Wednesday, June 5, 2019
An Introduction To Network Topology
An Introduction To Network topographic anatomyIn the context of a communication cyberspace, the experimental condition topology refers to that way in which the close points, or stations, attached to the network atomic result 18 intercommitted or it is the arrangements of systems in a computing machine network. It piece of tail be either physical or legitimate. The physical topology refers that, a way in which a network is laid out physic all(a)y and it will accept the devices, showation and location. Logical topology refers that how a selective information transfers in a network as opposed to its design.The network topology can be categorized into bus, ring, hotshot, tree and ope point.Hybrid networks (They argon the complex networks, which can be built of two or more topologies).Bus TopologyA Bus topology is characterized by the use of a multi point medium. A long and single melodic line acts as a backb ace to connect all the devices in a network. In a bus topology, all computers or stations attach through the appropriate hardw be interfacing known as a tap, directly to a bus network. Full duplex operation amidst the station and tap admits data to transmit onto the bus and received from the bus. A infection from any station propagates the length of the medium in some(prenominal) directions and can be received by all other stations. At to each one end of the bus is a terminator, which absorbs any signalize, removing it from the bus. Nodes are machine- narkible to the bus cable by drop lines and taps. A drop line is a fellowship ravel between the device and the main cable. A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to hit a contact with the metallic core. A bus network work best with a limited sum of computers.AdvantagesBus topology can install very easily on a network.Cabling will be less compare to other topologies because of the main backbone cable laid efficiently in the network path.Bus topology suited for a small network.If one computer fails in the network, the other computers are non affected they will underwrite to work.It is also less expensive than star topology.DisadvantagesThe cable length will limited and there by limits the number of stations.If the backbone cable fails, the entire network will goes down.It is very difficult to trouble shoot.Maintenance cost is very high in a long run.Terminators are required for both the ends of the cable. hollo topologyThe ring topology the network consists of sacred point to point club and a set of repeaters in a closed loop. A signal is passed along the ring in one direction, from device to device, until it reaches its destination. It may be clock wise or anti clock wise. When a device receives a signal intend for other device, its repeater generates the eccentrics and passes them along. As with the bus and tree, data are transmitted in frames. As a frame circulates past all the other stations, the des tination station recognize its breed and copies the frame into a local anaesthetic buffer as it goes by. The frame continues to circulate until it returns to the source station, where it is removed. These topologies are use in school campuses and some office buildings.tifsTemp 13.a.tifFigure (2) Bus topologyAdvantagesIt performs better than star topology under heavy work loadFor managing the connection between the computers, there is no need for the network server.It is cheaper than star topology because of less wiring.By adding the token ring in the network, can create rangy network.Very order network because all the devices has a access to the token ring and opportunity to transmit.DisadvantagesA break in the ring (such as a disabled station) can disable the entire network.It is much slower than an Ethernet network with under normal load.Any moves, changes and adds of the devices can affect the network.Network connection devices alike(p) (Network adapter cards and MAU) are mu ch more expense than Ethernet cards.Star TopologyIn a star topology, each station is directly machine-accessible to a common node called hub. Unlike a mesh technology, the devices are not directly interrelateed to one another(prenominal). A star topology does not allow direct traffic between devices. The manageler act as an exchange, like if one device wants to send to another, it sends the data to the controller, which therefore relays the data to the affiliated device. In a star, each device needs only one colligate and one I/O port to connect it to any number of others. The star topology is used in local area networks (LAN) and sometimes high speed LAN often uses a star topology with key hub.AdvantagesIf one link fails in the star topology, only that link is affected. All other links remain active.It is easy to identify the fault and fault isolation. tardily to expand the network in the star topology.No disruptions to the network when connecting or removing devices.It is v ery easy to manage because of its simplicity in the function.DisadvantagesIn a star topology, if the hub goes down, the entire network will fails.It requires more cable length compared to the linear bus topology.It is much more expensive than bus topology, because of the cost of the hubs.Tree TopologyA tree topology is the generalization of the bus topology. It integrates the multiple star topologies together on to a bus. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point known as the head end. The branches in turn may get under ones skin additional branches to allow quite complex layouts. A transmission from any station propagates throughout the medium and can be received by all other stations. This topology will allow for the expansion of an existing network.AdvantagesTree topology is well supported by the hardware and software vendors.Point to point wiring for each and every segments of the network.It is the best topology for the branched networks.DisadvantagesIt is more expensive because more hubs are required to install the network.Tree topology is entirely depends upon the backbone line, if it fails then the entire network would fail.It is very difficult to configure and wire than other network topologies.In a tree topology, the length of network depends on the typeface of cable being used.Mesh TopologyIn a mesh topology, every device has a dedicated point-to-point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must(prenominal) be connected to other node. Node 1 must be connected to n-1nodes, node 2 must be connected to n-1nodes, and finally node n must be connected n-1 nodes. However, if each physical link allows communication in both directions, we can divide the number of links by 2.In other words we can sa y that in a mesh topology, we need n (n-1)/2.tifsTmp9.tifFigure (5 Mesh topologySuppose if we are connecting 15 nodes in a mesh topology, then the number of cables requiredDA = n (n-1)/2 DA = Number of cables= 15 (15 1)/2 n = Node= 15*14/2= 15*7= 105Therefore, the original number of cables required for connecting 15 nodes = 105.AdvantagesThere is no traffic problem because of the dedicated link in the mesh network.Mesh topology is robust. If one link becomes unusable. It does not incapacitate the entire system.Point-to-point links make full identification and fault isolation easy.Security or privacy for data travels along the dedicated line.Network can be expanded without any disruptions to the users.DisadvantagesInstallation and reconnection are difficult.Large amount of cabling and the number of I/O ports requiredSheer muckle of the wiring can be greater than the available space can accommodate.The hardware required to connect each link can be prohibitively expensive.Hybrid To pologyA network can be hybrid, which uses two or more network topologies together in a network. For example, we can have a main star topology with each branch connecting several stations in a bus topology.The OSI ModelThe Open System lay connection (OSI) reference put was developed by the International Organization for Standardization (ISO)2 as a model for a computer protocol architecture and as a frame work for developing protocol standards. The purpose of the OSI model is show how to facilitate communication between different systems without requiring changes to the logic of the fundamental hardware and software. The OSI model is not a protocol it is a model for understanding a network architecture that is flexible, robust and interoperable. The OSI model is a forge frame work for the design of network systems that allows communication between all types of computer systems. It consists of seven separate but related shapes, each of which defines a stir up of the process movi ng information across a network.The seven storys of the OSI reference model can be divided into two categories pep pill molds and lower layers. hurrying Layers of the OSI Models areApplication layerPresentation layerSession layerThe upper layers of the OSI model designate the application issues, presentation session stages and generally are implemented only in software. The highest layer, (the application layer) is close to the end user. These upper layers are act as an interface between the user and the computer. The term upper layer is sometimes used to refer to any layer above another layer in the OSI model.Examples of upper layer technologies in the OSI model are SNMP, FTP, and WWW etc.Lower Layers of the OSI Model transfer layerNetwork layerData link layerPhysical layerThe lower layers of the OSI model provide network circumstantial functions like data transport issues (flow control, addressing and routing). The lower layers of the OSI model (the physical layer and the data link layer) are implemented in hardware and software also. Examples of lower layer technologies in the OSI model are TCP, UDP, IP, IPX etc.Application layerThe application layer enables the user, whether human or software, to access the network. It provides user interfaces and support for go such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services. The application layer provides specific services like network virtual death, file transfer, access and management, mail services and directory services.Network virtual terminal A network virtual terminal is a software version of physical terminal, and it allows a user to log on to a remote host.File transfer, access and management This application allows a user to access files in a remote host (to make changes, read data), to retrieve files from a remote computer for use in the local computer and to manage or control files in a remote computer locally.Mail services The application provides the basis for e-mail forwarding and storage.Directory services This application provides distributed database source and access for global information about various objects and services.Presentation layerThe presentation layer is concerned with the syntax and semantics of the information interchange between two systems. The presentation layer is responsible for the translation, compression and encryption. Messages are sending between the layers.Translation The process in two systems are normally exchanging in the form of character strings, numbers, and so on. The information is changed into bit streams before being transmitted. The presentation layer at the sender changes the information from its sender mutually beneficial format into a common format. On the receiving machine, the presentation layer changes the common format into its receiver-dependent format.Encryption Encryption means that the sender transforms the original information to anoth er form and sends the resulting message out over the network. Decryption reverses the original process to transform message back to its original form.Compression Data compression reduces the number of bits contained in the information. It becomes particularly important in the transmission of multimedia such as text, audio and video.Session layerThe session layer is the network dialog controller. It establishes, maintains and synchronizes the interaction among communicating systems. These layers have specific responsibilities include the followingDialog control The session layer allows two systems to enter into a dialog. It allows the communication between twp processes to take place in either half duplex (one way at a time) or full duplex (two ways at a time) mode.Synchronization The session layer allows a process to add check points, or synchronization points, to a stream of data.Examples for session layers are MPEG, JPEG, MIDI, NCP etc.Transport layerThe transport layer is respon sible for process to process delivery of the entire message. The transport layer is responsible for the delivery of a message from one process to another. A process is an application program running on a host. The transport layer ensures that the whole message arrives intact and in order, overseeing both misconduct control and flow control at the source-to-destination level. It also has some specific responsibilities mentioned belowService-point addressing The transport layer includes a type of address called a service-point address (or port address). The network layer gets each packet boat to the correct computer, the transport layer gets the entire message to the correct process on that computer. part and reassembly A message is divided into transmittable segments, with each segment containing a sequence number. These numbers enable the transport layers to reassemble the message properly upon arriving at the destination and to identify and replace packets that were lost in tran smission.Connection control The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. If a connection oriented transport layer make a connection with the transport layer at the destination machine first before delivering the packets. After all the data are transferred the connection is terminated.Flow control The transport layer is responsible for the flow control. However, flow control at this layer is performed end to end sooner than across a single link.Error control Transport layer is also responsible for the error control. Error control at this layer is performed process-to-process quite an than across a single link. The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error.These layers using the TCP/IP and UDP protocols.Network layerThe network layer is respon sible for the source to destination delivery of a packet, possibly across multiple networks (links). This layer ensures that each packet gets from its point of origin to its final destination. Network layers also have other responsibilities include the followingLogical addressing If a packet passes the network boundary, it needs another addressing system to help distinguish the source and destination systems. The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver.Routing When independent networks are connected to create internetworks or a large network, the connecting devices route or switch the packets to their final destination.Data link layerThe data link transforms the physical layer, a raw transmission facility, to a reliable link. It makes the physical layer appear error-free to the upper layer. It also has other responsibilities include the followingFraming The data link lay er divides the stream of bits received from the network layer into manageable data units called frames.Physical addressing The data link layer adds a header to the frame to define the sender and/or receive of the frame. If the frame is intend for a system outside the senders network, the receiver address is the address of the device that connects the network to the next one.Flow control If the rate at which the data are absorbed by receiver is less than the rate at which data are produced in the sender, the data link layer impose a flow control tool to avoid overwhelming the receiver.Error control The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame.Access control When two or more devices are connected to the same link, data link layer protocols are necessary to determin e which device has control over the link at any disposed(p) time.Data link contains two sub layers LLC (Logical Link Control) and MAC (Medium Access Control).LLC is the upper sub layer, which maintains and establishes the communication links to the device. And it also responsible for the frame error control and addressing.MAC is the lower sub layer of the data link layer. It controls how the devices sharing the media channel.Physical layerThe physical layer coordinates the functions required to carry a bit stream over a physical medium. It deals with the mechanical and electrical specifications of the interface and transmission medium. It also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur.The physical layer is also concerned with the followingPhysical characteristics of interface and medium Physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium. commission of bits This layer data consists of a stream of bits with no interpretation. To be transmitted, bits must be encoded into signals electrical or optical. The physical layer defines the type of encoding.Data rate The transmission rate the number of bits sent each second- is also defined by physical layer. In other words physical layer defines the season of a bit, which how long it lasts.Synchronization of bits The sender and receiver not only must use the same bit rate but also must be synchronized at the bit level.Line configuration The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected through a dedicated link. In a multipoint configuration a link is shared among several devices.Physical topology The physical topology defines how devices are connected to make a network. Devices can be connected by using a mesh topology, a star topology, a ring topology, a bus topology, or a hybrid topology.Transmission mode The physical layer also defines the direction of transmission between two devices simplex, half duplex, or full duplex.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.