Network Topologies
Network Topologies
Computing
• The terms centralized and distributed computing are used
to describe where the network processing takes place.
• In a centralized computing model, one system provides both
the data storage and the processing power for client systems.
• This networking model is most often associated with computer
mainframes and dumb terminals, where no processing or storage
capability exists at the workstation.
• These network environments are rare, but they do still exist.
• A distributed network model has the processing power
distributed between the client systems and the server.
• Most modern networks use the distributed network model, where
client workstations share in the processing responsibilities.
Network Topologies
• A topology refers to both the physical and logical
layout of a network.
• The physical topology of a network refers to the actual
layout of the computer cables and other network
devices.
• The logical topology of a network, on the other hand,
refers to the way in which the network appears to the
devices that use it.
• Several topologies are in use for networks today.
• Some of the more common include the bus, ring,
star, mesh, and wireless topologies.
Bus Topology
• A bus network uses a trunk or backbone to which all of the
computers on the network connect.
• Systems connect to this backbone using T connectors or taps.
• To avoid signal reflection, a physical bus topology requires that
each end of the physical bus be terminated.
• Figure below shows an example of a physical bus topology.
Advantages and Disadvantages
of the Bus Topology
• Compared to other topologies, a bus is cheap and easy
to implement.
• There might be network disruption when computers
are added or removed.
• Requires less cable than other topologies.
• Because all systems on the network connect to a
single backbone, a break in the cable will prevent all
systems from accessing the network.
• Does not use any specialized network equipment.
• Difficult to troubleshoot.
Ring Topology
• The ring topology is actually a logical ring, meaning that the data
travels in circular fashion from one computer to another on the network.
• It is not a physical ring topology.
• Figure below shows the logical layout of a ring network.
• In a true ring topology, if a single computer or section of cable fails, there is an
interruption in the signal.
• The entire network becomes inaccessible. Network disruption can also occur
when computers are added or removed from the network, making it an
impractical network design in environments where there is constant change to
the network.
Advantages and Disadvantages of
the Ring Topology
• Cable faults are easily located, making
troubleshooting easier.
• Expansion to the network can cause network
disruption.
• Ring networks are moderately easy to install.
• A single break in the cable can disrupt the entire
network.
Star Topology
• In the star topology, all computers and other network devices connect to a central
device called a hub or switch.
• Each connected device requires a single cable to be connected to
the hub, creating a point-to-point connection between the device and
the hub.
• The star topology is the most widely implemented network design in use
today, but it is not without its shortcomings.
• Because all devices connect to a centralized hub, this creates a single point of
failure for the network.
Advantages and Disadvantages of
the Star Topology
• Star networks are easily expanded without
disruption to the network.
• Requires more cable than most of the other
topologies.
• Cable failure affects only a single user.
• A central connecting device allows for a single point
of failure.
• Easy to troubleshoot and isolate problems.
• More difficult than other topologies to implement.
Mesh Topology
• The mesh topology incorporates a unique
network design in
which each computer on the network connects to every
other, creating a point-to-point connection between
every device on the network.
• The purpose of the mesh design is to provide a high level of redundancy.
• Mesh topology is rarely used.
Advantages and Disadvantages of
the Mesh Topology
• Provides redundant paths between devices
• Requires more cable than the other LAN topologies.
• The network can be expanded without disruption to
current users.
• Complicated implementation.
Infrastructure Wireless Topology
• The infrastructure wireless topology is commonly used to
extend a wired LAN to include wireless devices
through a base station known as an access point
(AP) or wireless access point (WAP).
• The AP forms a bridge between a wireless and wired LAN,
and all transmissions between wireless stations, or between a
system and a wired network client, go through the AP.
• APs are not mobile and have to stay connected to the
wired network; therefore, they become part of the wired
network infrastructure thus the name.
• There might be several access points providing wireless
coverage for a large area
Ad Hoc Wireless Networking
• In a wireless ad hoc topology, devices communicate
directly between themselves without using an access
point.
• This peer-to-peer network design is commonly used to
connect a small number of computers or wireless devices.
• As an example, an ad hoc wireless network may be set
up temporarily between laptops in a boardroom or to
connect to systems in a home instead of a wired
solution.
• The ad-hoc wireless design provides a quick method to
share files and resources between a small number of
systems.
Comparing wireless
topologies.
IEEE and Networking
Standards
• IEEE developed a series of networking
standards to ensure networking
technologies developed by respective
manufacturers are compatible.
• This means that the cabling,
networking devices, and protocols are
all interchangeable when designed
under the banner of a specific IEEE
standard.
802.2, 802.3, 802.5, and 802.11.
• Each of these IEEE specifications outlines
specific characteristics for LAN networking,
including the speed, topology, cabling, and
access method.
• The following slides outline the key features of these
IEEE specifications and the specific characteristics of
each.
802.2 IEEE Standard
• The 802.2 standard, referred to as the Logical Link
Control (LLC), manages data flow control and error
control for the other IEEE LAN standards.
• Data flow control regulates how much data can be
transmitted in a certain amount of time.
• Error control refers to the recognition and notification
of damaged signals.
802.3 IEEE Standard
The IEEE 802.3 standard defines the characteristics for
Ethernet networks.
Ethernet networking is by far the most widely implemented
form of local area networking.
Several Ethernet LAN characteristics are identified in the
802.3 standard.
Since the development of the original 802.3 standards, there
have also been several additions that have been assigned new
designators.
These standards are often referred to as the 802.3x standards.
Some of the newer standards include 802.3u for Fast
Ethernet, 802.3z for Gigabit Ethernet, and 802.3ae for 10-
Gigabit Ethernet
Features for 802.3
• Speed: The original IEEE 802.3 standard specified
a network transfer rate of 10Mbps.
• There have been modifications to the standard, the
result being Fast Ethernet (802.3u), which can transmit
network data up to 100Mbps and higher, as well as
Gigabit Ethernet (802.3z), which can transmit at speeds
up to 1000Mbps.
• 802.3ae is a very fast 803.3 standard. Known as 10-
Gigabit Ethernet, it offers speeds 10 times that of Gigabit
Ethernet.
Features for 802.3
• Topology: The original Ethernet networks used a
bus or star topology because the original 802.3 standard
included specifications for both twisted pair and coaxial
cabling.
• The IEEE 802.3u and 802.3z specify twisted pair cabling
and use a star topology.
• Remember that even when Ethernet uses a physical star
topology, it uses a logical bus topology.
Features for 802.3
• Media: The media refers to the physical cabling
used to transmit the signal around the network.
• The original 802.3 specifications identified coaxial and
twisted pair cabling to be used.
• The more modern standards specify twisted pair and
fiber-optic cable.
• 802.3ae currently only supports fiber media.
Features for 802.3
• Access method: The access method refers to the
way that the network media is accessed.
• Ethernet networks use a system called Carrier Sense Multiple
Access with Collision Detection (CSMA/CD).
• CSMA/CD works by monitoring the computers that are sending
data on the network.
• If two computers transmit data at the same time, a data collision
will occur.
• To prevent collisions, the systems sending the data will be
required to wait a period of time and then retransmit the data to
avoid the collision.
• 10-Gigbit Ethernet only operates in full-duplex mode and, as
such, does not need to use the traditional Ethernet CSMA/CD
access method.
802.5 IEEE Standard
• The IEEE 802.5 standard specifies the characteristics for
Token Ring networks.
• Token Ring was introduced by IBM in the mid-1980s and
quickly became the network topology of choice until the
rise in popularity of Ethernet.
• It is unlikely that you will encounter a ring network in
your travels and even more unlikely that you will be
implementing a ring network as a new installation.
• For what it's worth, Token Ring is a solid network
system, but Ethernet has all but eliminated it.
802.11 IEEE Standards
• The 802.11 standards specify the characteristics of
wireless LAN Ethernet networks.
• Under the banner of 802.11, there are four common
wireless standards.
• These include 802.11, 802.11a, 802.11b and 802.11g.
• Each of these wireless standards identifies several
characteristics.
• Here is a review of the 802.11 wireless standards and
characteristics:
802.11 IEEE Standards
• Speed 802.11 standards are measured in Mbps and vary
between network standards.
• Media The 802.11 standards use radio frequency (RF)
as a transmission media. Depending on the standard,
radio frequencies include 2.4GHz and 5GHz.
• Topology 802.11 wireless standards can be implemented
in an ad-hoc or infrastructure topology.
• Access method 802.11 uses Carrier Sense Multiple
Access/Collision Avoidance (CSMA/CA). CSMA/CA is a
variation on the CSMA/CD access method. CSMA/CA
access method uses a "listen before talking" strategy.
Any system wanting to transmit data must first verify that
the channel is clear before transmitting, thereby avoiding
potential collisions.
802.11 IEEE Standards
• Spread Spectrum Spread spectrum refers to the manner
in which data signals travel through a radio frequency
• Spread spectrum requires that data signals either
alternate between carrier frequencies or constantly
change their data pattern.
• Spread spectrum is designed to trade off bandwidth
efficiency for reliability, integrity, and security.
• Range 802.11 wireless standards each specify a
transmission range. The range is influenced by many
factors such as obstacles or weather.
The following is a look at the various 802.11
standards and their characteristics.
• IEEE 802.11
• There were actually two variations on the initial 802.11
standard. Both offered 1 or 2Mbps transmission speeds
and the same Radio Frequency (RF) of 2.4GHz.
• The difference between the two was in the way in which
data traveled through the RF media.
• One used frequency hopping spread spectrum (FHSS),
and the other, direct sequence spread spectrum (DSSS).
• IEEE 802.11a In terms of speed, the 802.11a standard
was far ahead of the original standards. 802.11a
specified speeds of up to 54Mbps in the 5GHz band; but
most commonly, communications takes place at 6Mbps,
12Mbps, or 24Mbps. 802.11a is not compatible with
other wireless standards 802.11b and 802.11g.
• These standards are heavily favored to the 802.11a
The following is a look at the various 802.11
standards and their characteristics.
• IEEE 802.11b
• The 802.11b standard provides for a maximum
transmission speed of 11Mbps. However, devices are
designed to be backward compatible with previous
standards that provided for speeds of 1-, 2-, and
5.5Mbps. 802.11b uses a 2.4GHz RF range and is
compatible with 802.11g.
• IEEE 802.11g
• 802.11g is a popular wireless standard today. 802.11g
offers wireless transmission over distances of 150 feet
and speeds up to 54Mbps compared with the 11
megabits per second of the 802.11b standard. Like
802.11b, 802.11g operates in the 2.4GHz range, and is
thus compatible with it.
Infrared Wireless Networking
• Infrared has been around for a long time; perhaps our
first experience with it was the TV remote.
• The command entered onto the remote control travels
over an infrared light wave to the receiver on the TV.
• Infrared technology has progressed, and today infrared
development in networking is managed by the Infrared
Data Association (IrDA).
• IrDA wireless networking uses infrared beams to send
data transmissions between devices.
• Infrared wireless networking offers higher transmission
rates reaching 10Mbps to 16Mbps.
Infrared Wireless Networking
• Infrared provides a secure, low-cost, convenient cable
replacement technology.
• It is well suited for many specific applications and
environments.
• Some of the key infrared points are included here:
• Infrared provides adequate speeds, up to 16Mbps.
• A directed infrared system provides a very limited range
of approximately 3 feet and typically is used for a PAN.
• Infrared devices use less power and a decreased drain
on batteries.
• Infrared is a secure medium. Infrared signals typically
travel short range between devices, which eliminates the
problem of eavesdropping or signal tampering.
Infrared Wireless Networking
• Infrared has no radio frequency interference issues or
signal conflicts.
• Infrared replaces cables for many devices such as
keyboards, mice, and other peripherals.
• Infrared uses a dispersed mode or a direct line of sight
transmission.
Bluetooth
• Bluetooth is a wireless standard used for many purposes
including connecting peripheral devices to a system.
• Bluetooth uses a low-cost, short-range radio link to
create a link to replace many of the cords that used to
connect devices.
• Bluetooth-enabled devices support transmissions
distances of up to 10 or so meters using an ad-hoc
network design.
• Bluetooth establishes the link using an RF-based media
and does not require a direct line of sight to make a
connection.
• The Bluetooth Standard defines a short RF link capable
of voice or data transmission up to a maximum capacity
of 720Kb/s per channel.
Bluetooth
• Bluetooth operates at 2.4 to 2.48GHz and uses a spread
spectrum, frequency-hopping technology.
• The signal hops can hop between 79 frequencies at
1MHz intervals to give a high degree of interference
immunity.
• As an established technology, Bluetooth has many
advantages, but the speed of 720Kbps is limiting.
• The newest version of Bluetooth, Bluetooth 2.0, will
increase overall speed to a data rate of 3Mbps.
• This speed might still be significantly slower than
802.11b or g, but for an easily configured, cable
replacement technology, it is an attractive option.
Spread Spectrum Technology
• Spread spectrum refers to the manner in which data
signals travel through a radio frequency.
• Spread spectrum requires that data signals either
alternate between carrier frequencies or constantly
change their data pattern.
• Although the shortest distance between two points is a
straight line (narrowband), spread spectrum is designed
to trade-off bandwidth efficiency for reliability, integrity,
and security.
• There are two types of spread spectrum radio: frequency
hopping and direct sequence.
FHSS
• FHSS requires the use of narrowband signals that
change frequencies in a predictable pattern.
• The term frequency hopping refers to hopping of data
signals between narrow channels.
• Somewhere between 20 and several hundred
milliseconds, the signal hops to a new channel following
a predetermined cyclic pattern.
• Because data signals using FHSS switch between RF
bands, they have a strong resistance to interference and
environmental factors.
• The constant hopping between channels also increases
security as signals are harder to eavesdrop on.
DSSS
• DSSS transmissions spread the signal over a full
transmission frequency spectrum.
• For every bit of data that is sent, a redundant bit pattern
is also sent.
• This 32-bit pattern is called a chip.
• These redundant bits of data provide for both security
and delivery assurance.
• Transmissions are so safe and reliable simply because
the system sends so many redundant copies of the data
and only a single copy is required to have complete
transmission of the data or information.
• DSSS can minimize the effects of interference and
background noise.
Broadband Versus Baseband
• Networks employ two types of signaling methods: baseband
and broadband.
• Baseband transmissions use digital signaling over a single wire.
• Communication on baseband transmissions is bidirectional,
allowing signals to be sent and received but not at the same
time.
• To send multiple signals on a single cable, baseband uses
something called Time Division Multiplexing (TDM). TDM
divides a single channel into time slots.
• In terms of LAN network standards, broadband transmissions,
on the other hand, use analog transmissions.
• For broadband transmissions to be sent and received, the
media has to be split into two channels.
• Multiple channels are created using Frequency Division-
Multiplexing (FDM).
Simplex, Half Duplex, and Full
Duplex
• Simplex, half duplex, and full duplex are referred to as
dialog modes, and they determine the direction in which
data can flow through the network media.
• Simplex allows for one-way communication of data
through the network, with the full bandwidth of the cable
being used for the transmitting signal.
• One-way communication is of little use on LANs, making
it unusual at best for network implementations.
• An example of simplex transmission is the signal sent
from the cable TV station to the home television.
Half Duplex communication
• Far more common is the half-duplex mode, which
accommodates transmitting and receiving on the
network but not at the same time.
• Many networks are configured for half-duplex
communication.
• communications mobile radios, work with half-duplex
transmissions
Full duplex communication
• The preferred dialog mode for network communication is the
full-duplex mode.
• To use full duplex, both the network card and the hub or switch
must support full duplexing.
• Devices configured for full duplexing are capable of transmitting
and receiving simultaneously.
• This means that 100Mbps network cards are capable of
transmitting at 200Mbps using full-duplex mode.
• A regular telephone conversation is an example of full-duplex
communication.
• Both parties can talk at the same time, and the person talking
on the other end can still be heard by the other party while they
are talking.
Media Interference
• Depending on where network cabling (commonly
referred to as media) is installed, interference can be a
major consideration.
• Two types of media interference can adversely affect
data transmissions over network media: electromagnetic
interference (EMI) and crosstalk.
• EMI is a problem when cables are installed near
electrical devices, such as air conditioners or fluorescent
light fixtures.
• If a network media is placed close enough to such a
device, the signal within the cable might become corrupt.
Media Interference
• Network media vary in their resistance to the effects of EMI.
• Standard UTP cable is susceptible to EMI, whereas fiber
cable with its light transmissions is resistant to EMI.
• When deciding on a particular media, consider where it will
run and the impact EMI can have on the installation.
• A second type of interference is crosstalk.
• Crosstalk refers to how the data signals on two separate
media interfere with each other.
• The result is that the signal on both cables can become
corrupt.
• As with EMI, media varies in its resistance to crosstalk, with
fiber-optic cable being the most resistant.
Attenuation
• Attenuation refers to the weakening of data signals as they
travel through a respective media.
• Network media varies in its resistance to attenuation.
• Coaxial cable is generally more resistant than UTP, STP is
slightly more resistant than UTP, and fiber-optic cable does not
suffer from attenuation at all.
• That's not to say that a signal does not weaken as it travels
over fiber-optic cable, but the correct term for this weakening is
'chromatic dispersion,' rather than attenuation.
• It's important to understand attenuation or chromatic dispersion
and the maximum distances specified for network media.
Exceeding a media's distance without using repeaters can
cause hard-to-troubleshoot network problems
MAXIMUM DATA RATE OF A CHANNEL
• Data rate depends on three factors: 1. bandwidth
available 2. Level of the signals we use 3. Quality of
the channel (the level of noise) The quality of the
channel indicates two types:
• a) A Noiseless or Perfect Channel
• An ideal channel with no noise.
• The Nyquist Bit rate derived by Henry Nyquist gives
the bit rate for a Noiseless Channel.
• b) A Noisy Channel
• A realistic channel that has some noise.
• The Shannon Capacity formulated by Claude
Shannon gives the bit rate for a Noisy Channel
Nyquist Bit Rate
The Nyquist bit rate formula defines the
theoretical maximum bit rate for a noiseless
channel
Where,
Bitrate is the bitrate of the channel in bits per
second
Bandwidth is the bandwidth of the channel
L is the number of signal levels.
Example
• What is the maximum bit rate of
a noiseless channel with a
bandwidth of 5000 Hz
transmitting a signal with two
signal levels.
Shannon Capacity
• The Shannon Capacity defines the theoretical
maximum bit rate for a noisy channel
Where,
Capacity is the capacity of the channel in bits
per second
Bandwidth is the bandwidth of the channel
SNR is the Signal to Noise Ratio
Example
• Calculate the bit rate for a noisy
channel with SNR 300 and
bandwidth of 3000Hz
INTRODUCTION TO SIGNAL
ENCODING
Data can be analog or digital, so can be the signal that represents it.
Signal encoding is the conversion from analog/digital data to analog /
digital signal.
The possible encodings