Uploaded by 210099

Computer Networks Study Material

advertisement
ZAMBIA CATHOLIC UNIVERSITY
Faculty of Business, Management and Finance
BIT: 123 Data Communication and Security
Study Material (Unit 1 and Unit 2)
INTRODUCTION TO COMPUTER NETWORKS
1. COMPUTER NETWORK
Computer network is network consists of two or more computers that are linked in order to
share resources (such as printers and CDs), exchange files, or allow electronic communications.
The computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
A Compute network should ensure:
reliability of the data communication process, should c
security of the data.
performance by achieving higher throughput and smaller delay times.
2. FACTORS DRIVING THE ADOPTION OF NETWORKS
Wired or Wireless
When it comes to making a decision between a wired or wireless network, there are a couple
of factors that you should consider such as the number of computers you have in your business
and your personal preferences.
Wireless networking is a smart and affordable business IT solution especially since wireless
technology is getting cheaper and easier to configure. It also provides a safer and sleeker
environment for your office as you won’t have wires dangling all around. Plus, if you have
laptop users in your office, they can use it anywhere they want without having to worry about
connection problems.
Ethernet (wired connection) on the other hand could possibly offer you faster connection
speeds at a lower cost.
So, when you are considering wired or wireless network, it really depends on the size of your
business, number of workstation available and office layout. If you are not too sure which one
you need, our business IT service experts will be able to help you figure out which one is the
most suitable one for your organization.
Peer-to-Peer or Client-Server
Both network types connect the computers in your office and optimize your workflow by
allowing everyone to share files, data and resources.
A peer-to-peer (P2P) networking service means that the computers function as the client and
server. Each computer is directly connected to each other and you only need a router, modem
and cables to set up a P2P network.
In a Client-server network, all computers are connected to a central server that acts as the hub
of your business’ data. Applications and files are also available on the server and everyone can
use these resources at any time, provided they are authorized to access the information.
The main difference between the two is that P2P network relies on information provided by
the clients (users) and it could have other issues such as limited performance and security, and
can only carry a small number of users.
Although client-server networks are a little bit pricier, it allows for faster processes, more RAM
and storage space, all which plays an important part in ensuring the efficiency of your
organization.
Cost
Equipment and maintenance costs are often the first consideration in network design.
Fortunately, the cost of hubs, routers and switches are relatively low when compared to the
early days of networking. Other items that need to be taken into consideration when designing
a network include cabling and labor. For small offices, the cost of these may be negligible. On
the other hand, even small manufacturing or warehouse operations may require a significant
investment of time and cabling material to provide connections where they are needed.
Security
Securing a network from outside intrusion or data theft is a primary concern for many
companies. While it is possible to eliminate the expense of Ethernet cabling by opting for a
wireless network solution, Wi-Fi networking is the least secure method of sharing data and
connections. The encryption methods built into most commercial routers, Wireless Encryption
Protocol (WEP), Wireless Protected Access (WPA) and the more recent WPA2, can be cracked
by skilled hackers. Designing a network with hard-wired Ethernet connections eliminates the
risk of intrusion to only those with physical access to the network. Unfortunately, this risk
expands dramatically when the local network is connected to the Internet.
Outside Access
Internet access has become all but mandatory for most modern businesses. It's a good idea to
consider the type of Internet connection required and the amount and type of support you will
receive from your Internet service provider before designing the rest of your network. Some
ISPs will provide support and advice on connection speed requirements and security concerns
for commercial accounts before installation. Keep in mind that connecting your network to the
Internet exposes it, at some level, to attack from anywhere in the world. If you routinely send
and receive sensitive data to and from remote locations, consider a virtual private network for
additional security. When handling sensitive information on the internal network only, a
firewall device or software implementation may be appropriate.
Expansion
Planning for growth in the initial stages can save future expenditures. The price difference, for
example, between a 16-port switch and a 32-port switch can be negligible when compared to
the cost of purchasing a new switch to replace one that is too small. Most network devices are
designed to provide several years of service. Buying equipment with an eye to expansion may
delay the need for additional investment in equipment.
Support
In most cases, the simpler the network design, the less technical support you'll require for both
installation and maintenance. If you need a complex, high-speed network, consider the level of
technical assistance available locally. Many small businesses can't justify the cost of full-time
IT personnel. Designing a simple network that can be serviced quickly by local technicians
should be a primary consideration. If your business demands a complex network beyond the
capabilities of local service, design sufficient redundancy in critical network elements to ensure
a minimum level of service until repairs can be made.
3. BENEFITS OF COMPUTER NETWORK
a). Data Storage
Al the data of the respective organization will be stored in a remote server that can be accessed
in any given time. Each and every employee within an organization will be able to access
them.
And many computers are interconnected through a central server there is an increase in
capacity. If in case one of the employees happens to lose data, there won't be any problem in
retrieval since all the information are already stored inside the central server.
b). Connecting Computers
A single network can be used to connect limited number of computers interconnecting with
each other. Hence, all the computers do not need to have a ISP account, they can be functioned
under the network with single unit.
And depending on the location of workplace the type of network that needs to be deployed
changes. If the employees of an organization happen to work within it, a Local Area
Network (LAN) will be sufficient. Others who work from far sites, needs to be connected using
larger Wide Area Network (WAN). Internet is one type of network which spans globally.
c). Problem Solving
Computer networking makes it possible for people all around the world to troubleshoot and
solve problems in lesser amount of time. Their services include, business, education and
medical. For an example, the business can start a blog to attract customers in various places.
And all the medical expenses can be viewed for an emergency using a computer network.
d). Reliability
The information stored on the central server is considered to be reliable. If one PC happens to
lose the information, similar kind of data can be accessed using another computer. This ensures
that no interruptions occur to the working environment, thus leading to smooth functioning.
e). Flexibility
There are numerous reasons which contribute to the flexibility of computer networks. It
provides the opportunity for the user to explore the fundamental things.
And also, information sharing can be done through different approaches. If information needs
to be sent to different people simultaneously then emails can be used. Social networking sites
such as Facebook too has the capability to share information. Or else files can be uploaded to
cloud servers so that they are made accessible to various devices. Computer networks contain
various information sharing options that can be convenient to different individuals.
f). Security
Security and protection is already included with computer network. Thus it provides a better
security to sensitive and confidential information. Employees can benefit from sharing personal
information with each other coworkers without worrying of exposure to the intruders. Without
the prior approval of users, even other workers will not be able to view user's files. Hence, it
can overall lead to fraud reduction.
g). Collaboration
Collaboration is made easy using computer network especially for the corporate world.
Whether it is connecting teams, organizing social meetups or acquiring personal responses, all
these tasks can be done comfortably.
Apart from businesses, families can also use personal networks to organize picnics, share
pictures and videos or put on a shopping list all without exposing their security.
h) Cost
Even though computer network involves high amount of setup cost, there are indirect cost
reductions here. For an example the inexpensive networking software only needs to be installed
once and made available for all of the connected computers. Which means that there is no need
to purchase the software frequently for each and every user.
Plus, there are very a smaller number of file storage expenses since files are stored using a
central server.
i). Resource Sharing
Using computer networking, connected resources such as scanners, printers and photocopy
machines can be shared across multiple users. This is particularly important for large
organizations where they need to buy resources for each and every staff. By using a common
network, companies can make sure that the resources are made available to all the employees
those are working.
j). Information Sharing
Unlike earlier time, file sharing with another user can be done effortless using computer
network. Using cloud services such as google drive and drop box; users can upload files to a
cloud server such that it is made available to other people. At a given time, users can access
and download the required files even if they are in remote locations. Thus, saving more time
and effort.
4. DISADVANTAGES OF COMPUTER NETWORK
a). Robustness
The connected systems on a network entirely depend on the main server. In case if the server
breaks down, the system cannot be used anymore.
Not only will the main server, if the problem lies on the central server or the bridging device
the entire network be failing. That is the reason why most of the large organizations tend to
keep their central server as a powerful computer which makes the implementation and
maintenance easy.
b). Independence
Since networks are based on the centralized server, most of the decisions are made themselves.
This hinders the freedom of user who wants to use the computer as they desire.
Moreover, computer networking includes new procedures which makes the process easy. Thus,
there are more chances where users will be relying on computers even for basic tasks that
cannot be done by hand.
c). Malware Attack
Basically, due to their interactions, a virus can easily spread between computers in a network.
Even if one of the computers happens to get infected with malware, there are high chances of
them spreading to remaining computers.
Similar instances can happen if the central server becomes infected. All these can lead to file
corruption. For avoiding this, the network administrator should regularly scan for malwares.
d). Implementation
Al though computer networks are considered to be cost effective, it is certainly not when it is
implemented. Setting up a computer network can be expensive. It depends on the number of
systems connected. Additionally, there must be separate cables and equipment such as
switches, routers and hubs.
e). Security
Unlike standalone computers, a computer connected to a network possess many security risks.
Since there are large number of users using the network. For large networks such as WAN,
hackers can easily access the network using specialized tools developed for this purpose.
However, for preventing theft and other illegal activities, large organizations tend to use
various security tools such as firewall.
f). Productivity
One of the major problems of computer networking is that it can drastically decrease the
productivity of the company. When there is an internet access, employees can use it for other
purposes other than the office work. While this can help to relieve stress of employees, it can
contribute to higher percentage of productivity loss. Therefore, management must decide to
what extent they can allow the computer use.
g). Maintenance
For the proper functioning of a computer network, it requires regular maintenance. The
problem is this cannot be done with basic skills. It involves advanced configurations and
complicated installations. Therefore, a skilled network manager with experience needs to be
deployed.
h). Health Issues
Computer networking includes various entertainment options such as gaming. While gaming
works as a stress buster for many, playing for a long time can make the user addictive.
Gaming addiction in essence can cause many health issues both physical and mental. Some of
them are insomnia and obesity.
i). Accessibility
Even though most of the modern computers provide free access, there are still connectivity
issues in some countries. Particularly countries those are developing, people residing there
suffer from connectivity challenges. Unless these challenges are resolved, there is no assurance
of true global network.
j). Multitasking
Another advantage of computer network is that it allows multitasking. However not everyone
can take benefit of this. Most people who perform multitasking, tends to lose high level of
productivity. There are very few numbers of people who are able to perform multitasks without
losing productivity.
5. TYPES OF COMPUTER NETWORK
a). Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a
computer or two, phones, printers, tablets, etc., and revolves around one person in one building.
These types of networks are typically found in small offices or residences, and are managed by
one person or organization from a single device.
b). Local Area Network (LAN)
We’re confident that you’ve heard of these types of networks before – LANs are the most
frequently discussed networks, one of the most common, one of the most original and one of
the simplest types of networks. LANs connect groups of computers and low-voltage devices
together across short distances (within a building or between a group of two or three buildings
in close proximity to each other) to share information and resources. Enterprises typically
manage and maintain LANs.
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly
and safely transfer data.
c). Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi.
Typically seen in the same types of applications as LANs, these types of networks don’t require
that devices rely on physical cables to connect to the network.
d). Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below),
these types of networks are typically seen in universities, large K-12 school districts or small
businesses. They can be spread across several buildings that are fairly close to each other so
users can share resources.
e). Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs – and incorporate
elements from both types of networks. MANs span an entire geographic area (typically a town
or city, but sometimes a campus). Ownership and maintenance is handled by either a single
person or company (a local council, a large company, etc.).
f). Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer
physical distances. This allows computers and low-voltage devices to be remotely connected
to each other over one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around
the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple
administrators or the public.
g). Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several
servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage
resources away from the network and place them into their own high-performance network.
SANs can be accessed in the same fashion as a drive attached to a server. Types of storagearea networks include converged, virtual and unified SANs.
h). System-Area Network (also known as SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local
network that is designed to provide high-speed connection in server-to-server applications
(cluster environments), storage area networks (called “SANs” as well) and processor-toprocessor applications. The computers connected on a SAN operate as a single system at very
high speeds.
i). Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be
integrated into structured cabling to overcome concerns about supporting traditional Ethernet
protocols and network applications such as Poe (Power over Ethernet). A point-to-multipoint
LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of
single mode optical fiber into multiple signals to serve users and devices.
j). Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely connect its
various locations to share computer resources.
k). Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and receive data
as if their devices were connected to the private network – even if they’re not. Through a virtual
point-to-point connection, users can access a private network remotely.
6.ETHERNET
Ethernet is a technology that connects wired local area networks (LANs) and enables the device
to communicate with each other through a protocol which is the common network language.
This LAN is a network of computers and other electronic devices which covers a small area in
your places like in the office, house, room or building. Unlike LAN, wide area network (WAN)
covers much larger geographical areas. Furthermore, Ethernet is a protocol that controls the
processes on how the data is transmitted through LAN. It also indicates how the network
devices can transmit and format data packets so that the other network devices in the same area
network segment can be able to receive, process and recognize them.
Any other devices with access to a geographically localized network by the use of a cable such
as with wire rather than a wireless connection most likely use Ethernet whether at home, office
or a school setting. However, these physical cables have an only limited distance that they can
totally stretch and carry enough signals through their durability. This is the reason why there
are different types of Ethernet cables used to perform a particular task in a certain situation.
The following are the different types of Ethernet cables:
10Base2 – thin Ethernet
10Base 5 – thin Ethernet
10Base-T – Twisted-pair cable and can achieve a speed of 10 Mbps
100Base-FX- this makes possible in achieving a speed of 100 Mbps through multimode fiber
optic.
100Base-TX- similar to twisted-pair cable but with a 10 times greater speed.
1000Base-T- double twisted-pair cable of category 5 cables that allows a speed up to one
Gigabit per second.
1000Base-SX- this is based on multimode fiber optic that uses a short wavelength signal of
850 nanometers.
1000Base-LX – this is also based on multimode fiber optic but uses a long wavelength signal.
Ethernet Networks
The following are the different types of Ethernet networks:
Fast Ethernet
This is a type of Ethernet network that can transmit data at a rate of 100 Mbps through a twistedpair cable or fiber-optic cable. The data can be transferred from 10 Mbps to 100 Mbps with no
protocol translation or changes in the application and networking software.
Gigabit Ethernet
This is a type of Ethernet network that has the capability to transfer data at a rate of 1000 Mbps
based on a twisted-pair cable or fiber-optic cable. Among other types of Ethernet cable, this is
the most popular one.
Switch Ethernet
This is a piece of network equipment that is required for multiple network devices in a LAN.
In using this type of cable, a regular network cable shall be used instead of a crossover cable.
This Ethernet cable forwards the data from one device to another device with the same network.
Normally, this supports different data transfer rates. Ethernet is widely used as a network
technology due to the fact that the cost of such a network is not too high.[3]
Ethernet Origins
IEEE 802.3, which was defined by the Institute of Electrical and Electronics Engineers (IEEE),
introduced the standards or policies governing the use of Ethernet. During its launch in the
1980s, Ethernet technologies employed a single coaxial cable from which all devices in a local
area, identified by their media access control (MAC) addresses, and are connected to. This
early Ethernet model was called “10BASE5,” which users colloquially referred to as “thick
net.”
The issue with this antiquated setup is that when there’s a problem with one computer, the
whole network is affected. So-called “collisions” or what we now know as “network
congestion,” occur when devices “talk” with each other all at once. As such, communication
between devices should take place one after the other.
The arrival of twisted pair cabling and hubs and switches have eliminated this technical issue.
Individual connections now allow devices to transport data independently without relying on
the main cable. Thus, in the modern setup, problems on a particular port will not impact other
users on the network.
Another significant improvement is Ethernet’s reach. Back then, connections were limited to
100 meters from the switch to the device. However, today’s fiber-optic technology has
substantially extended the distance between endpoints.
7.How Ethernet Works
Ethernet lies in the lower layers of the Open Systems Interconnection (OSI) model. It facilitates
the operation of physical and data link layers. The OSI model, which is composed of seven
layers, illustrates how various communication protocols work together.
The OSI’s seven layers are:
Physical layer
Data link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
The topmost layer is the application layer, which enables users to download and access data
from a browser or mail client. Users enter their queries through the application, which forwards
it to the next layer. The request comes in what’s called a “packet.” The packet contains data
about the destination web address and information about the sender. This information includes
the sender’s IP address, device version, and browser agent.
The packet is transmitted from the application layer until it reaches the bottom layer (now
called an “Ethernet frame”). The bottom or first layer is the one closest to your device. The
packet travels back and forth the OSI stack, being packed and unpacked in each layer for
checking.
7.ETHERNET ADVANTAGES AND DISADVANTAGES
Like any other technology, there is a good and a bad side to using Ethernet.
While Ethernet connection is faster than wireless, it is not mobile. A device designed to connect
to a network via cables or through Ethernet access can’t be quickly brought to another location,
such as from the office to an employee’s home. And unlike a wireless network, an Ethernet or
wired network is less flexible. You can’t easily add users to a wired network as you would to
a wireless one, especially if you don’t have the equipment (empty ports on routers and such)
and accessories (cables and the like) on hand.
But an Ethernet connection is more secure than a Wi-Fi connection. You can more easily
control who accesses an Ethernet network as opposed to a wireless one. That makes Ethernet
connections less prone to so-called “sniffing attacks.”
Ethernet access is also more stable than wireless access since radio frequencies don’t affect it.
Using specialized cables (e.g., Cat6) also allows Ethernet users to save on power consumption.
Ethernet networks, however, fall a bit on the pricey side to expand, not to mention timeconsuming. That’s because you’ll need more routers, switches, and meters and meters of wires.
You’ll also need to rewire all the devices, which takes a lot of time. Add to that the fact that
you’ll need professionals for network expansion as some wires may need to pass through walls
or floors.
Ethernet has been a widely used method of connecting computers. While its use may have been
superseded by the Internet, most organizations still rely on Ethernet for its security.
8.NETWORK TOPOLOGIES
Network topology
Network topology is the description of the arrangement of nodes (e.g., networking switches
and routers) and connections in a network, often represented as a graph.
No matter how identical two organizations are, no two networks are exactly alike. However,
many organizations are relying on well-established network topology models. Network
topologies outline how devices are connected together and how data is transmitted from one
node to another.
A logical network topology is a conceptual representation of how devices operate at particular
layers of abstraction. A physical topology details how devices are physically
connected. Logical and physical topologies can both be represented as visual diagrams.
A network topology map is a map that allows an administrator to see the physical network
layout of connected devices. Having the map of a network’s topology on hand is very useful
for understanding how devices connect to each other and the best techniques for
troubleshooting.
Types of network topology
There are many different types of topologies that enterprise networks have built on today and
in the past. Some of the network topologies we’re going to look at include bus topology, ring
topology, star topology, mesh topology, and hybrid topology.
What are the types of network topology?
Bus Topology Simple layout and cheap but vulnerable to failure and only suitable for low
traffic volumes. Not used for office networks today, but can still be found within some
consumer products.
Ring Topology Easy to manage and with a low risk of collision but reliant on all nodes being
powered up and in full working order. Rarely used today.
Star Topology All devices are connected to a central switch, which makes it easy to add new
nodes without rebooting all currently connected devices. This topology makes efficient use of
cable and is easy to administer. On the other hand, the health of the switch is vital. This
topology requires monitoring and maintenance. However, it is a commonly encountered
topology.
Tree Topology A hierarchical layout that links together groups of nodes. Creates parent-child
dependencies between root nodes and regular nodes. This layout can be vulnerable to failure if
a root node has a problem. This topology is complicated and difficult to manage and it uses a
lot of cable.
Mesh Topology Each node is connected to every other mode with a direct link. This topology
creates a very reliable network, but requires a large amount of cable and is difficult to
administer. Wi-Fi networks make this topology more feasible.
Hybrid Topology combines two or more of the standard topologies. This can be a good solution
to create quickly link together different existing networks into a unified system. Don’t confuse
the term “hybrid network topology” with “hybrid system” – a term that is applied to the
combination of onsite and cloud resources.
Bus Topology
Bus Topology Diagram
Pros:
Easy installation
Fewer cables required than Mesh and star topology
Good for small businesses
Low cost
Easy to manage and expand
Cons:
Backbone performance is critical
Easily congested on busy periods
Efficiency decreases rapidly with each added node
Data can only travel in one direction at any point in time
Bus topology is a network type where every device is connected to a single cable that runs from
one end of the network to the other. This type of network topology is often referred to as line
topology. In a bus topology, data is transmitted in one direction only. If the bus topology has
two endpoints, then it is referred to as a linear bus topology.
Smaller networks with this type of topology use a coaxial or RJ45 cable to link devices
together. However, the bus topology layout is outdated and you’re unlikely to encounter a
company using a bus topology today.
Advantages
Bus topologies were often used in smaller networks. One of the main reasons is that they keep
the layout simple. All devices are connected to a single cable so you don’t need to manage a
complex topological setup.
The layout also helped make bus topologies cost-effective because they can be run with a single
cable. In the event that more devices need to be added then you could simply join your cable
to another cable.
Disadvantages
However, relying on one cable does mean that bus topologies have a single point of failure. If
the cable fails then the entire network will go down. A cable failure would cost organizations
a lot of time while they attempt to resume service. Further to this, high network traffic would
decrease network performance because all the data travels through one cable.
This limitation makes bus topologies suitable only for smaller networks. The primary reason
is that the more network nodes you have, the slower your transmission speeds are going to be.
It is also worth noting that bus topologies are limited in the sense that they are half-duplex,
which means that data can’t be transmitted in two opposite directions simultaneously.
Ring Topology
Ring Topology Diagram
Pros:
Low incidence of collision
Low cost
Suitable for small businesses
Dual ring option provides continuity through redundancy
Cons:
One faulty node will bring the entire network down
Requires extensive preventative maintenance and monitoring
Performance declines rapidly with each additional node
Reorganizing the network requires a full system shutdown
In networks with ring topology, computers are connected to each other in a circular
format. Every device in the network will have two neighbors and no more or no less. Ring
topologies were commonly used in the past but you would be hard-pressed to find an enterprise
still using them today.
The first node is connected to the last node to link the loop together. As a consequence of being
laid out in this format packets need to travel through all network nodes on the way to their
destination.
Within this topology, one node is chosen to configure the network and monitor other devices.
Ring topologies are half-duplex but can also be made full-duplex. To make ring topologies fullduplex you would need to have two connections between network nodes to form a Dual Ring
Topology.
Dual Ring Topology
Dual Ring Topology Diagram
As mentioned above, if ring topologies are configured to be bidirectional then they are referred
to as dual ring topologies. Dual ring topologies provide each node with two connections, one
in each direction. Thus, data can flow in a clockwise or counterclockwise direction.
Advantages
With ring topologies, the risk of packet collisions is very low due to the use of token-based
protocols, which only allow one station to transmit data at a given time. This is compounded
by the fact that data can move through network nodes at high speeds which can be expanded
on when more nodes are added.
Dual ring topologies provided an extra layer of protection because they were more resistant to
failures. For instance, if a ring goes down within a node, then the other ring can step up and
back it up. Ring topologies were also low cost to install.
Disadvantages
One of the reasons why ring topologies were replaced is because they are very vulnerable to
failure. The failure of one node can take the entire network out of operation. This means that
ring topology networks need to be constantly managed to ensure that all network nodes are in
good health. However, even if the nodes were in good health your network could still be
knocked offline by a transmission line failure!
Ring topologies also raised scalability concerns. For instance, bandwidth is shared by all
devices within the network. In addition, the more devices that are added to a network the more
communication delay the network experiences. This means that the number of devices added
to a network topology needed to be monitored carefully to make sure that the network resources
weren’t stretched beyond their limit.
Making changes to a ring topology was also complicated because you need to shut down the
network to make changes to existing nodes or add new nodes. This is far from ideal as you’ll
need to factor in downtime every time you want to make a change to the topological structure!
Star Topology
Star Topology Diagram
Pros:
Easy to manage from one point – the switch
Easy to add and remove nodes
Durable
Low cable usage
Good for small businesses
Cons:
Requires specialist network hardware (the switch)
Makes the network reliant on the switch’s performance
A finite number of switch ports limits the network’s size
A star topology is a topology where every node in the network is connected to one central
switch. Every device in the network is directly connected to the switch and indirectly connected
to every other node. The relationship between these elements is that the central network hub is
a server and other devices are treated as clients. The central node has the responsibility of
managing data transmissions across the whole network and acts as a repeater. With star
topologies, computers are connected with a coaxial cable, twisted pair, or optical fiber cable.
Advantages
Star topologies are most commonly-used because you can manage the entire network from one
location: the central switch. As a consequence, if a node that isn’t the central node goes down
then the network will remain up. This gives star topologies a layer of protection against failures
that aren’t always present with other topology setups. Likewise, you can add new computers
without having to take the network offline like you would have to do with a ring topology.
In terms of physical network structure, star topologies require fewer cables than other topology
types. This makes them simple to set up and manage over the long-term. The simplicity of the
overall network design makes it much easier for administrators to run troubleshooting when
dealing with network performance faults.
Disadvantages
Though star topologies may be relatively safe from failure, if the central switch goes down then
the entire network will go down. As such, the administrator needs to manage the health of the
central node closely to make sure that it doesn’t go down. The performance of the network is
also tied to the central node’s configurations and performance. Star topologies are easy to
manage in most ways but they are far from cheap to set up and use.
Tree Topology
Tree Topology Diagram
Pros:
Blends bus and star topologies
Easy to manage
Easy to expand
Suitable for middle-sized businesses
Cons:
The network is dependent on the health of the root node
Requires networking expertise
Involves a lot of cable
Larger implementations require monitoring software
Can get expensive
As the name suggests, a tree topology network is a structure that is shaped like a tree with its
many branches. Tree topologies have a root node that is connected to another node hierarchy.
The hierarchy is parent-child where there is only one mutual connection between two
connected nodes. As a general rule, a tree topology needs to have three levels to the hierarchy
to be classified this way. This form of topology is used within Wide Area Networks to sustain
lots of spread-out devices.
Advantages
The main reason why tree topologies are used is to extend bus and star topologies. Under this
hierarchical format, it is easy to add more nodes to the network when your organization grows
in size. This format also lends itself well to finding errors and troubleshooting because you can
check for network performance issues systematically throughout the tree.
Disadvantages
The most significant weakness of tree topology is the root node. If the root node fails then all
of its subtrees become partitioned. There will still be partial connectivity within the network
amongst other devices such as the failed node’s parent.
Maintaining the network system is not simple either because the more nodes you add, the more
difficult it becomes to manage the network. Another disadvantage of a tree topology is the
number of cables you need. Cables are required to connect every device throughout the
hierarchy which makes the network layout more complex when compared to a simpler
topology.
Mesh Topology
Mesh Topology Diagram
Pros:
High speeds data transfers
Durable network that isn’t dependent on any one node
Very secure
Suitable for high-value networks for small to middle-sized networks
Easy to identify faulty equipment
Cons:
Requires a very large amount of cable
Can be difficult to secrete all the cable
Takes a long time to set up
Requires meticulous planning
There is a limit to the number of cables each computer can accommodate
A mesh topology is a point-to-point connection where nodes are interconnected. In this form
of topology, data is transmitted via two methods: routing and flooding. Routing is where nodes
use routing logic to work out the shortest distance to the packet’s destination. In contrast,
flooding is where data is sent to all nodes within the network. Flooding doesn’t require any
form of routing logic to work.
There are two forms of mesh topology: partial mesh topology and full mesh topology. With
partial mesh topology, most nodes are interconnected but there are a few which are only
connected to two or three other nodes. A full mesh topology is where every node is
interconnected.
Advantages
Mesh topologies are used first and foremost because they are reliable. The interconnectivity of
nodes makes them extremely resistant to failures. There is no single machine failure that could
bring down the entire network. The absence of a single point of failure is one of the reasons
why this is a popular topology choice. This setup is also secure from being compromised.
Disadvantages
However, mesh topologies are far from perfect. They require an immense amount of
configuration once they are deployed. The topological layout is more complex than many other
topologies and this is reflected by how long it takes to set up. You’ll need to accommodate a
whole host of new wiring which can add up to be quite expensive.
Hybrid Topology
Hybrid Topology Diagram
Pros:
Very flexible
Suitable for middle-sized and large organizations
Infinitely extendible
Adaptable to optimize equipment use
Cons:
Requires professional management
Needs monitoring software
Equipment costs are high
When a topology is composed of two or more different topologies it is referred to as a hybrid
topology. Hybrid topologies are most-commonly encountered in larger enterprises where
individual departments have network topologies that different from another topology in the
organization. Connecting these topologies together will result in a hybrid topology. As a
consequence, the capabilities and vulnerabilities depend on the types of topologies that are tied
together.
Advantages
There are many reasons why hybrid topologies are used but they all have one thing in
common: flexibility. There are few constraints on the network structure that a hybrid topology
cannot accommodate, and you can incorporate multiple topologies into one hybrid setup. As a
consequence, hybrid topologies are very scalable. The scalability of hybrid setups makes them
well-suited to larger networks.
Disadvantages
Unfortunately, hybrid topologies can be quite complex, depending on the topologies that you
decide to use. Each topology that is part of your hybrid topology will have to be managed
according to its unique network requirements. This makes administrators’ jobs more difficult
because they are going to have to attempt to manage multiple topologies rather than a single
one. In addition, setting up a hybrid topology can end up being quite costly.
9. HOW TO CHOOSE TOPOLOGY TO USE
There is a range of factors that you need to take into account when choosing which topology
to use. Before choosing a topology, you’ll want to closely consider the following:
Length of cable needed
Cable type
Cost
Scalability
First, you need to take into account the length of the cable you need to provide service to all
your network devices. A bus topology is the most lightweight in terms of cable needs. In this
sense, this would be the simplest topology to install and buy cables for. This ties into the second
factor, you need to consider the type of cable you’re going to use. Cable types range from
twister pairs to coaxial cables and optical fiber cables.
The cost of installing the topology is also very important. The more complex the topology you
choose is, the more you’ll need to pay in terms of resources and time to create that setup.
The final factor you’ll want to take into account is scalability. If you’re planning to
upscale your network infrastructure in the future you want to make sure that you use a network
that is easy to add devices to. A star topology network is ideal for this because you can add
network nodes with minimal disruption. This isn’t as simple within a ring network because you
will incur downtime if you add any nodes.
Download