Lec 3
Lec 3
BASIC TERMINOLOGIES
THE ADVANTAGES/USES OF NETWORK
Simultaneous Access
There are moments in any business when several workers may
need to use the same data at the same time.
Shared Peripheral Devices
Personal Communications
Videoconferencing
Voice over Internet Protocol (VoIP):-VoIP transmits the sound
of voice over a computer network using the Internet Protocol
(IP ) rather than sending the signal over traditional phone wires
Easier Data Backup
REPEATERS
.
A Wired Media:- uses copper and fiber media in local area network (LAN)
technology are collectively known as Ethernet
1. Copper Cable
.
a Coaxial Cables
.
b Shielded Twisted Pair(STP)
.
c Unshielded Twisted Pair
• Speed: 10-100Mbps
• Cost: Inexpensive
• Media and connector size: Medium
• Maximum cable length: 500m
B. SHIELDED TWISTED PAIR(STP)
• Speed: 0-100Mbps
• Cost: Moderate
• Media and connector size: Medium to large
• Maximum cable length: 100m
C. UNSHIELDED TWISTED PAIR
UTP is a four-pair wire Speed: 10-100-1000 Mbps*
medium used in a variety of Cost: Least Expensive
networks. Media and connector size: Small
Each of the eight copper Maximum cable length: 100m * (Depending
wires in the UTP cable is on the quality/category of cable)
covered by insulating material
FIBER OPTIC CABLE
Glass fiber carrying light pulses, each
pulse a bit.
SONET/SDH
Synchronous optical networking (SONET) and Synchronous Digital
Hierarchy (SDH) are standardized multiplexing protocols that transfer
multiple digital bit streams over optical Fibre using lasers.
An upside of a LAN is fast data transfer with data speed that can reach up
to 10Gbps.
Other significant LAN technologies are Fiber Distributed Data Interface
(FDDI) and token ring.
3. CAMPUS AREA NETWORK
1. A MAN is larger than a LAN but smaller than or equal in size to a WAN.
2. The size range anywhere from 5 to 50km in diameter.
3. MANs are typically owned and managed by a single entity.
4. This could be an ISP or telecommunications company that sells its services
to end-users in that metropolitan area.
5. For all intents and purposes, a MAN has the same characteristics as a WAN
with distance constraints.
5. WIDE AREA NETWORK
Advantages: Disadvantages:
1. There is no central controller. 1. It is possible that more than one station may
attempt transmission simultaneously (collision or
2. Control resides in each station
contention).
3. The less interconnecting wire is
2. Difficult reconfiguration and fault isolation.
required.
3. A fault or break in the bus cable stops all
4. Ease of installation.
transmission, even between devices on the same
5. Backbone cable can be laid along the side of the problem.
most efficient path, and then
4. The damaged area reflects signals in the direction
connected to the nodes by drop lines
of origin, creating noise in both directions
of various lengths
2. RING TOPOLOGY
• All devices are connected to one another in the shape of a
closed loop.
• Each device is connected directly to two other devices, one
on either side of it.
Advantages:
1. Avoids the collisions that are possible in the bus topology.
2. Each pair of stations has a point-to-point connection.
3. A signal is passed along the ring in one direction, from device to
another, until it reaches its destination.
4. Each device incorporates a repeater.
5. Relatively easy to install and reconfigure.
6. Fault isolation is simplified.
Disadvantages:
1. A break in the ring (such as station disabled) can disable the entire
network.
2. Unidirectional traffic.
RING
3. STAR TOPOLOGY
• All devices are connected to a central hub.
• Nodes communicate across the network by passing data
through the hub or switch.
Advantages:
1. Easy to install and reconfigure.
2. Robustness, if one link fails; only that link is affected. All other links
remain active.
3. Easy fault identification and isolation. As long as the hub is working, it
can be used to monitor link problems and bypass defective links.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another, it sends it to the controller,
which then relays the data to the other connected device.
4. TREE/HIERARCHICAL TOPOLOGY
Advantages:
1. It allows more devices to be attached to a
single central hub and can therefore increase
the distance a signal can travel between
devices.
2. It allows the network to isolate and prioritize
communications from different computers.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another, it
sends it to the controller, which then relays
the data to the other connected device.
6. MESH TOPOLOGY
Each host has its connections to all other hosts.
Mesh topology is implemented to provide as much
protection as possible from interruption of service.
1. A nuclear power plant might use a mesh
topology in the networked control systems.
2. Although the Internet has multiple paths to any
one location, it does not adopt the full mesh
topology.
Advantages: Disadvantages:
1. The use of dedicated links guarantees that each 1. A large amount of cabling required.
connection can carry its data load, thus eliminating 2. A large amount of I/O ports required.
the traffic problems that can occur when links must 3. Installation and reconfiguration are
be shared by multiple devices. difficult.
2. It is robust, if one link becomes unusable, it does 4. The sheer bulk of the wiring can be greater
not incapacitate (affect) the entire system. than the available space (in the walls, ceiling,
3. Privacy and Security (every message sent travels or floors) can accommodate.
along a dedicated line; only the intended recipient 5. The hardware required to connect each
sees it). link (I/O ports and cables) can be
4. Point-to-point links make fault identification and prohibitively expensive.
fault isolation easy.
MESH
1. The nodes are connected to every other completely via a dedicated link
during which information is travel from nodes to nodes and there are
N(N-1)/2 links in mesh if there are N nodes.
2. Suppose, N number of devices are connected with each other in a mesh
topology, the total number of ports that are required by each device is N-1.
Ex: there are 5 devices connected to each other, hence the total number of
ports required by each device is 4.
3. Total number of ports required=N*(N-1).
4. Suppose, N number of devices are connected with each other in a mesh
topology, then the total number of dedicated links required to connect them
is NC2 , N(N-1)/2.
Ex: there are 5 devices connected to each other, hence the total number of
links required is 5*4/2 = 10.
WIRELESS NETWORKS
Wireless network is a type of
computer network that uses
wireless data connections for
connecting network nodes.
Example
Bluetooth
Wi-Fi
BLUETOOTH
Bluetooth is a short-range
wireless technology standard
used for exchanging data
between fixed and mobile
devices over short distances.
It is using UHF radio waves in
the ISM bands, from 2.402 GHz
to 2.48 GHz.
The IEEE standardized
Bluetooth as IEEE 802.15.1, but
no longer maintains the
standard.
WI-FI
Wi-Fi Stands for Wireless Fidelity.
W i-Fi, is a Local Area Wireless
technology.
Wi-Fi networks use radio technologies to
transmit and receive data at high speed.
It is based on the IEEE 802.11 family of
standards.
Access point: The access point is a
wireless LAN transceiver or “ base station”
that can connect one or many wireless
devices simultaneously to the internet
THE INTERNET
How Information Travel Through the Internet
A page on the Internet—whether it's full of words, images or both—
doesn't come to you in one shipment. It's translated into digital
information, chopped into 1500 byte pieces called PACKETS, and
sent to you like a puzzle that needs to be reassembled. Each part
of the packet has a specific function:
Sequence ID
ID’s where the information
Header
belongs in relation to the rest of
Provides the
the information
complete
destination
address for the End of Message
packet ID’s the end of the
packet
Data Block
The portion of the overall information
carried by the packet
THE INTERNET
How Information Travel Through the Internet
When you connect to a Web site through an ISP and start exchanging information, there isn't
a fixed connection between your computer and the Web server computer hosting the Web
site. Instead, information is exchanged using the best possible path at that particular time.
Special computers called routers determine these paths, avoiding slow links and favoring
fast ones.