We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26
CAP476: Data Communiction and Networking
Unit-I: Networks
Dr. Manoj Sindhwani
Lovely Professional University Network Design - Topology The term “Topology” refers to the way in which the end points or stations/computer systems, attached to the networks, are interconnected. A topology is essentially a stable geometric arrangement of computers in a network. If you want to select a topology for doing networking.You have attention to the following points. Application S/W and protocols Types of data communicating devices Geographic scope of the network Cost Reliability Types of Topologies Depending on the requirement there are different Topologies to construct a network. Point-to-Point topology Bus topology Star topology Ring topology Mesh topology Tree (Hierarchical) topology Daisy Chain Cellular topology Hybrid Topology Point to Point Topology Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. Often, the receiving end of one host is connected to sending end of the other and vice-versa. If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the end hosts are unaware of underlying network and see each other as if they are connected directly. Bus topology In case of Bus topology, all devices share single communication line or cable. Bus topology may have problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning. Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line. Star topology All hosts in Star topology are connected to a central device using a point-to-point connection. That is, there exists a point to point connection between hosts and central device . The central device can be any of the following: Layer-1 device such as hub or repeater Layer-2 device such as switch or bridge Layer-3 device such as router or gateway • As in STAR topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. • Every communication between hosts, takes place through only the hub. • Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple. Ring topology In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing structure, the administrator may need only one more extra cable. Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a point of failure. Mesh topology In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only. Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. • Mesh technology comes into two types: • Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n- 1)/2 connections are required. It provides the most reliable network structure among all network topologies. • Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all. Tree (Hierarchical) topology Tree topology also known as Hierarchical Topology, this is the most common form of network topology in use presently. This topology imitates as extended Star topology and inherits properties of bus topology. This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices. The lowermost is access-layer where computers are attached. The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork. Tree (Hierarchical) topology contd… All neighbouring hosts have point-to-point connection between them. Similar to the Bus topology, if the root goes down, then the entire network suffers even though it is not the single point of failure. Every connection serves as point of failure, failing of which divides the network into unreachable segment. Daisy Chain This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are connected then it represents Ring topology. Each link in daisy chain topology represents single point of failure. Every link failure splits the network into two segments. Every intermediate host works as relay for its immediate hosts. Cellular topology The cellular topology is applicable only in case of wireless media that does not require cable connection. In wireless media, each point transmits in a certain geographical area called a cell. Each cell represents a portion of the total network area. Devices that are in the cell communicate through a central hub. Hubs in different cells are interconnected. They route data across the network and provide a complete network infrastructure. The data is transmitted in the cellular digital packet data (CDPD) format. Hybrid Topology A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. Network Classifications One way to categorize the different types of computer network designs is by their geographical scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are: PAN – Personal Area Network LAN - Local Area Network WLAN - Wireless Local Area Network WAN - Wide Area Network MAN - Metropolitan Area Network Personal Area Network A personal area network is a network concerned with the exchange of information in the vicinity of a person. Typically, these systems are wireless and involve the transmission of data between devices such as smartphones, personal computers, tablet computers, etc. The purpose of such a network is usually to allow either transmission of data or information between such devices or to server as the network that allows further up link to the Internet. Local Area Network A LAN connects network devices over a relatively short distance. LAN is privately owned network that operates in very small geographical area (10 m to a few km) widely used: To connect personal computers and workstations in offices and factories To share hardware (like printers, scanners) and software (application software) To exchange information A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs are distinguished from one other by three characteristics: Size of LAN is restricted by number of users licensed to access the operating system or application software Transmission technology: LAN consists of single type of cable and all the computers/ communicating devices connected to it. Most local-area networks use a 48-bit physical address Topology used Wireless Local Area Network (WLAN) A WLAN, or wireless LAN, is a network that allows devices to connect and communicate wirelessly. Unlike a traditional wired LAN, in which devices communicate over Ethernet cables, devices on a WLAN communicate via Wi-Fi. While a WLAN may look different than a traditional LAN, it functions the same way. New devices are typically added and configured using DHCP. They can communicate with other devices on the network the same way they would on a wired network. The primary difference is how the data is transmitted. In a LAN, data is transmitted over physical cables in a series of Ethernet packets containing. In a WLAN, data is transmitted over the air using one of the IEEE 802.11 protocols. Many wireless routers also include Ethernet ports, providing connections for a limited number of wireless devices. Metropolitan Area Network A network spanning a physical area larger than a LAN but smaller than aWAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation. Wide Area Network A WAN is a network that spans more than one geographical location often connecting separated LANs. A WAN is a geographically-dispersed collection of LANs. As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. WANs are slower than LANs and often require additional and costly hardware such as routers, dedicated leased lines, and complicated implementation procedures. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. Protocol and its Components Protocol is a set of rules that governs data communication. It represents an agreement between the communicating devices. Without protocol two devices may be connected but cannot communicate. The key elements of protocol are: 1. Syntax: The term syntax refers to the structure or format of the data, meaning the order in which they are presented. 2. Semantics: The word semantics refers how a particular pattern to be interpreted and what action is to be taken based on that interpretation. 3. Timing: Timing refers to when the data should be sent and how fast it should be sent? The key functions that a protocol performs are: Protocol Data Unit: It refers to the breaking of data in manageable units called Protocol Data Unit e.g. Segment, Packet, Frame etc. Format of packet: Format of the packet like which group of bits in the packet constitute data, address, or control bits. Sequencing: It refers to the breaking long message into smaller units. Sequencing is responsibility protocol. Routing of packets: Finding the most efficient path between source and destination is responsibility of protocol. Flow control: It is responsibility of the protocol to prevent fast sender to overwhelm slow receiver. It ensures resource sharing and protection against traffic congestion by regulating the flow of data through the shared medium. Error control: Protocol is responsible to provide method for error detection and correction. Log related information: Some communication software has features to provide log of usage of network resources. Defining priority: Different types of packets needs to have different priority while moving on the shared network e.g. network management packets needs to be given higher priority if some congestion occurs. Creating and terminating a connection: Protocol defines the rules to create and terminate a connection between sender and receiver to communicate among each other. Security of data: Several communication software has features to prevent data from unauthorized access.