Chap 5
Chap 5
• Logical topology: refers to the paths that messages take to get from
one user on the network to another
2
Bus Topology
• In Bus Topology:
– All devices are connected to a central cable, called the bus or
backbone
– The bus is terminated at its ends
Advantages
•Ease of installation.
•Less cabling than mesh or star topologies
•Well suited for temporary networks (quick setup)
3
Disadvantages of BUS
✓Difficult to administer/troubleshoot.
✓If there is a problem with the cable, the entire network goes down.
✓Low security (all computers on the bus can see all data transmissions).
✓One virus in the network will affect all of them (but not as badly as a star or ring nw).
✓If one node fails, the whole network will shut down.
✓If many computers are attached, the amount of data flowing causes the network to
slow down.
Star Topology
❖Central device, called hub or concentrator
❖This single point is called as a central node, hub, or
switch.
❖The hub:
• manages and controls all functions of the
network.
• acts as a repeater for the data flow.
• RJ-45 Connectors.
Advantages:
•Less expensive than a mesh topology.
•Easy to administer/troubleshoot Disadvantages:
•Easy to install and reconfigure •A single point of failure, the hub
additions, moves, and deletions ,the whole nw will be down
•It is robust. •More cabling than in bus.
• failures a single point still there is nw
6
Ring topology
• All devices are connected to one
another in the shape of a closed loop
➢It prevents network collisions because of the media access method or architecture
required.
“Taking ring
Token passing: T
token overhead T
latency
single point of failure (token)
data
9
Disadvantages
➢Data packets must pass through every computer between the sender and recipient
therefore this makes it slower.
➢If any of the nodes fail then the ring is broken and data cannot be transmitted
successfully.
➢It is difficult to troubleshoot the ring.
➢Because all stations are wired together, to add a station you must shut down the
network temporarily.
➢In order for all computers to communicate with each other, all computers must be
turned on.
➢Total dependence upon the one cable
➢A break in the ring can disable the entire network.
Solution: a dual ring or a switch capable of closing off the break
Mesh Topology
• High redundancy and fault tolerance since every node links to other,
ensures no single point failures
• Full mesh: every node to every other node
• Redundant interconnection.
Advantages:
•Dedicated link security &
privacy
Disadvantages:
•Robust: Failure of link does not
•Difficult installation and
affect network
reconnection
•Easy fault identification and •Requires large wiring space
isolation •Expensive: I/O ports and cables
11
Ethernet
➢Computer networking has become an integral part of business today.
➢Just how all this information is transmitted, stored, categorized and accessed
remains a mystery to the average computer user
Types of LAN Technology
Ethernet
• Ethernet is the most popular network on physical layer LAN technology in use
today.
• It defines the number of conductors that are required for a connection, the
performance thresholds that can be expected, and provides the framework for data
transmission.
• Other LAN types include Token Ring, Fast Ethernet, Gigabit Ethernet, 10 Gigabit
Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode
(ATM)
Fast Ethernet
• The Fast Ethernet standard (IEEE 802.3u) has been established for Ethernet
networks that need higher transmission speeds.
• This standard raises the Ethernet speed limit from 10 Mbps to 100 Mbps with only
minimal changes to the existing cable structure.
• Fast Ethernet provides faster throughput for video, multimedia, graphics, Internet
surfing and stronger error detection and correction.
There are three types of Fast Ethernet:
❖100BASE-TX for use with level 5 UTP cable;
❖100BASE-T4 which utilizes an extra two wires for use with level 3
UTP cable.
Power over Ethernet (PoE)
➢This solution does not require an extra AC power cord at the product
location.
➢Bridges and switches on the other hand allow LANs to grow significantly larger
by virtue of their ability to support full Ethernet segments on each port.
➢Bridges and switches selectively filter network traffic to only those packets
needed on each segment, significantly increasing throughput on each segment and
on the overall network.
Token Ring
➢Token Ring is another form of network configuration.
➢It differs from Ethernet in that all messages are transferred in one direction along
the ring at all times.
➢When the token arrives at a particular computer (or device), the recipient is
allowed to transmit data onto the network.
Cont.…
➢Since only one device may be transmitting at any given time, no data collisions
occur.
➢However, these benefits come at a price. Component costs are usually higher, and
the networks themselves are considered to be more complex and difficult to
implement.
• thin coax for 10BASE2 networks (easier to work with and less expensive)
Cat-5 4 twisted pairs of copper wire — 100 MHz Up to 1000Mbps ATM, Token
terminated by RJ45 connectors Ring,1000Base-T,
100Base-TX, 10Base-T
Cat-5e 4 twisted pairs of copper wire — 100 MHz Up to 1000Mbps 10Base-T, 100Base-TX,
terminated by RJ45 connectors 1000Base-T
Cat-6 4 twisted pairs of copper wire — 250 MHz 1000Mbps 10Base-T, 100Base-TX,
terminated by RJ45 connectors 1000Base-T
Transceivers
✓Transceivers are also referred to as Medium Access Units (MAUs). They are used
to connect nodes to the various Ethernet media.
✓The AUI connector consists of a 15-pin D-shell type connector, female on the
computer side, male on the transceiver side.
✓For Fast Ethernet networks, a new interface called the MII (Media Independent
Interface) was developed to offer a flexible way to support 100 Mbps connections.
Females
Network Interface Cards
➢Network Interface Cards, commonly referred to as NICs, are used to connect a PC
to a network.
➢The NIC provides a physical connection between the networking cable and the
computer’s internal bus. Different computers have different bus architectures.
➢ PCI bus slots are most commonly found on 486/Pentium PCs and ISA expansion
slots are commonly found on 386 and older PCs.
➢The larger number of bits that can be transferred to the NIC, the faster NIC can
transfer data to the network cable.
Conti…
▪ Many NIC adapters comply with plug-and-play specifications.
▪ On these systems, NICs are systems or adapters automatically configured without user
intervention, while on non-plug-and-play systems, configuration is done manually
through a set-up program and/or DIP switches.
▪ Cards are available to support almost all networking standards. Fast Ethernet NICs are
often 10/100 capable, and will automatically set to the appropriate speed.
▪ Gigabit Ethernet NICs are 10/100/1000 capable with auto negotiation depending on the
user’s Ethernet speed.
▪ Full duplex networking is another option where a dedicated connection to a switch allows
a NIC to operate at twice the speed.