CN 1st Unit
CN 1st Unit
3. Based on Authentication
Peer to Peer Connection
In peer-to-peer networks, there are no dedicated servers. All the computers are equal and, therefore,
are termed as peers. Normally, each computer functions as both a client and a server. No one can
control the other computers.
Server Based Connection
Most networks have a dedicated server. A dedicated server is a computer on a network which
functions as a server, and cannot be used as a client or a workstation. A dedicated server is
optimized to service requests from network clients. A server can control the clients for its
services.
MESH:
A mesh topology is the one where every node is connected to every other node in the network. A
mesh topology can be a full mesh topology or a partially connected mesh topology. In a full
mesh topology, every computer in the network has a connection to each of the other computers in
that network. The number of connections in this network can be calculated using the following
formula (n is the number of computers in the network): n(n-1)/2 In a partially connected mesh
topology, at least two of the computers in the network have connections to multiple other
computers in that network. It is an inexpensive way to implement redundancy in a network. If
one of the primary computers or connections in the network fails, the rest of the network
continues to operate normally.
Advantages of a mesh topology
1. Can handle high amounts of traffic, because multiple devices can transmit
data simultaneously.
2. A failure of one device does not cause a break in the network or transmission
of data.
3. Adding additional devices does not disrupt data transmission between other
devices.
3. The chance of redundant connections is high, which adds to the high costs
and potential for reduced efficiency.
STAR:
A star network, star topology is one of the most common network setups. In this configuration,
every node connects to a central network device, like a hub, switch, or computer. The central
network device acts as a server and the peripheral devices act as clients. Depending on the type
of network card used in each computer of the star topology, a coaxial cable or a RJ-45 network
cable is used to connect computers together.
3. If one computer on the network fails, the rest of the network continues to
function normally.
4. The star topology is used in local-area networks (LANs), High-speed LANs
often use a star topology with a central hub.
1. Can have a higher cost to implement, especially when using a switch or router as
the central network device.
2. The central network device determines the performance and number of nodes the
network can handle.
3. If the central computer, hub, or switch fails, the entire network goes down and all
computers are disconnected from the network.
BUS:
a line topology , a bus topology is a network setup in which each computer and network
device are connected to a single cable or backbone.
1. It can be difficult to identify the problems if the whole network goes down.
1. All data flows in one direction, reducing the chance of packet collisions.
1. All data being transferred over the network must pass through each workstation on
the network, which can make it slower than a star topology .
Reference model :
ISO-OSI:
There are n numbers of users who use computer network and are located over the world.
So to ensure, national and worldwide data communication, systems must be developed
which are compatible to communicate with each other ISO has developed a standard. ISO
stands for international organization of Standardization. This is called a model for Open
System Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer
An exchange using the OSI model:
Principles of OSI Reference Model
The principles that were applied to arrive at the seven layers can be briefly summarized
as follows:
A layer should be created where a different abstraction is needed.
Each layer should perform a well-defined function.
The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
The layer boundaries should be chosen to minimize the information flow across
the interfaces.
The number of layers should be large enough that distinct functions need not be
thrown together in the same layer out of necessity and small enough that
architecture does not become unwieldly.
Functions of Different Layers
3. It is responsible for transmission and reception of the unstructured raw data over
network.
4. Voltages and data rates needed for transmission is defined in the physical layer.