Physical and Logical Topology
Physical and Logical Topology
Introduction
So far, you have explored the various kinds of topologies used in computer
networks. This reading dives deeper into the differences between physical and
logical topologies and how they relate to one another. Understanding these
concepts can help you design and manage efficient and secure networks that meet
the specific needs of a business or organization.
Physical topology
A physical topology refers to how network devices are arranged and connected in a
visible layout that can be observed from above. It's similar to the map below that
depicts buildings and the streets that connect them.
The map provides the locations of all the buildings and identifies the different routes
you can take to get to your chosen destination. A physical topology is similar, but
instead of roads, you have data cables, and instead of buildings, you have
computers and network devices.
In other words, like the map, the physical topology gives you a bird's eye view of
where network elements are in relation to one another. Refer to the example of a
home network below; you can easily identify where the switch and router are and
how other devices like the modem, desktop computer, and gaming console are
connected to it with cables. Therefore, you can use this physical topology to locate
and troubleshoot a device if there is a problem.
Logical topology
A logical topology refers to how data is transmitted across a network and the
possible routes it can take to reach its destination. These routes are called
communication paths.
To better understand this, let's take a hub and compare its physical and logical
topologies. You might be unsure why a hub is mentioned here because you learned
that hubs have been replaced by switches, but for the purposes of this example a
hub is used to illustrate that a network’s physical and logical topologies are not
necessarily the same.
Physical versus logical topology
This physical diagram of a network with a hub has a star topology. It depicts how
the devices are connected with cables, but doesn't tell you what happens to data
inside the devices and cables.
To understand how data flows in the network you have to examine the logical
diagram. In this case it is a bus topology, not a star topology like the physical one.
In the bus topology, a hub is used to connect the devices together, but a hub can
only allow one device to communicate at a time. The logical diagram indicates this
is the case with every device connected to one resource. The problem is that two
computers could try to transmit data on that single line at the same time which will
cause a collision on the line. Just like turning into a busy road without looking can
cause a crash. Each device has to take its turn as it sends data on that single line.
Let's examine another example, this time the physical and logical topologies of a
network that uses a switch.
Switch topologies
Both the physical and logical topologies for the network with a switch are in a star
configuration.
A switch can allow many devices to communicate at the same time. Logically, each
cable is a communication path that gives every computer dedicated resources that
are not shared. This configuration is unlike the hub, where each cable only allows
one device physical access to one resource at a time. Again, the physical topology
does not let you observe what is happening inside the devices. That’s why you need
the logical topology to know the true path the data takes in a network.
Conclusion
In conclusion, both physical and logical topologies are essential in understanding
how networks are structured and how data moves within them. While physical
topology refers to network devices' actual layout and physical connections, logical
topology focuses on the paths data takes as it is transmitted through the network.
As illustrated by the last two examples, the physical and logical topologies may be
the same, or they may differ depending on the network devices used. By
considering both types of topology, you can design, troubleshoot, and optimize
networks to ensure good performance, reliability, and security.
Data transmission
Introduction
As the world relies more and more on digital communication, it is essential to have
a comprehensive understanding of how data is transmitted between devices over a
network. Whether sending an email, streaming a video, or making a video call, data
transmission is crucial in making these activities possible.
In this reading, you'll learn about the data transmission process in a network,
covering everything from the moment you initiate a data transfer to the point when
the information reaches its intended destination. And, the reading will also briefly
address the accompanying security risks.
Data transmission process
Data transmission is the process of sending and receiving data over a network. And
it's essential to how we use the internet and communicate with others online. This
process can be divided into multiple steps, so let's examine how these steps work,
and how they work together to ensure successful data transmission.
Preparing the data
The first step in data transmission is creating the data that needs to be transmitted.
This step can include text, images, video, and audio files. The data is usually
created on a computer or mobile device but can come from various sources.
The sender
The next step is for the sender to initiate the transmission process. The sender is
the device or computer responsible for creating and sending the data over the
network. To do this, the sender must be connected to a network that can transmit
the data.
Breaking data into packets
Once the sender initiates the transmission process, the data is broken down into
small units called packets. Each packet contains part of the original data and
additional information necessary for transmission.
Breaking the data into packets has a couple of advantages. First, it allows the data
to be transmitted more efficiently, as it can be sent in smaller units. Second, it will
transmit the data more reliably, as packets can be retransmitted if they are lost or
corrupted in transit.
Addressing the packets
Before the packets can be transmitted, they must be addressed. Each packet is
assigned a unique address that indicates its destination on the network.
Transmitting the packets
Once the packets have been addressed, they are transmitted over the network as
frames. A frame is a simple container for all the data and IP information to be
placed in, ready for transmission on the network. The frames can be transmitted
over wired or wireless connections, depending on the network type. Protocols such
as TCP (Transmission Control Protocol) ensure reliable transmission by
retransmitting lost or damaged packets.
Security concerns
Cybercriminals and hackers are always trying to find ways to intercept or steal data.
Therefore, it is essential to understand the security concerns associated with data
transmission in a network and to know how to protect your data from potential
threats.
Attackers use several techniques to steal user data, including eavesdropping, data
tampering, phishing, and malware. Eavesdropping is a method where third parties
intercept and listen to private conversations or data exchanges. Data tampering is
when someone alters the data during the transmission process. Phishing is a type of
social engineering attack that aims to deceive users into sharing confidential
information, such as login credentials. And malware is malicious software that
infects and compromises a network or device.
Multiple measures can be taken to protect sensitive or general user data from
getting hacked or leaked. These include encrypting data, using a virtual private
network (VPN), implementing a firewall, and using strong passwords.
Conclusion
In this reading, you learned about the steps involved in data transmission, a critical
process that facilitates the exchange of information in the digital world. You also
learned that it comes with significant security risks that must be carefully managed.
Ultimately, a thorough understanding of data transmission and its associated
security risks can go a long way in enabling safe and secure digital communication.