Unit 3 Introduction To Networking Concept: Structure
Unit 3 Introduction To Networking Concept: Structure
CONCEPT
Structure Page Nos.
3.0 Introduction 55
3.1 Objectives 56
3.2 Why Computer Networks? 56
3.3 The Topologies 57
3.4 Characteristics of the OSI Layers 59
3.5 OSI Model and Communication Between Systems 60
3.6 Interaction Between OSI Model Layers 60
3.7 Protocols 60
3.8 Types of Networks 61
3.8.1 Local Area Networks (LANs)
3.8.2 Metropolitan Networks (MANS)
3.8.3 Wide Area Networks (WANs)
3.9 Medium
3.10 Data Flow
3.11 Physical Connection
3.12 Transmission Media
3.13 Connecting Devices
3.13.1 Repeaters
3.13.2 Hubs
3.13.3 Bridges
3.13.4 Routers
3.13.5 Gateways
3.14 Summary 84
3.15 Solutions/Answers 84
3.16 Further Readings 86
i
3.0 INTRODUCTION
A network can consist of two computers connected together on a desk or it can
consist of many Local Area Networks (LANs) connected together to form a Wide
Area Network (WAN) across a continent. In simple terms it is an interconnected set
of some objects. For decades, we have been familiar with the Radio, Television,
Railways, Banks and various other types of networks. In recent years, the computer
network, a new form of network is becoming more and more visible in our day-to-day
life. A computer network is an interconnected set of autonomous computers.
Autonomous means each of them can function independent of others, i.e., each
computer has individual processors. Simply we can say each computer (terminal,
node) should not be a dump terminal. The key is that two or more computers are
. .
b) Resource Sharing: Resources like files, printers, hard drives, or CPU can be
shared throu~ha com~uternetwork.
environment.
network.
Applications of computer network
a) Electronic Mail (e-mail or Email). The most widely used network application is
E-mail, which is forwarding of electronic files to an electronic post office for the
recipient to pick up.
b) Scheduling programs allow people across the network to schedule appointments
directly by calling up their fellow worker's schedule and selecting a time!
c) Videotext is the capability of having a two-way transmission of picture and sound.
Games like distance education lectures, etc. use videotext.
d) Groupware is the latest network application. It allows user groups to share
documents, schedules databases
e) Teleconferencingallows people in different regions to "attend" meetings using
telephone lines.
i) Value Added Networks are common carriers such 'as ERNET, Satyam ,VSNL
etc. (they can be private or public companies) who provide additional leased line
connections to their customers. These can be Frame Relay, ATM (Asynchronous
Transfer Mode), X.25, etc.
(i) Marketing and sales Marketing professionals use computer network to collect,
Introduction to
Networking Concept
I
exchange and analyse data relating to customer needs.
The topology is the geometric arrangement (either physically or logically) ofthe linking
devices (usually called nodes) and the links, connecting the individual computers or nodes
together. Five basic topologies:
I) Bus topology
2) Ring topology
3) Star topology
4) Mesh topology
5) Combined topologies.
1) The Bus Topology
1n the bus topology there is a single bus that carries all the data to the entire network.
A bus is a single continuous communication cable to which all the computers are
connected. A cable or bus runs throughout tlie office to which all the workstations are
connected. The bus topology is also kiiow~ias linear bus.
When one workstation wants to talk to another the message or signal travels down the
bus in both directions. Each one reads the message to see if it matches its address.
The bus topology is a passive topology. It means that the computers connected to the
bus amplify the signal on the bus.
The main advantage of bus topology is that it is quite easy to set up. Any workstation
can be easily moved to another location as bus runs throughout the office. Another
benefit of this layout is that if one computer on the bus fails, it does not affect the rest
of the traffic on the bus.
A network with bus topology cannot become too big as all the traffic is on a single bu;.
The entire network can be down only if the bus has a break. The open ends of bus
must be terminated to prevent signal bounce. If one or both ends of the bus are not
terminated, the whole network can be down.
Disadvantages include difficult reconfiguration and fault isolation I
2) The Ring Topology
In the ring topology all the workstations are connected in the shape of a ring. The ring
does not have an end. It is made up of short segments that' connect one PC to the next
and so on, until all the computers are joined in a circle. The signals travel only in one
direction and from one PC to tlie next until it reaches the appropriate node. It is also
difficult to move a workstation or to add more computers to an existing ring.
In ring topology the wiring for a ring could be arranged in a circle throughout a building
or a group of buildings. The signal travels in one direction only from one computer to
the next. The ring topology is an active topology. Each computer boosts the signal (like
a repeater) and passes to the next computer till it reaches the destination computer. A
drawback of this topology is that if one computer fails, tlie entire network is down.
Iiowever, now some ring networks are so designed that a faulty workstation is
automatically bypassed. Another drawback is that the traffic is in only one direction.
This topology is not used for a large number of nodes.
--- -
In a mesh topology, every node has a dedicated point-to point link to every other
node. Simply dedicated means that the links carry traffic only between the two nodes.
So mesh topology does not have traffic congestion proble~nsevery node has n-1
link,for a fully connected mesh topology Iiaviug n nodes. So the total number of links
will be 11 (n-I).This also means that every node has (n-1) 110 ports.
Advantages of Mesh topology
1) Use of dedicated links guarantees that each connection can carry its own data
load. Thus eliminates the traffic problem.
2) If one link fails, it does not affect the rest of network. This means it is robust.
3) Point to point links make fault identification and fault isolation easy.
4) Privacy or security is high, since the other link cannot gain access to the
dedicated link where the message is travelling.
1) More cabling and I t 0 ports are required, because every node must be connected
to every other node.
2) Cost is very high, because more number of node and cabling required.
5) Combined Topologies
A network does not have to stick with one topology. Any two topologies or all the
topologies can be used in a network. For example, a hub may be connected to other
hubs using a bus and the workstations may be connected by a star.
Two maln hybrid topologies are:
three hubs of the networks are connected to a fourth hub (main hub) in star pattern.
Application Presentation
Each layer bas well defined filnctionalities and standard protocols for implementing
thes fuoctionalities.
BETWEEN SYSTEMS
Information being transferred from a software application in one computer system to a
software application in another must pass through the OSI layers. For example, if a
software application in System A has information to transmit to a software application
Operating System ' in System B, the application program in System A will pass its information to the
Fundamentals & application layer (Layer 7) of System A. The application layer then passes the
information to the presentation layer (Layer 6), which relays the data to the session
layer (Layer 5 ) , and so on down to the physical layer (Layer 1). At the physical layer,
the information is placed on the physical network medium and is sent across the
medium to System B. The physical layer of System B removes the information from
the physical medium, and then its physical layer passes the information up to the data
link layer (Layer 2), which passes it to the network layer (Layer 3), and so on, until it
reaches the application layer (Layer 7) of System B. Finally, the application layer of
System B passes the information to the recipient application program to complete the
communication process.
3.7 PROTOCOLS
Just like human beings need to have a common languages to speak to one another,
digital devices and computers also need to have common 'languages' to be able to
communicate with one another. The binding function of 'common language' in cirg~tal
communication is performed by communication protocols.
1) Syntax: The'format of data being exchanged, character set used, type of error
correction used, type of encoding scheme (e.g., signal level) being used. For
'
example, a simple protocol may use first eight bit for address of sender, the
second eight bit for address of receiver and the rest of bit for message itself.
2) Semantics: Type and order of messages used to ensure reliable and error free
information transfer.
3) Timing: Define data rate sejection and correct timing for various events during Introduction to
data transfer. Simply when data should be sent and how fast they can be sent. Networking Concept
It has been accepted that the complexity of writing cornrnunication software can be
reduced by adapting the principle of protocol layering. The idea here is to partition
communication functions into a vertical set of layers. Each layer performs a related
set of functions. Division of work between layers is done in such a way that they are
manageable and provide a logical interface and break point. Each communication
layer provides certain services to layers above it and relies on the next lower layer to
perform more primitive functions. Each layer hides internal details from other layers.
Thus dividing the communication problem into several layers reduces its complexity
and makes the work of developing cornrnunication software a lot easier and error
The differences among different types of computer networks are usually based on
perspective. For example, computer networks are frequently classified by the geographical
area (LAN, MAN, WAN), their topologies (e.g., point to point or broadcast),or the type
of communication path they use and the manner in which data are transmitted across
this path (e.g., circuit-switched and packet-switched).
Computer networks are classified by the geographical area are:
1) Local Area Networks (LANs)
2) Metropolitan Network (MANS)
Ethernet Bridge
A LAN is a high-speed data network that covers a relatively small geographic area. It
typically connects workstations, personal computers, printers, servers, and other
devices, so that devices can communicate with each other to share resources. LANs
offer computer users many advantages, including shared access to devices and
applications, file exchange between collnected users, and communication between
users via electronic mail and other applications.
A Local Area Network is a system of computers that share resources such as disk
drives, printers, data, CPU power, fadmodem, applications, etc. They usually have
distributed processing, which means that there are many desktop computers
distributed around the network and that there is no central processor machine
(mainframe).
Operating System Location: In a building or individual rooms or floors of buildings or nearby buildings.
Fundamentals & Can be campus wide like a college or university.
LAN Characterisation
There are four key areas that characterise a local area network.
These are:
1) Transmission Medium a
2) Access Method
3) Topology
4) SignalingTechniques
LAN ~ e d i a - ~ c c e dMethods
s
Media contention occurs when two or more network devices have data to send at the
same time. Because multiple devices cannot talk on the network simultaneously, some
type of method must be used to allow one device access to the network media at a
time. This is done in two main ways: carrier senses multiple accesses collision detect
(CSMAICD) and token passing.
In networks using CSMAICD technology such as Ethernet, network devices contend
for the network media. When a device has data to send, it first listens to see if any
other device is currently using the network. If not, it starts sending its data. After
finishing its transmission, it listens again to see if a collision occurred.A collision occurs
when two devices send data simultaneously.When a collision happens, each device
waits a random length of time before resending its data. In most cases, a collision will
not occur again between the two devices. Because of this type of network contention,
the busier a network becomes, the more collisions occur. This is why performance of
Ethernet degrades rapidly as the number of devices on a single network increases.
In token-passing networks such as Token Ring and FDDI, a special network packet
called a token is passed around the network from device to device. When a device has
data to send, it must wait until it has the token and then send its data. When the data
transmission is complete, the token is released so that other devices may use the
network media. The main advantage of token-passing networks is that they are
deterministic. In other words, it is easy to calculate the maximum time that will pass
before a device bas the opportunity to send data. This explains the popularity of token-
passing networks in some real-time environments such as factories, where machinery
must be capable of communicating at determinable intervals.
For CSMAICD networks, switches segment the network into multiple collision
domains. This reduces the number of devices per network segment that must contend
for the media. By creating smaller collision domains, the performance of a network can
be increased significantly without requiring addressing changes.
Normally CSMAICD networks are half-duplex, meaning that while a device sends
information, it cannot receive at the same time. While that device is talking, it is
incapable of also listening for other traffic. This is much like a walkie-talkie. When one
person wants to talk, he presses the transmit button and begins speaking. While he is
talking, no one else on the same frequency can talk. When the sending person is
finished, he releases the transmit button and the frequency is available to others.
When switches are introduced, full-duplex operation is possible. Full-duplex works
much like a telephoneyou can listen as well as talk at the same time. When a
network device is attached directly to the port of a network switch, the two devices
may be capable of operating in full-duplex mode. In full-duplex mode, performance can
be increased, but not quite as much as some like to claiin.. However, full-duplex
operation does increase the throughput of most applications because the network
media is no longer shared. Two devices on a full-duplex connection can send data as Introduction to
soon as it is ready. Networking Concept
Token-passing networks such as Token Ring can also benefit from network switches.
In large networks, the delay between turns to transmit may be significant because the
token is passed around the network.
LAN Transmission Methods
For Transmission, LAN usually broadcast their message to all hosts on the LAN The
address in the packet or frame enables the destination to receive the packet, while the
rest of the hosts ignore the broadcast message.
LAN data transmissions fall into three classifications: unicast, multicast, and
broadcast. In each type of transmission, a single packet is sent to one or more nodes.
In a unicast transmission, a single packet is sent from the source to a destination on a
network. First, the source node addresses the packet by using the address of the
destination node. The package is then sent onto the network, and finally, the network
passes the packet to its destination.
A multicast transmission consists of a single data packet that is copied and sent to a
specific subset of nodes on the network. First, the source node addresses the packet
by using a multicast address. The packet is then sent into the network, which makes
copies of the packet and sends a copy to each node that is part of the multicast
address.
A broadcast transmission consists of a single data packet that is copied and sent to all
nodes on the network. In these types of transmissions, the source node addresses the
packet by using the broadcast address. The packet is then sent on to the network,
which makes copies of the packet and sends a copy to every node on the network
Topology: The most common LAN topologies are bus, ring, and star.
3.8.2 Metropolitan Networks (MANs)
Metropolitan Area Networks (MANs), as shown in Figure 4, are networks that
connect LANs together within a city.
Warehwse
The main criterion for a MAN is that the connection between LANs is through a local
exchange carrier (the local phone company) . The protocols that are used for MANs
are quite different from those used for LANs (except for ATM, which can be used for
both under certain conditions). It has been distinguished as a separate type of
network; because of the specific standard known as Distributed Queue Double Bus
(DQDB) that has been adopted for MAN. The DQDB comprises two unidirectional
buses for connecting computers.
T ,T I Router Router
L A
Figure 7: City to city, across a country or across a continent.
The rnairi difference between a MAN and a WAN is that the WAN uses Long Distance Introduction to
Carriers. Otherwise the same protocols and equipment are used as in MAN. Networking Concept
Main differences between a LAN and a WAN are given in the following Tablel.
Tablel: Difference between LAN and MAN
-
Wide area Network Local Area Network
May be managed by organizations LAN uses simple protocols and does not
independent of users employ any retransmission strategy for
lost frames
WAN uses complex protocols and
extej~siveerror recovery mechanisms Number of host on a LAN is limited
(usually up to 1024)
Number of node coinputers has no
theoretical limit and could be very large.
Tile practical limit comes from address-
ing schemes used to ide~itifjrindividual
system on the network and other
resource constrains.
1
Source1 Host1
Sender Receiver
..
Figure 81 O r t r Communication-1
I
t
I I I I
I I I I
DCE: The interface between the Source and the Medium, and the Medium and the
Receiver is called the DCE (Data Communication Equipment) (Figure 9) and is a
physical piece ofequipment.
DTE: Data Terminal Equipment is the telecommunications name given to the source
and receiver's equipment. Tt is any device that is a source of or destination for binary
digital data.
The DTE generates the data and passes them, through DCE. The DCE takes the generated
data by DTE and converts them to an appropriate signal. Then this signal is introduced to
telecommunication link. Most commonly used DCE is a modem, discussed in the section.
Data flow (transir7ission mode) is the flow of data between two points.
There are three types of dataflow (Figure 10): simplex, half duplex and full duplex.
Simplex: data flows in only one direction (Figure 11) on the data communication line
(medium). Examples are radio and television broadcasts. They go from the TV station Netw
to your home television.
'
TV
rransmitter
station 1 One direction
SIMPLEX
Half-Duplex: Data flows in both directions but only one direction at a time (Figure 12)
on the data communication line. Each of the stations can both transmit and receive. For
example; a conversation on walkie-talkie is a half-duplex data flow. Each person takes
turns talking. If both talk at once - nothing occurs!
Modems
Voice Channel
(Phclne Line)
Basic Definition
Digital Connection
T@XD(2) T'xD O
RXD (3).
0-4kHzBW
Analog
Voice Band
Modem
The modem converts digital information into tones (frequencies) for transmitting
through the phone lines.
ExternalIInternal Modems
There are 2 basic physical types of mode'ms: Internal & External modems. External
modems (Figure 17) sit next to the computer i~ndconnect to the serial port using a
straight-through serial cable.
Serial Cable
External
Modem
Internal modems (Figure 18) are a plug-in circuit board that sits inside the computer. It
incorporates the serial port on-board. They are less expensive than external modems
because they do not require a case, power supply and serial cable. They appear to the
communication programs as if they were an external modem for all practical purposes.
------- a if~ it
Internal ~ ~ d Ie *n ~~ p as
were an External
(2) Short Haul Modem: A modem used to transmit data over 30 km or less. Modems
we use at home or to connect computers together among different offices in the
same building are short haul modems.
(3) Acoustic Modem: A modem that couples to the telephone handset with what looks
like suction cups that contain a speaker and microphones. Used by travelling sales
people to connect to hotel phones.
(4) Smart Modem: A modem with a CPU (microprocessor) on board that uses the
Hayes AT command set. This allows auto-answer & dial capability rather than
manuallv dialine & answering.
(6) V.32 Modem: A milestone modem that uses a 2400-baud modem with 4 bit
encoding. This results in a 9600 bps (bits per second) transfer rate.
Baud (Figure 19) is the speed at which the analog data is changing on the voice
channel and bps is the speed at which the decoded digital data is being transferred.
Features of Modems
(1) Speed: The speed at which the modem can send data in bps (bits per second).
bps.
(2) Auto DialIRe Dial: Smart modems can dial the phone number and auto re dial if a
busy signal is received.
(3) Auto Answer: Most modems have Ring Detect capability and can automatically
answer the telephone when an incoming call comes in.
(4) Self-Testing: Newer modems have self-testing features. They can test the digital
connectio~~ to the terminallcomputer and the analog connection to a remote
modem. Thcv call also check the modem's internal electronics.
(5) Voice Over Data: Voice Over Data modems allow a voice conversation to take
place while data is being transmitted. This requires both the source and
destination modems to have this feature.
Introduction to
Networking Concept I
(6) Synchronousor Asynchronous Transmission: Newer modems allow a choice of
synchronous or asynchronous transmission of data. Normally, modem
transmission is asynchronous (we send individual characters with just start and
stop bits). Synchronous transmission or packet transmission is used in specific
The physical connection determines how many bits (1's or 0's) can be transmitted in
a single instance of time. If only 1 bit of information can be transmitted over the
data transmission medium at a time then it is considered a serial communication
Receives
I ~ i arr a rime
1 bit at a time
If more than 1 bit of information is transmitted over the data transmission medium at a
time then it is considered a parallel communication (Figure 21). By grouping, we can
send data n bits at a time instead of one, through n wires.
Data Traosm~ssionMedium - 8 W i n s
0- 0-
Sends ~n ~n Receives
Parallel Data 0- 0- Parallel Data
8bitsatarime 0- 0- 8 bits at a tin
Byte: OlM 1010 ~n
0-
1J l Byte: 0100 1010
Separate wire D- Separate w i r ~
L
n
for each bit! 0- for each bit!
0-
Trans~nissionMedia
Unguided
Guided transmission uses a cabling system that guides the data signals along a specific
path. The data signals are bound by the cabling system. Guided media is also known as
bound media. "Cabling" is meant in a generic sense, and is not meant to be interpreted
as copper wire cabling only. Guided media are commonly used for point-to-point
connection. The cllaracteristics of the medium mainly decide the nature and quality of
transmission. Guided media are commonly used for LAN application.
a) Open Wire
b) Twisted Pair
C) Coaxial Cable
d) Optical Fiber
Open Wire
Open wire 1s (Figure 23) traditionally used to describe the electrical wire strung along
power poles. There is a single wire strung between poles. No shielding or protection
from noise interference IS used. We are going to extend the traditional definition of
open wire to include any data signal path without shieldingor protection from noise
' interference. This can include multi conductor cables or single wires. This medium is
susceptible to a large degree of noise and interference and consequently is not
acceptable for data transmission except for short distalices of less than 20 ft.
Twisted Pair
The wires in twisted pair (Figure 24) cabling are twisted together in pairs. Each pair
consists of a wire used for the +ve data signal and a wire used for the -ve data signal.
Each pair is twisted together to minimize electromagnetic interference between the
pairs.Ar1y noise that appears on 1 wire of the pair will also occur on the other wire.
Because the wires are opposite pojarities, they are 180 degrees out of phase (180
degrees - phasor definition of opposite polarity). When the noise appears on both
wires, it cancels or nulls itself out at the receiving end.
Coaxial Cable
Coaxial cable (Figure 26) consists of two conduotors. The inner conductor is held I
inside an insulator with the other conductor woven around it providing a shield. An
insulating protective coating called a jacket covers the outer conductor.
The outer shield protects the inner conductor from outside electrical signals. The
distance between the outer conductor (shield) and inner conductor plus the type of
material used for insulating the inner conductor determine the cable properties or
impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV, 50 ohms
for Ethernet Thinnet and Thicknet. The excellent control ofthe impedance
characteristics of the cable allow higher data rates to be transferred than with twisted
pair cable.
Optical fiber
Optical fiber consists of thin glass fibers that can carry information at frequeit-ies in
the visible light spectrum and beyond. The typical optical fiber consists of a very
Typically Cladding has a diameter of 125 microns. Coating the cladding is a protective
coating consisting of plastic, it is called the Jacket.
Optical fibers work on the principle that the core refracts the light and the cladding.
reflects the light. The core refracts the light and guides the light along its path. The
100 100
John Ware I
Building I I Building
I I
Typically, repeaters are used to connect two physically close buildings together (when
they are too far apart to just extend the segment). They can be used to connect floors
of a building that would normally surpass the maximum allowable segment length.
Note: for large extensions, as in the above example, two Repeaters are required. For
shorter extensions, only one Repeater may be required.
Physical Physical
100
I
A B C Rep-er I 13 E F
1
100
1, ,I rTP7,
I loo
I
Floor 5 I Floor 1
Network Node
Star Topology
The Hub is installed in a central wiring closet (Figure 3 1) with all the cables extending
out to the network nodes. The advantage of having a central wiring location is that it is
easier to maintain and troubleshoot large networks. All of the network cables come to
the central hub. This way, it is especially easy to detect and fix cable problems. You
can easily move a workstation in-a star topology- by changing the connection to the
hub at the central wiring closet.
Wice #1 Office #2 mice #3 Office #4 Office #5
3.13.3 Bridges
Bridges have all the features of the repeater. Besides regenerating the signals, a bridge
can segment (or divide) a network to isolate traffic related problems. A bridge sends
the data frames only to the concerned segment, thus preventing excess traff~c.A
bridge can split an overloaded network into two separate networks, reducing the
amount of traffic on each segment and thus making each network more efficient. Just
like repeaters, the bridges can be used to link different physical media. Bridges can
also be used to connect dissimilar networks like Ethernet system to a Token Ring
system. Thus bridges can be used to join networks using CSMAtCD access and token
passing access.
Bridges are both hardware and software devices. They can be standalone devices -
separate boxes specifically designed for bridging applications- or they can be
dedicated PCs (with 2 NlCs and bridging software). Most server software will
automatically act as a bridge when a second NIC card is installed.
Bridge OSI Operating Layer
Bridges (Figure 34) operate on the OS1 Model Data Link Layer, while repeaters work
at the physical layer. Since bridges work on a higher layer than repeaters, they are
more complex than repeaters and cost more than repeaters. They look at the MAC
addresses for Ethernet and Token Ring, and determine whether or not to forward--or
ignore-a packet.
Router
Bridges have their own routing tables. Initially the bridge's routing table is empty. As
nodes send packets, the source address is copied to the routing table. With this address
information, the bridge learns where the computers are situated. When any packet is
received by a bridge it reads its source and destination address. If the bridge knows the
location of the destination node it forwards the packet to the segment on which the
destination node is situated. If it does not know the destination, it forwards the packet
to all the segments.
Purposes of a Bridge
The purposes of a Bridge are the following:
Isolates networks by MAC addresses
Manages network traffic by filtering packets
Translates from one protocol to another
Isolates networks by MAC addresses Introduction to '
Networking Concept
For example, you have one segment called Segment 100: it has 50 users (in several
departments) using this network segment. The Engineering Dept. is CAD (Computer
Aided Design) -oriented, while the Accounting Dept. is into heavy number crunching
(vear end reports, month end statements, etc.).
100 100
Accounting I "Other" I Engineering
I ~ P L
Dept I I D~P
On this network, any traffic between Clients A, B or C and the Accou~ltingFile Server
(in the Accounting Dept.) will be heard across the Segment 100. Likewise, any traffic
between the Engineering Dept. clients G, H or I (to the CAD File Server) will be
heard throughout the Network Segment. The result is that "Other" Department
accesses to the Generic File Server are incredibly slow: this is because of the
unnecessary traffic that is being generated from other departments (Engineering &
Accounting).
The solution is to use one Bridge (Figure 36) to isolate the Accounting Dept., and
another bridge to isolate the Engineering Department. The Bridges will only allow
packets to pass through that are not on the local segment. The bridge will first check
its "routing" table to see ifthe packet is on the local segment. If it is, it will ignore the
packet, and not forward it to the remote segment. If Client A sent a packet to the
Accounting File Server then Bridge # I will check its routing table (to see if the
Accounting File Server is on the local port). If it is on the local port, then Bridge #1
will not forward the packet to the other segments.
I I
Accounting I Generic I CAD
, File Server I ,, ,File Server1 Fileserver , .. .
100
Accounting
ha1 ~anotc
II "Other" iaaa Engineering 100 I
If Client A sent a packet to the Generic File Server, Bridge #1 will again check its
routing table to see if the Generic File Server is on the local port. If it is not, then
Bridge #1 will forward the packet to the remote port.
Note: The terms local and remote ports are arbitrarily chosen to distinguish between
the two network ports available on a bridge. R1 I
Operating System In this manner, the network is segmented, and the local department traffic is isolated
Fundamentals & from the rest of the network. Overall network bandwidth increases because the
Networking
Accounting Dept. does not have to fight with the Engineering Dept. (for access to the
segment). Each segment has reduced the amount of traffic on it and the result is faster
access. Each department still has complete access to the other segments, but only
when required.
3.13.4 Routers
A router is a special -purpose computer having a processor (CPU) and memory like
any other computer. But unlike any other computer, it has more than one 110 interface
that allows it to connect to multiple computer networks.
Routers are both hardware and software devices. Just like bridges, Router can connect
network segments and filter and isolate traffic. Unlike a bridge, a router can connect
networks that use different technologies, addressing methods, media types, frame
formats, and speeds. Routers are used in complex network situations because they
provide better traffic management than bridges. A router keeps track of the address of
all the segment of a network and can even determine the best path for sending data.
Routers do not pass broadcast traffic.
Like bridges, the routers also maintain routing tables in their memories to store
information about physical connections on the network. The router examines each
packet of data, checks the routing table , and then forwards the packet if necessary.
Routers are more inelegant than bridges, as routers can share status and routing
information with one another and use this information to bypass slow or malfunctioning
connections. Routers do not maintain any state information about the packets; they
simply move them along the network. Routers are usually employed by wide area
networks using dissimilar addressing schemes and different communication protocols.
Routers do not allow bad data to get passed on to the network. Thus they save
networks from broadcast storms.
There are two types of routers - static routers and dynamic routers.
Static routers require an administrator to manually set up and configure the routing
table and to specify each route.
Dynamic routers maintain a routing table automatically and require minimal set up and
configuration.
Router OSI Operating Layer
Routers operate on the OSI Model's Network Layer as shown in Figure 37. The
Internet work must use the same Network Layer protocol. Routers allow the
transportation of the Network Layer PDU through the Internetwork, even though the
Physical and Data Link Frame size and addressing scheme may change.
Bridge
Daralink Daralink
Physical Physical
a Computer network is classified into three types: LAN, MAN and WAN.
a The most familiar type of DCE is the modem that modulates and demodulates
signals.
Guided transmission media use a cabling system that guides the data signals
along a specific path.
Unguided transmission media consist of a means for the data signals to travel
but nothing to guide them along a specific path.
Repeater is a device that operates at the physical layer, bridge at the data link
layer, router at the network layer and Gateway at all seven layers of the OSI
model.
3.15 SOLUTIONS/ANSWERS
Check Your Progress 1
Noise immunity: RFI and EM1 immune (RFI - Radio Frequency Interference,
EM1 -Electromagnetic Interference) Because fiber -optic transmission uses
light rather than electricity, noise is not a factor.
No corrosion.
The main advantage of bus topology is that it is quite easy to set up. Any
workstation can be easily moved to another location as bus runs throughout the
office. Another benefit of this layout is that if one computer on the bus fails, it does
not affect the rest of the traffic on the bus.
A network with bus topoiogy cannot become too big as all the traffic is on a single
bus. The entire network can be down only if the bus has a break. The open ends of
the bus must be terminated to prevent signal bounce. If one or both ends of the bus
are not terminated, the whole network can be down.
Mesh Topologies
In a mesh topology, every node has a dedicated point-to point link to every other
node. Simply dedicated means that the links carry traffic only between the two
nodes. So mesh topology ddes not have traffic congestion problems. Every node
has n-1 link, for a fully connected mesh topology having n nodes. So total number of
links will be n (n-l).This also means that every node has (n-1) I10 ports
1) Use of dedicated links guarantees that each connection can carry its own data
load. This eliminates the traffic problem.
2) If one link fails, it does not affect the rest of network. This means it is robust.
3) Point to point links make fault identification and fault isolation easy.
4) Privacy or security is high; as any other link cannot gain access to dedicated link
where the message is travailing.
1) More cabling and I10 ports are required, because every node must be connected
to every other node.
2) Cost is very high, because more number of nodes and cabling required.