0% found this document useful (0 votes)
21 views33 pages

Chapter 1 - Introduction To Computer Network Design

The document provides an overview of computer network design and components. It discusses the following key points in 3 sentences or less: Networks connect devices like computers and printers to allow sharing of resources. The basic components of a network are messages, senders, receivers, transmission mediums, and protocols. Network performance, reliability, and security depend on factors like transmission speed, hardware capabilities, software efficiency, failure frequency, and data protection.

Uploaded by

miliamodes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views33 pages

Chapter 1 - Introduction To Computer Network Design

The document provides an overview of computer network design and components. It discusses the following key points in 3 sentences or less: Networks connect devices like computers and printers to allow sharing of resources. The basic components of a network are messages, senders, receivers, transmission mediums, and protocols. Network performance, reliability, and security depend on factors like transmission speed, hardware capabilities, software efficiency, failure frequency, and data protection.

Uploaded by

miliamodes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

Computer Network Design

ITU 07114
Introduction to Computer Networks
• A network is a set of devices (often referred to as nodes) connected
by communication links. A node can be a computer, printer, or any
other device capable of sending and/or receiving data generated by
other nodes on the network.
• A computer network is a set of computers connected together for the
purpose of sharing resources. Shared resources can include printers,
Scanners, file servers, etc.
Components
• A data communications system has five components.
1. Message: The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video.
2. Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, etc.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, etc.
4. Transmission medium: The transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fiber optic cable, and radio waves.
5. Protocol: A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating.
Characteristics of a Network
The effectiveness of a network depends on three characteristics.
• Delivery: The system must deliver data to the correct destination.
Data must be received by the intended device or user.
• Accuracy: The system must deliver the data accurately. Data that have
been altered in transmission and left uncorrected are unusable.
• Timeliness: The system must deliver data in a timely manner. Data
delivered late are useless.
Data Flow / Transmission mode (1/4)
• Communication between two devices can be simplex, half-duplex, or
full-duplex
Data Flow / Transmission mode (2/4)
Simplex
• In simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can
only receive. Keyboards and traditional monitors are examples of simplex
devices.
Advantage of Simplex mode:
• In simplex mode, the station can utilize the entire bandwidth of the
communication channel, so that more data can be transmitted at a time.
Disadvantage of Simplex mode:
• Communication is unidirectional, so it has no inter-communication between
devices.
Data Flow / Transmission mode (3/4)
Half-Duplex
• In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive, and vice versa. Walkie-
talkies and CB (citizen band) radios are both half-duplex systems.
• The half-duplex mode is used in cases where there is no need for communication in both
directions at the same time.
Advantage of Half-duplex mode:
• In half-duplex mode, both the devices can send and receive the data and also can utilize
the entire bandwidth of the communication channel during the transmission of data.
Disadvantage of Half-Duplex mode:
• In half-duplex mode, when one device is sending the data, then another has to wait, this
causes the delay in sending the data at the right time.
Data Flow / Transmission mode (4/4)
Full-Duplex
• In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously. The full-duplex mode is like a two-way street with traffic flowing in both
directions at the same time. One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone line, both can
talk and listen at the same time. The full-duplex mode is used when communication in
both directions is always required.
Advantage of Full-duplex mode:
• Both stations can send and receive the data at the same time.
Disadvantage of Full-duplex mode:
• If there is no dedicated path exists between the devices, then the capacity of the
communication channel is divided into two parts. communicate by a telephone line, both
can talk and listen simultaneously
Network Criteria
• A network must be able to meet a certain number of criteria. The
most important of these are
performance,
reliability, and
security.
1. Performance
• Performance can be measured in many ways, including transit time and response time.
• Transit time is the amount of time required for a message to travel from one device to another.
• Response time is the elapsed time between an inquiry and response
• The performance of a network depends on a number of factors, including the number of users,
the type of transmission medium, the capabilities of the connected hardware, and the
efficiency of the software.
• Performance is often evaluated by two networking metrics: throughput and delay.
 Throughput is an actual measurement of how fast data can be transmitted.
 Latency/delay is the time required for a message to completely arrive at the destination from
the source.
• We often need more throughput and less delay. However, these two criteria are often
contradictory. If we try to send more data to the network, we may increase throughput but we
increase the delay because of traffic congestion in the network.
• Factors that affect the Performance of a network:
Number of users
Type of transmission medium
Capabilities of the connected hardware
2. Reliability
• In addition to delivery accuracy, network reliability is measured by the
frequency of failure, the time it takes a link to recover from a failure,
and the network's robustness in a catastrophe.
• Factors that affect the Reliability of a network:
 Efficiency of software.
 Frequency of failure
 Recovery time of a network after a failure
3. Security

• Network security issues include protecting data from unauthorized


access, protecting data from damage and development, and
implementing policies and procedures for recovery from breaches and
data losses.
• Factors that affect the Security of a network:
 Protecting data from unauthorized access and viruses.
Physical Structures
Type of Connection / Line configuration
• A network is two or more devices connected through links.
• A link is a communications pathway that transfers data from one
device to another.
• There are two possible types of connections:
point-to-point, and
multipoint.
Point-to-Point
• A point-to-point connection provides a dedicated link between two devices.
The entire capacity of the link is reserved for transmission between those two
devices.
• Most point-to-point connections use an actual length of wire or cable to
connect the two ends.
• When you change television channels by infrared remote control, you are
establishing a point-to-point connection between the remote control and the
television's control system.
Multipoint
• A multipoint (also called multidrop) connection is one in which more than two specific devices
share a single link.
• In a multipoint environment, the capacity of the channel is shared, either spatially or temporally.
 Spatial Sharing: If several devices can share the link simultaneously, it is called Spatially shared
line configuration.
 Temporal (Time) Sharing: If users must take turns using the link, then its called Temporally
shared or Time Shared Line Configuration.
Network Topology
• Topology defines the structure of the network of how all the
components are interconnected to each other.
• There are two types of topology: physical and logical topology.
• Physical topology is the geometric representation of all the nodes in a
network. There are six types of network topology, which are Bus
Topology, Ring Topology, Tree Topology, Star Topology, Mesh Topology,
and Hybrid Topology.
• Logical topology It defines the logical pathways and connections that
data follows as it travels from one node to another within a network.
1. Bus Topology (1/3)
• The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or directly connected
to the backbone cable.
• When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it has
been addressed or not.
• The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
• The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).
1. Bus Topology (2/3)
• CSMA: It is a media access control used to control the data flow to
maintain data integrity, i.e., the packets do not get lost. Two alternative
ways of handling the problems occur when two nodes send the messages
simultaneously.
CSMA CD: CSMA CD (Collision detection) is an access method used to
detect the collision. Once the collision is detected, the sender will stop
transmitting the data. Therefore, it works on "recovery after the collision".
CSMA CA: CSMA CA (Collision Avoidance) is an access method used to
avoid the collision by checking whether the transmission media is busy or
not. If busy, then the sender waits until the media becomes idle. This
technique effectively reduces the possibility of the collision. It does not
work on "recovery after the collision".
1. Bus Topology (3/3)
 Advantages of Bus topology:
• Low-cost: In bus topology, nodes are directly connected to the cable without passing through a hub.
Therefore, the initial cost of installation is low.
• Moderate data speeds: Coaxial cables are mainly used in bus-based networks that support up to 10
Mbps.
• Familiar technology: Bus topology is familiar as the installation and troubleshooting techniques are
well known, and hardware components are easily available.
• Limited failure: A failure in one node will not affect other nodes.
 Disadvantages of Bus topology:
• Extensive cabling: A bus topology is quite simpler, but still, it requires much cabling.
• Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any
fault occurs in the cable, it would disrupt the communication for all the nodes.
• Signal interference: If two nodes send the messages simultaneously, both signals collide.
• Reconfiguration difficult: Adding new devices would slow down the network.
• Attenuation: Attenuation is a loss of signal that leads to communication issues. Repeaters are used
to regenerate the signal.
2. Ring Topology (1/3)
• Ring topology is like a bus topology but with connected ends.
• In a ring topology, each device has a dedicated point-to-point
connection with only the two devices on either side of it.
• A signal is passed along the ring in one direction, from device
to device, until it reaches its destination.
• Each device in the ring incorporates a repeater.
• When a device receives a signal intended for another device,
its repeater regenerates the bits and passes them along.
• The most common access method of the ring topology is
token passing.
• Token passing: It is a network access method in which a
token is passed from one node to another node.
• Token: It is a frame that circulates around the network.
2. Ring Topology (2/3)
 Working of Token passing
• A token moves around the network, and it is passed from computer to
computer until it reaches the destination.
• The sender modifies the token by putting the address along with the
data.
• The data is passed from one device to another device until the
destination address matches. Once the token received by the destination
device, then it sends the acknowledgment to the sender.
• In a ring topology, a token is used as a carrier.
2. Ring Topology (3/3)
 Advantages of Ring topology:
• Network Management: Faulty devices can be removed from the network without bringing the
network down.
• Product availability: Many hardware and software tools for network operation and monitoring are
available.
• Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is very
low.
• Reliable: It is a more reliable network because the communication system is not dependent on the
single host computer.
 Disadvantages of Ring topology:
• Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any
fault occurs in the cable, then it would disrupt the communication for all the nodes.
• Failure: The breakdown in one station leads to the failure of the overall network.
• Reconfiguration difficult: Adding new devices to the network would slow down the network.
• Delay: Communication delay is directly proportional to the number of nodes. Adding new devices
increases the communication delay.
3. Star Topology (1/2)
• Star topology is an arrangement of the
network in which every node is connected
to the central hub or switch.
• The hub/switch acts as an exchange.
• If one device wants to send data to
another, it sends the data to the central
device (hub/switch), which then relays the
data to the other connected device.
3. Star Topology (2/2)
 Advantages of Star topology
• Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to bus topology. In a bus
topology, the manager has to inspect the kilometers of cable. In a star topology, all the stations are connected to the
centralized network. Therefore, the network administrator has to go to the single station to troubleshoot the
problem.
• Network control: Complex network control features can be easily implemented in the star topology. Any changes
made in the star topology are automatically accommodated.
• Limited failure: As each station is connected to the central hub with its own cable, therefore failure in one cable will
not affect the entire network.
• Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
• Easily expandable: It is easily expandable as new stations can be added to the open ports on the hub.
• Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
• High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the most popular Star
topology networks.
 Disadvantages of Star topology
• A Central point of failure: If the central hub or switch goes down, then all the connected nodes will not be able to
communicate with each other.
• Cable: Sometimes cable routing becomes difficult when a significant amount of routing is required.
4. Tree topology (1/2)
• Tree topology combines the characteristics
of bus topology and star topology.
• A tree topology is a type of structure in
which all the computers are connected
with each other in a hierarchical fashion.
• The top-most node in tree topology is
known as a root node, and all other nodes
are the descendants of the root node.
• There is only one path exists between two
nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
4. Tree topology (2/2)
 Advantages of Tree topology
• Support for broadband transmission: Tree topology is mainly used to provide broadband transmission, i.e.,
signals are sent over long distances without being attenuated.
• Easily expandable: We can add the new device to the existing network. Therefore, we can say that tree
topology is easily expandable.
• Easily manageable: In tree topology, the whole network is divided into segments known as star networks which
can be easily managed and maintained.
• Error detection: Error detection and error correction are very easy in a tree topology.
• Limited failure: The breakdown in one station does not affect the entire network.
• Point-to-point wiring: It has point-to-point wiring for individual segments.
 Disadvantages of Tree topology
• Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the problem.
• High cost: Devices required for broadband transmission are very costly.
• Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall
network.
• Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
5. Mesh topology (1/3)
• Mesh technology is an arrangement of the network in which
computers are interconnected with each other through
various redundant connections.
• There are multiple paths from one computer to another
computer.
• It does not contain the switch, hub or any central computer
which acts as a central point of communication.
• Mesh topology is mainly used for WAN implementations
where communication failures are a critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
• Number of cables = (n*(n-1))/2; Where n is the number of
nodes that represents the network.
5. Mesh topology (2/3)
• Mesh topology is divided into two categories:
• Full Mesh Topology: In a full mesh topology, each computer is
connected to all the computers available in the network.
• Partial Mesh Topology: In a partial mesh topology, not all but certain
computers are connected to those computers with which they
communicate frequently.
5. Mesh topology (3/3)
 Advantages of Mesh topology:
• Reliable: The mesh topology networks are very reliable as if any link breakdown will
not affect the communication between connected computers.
• Fast Communication: Communication is very fast between the nodes.
• Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
 Disadvantages of Mesh topology
• Cost: A mesh topology contains a large number of connected devices such as a router
and more transmission media than other topologies.
• Management: Mesh topology networks are very large and very difficult to maintain
and manage. If the network is not monitored carefully, then the communication link
failure goes undetected.
• Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.
6. Hybrid Topology (1/2)
• The combination of various different topologies is known as Hybrid topology.
• A Hybrid topology is a connection between different links and nodes to
transfer the data.
• When two or more different topologies are combined together is termed as
Hybrid topology and if similar topologies are connected with each other will
not result in Hybrid topology. For example, if there exist a ring topology in
one branch of ICICI bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.
6. Hybrid Topology (2/2)
Advantages of Hybrid Topology
• Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the
network.
• Scalable: Size of the network can be easily expanded by adding new devices without affecting the
functionality of the existing network.
• Flexible: This topology is very flexible as it can be designed according to the requirements of the
organization.
• Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of
the network is maximized and weakness of the network is minimized.
Disadvantages of Hybrid topology
• Complex design: The major drawback of the Hybrid topology is the design of the Hybrid network. It
is very difficult to design the architecture of the Hybrid network.
• Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are different
from usual Hubs used in other topologies.
• Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of
cabling, network devices, etc.

You might also like