0% found this document useful (0 votes)
71 views12 pages

Physical and Logical Topology

The document explains the differences between physical and logical topologies in computer networks, emphasizing their roles in network design and management. Physical topology refers to the physical arrangement of devices, while logical topology describes how data is transmitted across the network. Additionally, it covers the data transmission process and associated security risks, concluding with a case study on constructing a network for a small business.

Uploaded by

sco field
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views12 pages

Physical and Logical Topology

The document explains the differences between physical and logical topologies in computer networks, emphasizing their roles in network design and management. Physical topology refers to the physical arrangement of devices, while logical topology describes how data is transmitted across the network. Additionally, it covers the data transmission process and associated security risks, concluding with a case study on constructing a network for a small business.

Uploaded by

sco field
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Physical and logical topology

Introduction
So far, you have explored the various kinds of topologies used in computer
networks. This reading dives deeper into the differences between physical and
logical topologies and how they relate to one another. Understanding these
concepts can help you design and manage efficient and secure networks that meet
the specific needs of a business or organization.
Physical topology
A physical topology refers to how network devices are arranged and connected in a
visible layout that can be observed from above. It's similar to the map below that
depicts buildings and the streets that connect them.

The map provides the locations of all the buildings and identifies the different routes
you can take to get to your chosen destination. A physical topology is similar, but
instead of roads, you have data cables, and instead of buildings, you have
computers and network devices.
In other words, like the map, the physical topology gives you a bird's eye view of
where network elements are in relation to one another. Refer to the example of a
home network below; you can easily identify where the switch and router are and
how other devices like the modem, desktop computer, and gaming console are
connected to it with cables. Therefore, you can use this physical topology to locate
and troubleshoot a device if there is a problem.

Logical topology
A logical topology refers to how data is transmitted across a network and the
possible routes it can take to reach its destination. These routes are called
communication paths.
To better understand this, let's take a hub and compare its physical and logical
topologies. You might be unsure why a hub is mentioned here because you learned
that hubs have been replaced by switches, but for the purposes of this example a
hub is used to illustrate that a network’s physical and logical topologies are not
necessarily the same.
Physical versus logical topology
This physical diagram of a network with a hub has a star topology. It depicts how
the devices are connected with cables, but doesn't tell you what happens to data
inside the devices and cables.
To understand how data flows in the network you have to examine the logical
diagram. In this case it is a bus topology, not a star topology like the physical one.
In the bus topology, a hub is used to connect the devices together, but a hub can
only allow one device to communicate at a time. The logical diagram indicates this
is the case with every device connected to one resource. The problem is that two
computers could try to transmit data on that single line at the same time which will
cause a collision on the line. Just like turning into a busy road without looking can
cause a crash. Each device has to take its turn as it sends data on that single line.
Let's examine another example, this time the physical and logical topologies of a
network that uses a switch.
Switch topologies
Both the physical and logical topologies for the network with a switch are in a star
configuration.

A switch can allow many devices to communicate at the same time. Logically, each
cable is a communication path that gives every computer dedicated resources that
are not shared. This configuration is unlike the hub, where each cable only allows
one device physical access to one resource at a time. Again, the physical topology
does not let you observe what is happening inside the devices. That’s why you need
the logical topology to know the true path the data takes in a network.
Conclusion
In conclusion, both physical and logical topologies are essential in understanding
how networks are structured and how data moves within them. While physical
topology refers to network devices' actual layout and physical connections, logical
topology focuses on the paths data takes as it is transmitted through the network.
As illustrated by the last two examples, the physical and logical topologies may be
the same, or they may differ depending on the network devices used. By
considering both types of topology, you can design, troubleshoot, and optimize
networks to ensure good performance, reliability, and security.

Data transmission
Introduction
As the world relies more and more on digital communication, it is essential to have
a comprehensive understanding of how data is transmitted between devices over a
network. Whether sending an email, streaming a video, or making a video call, data
transmission is crucial in making these activities possible.
In this reading, you'll learn about the data transmission process in a network,
covering everything from the moment you initiate a data transfer to the point when
the information reaches its intended destination. And, the reading will also briefly
address the accompanying security risks.
Data transmission process
Data transmission is the process of sending and receiving data over a network. And
it's essential to how we use the internet and communicate with others online. This
process can be divided into multiple steps, so let's examine how these steps work,
and how they work together to ensure successful data transmission.
Preparing the data
The first step in data transmission is creating the data that needs to be transmitted.
This step can include text, images, video, and audio files. The data is usually
created on a computer or mobile device but can come from various sources.

The sender
The next step is for the sender to initiate the transmission process. The sender is
the device or computer responsible for creating and sending the data over the
network. To do this, the sender must be connected to a network that can transmit
the data.
Breaking data into packets
Once the sender initiates the transmission process, the data is broken down into
small units called packets. Each packet contains part of the original data and
additional information necessary for transmission.

Breaking the data into packets has a couple of advantages. First, it allows the data
to be transmitted more efficiently, as it can be sent in smaller units. Second, it will
transmit the data more reliably, as packets can be retransmitted if they are lost or
corrupted in transit.
Addressing the packets
Before the packets can be transmitted, they must be addressed. Each packet is
assigned a unique address that indicates its destination on the network.
Transmitting the packets
Once the packets have been addressed, they are transmitted over the network as
frames. A frame is a simple container for all the data and IP information to be
placed in, ready for transmission on the network. The frames can be transmitted
over wired or wireless connections, depending on the network type. Protocols such
as TCP (Transmission Control Protocol) ensure reliable transmission by
retransmitting lost or damaged packets.

Receiving the packets


As the frames are transmitted over the network, they are received by other devices
on the network. These devices act as routers, switches, and other network devices,
which direct the frames to their destination. Routers are used to direct data traffic
through the network, and transmission technologies include wired and wireless
connections.
Reassembling the data
Once all the frames have been received, the receiving device must reassemble
them into the original data packets. The additional information in the packets
determines the order in which they should be reassembled and delivered to the
user.
Delivering the data
Finally, the data is delivered to the intended recipient. This delivery can happen in
various ways, depending on the application used. For example, the data could be
displayed on a web page, played as an audio or video file, or saved as a document.

Security concerns
Cybercriminals and hackers are always trying to find ways to intercept or steal data.
Therefore, it is essential to understand the security concerns associated with data
transmission in a network and to know how to protect your data from potential
threats.
Attackers use several techniques to steal user data, including eavesdropping, data
tampering, phishing, and malware. Eavesdropping is a method where third parties
intercept and listen to private conversations or data exchanges. Data tampering is
when someone alters the data during the transmission process. Phishing is a type of
social engineering attack that aims to deceive users into sharing confidential
information, such as login credentials. And malware is malicious software that
infects and compromises a network or device.
Multiple measures can be taken to protect sensitive or general user data from
getting hacked or leaked. These include encrypting data, using a virtual private
network (VPN), implementing a firewall, and using strong passwords.
Conclusion
In this reading, you learned about the steps involved in data transmission, a critical
process that facilitates the exchange of information in the digital world. You also
learned that it comes with significant security risks that must be carefully managed.
Ultimately, a thorough understanding of data transmission and its associated
security risks can go a long way in enabling safe and secure digital communication.

Exercise: Network construction


Introduction
In computer networking, physical topology refers to the layout of devices and cables
in a network. Designing a physical topology is crucial in building a network as it
determines how devices are connected and how data is transmitted. By now, you
know about different network types and the differences between logical and
physical topologies, and in this activity, you will put this knowledge to work. By the
end of this exercise, you will have created a basic physical topology and gained
some insight into the considerations you have to make when constructing a
topology.
Case study
Sam started an ice cream business from home, relying on her personal devices to
keep track of her recipes and taking orders from friends and family. Despite the
modest beginnings, Sam's ice cream soon gained a following in the local
community, and she opened a storefront to meet the growing demand. Once the
store is open, Sam hires one additional employee to help her. To facilitate the
running of the business, she needs to set up the office to allow two employees to
oversee the company's activities. These activities include: stock keeping, printing
out menus and promotional materials, and keeping financial records. Sam has
purchased a network switch, but she needs your advice about the additional
infrastructure required and the network that needs to be set up to make it possible
to conduct her business.
Instructions
Step 1: Identify the necessary equipment
Begin by making a list of the equipment Sam will need. Remember, they have
already purchased a network switch, and the business has two employees who need
access to the network.
Step 2: Construct a diagram
Once you've identified what equipment is needed, demonstrate how the equipment
is connected by creating a physical network topology. You can use a mind-mapping
tool or pen and paper if you prefer.
Conclusion
This exercise allowed you to think about the technology needs of a small business
and what is required to establish a network from which to run it. For now, this
network has a physical presence and, as such, is fixed to one location. As you
progress through the course, you will gain greater insights into how to migrate
these features to an online space and what security features it will require. As the
business grows, the network topology will have to be updated to accommodate new
users, devices, and applications. But, for now, you only needed to construct a
physical topology diagram of the network Sam needs to run their ice cream store
efficiently.

Exemplar: Network construction


Introduction
This short guide will take you through the network topology construction for Sam’s
ice cream outlet and the equipment needed to support the two employees.
Step 1: Identify initial equipment
The devices needed for the initial network setup are as follows:
 A switch: Already provided for connecting devices
 Two laptops, two computers, or one laptop and one computer: One device for
Sam to keep track of financial records and stock taking, and another one for
the additional employee to create menus and promotional materials
 A printer: To enable the additional employee to print menus and promotional
materials
Step 2: Construct a diagram
Taking all the devices you have identified, you may have constructed a physical
network diagram similar to the one below. This diagram includes the network
switch, two laptops, and one printer. This setup is sufficient for Sam’s current
business needs.
Conclusion
Designing a physical topology is important for establishing a reliable and efficient
network infrastructure. It involved identifying the network components required to
support the business needs, choosing the appropriate devices, and arranging them
in a logical and organized manner. By following the steps outlined in the exercise,
you created a simple physical topology for Sam’s ice cream outlet.

You might also like