0% found this document useful (0 votes)
69 views15 pages

Q3M4 - JAVA2 - NetworkTopology

Uploaded by

Randy Mercado
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views15 pages

Q3M4 - JAVA2 - NetworkTopology

Uploaded by

Randy Mercado
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Mind and Integrity College, Inc.

San Cristobal, Calamba City


In collaboration with
Department of Education
Region IV – CALABARZON

JAVA 2
Quarter 4 – Module 1:
Network Topology and OSI Network Model

SELF LEARNING MODULE


GRADE 11

Development Team:
Writer: Randy T. Mercado
Reviewer: Marife P. De Castro
Layout: Paulo Stephen Cadawas
Management: Dr. Edwin T. Casila, MCL – Principal
Christian D. Manalansan – President

Mind and Integrity College, Inc.


Selina-Liz Bldg. National Hi-way, San Cristobal, Calamba City, Laguna
Contact #: 049-531-1604 / 0908-965-0010
Email Address: [email protected]

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 1 of 15
Dear Parents,

Mind and Integrity College, Inc. is one with every Filipino family in coping with the
demands of our modern times amidst the threat of COVID-19 pandemic.

The school initiated the distribution of a Self-Learning Module (SLM) in order to meet the
essential learning competencies required to be learned by your child whether your child opts for
online, modular, or blended learning modality. The learning activities in this SLM are arranged
chronologically from simple to complex that will lead your child to think critically, act skillfully,
and reflect deeply on each lesson and to practice them into real life settings. Most importantly,
this SLM promotes self-paced learning as your child can always review the least understood
lessons as often as he/she pleases.

Thank you in advance for being one with us! Together, let us envision that, by the end of
this school year, we will see your child as one responsible young person with a heart and mind
for humanity, for nature, for the country, and for God.

Dear Learner,

Welcome to a brand-new year of learning!

This is our gift to you. The school initiated the distribution of Self-Learning Modules
(SLM) that will help you keep up with the lesson whether you opted for online, modular, or
blended learning as a modality.

Please take time to read and do the activities in these SLM as if you are reporting in
school. Set a regular study schedule for you as much as possible, but keep in mind that these
SLM will enable you to learn at your own pace. If you do not understand a lesson, the SLM
would not mind you flipping back the pages repeatedly for review. Also, remember to keep in
touch with your teachers. Send them a message through your online sessions or write them a
note as you do your modular activities.

We wish you good luck in your studies, and we hope that you will remain happy and
enthusiastic in learning!

NOTE: Prepare yellow pad papers where you would write all your outputs for this
module. Do not forget to label your works properly corresponding to the title of each
activity. Also, please label your work with module number and module title. Do not forget
to write your name, section and the date of first entry.

Make sure to clip/staple your works so that they will not easily be separated. It is advised
to take down notes about the important information from each lesson because of the
modules will be returned at the end of every week. Please do not write anything on
module.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 2 of 15
What This Module is About
Fast and efficient processing of two-dimensional arrays is essential in land-change modeling
because of the substantial computational effort expended by some computer land change models in
processing raster-graphic images and other two-dimensional arrays. Elapsed, wall-clock runtimes
for spatially explicit land-change models often span days or weeks, so improvements in the speed
and efficiency of a land-change model’s executable computer code can reduce its runtime by hours
or even days. The speed of execution can make the difference between a model that is fast enough
to be used and one that is not. Computational speed and efficiency in array processing are
fundamental, threshold concerns in land-change modeling and other areas of scientific
computation.

Icons of this Module


What I Need to This part contains learning objectives that are set for you
Know to learn as you go along the module.

What I know This is an assessment as to your level of knowledge


to the subject matter at hand, meant specifically to
gauge prior related to
Knowledge

What’s In This part connects previous lesson with that of the current
one.

What’s New An introduction of the new lesson through various


activities, before it will be presented to you

What is It These are discussions of the activities as a way to


deepen your discovery and under- standing of the
concept.

What’s More These are follow-up activities that are in- tended for you
to practice further in order to master the competencies.

What I Have Activities designed to process what you have


Learned learned from the lesson

What I can do These are tasks that are designed to show- case your
skills and knowledge gained and applied into real-life
concerns and situations.

Assessment This is a task which aims to evaluate your level of mastery


in achieving the learning competency

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 3 of 15
WHAT I KNOW

Instruction: Identify the following. Write your answer on a yellow pad paper.
1. This refers to the layout of connected devices on a network.
2. Here every device has a point to point link to every other device.
3. Here each device has a dedicated point-to-point link to the central controller.
4. Here one long cable act as a backbone to link all the devices are connected to the backbone by drop lines
and taps.
5. It is the connection between the devices and the cable.
6. Here each device has a dedicated connection with two devices on either side.
7. It is the splitter that cut the main link.
8. It is is one of the most common network setups that is similar to a bus topology and a star topology.
9. A network which contain all type of physical structure and connected under a single backbone channel.
10. It is a central controller used in Star Topology.

Lesson 4: NETWORK TOPOLOGY

What I Need to Know

TOPOLOGY
Topology refers to the layout of connected devices on a network. It is the way a network is arranged, including
the physical or logical description of how links and nodes are set up to relate to each other. There are
numerous ways a network can be arranged, all with different pros and cons, and some are more useful in
certain circumstances than others.
• Here, some logical layout of topology.
 Mesh  Ring
 Star  Tree
 Bus  Hybrid

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 4 of 15
MESH TOPOLOGY
• Here every device has a point to point link to every other device.
• Node 1 node must be connected with n-1 nodes.
• A fully connected mesh can have n (n-1)/2 physical channels to link n devices.
• It must have n-1 I/O ports.
Advantages:
1. They use dedicated links so each link can only carry its own data load. So traffic problem can be
avoided.
2. It is robust. If anyone link get damaged it cannot affect others.
3. It gives privacy and security. (Message travels along a dedicated link)
4. Fault identification and fault isolation are easy.

Disadvantages:
1. The amount of cabling and the number of I/O ports required are very large. Since every device is
connected to each devices through dedicated links.
2. The sheer bulk of wiring is larger than the available space.
3. Hardware required to connect each device is highly expensive.
Applications:
1. Telephone Regional office.
2. WAN (Wide Area Network).

STAR TOPOLOGY
• Here each device has a dedicated point-to-point link to the central controller called “Hub” (Act as an
Exchange).
• There is no direct traffic between devices.
• The transmission are occurred only through the central “hub”.
• When device 1 wants to send data to device 2; first sends the data to hub. Which then relays the data
to the other connected device.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 5 of 15
Advantages:
1. Less expensive then mesh since each device is connected only to the hub.
2. Installation and configuration are easy.
3. Less cabling is need then mesh.
4. Robustness.(if one link fails, only that links is affected. All other links remain active)
5. Easy to fault identification & to remove parts.
6. No disruptions to the network then connecting (or) removing devices.
Disadvantages:
1. Even it requires less cabling then mesh when compared with other topologies it still large. (Ring or
bus).
2. Dependency (whole n/w dependent on one single point (hub). When it goes down. The whole system is
dead.
APPLICATIONS:
• Star topology used in Local Area Networks (LANs).
• High speed LAN often used STAR.

BUS TOPOLOGY
• A bus topology is multipoint.
• Here one long cable act as a backbone to link all the devices are connected to the backbone by drop
lines and taps.
• Drop line- is the connection b/w the devices and the cable.
• Tap- is the splitter that cut the main link.
• This allows only one device to transmit at a time.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 6 of 15
• A device want to communicate with other device on the n/ws sends a broadcast message onto the wire
all other devices see.
• But only the intended devices accepts and process the message.
Advantages:
1. Ease of installation
2. Less cabling
Disadvantages:
1. Difficult reconfiguration and fault isolation.
2. Difficult to add new devices.
3. Signal reflection at top can degradation in quality.
4. If any fault in backbone can stops all transmission.
Applications:
• Most computer motherboard.
RING TOPOLOGY
• Here each device has a dedicated connection with two devices on either side.
• The signal is passed in one direction from device to device until it reaches the destination and each
device have repeater.
• When one device received signals instead of intended another device, its repeater then regenerates the
data and passes them along.
• To add or delete a device requires changing only two connections.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 7 of 15
Advantages:
1. Easy to install.
2. Easy to reconfigure.
3. Fault identification is easy.
Disadvantages:
1. Unidirectional traffic.
2. Break in a single ring can break entire network.
Applications:
• Ring topologies are found in some office buildings or school campuses.
• Today high speed LANs made this topology less popular.
TREE TOPOLOGY
• Alternatively referred to as a star bus topology.
• Tree topology is one of the most common network setups that is similar to a bus topology and a star
topology.
• A tree topology connects multiple star networks to other star networks. Below is a visual example of a
simple computer setup on a network using the star topology.

HYBRID TOPOLOGY
• A network which contain all type of physical structure and connected under a single backbone channel.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 8 of 15
CONSIDERATIONS FOR CHOOSING TOPOLOGY

• Money-Bus n/w may be the least expensive way to install a n/w.

• Length-of cable needed- the linear bus n/w uses shorter lengths of cable.

• Future growth-with star topology, expending an n/w is easily done by adding another devices.

• Cable type-most common used cable in commercial organization is twisted pair. Which often used with star
topologies.

• Full mesh topology is theoretically the best since every device is connected to every other device.(thus
maximizing speed and security. however, it quite expensive to install)

• Next best would be tree topology, which is basically a connection of star.

What’s New
Activity 1: PERFORMANCE ACTIVITY
Instruction: Research about how the topology applies in real life. Draw it on your clean bond paper.

Lesson 5: OSI Network Model

What I Need to Know

OSI MODEL
OSI model is based on the proposal developed by the International Standards Organization (ISO).
This model is called ISO OSI (Open Systems Interconnection) Reference model because it deals with connecting
open systems (systems that are open for communication with other systems)

The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-layer model is still
widely used, as it helps visualize and communicate how networks operate, and helps isolate and troubleshoot
networking problems.
OSI was introduced in 1983 by representatives of the major computer and telecom companies, and was adopted by
ISO as an international standard in 1984.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 9 of 15
OSI Model Explained: The OSI 7 Layers

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 10 of 15
1. PHYSICAL LAYER

 It is the bottom layer of OSI Model.


 It is responsible for the actual physical connection between the devices. Such physical connection may be
made by using twisted pair cable.
 It is concerned with transmitting bits over a communication channel.

FUNCTIONS OF PHYSICAL LAYER


Transforming bits into signals
Provides synchronization of bits by a clock.
Physical layer manages the way a device connects to network media.
It defines the transmission rate.
It defines the way in which the devices are connected to the medium.
It provides physical topologies
It can use different techniques of multiplexing.

2. DATA LINK LAYER

 It is responsible for node-to-node delivery of data.


 It receives the data from network layer and creates FRAMES, add physical address to these frames & pas
them to physical layer
 It consist of 2 layers:
Logical Link Layer (LLC): Defines the methods and provides addressing information for communication
between network devices.
Medium Access Control (MAC): establishes and maintains links between communicating devices.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 11 of 15
FUNCTIONS OF DATA LINK LAYER
Framing: DLL divides the bits received from N/W layer into frames. (Frame contains all the addressing
information necessary to travel from S to D).
Physical addressing: After creating frames, DLL adds physical address of sender/receiver (MAC address)
in the header of each frame.
Flow Control: DLL prevents the fast sender from drowning the slow receiver.
Error Control: It provides the mechanism of error control in which it detects & retransmits damaged or
lost frames.
Access Control: When single comm. Channel is shared by multiple devices, MAC layer of DLL provides help
to determine which device has control over the channel.
Data Link Layer Example:

3. NETWORK LAYER

 It is responsible for the source to destination delivery of a packet across multiple networks.
 If two systems are attached to different networks with devices like routers, then N/W layer is used.
 Thus DLL overseas the delivery of the packet between the two systems on same network and the network
layer ensures that the packet gets its point of origin to its final destination.

FUNCTIONS OF NETWORK LAYER


Internetworking: It provides Internetworking.
Logical Addressing: When packet is sent outside the network, N/W layer adds Logical (network) address
of the sender & receiver to each packet.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 12 of 15
Logical Addressing: When packet is sent outside the network, N/W layer adds Logical (network) address
of the sender & receiver to each packet.
Routing: When independent n/w are connected to create internetwork several routes are available to send
the data from S to D. These n/w are interconnected by routers & gateways that route the packet to final
destination.
4. TRANSPORT LAYER

 It is responsible for process-to-process delivery of the entire message.


 TL looks after the delivery of entire message considering all its packets & make sure that all packets are in
order. On the other hand n/w layer treated each packet independently.
 At the receiver side, TL provides services to application layer & takes services form n/w layer.
 At the receiver side, TL provides services to application layer & takes services form n/w layer.
 Transport Layer provides two types of services:

CONNECTION ORIENTED TRANSMISSION


In this type of transmission the receiving devices sends an acknowledgement back to the source after a
packet or group of packet is received. It is slower transmission method.
CONNECTIONLESS TRANSMISSION
In this type of transmission the receiving devices does not sends an acknowledgement back to the source. It
is faster transmission method.

FUNCTIONS OF TRANSPORT LAYER


Segmentation of message into packet & reassembly of packets into message.
Port addressing: Computers run several processes. TL header include a port address with each process.
Flow Control: Flow control facility prevents the source form sending data packets faster than the
destination can handle.
Error control: TL ensures that the entire message arrives at the receiving TL without error.

5. SESSION LAYER
 Session layer is the fifth layer of OSI Model
 It has the responsibility of beginning, maintaining and ending the communication between two devices,
called session.
 It also provides for orderly communication between devices by regulating the flow of data.

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 13 of 15
FUNCTIONS OF SESSION LAYER
Establishing, Maintaining and ending a session: When sending device first contact with receiving device,
it sends sync (synchronization) packet to establish a connection & determines the order in which
information will be sent. Receiver sends ack (acknowledgement). So the session can be set & end.
Dialog Control: This function determines that which device will communicate first and the amount of data
that will be sent.
Dialog separation: Process of adding checkpoints & markers to the stream of data is called dialog
separation.

6. PRESENTATION LAYER

 Presentation layer is the sixth layer of OSI Model.


 It is concerned with the syntax & semantics of the information exchanged between the two devices.
 It was designed for data encryption, decryption and compression.
FUNCTIONS OF PRESENTATION LAYER
Data Presentation or Translation: Because different computers use different encoding systems. It
ensures that the data being sent is in the format that the recipient can process.
Data Encryption: PL provides this facility by which hides the information from everyone except the person
who originally sent the information & the intended recipient. When encrypted data arrives at destination,
PL decrypts the message.
Data Compression: PL shrinks large amount of data into smaller pieces i.e. it reduces the size of data.

7. APPLICATION LAYER

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 14 of 15
 It is the topmost i.e. seventh layer of OSI Model.
 It enables the user to access the network.
 It provides user interface & supports for services such as e-mail, file transfer, access to the World Wide
Web.
 So it provides services to different user applications.

FUNCTIONS OF APPLICATION LAYER


Mail Services: This application provides various e-mail services.
File transfer & Access: It allows users to access files in a remote host, to retrieve files from remote
computer for use etc.
Remote log-in: A user can log into a remote computer and access the resources of that computer.
Accessing the World Wide Web: Most common application today is the access of the World Wide Web.

ASSESSMENT
ENUMERATION: Enumerate what is being asked. Write your answer on a yellow pad paper.
1 – 7: 7 Layers of OSI Model
8 – 10: Functions of Presentation Layer
11 – 13: Functions of Session Layer
14 – 17: Functions of Transport Layer
18 – 20: Functions of Network Layer

©2020 Mind and Integrity College, Inc. All Rights Reserved Page 15 of 15

You might also like