.31p.
- \bibitem{deni}\textbf{http:/www.deniweb.com}
- \bibitem{9tut}\textbf{http:/www.9tut.com}
- \bibitem{Davida and Toby} \textbf{Groth, David; Toby Skandier}(2005). Network+ Study Guide, Fourth Edition'. Sybex, Inc.. ISBN 0-7821-4406-3.
- \bibitem{PRQC} \textbf{ATIS committee }PRQC. "\textit{network topolog}y". ATIS Telecom Glossary 2007. Alliance for Telecommunications Industry Solutions. Retrieved 2008-10-10.
- \bibitem{Proulxa and Promislow}\textbf{Proulx, S. R.; Promislow}, D. E. L.; Phillips, P. C. (2005). "\textit{Network thinking in ecology and evolution}". Trends in Ecology and Evolution 20 (6): 345–353. DOI:10.1016/j.tree.2005.04.004. PMID 16701391.
- \end{thebibliography}
- \clearpage
- %project
- \section{Project}
- \begin{center}
- \textbf{\Huge \newline\newline
- \newline Student Projects in Computer Networking: Simulation versus Coding}\\
- \par
- \vspace{4cm}
- Leann M. CHRISTIANSON\\
- California State University, East Bay\\
- Department of Mathematics and Computer Science\\
- Hayward, CA 94542-3092, USA\\
- and\\
- Kevin A. BROWN\\
- California State University, East Bay\\
- Department of Mathematics and Computer Science\\
- Hayward, CA 94542-3092, USA\\
- \end{center}
- \clearpage
- \begin{abstract}
- \textit{ \LARGE In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experience developing laboratory exercises for classroom use in both realms. Two case studies, TCP versus UDP protocol performace, and routing algorithm convergence are described. For both studies, students either wrote a program that implemented the protocols being tested or created a simulation using the OPNET Modeler package. Issues specific to these projects are discussed. Student opinion reflected that simulation software allows more focus on the performance of the protocol and visualization of results. Programming, though viewed by students as more difficult, allows them to practice and gain skills that will be useful in their future careers. The authors feel that a balance of both programming and simulation activities is the best practice.}
- \end{abstract}
- \clearpage
- \subsection{Introduction}
- When teaching computer networking it is important to design activities for students that illustrate the concepts covered in lecture. In this
- paper, we consider the pros and cons of using network simulators to teach computer networking concepts versus having students write programs. The authors have experience developing laboratory exercises for classroom use in both realms [1-3]. Issues that impact the development of effective networking assignments are presented along with case studies and student feedback.
- \noindent Computer networking is an integral part of computer science education today. Creating practical and compelling student assignments in networking, however, is challenging. This is due to the fact that networking concepts and algorithms often involve many entities or are designed to work in environments that are not readily available for classroom use. Some of the issues to consider when designing computer-networking exercises are listed below:
- \begin{enumerate}
- \item Many protocols differ in how they respond to corruption, errors, and loss, which occur uncommonly and inconsistently in real networks making replication of results difficult.
- \item The performance of data-link layer algorithms may only be apparent under high load which may negatively impact other users of the network.
- \item The differences in the performance of transport algorithms may only be apparent if the transmitter and receiver nodes are separated by large distances or if a large number of machines are linked to the network.
- \item Routing algorithms require communication with tens to hundreds of other nodes.
- \item Security concerns within a university may make it difficult to provide access to live servers with which to interact (e.g., to test a student web client).
- \item Super-user access may be needed to use commands that report on network performance
- \item Much network code is at the kernel-level requiring recompilation of the kernel in order to modify.
- \end{enumerate}
- Computer networking algorithms are complex, therefore, it is beneficial to provide more than a description and explanation of them in a lecture setting. Students often learn more by experimenting on their own, by poking and prodding an algorithm to see how it reacts to different stimuli. The ability to experiment may be provided in (at least) two ways. Students can be supplied with a simulation environment, or they can be asked to implement an algorithm themselves and run it on real machines.
- \subsection{Simulation Versus Programming}
- In the computer networking area, as in much of Computer Science, it is not considered sufficient to simply teach the theory of a concept. Computer Science may be considered engineering, and as such, Computer Scientists should be able to apply what they learn by building an artifact or program which embodies the concept. In much the same way that a person who builds an automobile will have a better understanding of its workings than a person who only knows how to drive it, our students will understand algorithms more deeply by implementing them. In addition, undergraduate students should be given every opportunity to improve their coding and widen the application of their skills.
- \noindent There are many practical considerations in computer networking, however, which may preclude a project’s successful creation and testing in a real environment. Even with a completely dedicated network laboratory in which students are given super-user access, many experiments may not be conducted due to the need for additional nodes at a distance to act as correspondents. Without a dedicated lab, students may be unable to modify network algorithms residing in the kernel. Due to security concerns, students may not be able to run network interfaces in promiscuous mode in order to monitor packet arrivals on the local LAN.
- \subsection{Case Study: TCP Versus UDP}
- The effect of packet size on Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) round-trip delay is a concept presented in most beginning network courses. We have assigned this exercise as both a simulation and a programming assignment. Using simulation software such as OPNET Modeler [4], students can easily “drag and drop” networking components to a workspace to create a network model. Components can be linked together using a variety of link speeds, and nodes can be configured to use the TCP or UDP protocol via drop down menus. Figure 1 illustrates a wide area network with a File Transfer Protocol (FTP) client and FTP server. A base packet size and traffic pattern can be configured from a list of options. The end nodes can be configured with a drop-down menu to use TCP or UDP packets when simulating a file request.
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{PP1}
- \caption{ OPNET model of a wide area netwok with an FTP client and FTP server}
- \label{fig: PP1}
- \end{figure}
- \begin{figure}[h]
- \centering \includegraphics[width=5cm]{PP2}
- \caption{ Graph of TCP versus UDP packet delay for a file transfer}
- \label{fig: PP2}
- \end{figure}
- Student comments reflect that the experiment’s goals and outcomes are clearer when simulation software is used. Students enjoy playing with the simulation and tweaking model components. The students do feel, however, that the experience of coding and using sockets for program communication is worthwhile. For many, this is the first time that they have been exposed to socket programming. Though students do enjoy flexibility, some problem issues of this exercise can assuaged by having all the students use the same programming language, operating system and network.
- \subsection{Case Study: Routing Convergence}
- Routing algorithm convergence time is another lesson that students can explore through simulation or programming. Convergence time is the time it takes for routes within a routing table to stabilize after start up or after a link has gone down. Common routing algorithms such as Open Shortest Path First (OSPF), the Routing Information Protocol (RIP), or others can be used. Using OPNET Modeler to simulate this exercise is straightforward. A group of routing nodes can be connected into a network of a given topology. Figure 3 illustrates a simple topology with five nodes. Each node can be configured to run the routing protocol of choice.
- \noindent OPNET provides the capability to export routing tables to a file as well as to allow the student to “break a link” after a certain amount of simulation time. Students can then study the routing tables to find the new path that was propagated to the routing tables after the link went down. This exercise gives the student experience with router interfaces and interpretation of routing tables. Students can then study the simulation and routes and calculate the convergence time for the original network and then again for the network after one link goes down. Figure 4 illustrates a routing table for node 0 at 8 seconds into the simulation.
- \begin{figure}[h]
- \centering \includegraphics[width=3cm]{PP3}
- \caption{ Simple topology for routing convergence}
- \label{fig: PP3}
- \end{figure}
- \begin{figure}[h]
- \centering \includegraphics[width=3cm]{PP4}
- \caption{ Routing table for node 0 after 8 second of simulation time}
- \label{fig: PP4}
- \end{figure}
- \subsection{Conclusion}
- We have discussed the advantages and disadvantages of simulation versus programming for computer networking courses. Two case study activities were described: the first, compares the round-trip packet delay time for both TCP and UDP protocols, the second looks at routing protocol convergence time. For both studies, students either wrote a program that implemented the protocols being tested or created a simulation using OPNET Modeler. Student opinion reflects that simulation software allows more concentration on the performance of the protocol and allows for an easier visualization of results. With simulations, students are more apt to “play” with their simulations and experiment beyond the bounds of the assignment. Programming, though viewed by students as more difficult, allows them to practice and gain skills that will be useful in their future careers. The authors feel that a balance of both programming and simulation activities is the best practice.
- \clearpage
- \subsection{References}
- \begin{thebibliography}{9}
- \bibitem{Christianson and Brown,}\textbf{ Christianson and Brown}, OPNET Lab Manual to
- Accompany Business \textit{Data Communications by
- William Stallings}, 5th Edition, Pearson Prentice Hall
- 2005.
- \bibitem{Brown and Christianson} \textit{OPNET Lab Manual to
- Accompany Data and Computer Communications 7th
- Edition and Computer Networking with Internet
- Protocols and Technology,}4th Edition, by William
- Stallings, 5th Edition, Pearson Prentice Hall 2005.
- \bibitem{Brown and Christianson,}
- \textbf{Brown and Christianson}, Networking Lab Exercise
- for \textit{The Networking and Data Communications
- Laboratory Manual}, edited by
- \bibitem{OPNET} OPNET IT Guru http://www.opnet.com
- \end{thebibliography}
- \clearpage
- %personal Statement
- \section{Personal Statement}
- \begin{center}
- \large{\bf University of Cambridge}\\
- \small{\textbf {Mishigan,USA\\
- Telephone +44 (0)1223 767600 Fax: +44 (0)1223 767602\\
- Email reception@educ.cam.ac.uk}}
- \end{center}
- \noindent July 5, 2018\\
- \newline
- \noindent Dear David Willey,\\
- \noindent I have completed my B.Sc. Computer Science Engineering from Jatiya Kabi Kazi Nazrul Islam University,Trishal,Mymensingh. There were sixty subjects consisting of twenty-two credit hours. I did course projects during the four years of study individually as well as in a group which created self-confidence as well as ability to work in team environment. My final project was Web Mining System for a private company. Basically, I was interested in developing web applications because it's my passion.\\
- \noindent I have still great thirst for more education. My aims are to do a PhD in Computer Science. I know that according to the rules and regulations of Universities of Cambridge. I have to readmit and complete Masters program first and then apply for the PhD in Computer Science if I fulfill the rules and regulations of the US Government and its Educational Institutions. So I am applying for the same and I believe that this Masters program would polish my skills more and will enable me to get starting the PhD accordingly.\\
- \noindent USA is education friendly country which is promoting higher education in every possible manner without discrimination of race, gender and religion. USA has one of World’s most comprehensive quality education systems. The University of Cambridge puts USA among the world’s top investors in education. Investment has helped produce a vibrant, creative and student-centered system, one in which much of the work is left to the student’s own initiative.These are the reasons for which I choose USA for my higher education.\\
- \noindent In Bangladesh, while getting a reasonable job any foreign qualified person is always preferred and paid well. Also Bangladesh is in a desperate need for foreign qualified persons and their skills for its development. So in future when I’ll return I am sure to get a good position to serve my country.\\
- \newline
- \noindent Sincerely yours\\
- \newline
- \noindent \textbf{Sirsendu Biswas}
- \clearpage
- %Oral presentation
- \section{Oral Presentation}
- \begin{center}
- \textbf{\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak\linebreak \Huge Welcome To ORAL PRESENTATION
- }
- \par
- \vspace{6cm}
- \Large BY\\
- \LARGE Sirsendu Biswas \\
- Dept. OF CSE, JKKNIU
- \end{center}
- \clearpage
- \subsection{Road map}
- \begin{itemize}
- \item What is oral presentation?
- \item Planning
- \item Preparation
- \item Practice
- \item Giving the presentation
- \item Questions
- \item Why does an audience get distracted?
- \item Tips for a successful presentation
- \end{itemize}
- \subsection{What is Oral Presentation}
- \begin{itemize}
- \item Brief discussion of a focused topic delivered to audience
- \item Is a way to show your knowledge on a particular subject
- \item Similar to short paper with an introduction, main body and conclusion
- \end{itemize}
- \subsection{Planning}
- \begin{itemize}
- \item Who are you talking to?\item Why are you talking to them?\item How long have you got? \item What story are you going to tell?
- \end{itemize}
- \subsection{Preparation}
- \begin{itemize}
- \item Outline
- \item Preparing slides
- \item Preparing handouts
- \end{itemize}
- \subsection{Preparation-Outline}
- \begin{itemize}
- \item Obtain and carefully follow instructions.
- \item Include much less detail than in a paper to publish.
- \item Stick to the main idea.
- \item Give the presentation a beginning, a middle, and an end.
- \item If feasible, structure the presentation largely as a story.
- \end{itemize}
- \subsubsection{Preparation-Outline(cont.)}
- \begin{itemize}
- \item Remember: People must be able to understand you as you say it.
- \item Minimize use of abbreviations/acronyms.
- \item In general, prepare notes, not a full text.
- \end{itemize}
- \subsection{Preparation-Preparing Slides}
- \begin{itemize}
- \item At most one slide per minute, on average
- \item One theme or idea per slide
- \item Simple and uncrowded
- \item Thus, usually no published graphs/tables
- \item Bullet points (not paragraphs) for most text
- \item Large enough lettering to red
- \item Use images and graphics
- \item Minimize text and numbers
- \end{itemize}
- \subsubsection{Preparation-Preparing Slides(cont.)}
- \begin{itemize}
- \item Light text on dark background
- \item Void distracting background
- \item Use large sans serif fonts
- \item Mixture upper and lower case
- \item Use color to highlight text
- \item Keep figures simple
- \item Thick lines and large symbol
- \end{itemize}
- \subsection{Preparation-Preparing handouts}
- \begin{itemize}
- \item It is optional
- \item It serve s record of the presentation
- \item Handouts provide structure to the presentation
- \item Should be attractively laid out and inviting to read
- \item Should be 1-2 pages long.
- \end{itemize}
- \subsection{Practice}
- \begin{itemize}
- \item Time the presentation carefully
- \item Try to make the presentation slightly shorter than the allotted time
- \item Perhaps rehearse for others
- \item Perhaps have others ask you questions
- \end{itemize}
- \subsubsection{Practice(cont.)}
- \begin{itemize}
- \item Do a test run in front of a mirror
- \item Memorize the content of the presentation
- \item Delete unnecessary content from the presentation
- \item Use notes
- \end{itemize}
- \subsection{Giving the Presentation}
- \begin{itemize}
- \item Arrive early
- \item Make sure audiovisuals are working
- \item Speak slowly enough
- \item Speak clearly
- \item Look at the audience
- \end{itemize}
- \subsubsection{Giving the Presentation(cont.)}
- \begin{itemize}
- \item Show enthusiasm
- \item Avoid distracting habits
- \item Relax and try to have fun
- \item Do not Read directly from a script
- \item Do not chew gum, eat, or drink
- \item Do not go over time,
- \end{itemize}
- \subsection{Question}
- \begin{itemize}
- \item Lay the groundwork for relevant questions
- \item Perhaps have the moderator or a colleague to ask the first question
- \item Briefly repeat each question
- \item Keep answer brief
- \item Focus on the questioner
- \end{itemize}
- \subsubsection{Question (cont.)}
- \begin{itemize}
- \item If you don’t know the answer, say so.
- \begin{itemize}
- \item Offer to find out
- \item Suggest how to find out, or
- \item See if someone present has the answer
- \end{itemize}
- \item If a question seems irrelevant, offer to answer it later, or move to a related item
- \item If a question is hostile, answer it politely and briefly; perhaps offer to talk later
- \item Make note of questions. Use them to help shape future presentations and publications about the work.
- \end{itemize}
- \subsection{Tips For a successful Presentation}
- \begin{itemize}
- \item Start in time.
- \item The Message
- \item Excellent figures have the highest impact
- \item Timing: Absolutely Necessary
- \item Communication in stead of performing
- \end{itemize}
- \clearpage
- \section{IEEE Format}
- \end{document}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement