Chapter 3-Network Types
Chapter 3-Network Types
Chapter 3
Local Area Network
• A local area network (LAN) is usually privately owned and connects some
hosts in a single office, building, or campus.
• Depending on the needs of an organization, a LAN can be as simple as two PCs
and a printer in someone’s home office, or it can extend throughout a company
and include audio and video devices.
Each host in a LAN has an
identifier, an address, that
uniquely defines the host in the 192.168.2.1
LAN. 192.168.2.2
A packet sent by a host to
another host carries both the
source host’s and the
destination host’s addresses.
• In the past, all hosts in a network were connected through a common cable,
which meant that a packet sent from one host to another was received by all
hosts.
• The intended recipient kept the packet; the others dropped the packet.
• Today, most LANs use a smart
connecting switch, which is
able to recognize the
destination address of the
packet and guide the packet
to its destination without
sending it to all other hosts.
• The switch alleviates the
traffic in the LAN and allows
more than one pair to
communicate with each other
at the same time if there is no
common source and
destination among them.
Wide Area Network
• A wide area network (WAN) is also an interconnection of devices capable of
communication.
• A LAN is normally limited in size, spanning an office, a building, or a campus; a
WAN has a wider geographical span, spanning a town, a state, a country, or
even the world.
• A LAN interconnects hosts; a WAN interconnects connecting devices such as
switches, routers, or modems.
• A LAN is normally privately owned by the organization that uses it; a WAN is
normally created and run by communication companies and leased by an
organization that uses it.
• There are two distinct examples of WANs:
• point-to-point WANs and
• switched WANs.
• Point-to-Point WAN
• A point-to-point WAN is a network that connects two communicating devices through a
transmission media (cable or air).
• Switched WAN
• A switched WAN is a network with more than two ends.
• A switched WAN is used in the backbone of global communication today.
• We can say that a switched WAN is a combination of several point-to-point WANs
that are connected by switches.
Internetwork
• Today, it is very rare to see a LAN or a WAN in isolation; they are connected to
one another.
• When two or more networks are connected, they make an internetwork, or
internet.
• As an example, assume that an organization has two offices, one on the east coast and
the other on the west coast.
• Each office has a LAN that allows all employees in the office to communicate with each
other.
• To make the communication between employees at different offices possible, the
management leases a point-to-point dedicated WAN from a service provide, and
connects the two LANs.
• Now the company has an internetwork, or a private internet.
• When a host in the west coast office sends a message to another host in the same office,
the router blocks the message, but the switch directs the message to the destination. On
the other hand, when a host on the west coast sends a message to a host on the east
coast, router R1 routes the packet to router R2, and the packet reaches the destination.
Client-Server Network
• Client-Server Network model is broadly used network model.
• In Client-Server Network, Clients and server are differentiated, specific server
and clients are present.
• In Client-Server Network, Centralized server is used to store the data because
its management is centralized.
• In Client-Server Network, Server respond the services which are requested by
Client.
• In Server-based network, server administers the whole set-up in the network.
• Access rights and resource allocations are also done by the server.
• Due to centralized storage, it becomes easy to find a file or some other
resource.
• A centralized server makes data backup and recovery possible in a convenient
manner.
• Changes in the network can be made very easily by just upgrading the server.
Also, the network is easily scalable.
• Servers can be accessed remotely from various platforms in the network.
• Rules defining security and access rights can be defined at the time of the set-
up of the server.
Peer-to-Peer Network
• Peer-to-Peer Network model does not differentiate the clients and the servers, each and every
node is itself client and server.
• In Peer-to-Peer Network, Each and every node can do both request and respond for the
services.
• Peer-to-peer networks are often created by collections of fewer machines.
• All of these computers use unique security to keep their data, but they also share data with
every other node.
• In peer-to-peer networks, the nodes both consume and produce resources.
• Therefore, as the number of nodes grows, so does the peer-to-peer network’s capability for
resource sharing.
• This is distinct from client-server networks where an increase in nodes causes the server to
become overloaded.
• It is challenging to give nodes in peer-to-peer networks proper security because they function as
both clients and servers.
• A denial of service attack may result from this.
• The majority of contemporary operating systems, including Windows and Mac OS, come with
software to implement peer
• Peer-to-peer network model is easy to implement
and manage.
• Nodes or workstations are independent of one
another.
• No access permissions is also needed.
• The network is reliable in nature.
• If a peer fails, it will not affect the working of
others.
• There is no need for any professional software in
such kind of networks.
• The cost of implementation of such networks is very
less.
• In Peer-to-peer network model Storage is
decentralized, and also not so efficiently managed.
• Data backup options are not available in peer-to-peer
networks.
• These kinds of networks are not so secure too.
Packet-switched and Circuit
switched networks
• Circuit-Switched Network
• In a circuit-switched network, a dedicated connection, called a circuit, is always available
between the two end systems; the switch can only make it active or inactive.
• Circuit switching was very common in telephone networks in the past, although part of
the telephone network today is a packet-switched network.
• The switches used in this case have forwarding tasks but no storing capability.
• Let us look at two cases.
• In the first case, all telephone sets are busy; four people at one site are talking
with four people at the other site; the capacity of the thick line is fully used.
• In the second case, only one telephone set at one side is connected to a
telephone set at the other side; only one-fourth of the capacity of the thick line
is used.
• This means that a circuit-switched network is efficient only when it is working
at its full capacity; most of the time, it is inefficient because it is working at
partial capacity.
• The reason that we need to make the capacity of the thick line four times the
capacity of each voice line is that we do not want communication to fail when
all telephone sets at one side want to be connected with all telephone sets at
the other side.
• Packet-Switched Network
• In a computer network, the communication between the two ends is done in blocks of
data called packets.
• In other words, instead of the continuous communication we see between two telephone
sets when they are being used, we see the exchange of individual data packets between
the two computers.
• This allows us to make the switches function for both storing and forwarding because a
packet is an independent entity that can be stored and sent later.
• A router in a packet-switched network has a queue that can store and forward the packet.
• Now assume that the capacity of the thick line is only twice the capacity of the data line
connecting the computers to the routers.
• If only two computers (one at each site) need to communicate with each other, there is
no waiting for the packets.
• However, if packets arrive at one router when the thick line is already working at its full
capacity, the packets should be stored and forwarded in the order they arrived.
• The two simple examples show that a packet-switched network is more efficient than a
circuit switched network, but the packets may encounter some delays.
Network cabling & Topologies
• The term physical topology refers to the way in which a network is laid out
physically.
• Two or more devices connect to a link; two or more links form a topology.
• The topology of a network is the geometric representation of the relationship of
all the links and linking devices (usually called nodes) to one another.
• There are four basic topologies possible: mesh, star, bus, and ring.
• Mesh Topology
• In a mesh topology, every device has a dedicated point-to-point link to every other device.
• The term dedicated means that the link carries traffic only between the two devices it connects.
• To find the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node.
• Node 1 must be connected to n – 1 nodes, node 2 must be connected to n – 1 nodes, and finally node n
must be connected to n – 1 nodes.
• We need n (n – 1) physical links. However, if each physical link allows communication in both directions
(duplex mode), we can divide the number of links by 2.
• In other words, we can say that in a mesh topology, we need n (n – 1) / 2 duplex-mode links.
• To accommodate that many links, every device on the network must have n – 1 input/output (I/O) ports
• A mesh offers several advantages over other network topologies.
• First, the use of dedicated links guarantees that each connection can carry its
own data load, thus eliminating the traffic problems that can occur when links
must be shared by multiple devices.
• Second, a mesh topology is robust.
• If one link becomes unusable, it does not incapacitate the entire system.
• Third, there is the advantage of privacy or security.
• When every message travels along a dedicated line, only the intended recipient sees it.
Physical boundaries prevent other users from gaining access to messages.
• Finally, point-to-point links make fault identification and fault isolation easy.
• Traffic can be routed to avoid links with suspected problems. This facility enables the
network manager to discover the precise location of the fault and aids in finding its cause
and solution.
• The main disadvantages of a mesh are related to the amount of
cabling and the number of I/O ports required.
• In a star topology, each device has a dedicated point-to-point link only to a central controller, usually
called a hub or switch, The devices are not directly linked to one another.
• If one device wants to send data to another, it sends the data to the controller, which then relays the data
• In a star, each device needs only one link and one I/O port to connect it to any number of others.
• Far less cabling needs to be housed, and additions, moves, and deletions involve only one connection:
• Multimode cable has a larger diameter; however, both cables provide high bandwidth at
Specification Cable Type
high speeds. 10BaseT Unshielded Twisted Pair
10Base2 Thin Coaxial
• Single mode can provide more distance, but it is more expensive. 10Base5 Thick Coaxial
100BaseT Unshielded Twisted Pair
100BaseFX Fiber Optic
100BaseBX Single mode Fiber
100BaseSX Multimode Fiber
1000BaseT Unshielded Twisted Pair
1000BaseFX Fiber Optic
1000BaseBX Single mode Fiber
1000BaseSX Multimode Fiber