Network ch3
Network ch3
Network ch3
Topics:
3.1. Network line configuration (point-to-point, multipoint)?
3.2. Networking and internetworking devices: Repeaters, bridges, switches, routers, and gateways?
3.3. Network Topologies (mesh, star, tree, bus, and ring)?
3.4. Connection-oriented and connectionless services?
• Provide dedicated link between two devices use actual length of wire or cable to connect the
two end including microwave & satellite link.
• This topology is considered to be one of the easiest and most conventional network topologies.
3.1.3. Multipoint Connection
In this connection two or more devices share a single link.
• More than two devices share the link that is the capacity of the channel is shared now.
• With shared capacity, there can be two possibilities in a Multipoint Line configuration:
• Spatial Sharing: If several devices can share the link simultaneously, its called
Spatially shared line configuration.
• Temporal (Time) Sharing: If users must take turns using the link , then its called
Temporally shared or Time Shared Line configuration.
D. Switch
A switch is a hardware device that connects multiple devices on a computer network. A Switch
contains more advanced features than Hub. The Switch contains the updated table that decides where
the data is transmitted or not.
It delivers the message to the correct destination based on the physical address present in the
incoming message.
It does not broadcast the message to the entire network like the Hub. It determines the device to
which the message is to be transmitted.
Therefore, we can say that switch provides a direct connection between the source and
destination. It increases the speed of the network.
A switch is a multiport bridge with a buffer and a design that can boost its efficiency (a large number of
ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform
error checking before forwarding data, which makes it very efficient as it does not forward packets that
have errors and forward good packets selectively to the correct port only.
E. Router
A router is a hardware device which is used to connect a LAN with an internet connection. It is
used to receive, analyze and forward the incoming packets to another network. It is a Layer 3
device that has much more intelligence than a hub or switch.
A router works in a Layer 3 (Network layer) of the OSI Reference model.
A router forwards the packet based on the information available in the routing table.
It determines the best path from the available paths for the transmission of the packet.
A router is a device like a switch that routes data packets based on their IP addresses.
It normally connect LANs and WANs together and have a dynamically updating routing table
based on which they make decisions on routing the data packets.
Advantages of Router:
o Security: The information which is transmitted to the network will traverse the entire cable, but
the only specified device which has been addressed can read the data.
o Reliability: If the server has stopped functioning, the network goes down, but no other
networks are affected that are served by the router.
o Performance: Router enhances the overall performance of the network. Suppose there are 24
workstations in a network generates a same amount of traffic. This increases the traffic load on
the network. Router splits the single network into two networks of 12 workstations each,
reduces the traffic load by half.
F. Modem
A modem is a hardware device that allows the computer to connect to the internet over the
existing telephone line.
A modem is not integrated with the motherboard rather than it is installed on the PCI slot found
on the motherboard.
It stands for Modulator/Demodulator. It converts the digital data into an analog signal over the
telephone lines.
G. Gateway
A gateway is any hardware and software combination that connects dissimilar network environments.
Gateways are the most complex of network devices because they perform translations at multiple layers
of the OSI model. It acts as a "gate" between two networks. It may be a router, firewall, server, or other
device that enables traffic to flow in and out of the network.
It is the structure of the network of how all the components are interconnected to each other and how
the arrangement of the elements (links, nodes, etc.) of a communication network designed. Network
topology is the topological structure of a network and may be depicted physically or logically.
Physical Topology: It describes the way in which the computers or nodes are connected with each
other in a computer network. It is the arrangement of various elements (link, nodes, etc.), including the
device location and code installation of a computer network. In other words, we can say that it is the
physical layout of nodes, workstations, and cables in the network.
Logical topology describes the way, data flow from one computer to another. It is logical flow of
information in the network.
In a computer network, there are mainly five types of network topology, they are: Bus Topology
I. Bus Topology
o The backbone cable is considered as a "single lane" through which the message is broadcast to
all the stations.
o Low-cost cable: In bus topology, nodes are directly connected to the cable without passing
through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks
that support up to 10 Mbps.
o Limited failure: A failure in one node will not have any effect on other nodes.
o Difficult troubleshooting: It requires specialized test equipment to determine the cable faults.
If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the signals of both
the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the network.
o It has no terminated ends, i.e., each node is connected to other node and having no termination
point.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from one node
to another node.
o Network Management: Faulty devices can be removed from the network without bringing the
network down.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is
very low.
o Reliable: It is a more reliable network because the communication system is not dependent on
the single host computer.
o Reconfiguration difficult: Adding new devices to the network would slow down the network.
o Delay: Communication delay is directly proportional to the number of nodes. Adding new
devices increases the communication delay.
o Network control: Complex network control features can be easily implemented in the star
topology. Any changes made in the star topology are automatically accommodated.
o Limited failure: As each station is connected to the central hub with its own cable, therefore
failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
o Easily Scalable: It is easily expandable as new stations can be added to the open ports on the
hub.
o Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
o A Central point of failure: If the central hub or switch goes down, then all the connected
nodes will not be able to communicate with each other.
o It does not contain the switch, hub or any central computer which acts
as a central point of communication.
o Mesh topology is mainly used for WAN implementations where communication failures are a
critical concern.
Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the
communication between connected computers.
Easier Reconfiguration: Adding new devices would not disrupt the communication between other
devices.
o Cost: A mesh topology contains a large number of connected devices such as a router and more
transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to maintain and
manage. If the network is not monitored carefully, then the communication link failure goes
undetected.
o Redundancy.
V. Hybrid Topology
o When two or more different topologies are combined together is termed as Hybrid topology and
if similar topologies are connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of CBE bank and bus topology in another
branch of CBE bank, connecting these two topologies will result in Hybrid topology.
o Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of
the network.
o Scalable: Size of the network can be easily expanded by adding new devices without affecting
the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the requirements of
the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way that the
strength of the network is maximized and weakness of the network is minimized.
o Complex design: The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of
cabling, network devices, etc.
There are two ways to establish a connection before sending data from one device to another, that
are Connection-Oriented and Connectionless Service.
• Connection-oriented service involves the creation and termination of the connection for
sending the data between two or more devices.
• In contrast, connectionless service does not require establishing any connection and
termination process for transferring the data over a network.
Connection-Oriented Service
• It is a network service that was designed and developed after the telephone system.
• It uses a handshake method that creates a connection between the user and sender for
transmitting the data over the network.
• Connection is established.
• Information is sent.
• Connection is released.
After that, the receiver responds to the sender's request with (SYN-ACK) signal/packets.
That represents the confirmation is received by the receiver to start the communication between
the sender and the receiver.
Similarly, a receiver can respond or send the data to the sender in the form of packets.
After successfully exchanging or transmitting data, a sender can terminate the connection by
sending a signal to the receiver. In this way, we can say that it is a reliable network service.
Connectionless Service:
• A connection is similar to a postal system, in which each letter takes along different route paths
from the source to the destination address.
• It is used in the network system to transfer data from one end to another end without creating
any connection.
• So it does not require establishing a connection before sending the data from the sender to the
receiver.
• It is not a reliable network service because it does not guarantee the transfer of data packets
to the receiver, and data packets can be received in any order to the receiver.
Therefore we can say that the data packet does not follow a defined path.
• In connectionless service, the transmitted data packet is not received by the receiver due to
network congestion, and the data may be lost.
1. What is the difference between connection oriented and connectionless?
2. How to create a connection for data communication?
Summary Questions