Network ch3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Chapter 3: Communications network architecture

Topics:
3.1. Network line configuration (point-to-point, multipoint)?
3.2. Networking and internetworking devices: Repeaters, bridges, switches, routers, and gateways?
3.3. Network Topologies (mesh, star, tree, bus, and ring)?
3.4. Connection-oriented and connectionless services?

3.1. Network line configuration (point-to-point, multipoint)


 Line configuration refers to the way two or more communication devices attached to a link.
For communication to occur, two devices must be connected in some way to the same link at the
same time.

There are two possible line configurations

3.1.1. Point-to-Point Connection


3.1.2. Multipoint Connection

3.1.1. Point-to-Point Connection


• A point-to-point connection provides a dedicated link between two devices.

• Provide dedicated link between two devices use actual length of wire or cable to connect the
two end including microwave & satellite link.

• This topology is considered to be one of the easiest and most conventional network topologies.
3.1.3. Multipoint Connection
In this connection two or more devices share a single link.

• More than two devices share the link that is the capacity of the channel is shared now.

• With shared capacity, there can be two possibilities in a Multipoint Line configuration:

• Spatial Sharing: If several devices can share the link simultaneously, its called
Spatially shared line configuration.

• Temporal (Time) Sharing: If users must take turns using the link , then its called
Temporally shared or Time Shared Line configuration.

1. What is the difference between point to point and multipoint connection?


2. List and discuss about the type of multipoint connection?

3.2. Networking and internetworking devices


A. Repeater
A repeater is an electronic device in a communication channel that increases the power of a signal and
retransmits it, allowing it to travel further. A repeater operates at the physical layer. Its job is to
regenerate the signal over the same network before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted over the same network. When the signal
becomes weak, they copy the signal bit by bit and regenerate it at the original strength.
 It is a 2 port device.
 A physical layer device the acts on bits not on frames or packets
 Extending the geographical LAN range
 Repeaters do not implement any access method (If any two nodes on any two connected
segments transmit at the same time collision will happen)
B. Hub
A Hub is a hardware device that divides the network connection among multiple devices. It is basically
a multiport repeater. A hub connects multiple wires coming from different branches, for example, the
connector in star topology which connects different stations.
 Hubs cannot filter data, so data packets are sent to all connected devices.
 They do not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.
 Hub will broadcast this request to the entire network. All the devices will check whether the
request belongs to them or not. If not, the request will be dropped.
 Acts on the physical layer
 Operate on bits rather than frames
 Hub receives a bit from an adapter and sends it to all the other adapters without implementing
any access method.
Types of Hub
 Active Hub: - These are the hubs that have their own power supply and can clean, boost, and
relay the signal along with the network. It serves both as a repeater as well as a wiring center.
These are used to extend the maximum distance between nodes.
 Passive Hub: - These are the hubs that collect wiring from nodes and power supply from the
active hub. These hubs relay signals onto the network without cleaning and boosting them and
can’t be used to extend the distance between nodes.
 Intelligent Hub: - It works like active hubs and includes remote management capabilities. They
also provide flexible data rates to network devices. It also enables an administrator to monitor
the traffic passing through the hub and to configure each port in the hub.
The physical connection point on a network device (a hub, switch, or router) is called an interface or a
port.
The process used by the Hub consumes more bandwidth and limits the amount of communication.
Nowadays, the use of hub is obsolete, and it is replaced by more advanced computer network
components such as Switches, Routers.
C. Bridge: - A bridge operates at the data link layer. A bridge is a repeater; with add on the
functionality of filtering content by reading the MAC addresses of source and destination. It is
also used for interconnecting two LANs working on the same protocol.
It has a single input and single output port, thus making it a 2 port device.
Bridge is a network device that connects two similar network segments together.
The main disadvantage to bridges is that they can’t connect dissimilar network types or perform
intelligent path selection.

D. Switch
A switch is a hardware device that connects multiple devices on a computer network. A Switch
contains more advanced features than Hub. The Switch contains the updated table that decides where
the data is transmitted or not.
 It delivers the message to the correct destination based on the physical address present in the
incoming message.
 It does not broadcast the message to the entire network like the Hub. It determines the device to
which the message is to be transmitted.
 Therefore, we can say that switch provides a direct connection between the source and
destination. It increases the speed of the network.

A switch is a multiport bridge with a buffer and a design that can boost its efficiency (a large number of
ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform
error checking before forwarding data, which makes it very efficient as it does not forward packets that
have errors and forward good packets selectively to the correct port only.
E. Router
 A router is a hardware device which is used to connect a LAN with an internet connection. It is
used to receive, analyze and forward the incoming packets to another network. It is a Layer 3
device that has much more intelligence than a hub or switch.
 A router works in a Layer 3 (Network layer) of the OSI Reference model.
 A router forwards the packet based on the information available in the routing table.
 It determines the best path from the available paths for the transmission of the packet.
 A router is a device like a switch that routes data packets based on their IP addresses.
 It normally connect LANs and WANs together and have a dynamically updating routing table
based on which they make decisions on routing the data packets.

Advantages of Router:
o Security: The information which is transmitted to the network will traverse the entire cable, but
the only specified device which has been addressed can read the data.
o Reliability: If the server has stopped functioning, the network goes down, but no other
networks are affected that are served by the router.
o Performance: Router enhances the overall performance of the network. Suppose there are 24
workstations in a network generates a same amount of traffic. This increases the traffic load on
the network. Router splits the single network into two networks of 12 workstations each,
reduces the traffic load by half.
F. Modem
 A modem is a hardware device that allows the computer to connect to the internet over the
existing telephone line.
 A modem is not integrated with the motherboard rather than it is installed on the PCI slot found
on the motherboard.
 It stands for Modulator/Demodulator. It converts the digital data into an analog signal over the
telephone lines.
G. Gateway
A gateway is any hardware and software combination that connects dissimilar network environments.
Gateways are the most complex of network devices because they perform translations at multiple layers
of the OSI model. It acts as a "gate" between two networks. It may be a router, firewall, server, or other
device that enables traffic to flow in and out of the network.

1. What are internetworking devices in a network?


2. What is the difference and similarity of Repeater and Bridge?
3. What are the advantages of Router rather than Hub and Switch?
4. List and differentiate the types of Hub?

3.3. Network Topologies (mesh, star, tree, bus, and ring)

It is the structure of the network of how all the components are interconnected to each other and how
the arrangement of the elements (links, nodes, etc.) of a communication network designed. Network
topology is the topological structure of a network and may be depicted physically or logically.

Physical Topology: It describes the way in which the computers or nodes are connected with each
other in a computer network. It is the arrangement of various elements (link, nodes, etc.), including the
device location and code installation of a computer network. In other words, we can say that it is the
physical layout of nodes, workstations, and cables in the network.

Logical topology describes the way, data flow from one computer to another. It is logical flow of
information in the network.
In a computer network, there are mainly five types of network topology, they are: Bus Topology

Ring Topology, Star Topology, Mesh Topology and Hybrid Topology

I. Bus Topology

o The bus topology is designed in such a way that all


the stations are connected through a single cable known as
a backbone cable.

o The bus topology is mainly used in 802.3 (ethernet)


and 802.4 standard networks.

o The configuration of a bus topology is quite simpler as compared to other topologies.

o The backbone cable is considered as a "single lane" through which the message is broadcast to
all the stations.

Advantages of Bus topology:

o Low-cost cable: In bus topology, nodes are directly connected to the cable without passing
through a hub. Therefore, the initial cost of installation is low.

o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks
that support up to 10 Mbps.

o Familiar technology: Bus topology is a familiar technology as the installation and


troubleshooting techniques are well known, and hardware components are easily available.

o Limited failure: A failure in one node will not have any effect on other nodes.

Disadvantages of Bus topology:

o Difficult troubleshooting: It requires specialized test equipment to determine the cable faults.
If any fault occurs in the cable, then it would disrupt the communication for all the nodes.

o Signal interference: If two nodes send the messages simultaneously, then the signals of both
the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the network.

II. Ring Topology

o Ring topology is like a bus topology, but with connected


ends.

o The node that receives the message from the previous


computer will retransmit to the next node.

o The data flows in one direction, i.e., it is unidirectional.

o The data flows in a single loop continuously known as an


endless loop.

o It has no terminated ends, i.e., each node is connected to other node and having no termination
point.

o The data in a ring topology flow in a clockwise direction.

o The most common access method of the ring topology is token passing.

o Token passing: It is a network access method in which token is passed from one node
to another node.

o Token: It is a frame that circulates around the network.

Advantages of Ring topology:

o Network Management: Faulty devices can be removed from the network without bringing the
network down.

o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is
very low.

o Reliable: It is a more reliable network because the communication system is not dependent on
the single host computer.

Disadvantages of Ring topology:


o Failure: The breakdown in one station leads to the failure of the overall network.

o Reconfiguration difficult: Adding new devices to the network would slow down the network.

o Delay: Communication delay is directly proportional to the number of nodes. Adding new
devices increases the communication delay.

III. Star Topology

o Star topology is an arrangement of the network in which


every node is connected to the central hub, switch or a central
computer.

o The central computer is known as a server, and the


peripheral devices attached to the server are known as clients.

o Coaxial cable or RJ-45 cables are used to connect the


computers.

o Star topology is the most popular topology in network implementation.

Advantages of Star topology

o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to


bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star
topology, all the stations are connected to the centralized network. Therefore, the network
administrator has to go to the single station to troubleshoot the problem.

o Network control: Complex network control features can be easily implemented in the star
topology. Any changes made in the star topology are automatically accommodated.

o Limited failure: As each station is connected to the central hub with its own cable, therefore
failure in one cable will not affect the entire network.

o Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
o Easily Scalable: It is easily expandable as new stations can be added to the open ports on the
hub.

o Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.

o High data speeds: It supports a bandwidth of approximately 100Mbps.

Disadvantages of Star topology

o A Central point of failure: If the central hub or switch goes down, then all the connected
nodes will not be able to communicate with each other.

IV. Mesh topology

o Mesh technology is an arrangement of the network in which


computers are interconnected with each other through various redundant
connections.

o There are multiple paths from one computer to another computer.

o It does not contain the switch, hub or any central computer which acts
as a central point of communication.

o The Internet is an example of the mesh topology.

o Mesh topology is mainly used for WAN implementations where communication failures are a
critical concern.

o Mesh topology is mainly used for wireless networks.

o Mesh topology can be formed by using the formula:


Number of cables = (n*(n-1))/2, Where n is the number of nodes that represents the network.

Mesh topology is divided into two categories:

o Fully connected mesh topology

o Partially connected mesh topology


Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers
available in the network.

o Partial Mesh Topology: In a partial


mesh topology, not all but certain computers
are connected to those computers with which
they communicate frequently.

Advantages of Mesh topology:

Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the
communication between connected computers.

Fast Communication: Communication is very fast between the nodes.

Easier Reconfiguration: Adding new devices would not disrupt the communication between other
devices.

Disadvantages of Mesh topology

o Cost: A mesh topology contains a large number of connected devices such as a router and more
transmission media than other topologies.

o Management: Mesh topology networks are very large and very difficult to maintain and
manage. If the network is not monitored carefully, then the communication link failure goes
undetected.

o Redundancy.

V. Hybrid Topology

o The combination of various different topologies


is known as Hybrid topology.
o A Hybrid topology is a connection between different links and nodes to transfer the data.

o When two or more different topologies are combined together is termed as Hybrid topology and
if similar topologies are connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of CBE bank and bus topology in another
branch of CBE bank, connecting these two topologies will result in Hybrid topology.

Advantages of Hybrid Topology

o Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of
the network.

o Scalable: Size of the network can be easily expanded by adding new devices without affecting
the functionality of the existing network.

o Flexible: This topology is very flexible as it can be designed according to the requirements of
the organization.

o Effective: Hybrid topology is very effective as it can be designed in such a way that the
strength of the network is maximized and weakness of the network is minimized.

Disadvantages of Hybrid topology

o Complex design: The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.

o Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of
cabling, network devices, etc.

1. What is the difference between Physical and Logical topology?


2. List all the physical topologies?
3. What are an advantage and dis advantage of Ring topology?
4. How do we know the number of cables in Mesh topology?
3.4. Connection-oriented and connectionless services
• Data communication is a telecommunication network to send and receive data between two
or more computers over the same or different network.

There are two ways to establish a connection before sending data from one device to another, that
are Connection-Oriented and Connectionless Service.

• Connection-oriented service involves the creation and termination of the connection for
sending the data between two or more devices.

• In contrast, connectionless service does not require establishing any connection and
termination process for transferring the data over a network.

Connection-Oriented Service
• It is a network service that was designed and developed after the telephone system.

• A connection-oriented service is used to create an end to end connection between the


sender and the receiver before transmitting the data over the same or different networks.

• It uses a handshake method that creates a connection between the user and sender for
transmitting the data over the network.

• Hence it is also known as a reliable network service.

• There is a sequence of operation to be followed by the users of connection oriented service.


These are:

• Connection is established.

• Information is sent.

• Connection is released.

Connection oriented communication:


 Suppose, a sender wants to send data to the receiver. Then, first, the sender sends a request
packet to a receiver in the form of an SYN packet.

 After that, the receiver responds to the sender's request with (SYN-ACK) signal/packets.

 That represents the confirmation is received by the receiver to start the communication between
the sender and the receiver.

 Now a sender can send the message or data to the receiver.

 Similarly, a receiver can respond or send the data to the sender in the form of packets.

 After successfully exchanging or transmitting data, a sender can terminate the connection by
sending a signal to the receiver. In this way, we can say that it is a reliable network service.

Connectionless Service:
• A connection is similar to a postal system, in which each letter takes along different route paths
from the source to the destination address.

• It is used in the network system to transfer data from one end to another end without creating
any connection.

• So it does not require establishing a connection before sending the data from the sender to the
receiver.

• It is not a reliable network service because it does not guarantee the transfer of data packets
to the receiver, and data packets can be received in any order to the receiver.

Therefore we can say that the data packet does not follow a defined path.

• In connectionless service, the transmitted data packet is not received by the receiver due to
network congestion, and the data may be lost.
1. What is the difference between connection oriented and connectionless?
2. How to create a connection for data communication?

Summary Questions

You might also like