Computer Network
Computer Network
A network topology is the physical and logical arrangement of nodes and connections
in a network. Nodes usually include devices such as switches, routers and software
with switch and router features. Network topologies are often represented as a graph.
Network topologies describe the arrangement of networks and the relative location of
traffic flows. Administrators can use network topology diagrams to determine the best
placements for each node and the optimal path for traffic flow. With a well-defined
and planned-out network topology, an organization can more easily locate faults and
fix issues, improving its data transfer efficiency.
Network geometry can be defined as the physical topology and the logical topology.
Network topology diagrams are shown with devices depicted as network nodes and
the connections between them as lines. The type of network topology differs
depending on how the network needs to be arranged.
A well-defined network topology makes it easier for network admins to locate faults,
troubleshoot issues and to allocate network resources. Diagrams are an important
reference point in helping to diagnose network issues, as they can represent physical
and logical layouts.
There are several types of topologies. For example, physical topologies include the
following:
Star network. In the star network topology, a central device connects to all
other nodes through a central hub. Switched local area networks based on
Ethernet switches and most wired home and office networks have a physical
star topology.
Ring network. In the ring network topology, the nodes are connected in a
closed-loop configuration. Some rings pass data in one direction only, while
others are capable of transmission in both directions. These bidirectional
ring networks are more resilient than bus networks since traffic can reach a
node by moving in either direction. Metro networks based on Synchronous
Optical Network technology are the primary example of ring networks.
Mesh network. The mesh network topology links nodes with connections
so that multiple paths between at least some points of the network are
available. A network is considered to be fully meshed if all nodes are
directly connected to all other nodes and partially meshed if only some
nodes have multiple connections to others. Meshing multiple paths
increases resiliency but also increases cost. However, more space is needed
for dedicated links.
Tree network. The tree network topology consists of one root node, and all
other nodes are connected in a hierarchy. The topology itself is connected in
a star configuration. Many larger Ethernet switch networks, including data
center networks, are configured as trees.
A logical topology for a network refers to the relationship between nodes and logical
connections -- defining how data should transfer.
A logical connection differs from a physical path when information can take
an invisible hop at intermediate points. In optical networks, optical add-drop
multiplexers create logical optical paths because the ADM hop is not visible to the
endpoint nodes. Networks based on virtual circuits or tunnels have a physical
topology based on the real connection medium -- fiber, for example -- and a logical
topology based on the circuits and tunnels.
Sometimes, the logical topology refers to the topology as the user sees it. Internet
Protocol (IP) and Ethernet networks are two common examples. They are fully
meshed at the connection level since any user can connect with any other user. This is
true unless some means of blocking unwanted connections, like a firewall, is
introduced. Full connectivity is a property of the network protocols used -- IP and
Ethernet -- not of the network topology itself.
As an example, logical bus and logical ring topologies can be used to define data
transmission flows. A logical bus topology features nodes that broadcast data to the
entire network. Other nodes on the network check to see if the data is meant for them.
Logical ring topology only allows one node to transfer data at a time.
This process should start with a list of all the devices in the network. This could, for
example, include routers, firewalls and servers. The type of network topology should
then be chosen. Once the list of devices is put together and a topology has been
chosen, the diagram can be sketched out. Devices should be placed in areas that would
best make sense, considering data flows. Next, lines are drawn from network devices.
These lines are the connections the network nodes make. Stray away from having too
many lines cross over each other and strive to make the diagram clear and easy to
read. Scalability and future modifications should also be kept in mind when creating
the diagram.
After a sketch showing a rough general input is constructed, diagram software can be
used to help map everything out. The software used may include a network diagram
template to follow. The network nodes should be named, and lines can be color-coded
to further help make the diagram more understandable and clear.
For instance, network configuration software helps configure networks, while also
automating repetitive tasks. These tools are often used to configure complicated
network topologies and can auto detect network nodes and highlight apparent
vulnerabilities.
Network performance monitoring and troubleshooting tools keep track of and alert
users to network-related performance issues and outages. Some of these tools may
keep track of performance using a visual display of the network topology. After
setting baseline performance settings, users can track, locate and troubleshoot issues.
Edraw
Lucidchart
Microsoft Visio
NetTerrain Logical
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
o In simplex mode, the station can utilize the entire bandwidth of the
communication channel, so that more data can be transmitted at a time.
Half-Duplex mode
o In half-duplex mode, both the devices can send and receive the data and also
can utilize the entire bandwidth of the communication channel during the
transmission of data.
o In half-duplex mode, when one device is sending the data, then another has
to wait, this causes the delay in sending the data at the right time.
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving
in one direction, and another channel has traffic flowing in the opposite
direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network.
When two people are communicating with each other by a telephone line,
both can talk and listen at the same time.
o Both the stations can send and receive the data at the same time.
o If there is no dedicated path exists between the devices, then the capacity of
the communication channel is divided into two parts.
Send/Receive A device can only Both the devices Both the devices can send
send the data but can send and and receive the data
cannot receive it or it receive the data, simultaneously.
can only receive the but one at a time.
data but cannot send
it.
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked
together with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources,
but this can lead to a problem if the computer with the resource is down.
Advantages Of Peer-To-Peer Network:
Client/Server Network
o Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central
computer known as Server.
o The central controller is known as a server while all other computers in the
network are called clients.
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files,
directories, printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to
the server for the permission. The server sends the response to the client 1 to
initiate its communication with the client 2.
NIC
o NIC stands for network interface card.
o NIC is a hardware component used to connect a computer with another
computer onto a network
o It can support a transfer rate of 10,100 to 1000 Mb/s.
o The MAC address or physical address is encoded on the network card chip
which is assigned by the IEEE to identify a network card uniquely. The MAC
address is stored in the PROM (Programmable read-only memory).
1. Wired NIC
2. Wireless NIC
Wired NIC: The Wired NIC is present inside the motherboard. Cables and
connectors are used with wired NIC to transfer data.
Wireless NIC: The wireless NIC contains the antenna to obtain the
connection over the wireless network. For example, laptop computer
contains the wireless NIC.
Hub
A Hub is a hardware device that divides the network connection among
multiple devices. When computer requests for some information from a
network, it first sends the request to the Hub through cable. Hub will
broadcast this request to the entire network. All the devices will check
whether the request belongs to them or not. If not, the request will be
dropped.
The process used by the Hub consumes more bandwidth and limits the
amount of communication. Nowadays, the use of hub is obsolete, and it is
replaced by more advanced computer network components such as
Switches, Routers.
Switch
A switch is a hardware device that connects multiple devices on a computer
network. A Switch contains more advanced features than Hub. The Switch
contains the updated table that decides where the data is transmitted or not.
Switch delivers the message to the correct destination based on the physical
address present in the incoming message. A Switch does not broadcast the
message to the entire network like the Hub. It determines the device to
whom the message is to be transmitted. Therefore, we can say that switch
provides a direct connection between the source and destination. It
increases the speed of the network.
Router
o A router is a hardware device which is used to connect a LAN with an internet
connection. It is used to receive, analyze and forward the incoming packets to
another network.
o A router works in a Layer 3 (Network layer) of the OSI Reference model.
o A router forwards the packet based on the information available in the routing
table.
o It determines the best path from the available paths for the transmission of
the packet.
Advantages Of Router:
Modem
o A modem is a hardware device that allows the computer to connect to the
internet over the existing telephone line.
o A modem is not integrated with the motherboard rather than it is installed on
the PCI slot found on the motherboard.
o It stands for Modulator/Demodulator. It converts the digital data into an
analog signal over the telephone lines.
Based on the differences in speed and transmission rate, a modem can be
classified in the following categories:
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in
one computer moves through a physical medium to the software application
in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be
performed independently.
Characteristics of OSI Model:
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer
is closest to the end user. Both the end user and the application layer interact
with the software applications. An upper layer refers to the layer just above
another layer.
o The lower layer of the OSI model deals with the data transport issues. The
data link layer and the physical layer are implemented in hardware and
software. The physical layer is the lowest layer of the OSI model and is
closest to the physical medium. The physical layer is mainly responsible for
placing the information on the physical medium.
1) Physical layer
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
2) Data-Link Layer
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on both
the sides so that no data get corrupted. It ensures that the transmitting
station such as a server with higher processing speed does not exceed the
receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to the physical layer. If any
error seems to occurr, then the receiver sends the acknowledgment for the
retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
3) Network Layer
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data
completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-
point connection between source and destination to deliver the data reliably.
5) Session Layer
6) Presentation Layer
7) Application Layer