0% found this document useful (0 votes)
5 views14 pages

IOT2

Uploaded by

reshma.m03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views14 pages

IOT2

Uploaded by

reshma.m03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Introduction

• In the present era of data- and information-centric operations, everything—right


from agriculture to military operations—relies heavily on information.
• Strength of the data that generates this information.
• Speed at which data is updated to all members ofa team (which may be a group of
individuals, an organization, or a country) dictates the advantage that the team
has over others in generating useful information from the gathered data.

• Data and networking, which allows for the instant availability of information from
anywhere on the earth at any moment.

• Typically, networking refers to the linking of computers and communication


network devices (also referred to as hosts), which interconnect through a network
(Internet or Intranet) and are separated by unique device identifiers (Internet
protocol,IP addresses and media access control, MAC addresses).
• These hosts may be connected by a single path or through multiple paths for
sending and receiving data.
• The data transferred between the hosts may be text, images, or videos, which are
typically in the form of binary bit streams
Network Types
Computer networks are classified according to various parameters:
1) Type of connection,
2) physical topology, and
3) reach of the network.
These classifications are helpful in deciding the requirements of a network setup
and provide insights into the appropriate selection of a network type for the setup.
Connection types

Depending on the way a host communicates with other hosts, computer networks are of
two types
(i)Point-to-point
(ii)Point-to-multipoint.

(i) Point-to-point: Point-to-point connections are used to establish direct connections


between two hosts. Day-to-day systems such as a remote control for an air
conditioner or television is a point to point connection, where the connection has the
whole channel dedicated to it only. These networks were designed to work over
duplex links and are functional for both synchronous as well as asynchronous
systems. Regarding computer networks, point to point connections find usage for
specific purposes such as in optical networks.
(ii) Point-to-multipoint: In a point-to-multipoint connection, more than two hosts
share the same link. This type of configuration is similar to the one-to-many
connection type. Point-to-multipoint connections find popular use in wireless
networks. The channel is shared between the various hosts, either spatially or
temporally. One common scheme of spatial sharing of the channel is frequency
division multiple access (FDMA). Temporal sharing of channels include approaches
such as time division multiple access (TDMA).
Point-to multipoint connections find popular use in present-day networks,
especially while enabling communication between a massive number of connected
devices.
What is FDMA?
The term FDMA is an acronym for Frequency Division Multiple Access.
It splits its available radio frequency (RF) channel into multiple sub-channels (smaller).
For instance, an FM channel that’s 13 kHz wide in narrowband that carried just one conversation previously
gets split into two 6.5 kHz sub-channels, both able to carry separate conversations.
Ex: Telephone-style conversation if they use one channel for receiving and one channel for transmitting
signals.
Drawback
when you try to fit in more sub-channels in the original channel, the users will start suffering from the call
interference. It happens because the decreased channel spacing makes the filtration of one intended sub-
channel very difficult while simultaneously rejecting all the others at the receiver’s end.

What is TDMA?
The term TDMA is an acronym for Time Division Multiple Access.
The TDMA doesn’t split its primary RF channel into two or more sub-channels- but splits it into two time slots
instead.
Each slot carries an identical RF frequency- but they hold the capacity of carrying separate conversations in
each of them.
Physical topology
Depending on the physical manner in which communication paths between
the hosts
are connected, computer networks can have the following four broad
topologies—
(i)Star
(ii)Mesh
(iii)Bus
(iv)Ring.
(i) Star
• In a star topology, every host has a point-to-point link to a central
controller or hub.
• The hosts cannot communicate with one another directly; they
can only do so through the central hub.
• The hub acts as the network traffic exchange.
• For large-scale systems, the hub, essentially, has to be a powerful
server to handle
• all the simultaneous traffic flowing through it.
• However, as there are fewer links (only one link per host), this
topology is cheaper and easier to set up.
Advantages
easy installation and the ease of fault identification within the
network.
If the central hub remains uncompromised, link failures between a
host and the hub do not have a big effect on the network,except for
the host that is affected.
Disadvantage
The danger of a single point of failure. If the hub fails, the whole
network fails.
(ii) Mesh
• In a mesh topology, every host is connected to every other
host using a dedicated link (in a point-to-point manner).
• For n hosts in a mesh, there are a total of n(n􀀀1)=2
dedicated full duplex links between the hosts.
Advantages
• The robustness and resilience of the system. Even if a link is
down or broken, the network is still fully functional as there
remain other pathways for the traffic to flow through.
• security and privacy of the traffic as the data is only seen by
the intended recipients and not by all members of the
network.
• Reduced data load on a single host, as every host in this
network takes care of its traffic load.
Disadvantages
• This massive number of links makes the mesh topology
expensive.
So, mesh networks are used very selectively, such as in
backbone networks.
Bus Topology
• Bus topology, also known as line topology, is a type of
network topology in which all devices in the network are
connected by one central RJ-45 network cable or coaxial
cable.
• A bus topology is a network configuration in which all devices
are connected to a central cable, also known as a bus .
• A bus topology follows the point-to-multipoint connection. A
backbone cable or bus serves as the primary traffic pathway
between the hosts.
• The hosts are connected to the main bus employing drop
lines or taps.
Advantage
• ease of installation.
• Multiple drop lines and taps can be used to connect various
hosts to the bus, making installation very easy and cheap.
• The bus topology has a simple cabling procedure in which a
single bus (backbone cable) can beused for an organization.
Drawback
• difficulty in fault localization within the network.
• restriction on the length of the bus and the number of hosts that can
be simultaneously connected to the bus due to signal loss over the
extended bus
Ring topology

A ring topology is a network configuration


where device connections create a circular
data path.
Each networked device is connected to two
others, like points on a circle. Together,
devices in a ring topology are called a ring
network.
In a ring network, packets of data travel from
one device to the next until they reach their
destination.
Most ring topologies allow packets to travel
only in one direction, called
a unidirectional ring network. Others
permit data to move in either direction,
called bidirectional.
The major disadvantage of a ring topology is
that if any individual connection in the ring is
broken, the entire network is affected.

You might also like