Chapter 2
Chapter 2
4 1 0
COMPUTER NETWORKS
INTRODUCTION:
AGENDA:
Chapter 2......Syllabus
N/W Topology
CHAPTER-2
COMPUTER NETWORKS
OUTLINE
• N/w Topology
• Wired N/W Vs Wireless N/w
• Classification of computer N/W's- LAN, MAN,
WAN.
• Internet
• Intranet
• Extranet
* A network may be represented as a graph with nodes representing
Computers or network devices like switches, routers etc. And the links
Modes of coomunication
1. Broadcast
2. point-to-point links
Single cable connects all computers
Each computer has connector to shared cable
Computers must synchronize and allow only one computer to transmit at a time.
Network maintained by single cable
Cable segment must end with a terminator
Uses thin coaxial cables
Extra stations can be added in daisy chain manner
BUS TOPOLOGY: conti...
Standard is IEEE 802.3
Thin Ethernet (10 base 2) has max segment length of 200m
Max no of connections is 30 nodes
Four repeaters may be used to a total cable length of 1000m
Max no of nodes is 150
BUS TOPOLOGY: conti...
Thich Ethernet (10 base 5) used for backbone
Limeted to 500m
Max of 100 nodes per segment
Total of four repeaters , 2500m , with a total of 488 nodes
Advantages Disadvantages
Inexpesnive to
No longer
install recommended
Easy to add stations
Back bone breaks
Use less cables than whole n/w down
other topologies
Limited no of devices
Work well for small can be attached
networks
Difficult to isolate
problems
Slows response rates
Connections in Point to point communication:
A star N/w which has been expanded to include an additional hub or hubs.
Hybrid TOPOLOGY :
RING TOPOLOGY :
Computers connected in a closed loop
First passed data to the second, second passes data to third, and so on
In practice there is short connector cable from the computer to the ring
Ring connections may run fast offices with connector cable to socket in the
office.
RING TOPOLOGY :
No beginnig or end
All devices have equal access
Single ring—data travels in one direction only
Double ring---a double ring allows fault tolerence
Each device has to wait its turn to transmite
Most common type is TOKEN RING (IEEE 802.5)
A token contains the data reaches the destination, data extracted, ack of receipt sent back
to transmitting device, removed , empty token passed on for another device to use.
ADV DIS ADV
Data packets travel
Require more cable
at great speed than bus
No collision
A break in ring will
Easier to fault find bring it down
No terminator
Not as common as
require the bus---less
devices available
TOKEN RING:
Many LAN technologies that uses ring topology use token passing for
synchronized access to the ring
Ring itself is treated as a single , shared communication mediun
Bits pass from transmitter, past other computers and are copied by
destination
Hardware must be designed to pass token even if attached computer is
powered down.
FDDI:
Hybrid Topology:
MESH TOPOLOGY:
MESH TOPOLOGY:
Why multiple topologies:
Further Readings
• William Stallings (Data & Computer
Communications) – Chapter 1
• Behrouz A Forouzan (Data Communication
concepts) – Chapter 1
NEXT CLASS TOPICS:
NETWORK TOPOLOGY