Computer Network
Computer Network
Network
By
• Protocol
- common set of rules and signals used for communication. E.g. ethernet,
token-ring network
• Architecture
- type of structure e.g. peer-to-peer or client/server architecture
Network Topology
• the way in which the network of computers is
connected
• Different types of topologies are
Bus
Mesh
Star
Ring
Tree
Unconstrained
Shared Broadcast Links
• Point to point communication
• Each pair of communicating nodes use the link
for a short time
• Other nodes ignore the communication
• There has to be a distributed protocol to
decide who gets to use the link
Bus Topology
• Key Features
o Flexible
o Expandable
o Moderate Reliability
o Moderate performance
Bus Topology (2)
• Key Features
o High Speed
o Very Flexible
o High Reliability
o High Maintainability
Extended Star Topology
A Star
Network
Which has
Been
Expanded to
Include an
Additional
Hub or hubs
Hybrid Topology
Ring Topology
Ring Topology (2)
• Computers connected in a closed loop
• First passes data to second, second passes
data to third, and so on
• In practice, there is a short connector cable
from the computer to the ring
• Ring connections may run past offices with
connector cable to socket in the office.
Ring Topology (3)
• No beginning or end ( a ring in fact!!)
• All devices have equal access to media
• Single ring - data travels in one direction only
• Double ring – allows fault tolerance
• Each device has to wait its turn to transmit
• Most common type is token ring (IEEE 802.5)
• A token contains data, reaches the destination, data
extracted, acknowledgement of receipt sent back to
transmitting device, removed, empty token passed
on for another device to use
Ring Topology (4)
Advantages Disadvantages
• Key Features
o Fully connected
o Robust – Highly reliable
o Not flexible
o Poor expandability
Mesh Topology(2)
• Not common on LANs
• Most often used in WANs to interconnect
LANs
• Each node is connected to every other node
• Allows communication to continue in the
event of a break in any one connection
• It is “Fault Tolerant”
Mesh Topology (3)
Advantages Disadvantages
B A
D
Examples (2)
• Physical Star and Logical Mesh
B A
D
D
Physical v/s Logical Topology (2)
• Your choice of Logical Topology will affect the
Physical Topology – and vice versa
• Design carefully – it may be difficult to change
part way through the installation
• Your choice will determine cable installation,
network devices, network connections,
protocol (and where you will drill holes in the
building)
Factors
• Cost
• Scalability
• Bandwidth Capacity
• Ease of Installation
• Ease of fault finding and maintenance
Medium Access Control (MAC)
• A network of computers based on multi-access medium
requires a protocol for effective sharing of the media
• Only one node can send or transmit signal at a time using the
broadcast mode, the main problem here is how different
nodes get control of the medium to send data, that is “who
goes next?”.
• The protocols used for this purpose are known as Medium
Access Control (MAC) techniques.
• The key issues involved here are - Where and How the control
is exercised.
Medium Access Control (MAC)(2)
• ‘Where’ refers to whether the control is exercised in a
centralised or distributed manner.
• In a centralised system a master node grants access of the
medium to other nodes.
o Greater control to provide features like priority, overrides, and
guaranteed bandwidth.
o Simpler logic at each node.
o Easy coordination.
• In a distributed approach all the nodes collectively perform a
medium access control function and dynamically decide
which node to be granted access.
o more reliable than centralised
Medium Access Control (MAC)(3)
• ‘How’ refers to in what manner the control is
exercised.
• It is constrained by the topology and trade off
between cost-performance and complexity.
MAC Approaches
MAC Approaches (2)
• Random and Round Robin techniques are
used for LANs of IEEE standard
• The CSMA/CA, a collision-free protocol used in
wireless LAN
• Channelization-based MACs, which are used in
cellular telephone networks
• The reservation-based MACs, which are used
in satellite networks
MAC Approaches (3)
• In Round Robin techniques, each and every
node is given the chance to send or transmit by
rotation.
• When a node gets its turn to send, it may either decline to send, if it has no
data or may send if it has got data to send.
• Polling is an example of centralised control and token passing is an example
of distributed control.
• The mechanism of polling is similar to the roll-call performed in a classroom.
A controller sends a message to each node in turn. The message contains the
address of the node being selected for granting access.
• In token passing scheme, all stations are logically connected in the form of a
ring and control of the access to the medium is performed using a token.
MAC Approaches (4)
• The ALOHA scheme was invented by Abramson in 1970 for a packet radio
network connecting remote stations to a central computer and various
data terminals at the campus of the university of Hawaii.
• In CSMA(Carrier Sensing Multiple Access)scheme, a node having data to
transmit first listens to the medium to check whether another
transmission is in progress or not. The node starts sending only when the
channel is free, that is there is no carrier. That is why the scheme is also
known as listen-before-talk.
• CSMA/CD (Carrier Sensing Multiple Access with Collision Detection)
protocol can be considered as a refinement over the CSMA scheme. It will
monitor the channel while transmitting a packet and immediately cease
transmission when collision is detected. This scheme is also called as
Listen-While-Talk.
IEEE CSMS/CD based LANs
• A LAN consists of shared transmission medium and a
set of hardware and software for interfacing devices
to the medium and regulating the ordering access to
the medium.
• LAN protocols function at the lowest two layers of
the OSI reference model: the physical and data-link
layers.
• The IEEE 802 LAN is a shared medium peer-to-peer
communications network that broadcasts
information for all stations to receive.
IEEE 802 Legacy LANs
• The 802.2 sublayer describes the LLC (logical link layer), which is the
upper part of the data link layer. LLC facilitate error control and flow
control for reliable communication.
IEEE 802.3 and Ethernet
• Ethernet refers to the family of local-area network (LAN)
products covered by the IEEE 802.3 standard that defines
what is commonly known as the CSMA/CD protocol.
• Ethernet has survived as the major LAN technology (it is
currently used for approximately 85 percent of the world's
LAN-connected PCs and workstations)
• Three data rates are currently defined for operation over
optical fiber and twisted-pair cables:
10 Mbps —10Base-T Ethernet
100 Mbps —Fast Ethernet
1000 Mbps—Gigabit Ethernet
Ethernet Architecture
• Ethernet architecture can be divided into two layers:
Physical layer: this layer takes care of following functions.
• Encoding and decoding
• Collision detection
• Carrier sensing
• Transmission and receipt
Data link layer: Following are the major functions of this
layer.
• Station interface
• Data Encapsulation /Decapsulation
• Link management
• Collision Management
Ethernet Architecture (2)
• The naming convention of Ethernet is a
concatenation of three terms indicating the
transmission rate, the transmission method,
and the media type/signal encoding.
• E.g. 10Base-T. where
10 implies transmission rate of 10 Mbps,
Base represents that it uses baseband signaling, and
T refers to twisted-pair cables as transmission media.
Ethernet Architecture (3)
(a) Footprint using a global beam (b) Footprint using a phased array antenna
Categories of Satellites
• The satellites can be categorized into three different types , based on the
location of the orbit.
• These orbits are chosen such that the satellites are not destroyed by the
high-energy charged particles present in the two Van Allen belts