Uploaded by Henok Girma

Chapter 1- Introduction to Computer Networks (2)

advertisement
Data Communication and Computer Networks
Chapter Two
Introduction to Computer Networks
2.1 What is Networking?
A computer network is a collection of computers and other devices that communicate to share data,
hardware, and software.
Copying files onto floppy disks and giving them to others to copy onto their computers was
sometimes referred to as the "sneakernet." This early form of computer networking is one that
many of us have used and perhaps still use today.
Generally a computer network is a system in which a number of independent computers are linked
together to share data and peripherals, such as files and printers. In the modern world, computer
networks have become almost indispensable. All major businesses, and governmental and
educational institutions make use of computer networks to such an extent that it is now difficult to
imagine a world without them.
Note:
•
Connecting together of computers and other devices is called a network, and the concept of
connected computers sharing resources is called networking
2.2 Elements of Computer Networking
Figure 1: Basic elements of computer networks
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 1
Data Communication and Computer Networks
2.3 Uses (Application) of Computer Networking
Networks increase efficiency and reduce costs. Computer networks achieve these goals in the
following primary ways:
1. Sharing Information (Or Data)-- like, Company Data Base
2. Sharing Hardware(Peripheral Devices) Printers, Faxes, FDD,HDD,CD-ROM-DRIVE etc
3. Sharing Internet Connection /communication by e-mail, voice and video conferencing.
4. Sharing Programs/Software - Expensive Professional Software
5. Centralizing Administration And Support
i.
Centralized Software Update: like Antivirus
ii.
Centralized Storage and Backup
iii.
Centralized Processing and management of data, such as Airline reservation.
The following figure illustrates the benefit of computer networking
Figure 2: Benefit of computer networks
Sharing Information/data
The reason for the popularity of computer networks is that they offer many advantages. Information
such as important files, video and audio, and email can be easily shared between users. Users in a
certain network environment have the liberty of sharing data and information across the network.
Data sharing enables different users to work on a certain file concurrently. Few examples of data
sharing are:
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 2
Data Communication and Computer Networks
• Database: - databases are often managed centrally and several users can have access to the
database at same time. For example, in a networked banking system, different bank
branches can have access to the central account database. This enables bank clients to carry
their transactions on any branch bank office.
• Email: email communication can be achieved over the network enabling networked users in
the company to communicate messages across the network using email.
Sharing Hardware (Peripheral devices)
Computer networks enable us to share expensive hardware resource among several computers.
Peripherals such as printers and modems can be shared over the network. For example, a company
may prefer to acquire one expensive printer and connect it to the network to provide high quality
printing to users. This avoids the need to have separate printer for each computer in the office.
For example, Figure 1 shows a printer being used in a stand-alone environment and in a networked
environment. By connecting many computers to a print server any of them may make use of the
printer directly, instead of the single computer in the stand-alone environment.
Figure 3: Printer in a stand-alone environment (left) and in a networked environment (right)
Central Disk storage can also be shared among users through networks. Network system provide
the possibility of using a dedicated file server to store all the company data in one location. Users
will be able to access their data over the network from their workstations. Using central disk
storage system facilitates data backup operations from a central location guarantying complete data
recovery in case of system failures.
Sharing Programs/Software
Application (software) sharing occurs when several users at different locations run application
programs that are installed centrally in one location (application server). Software (applications)
that are installed centrally can be managed and upgraded centrally. Such systems are mostly
common in financial system where the main application is stored centrally and users in different
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 3
Data Communication and Computer Networks
sections of the finance department are able to run the system from the network. It is effective for
several reasons
• Less disk storage space is required because the program is stored only once on the server,
instead of being stored on the hard disk s of multiple stand alone computers
• When a new version of the software is released, it is easier to update on copy of the program
on the server than to update many copies stored on stand –alone computer.
• Purchasing a software license for a network can be less expensive than purchasing a singleuser license for every workstation on the network
In short sharing programs on a network Saves disk space, Reduces maintenance, and Reduce
licensing cost
Centralizing Administration And Support
The login (gain access to) Process: Even if your computer is physically connected to a network,
you cannot typically use network resources until you log into the network. When you log in, you
formally identify yourself to the network by providing your ID and password.
Your user ID and password are the basis for your user account. A user account provides access to
network resources and accumulates information about your network use by tracking when you log
in and log out.
A network administrator/supervisor is the person who is responsible for setting up user accounts
and maintain a network. The network administrator provides each new user with a user ID and
starter password. In this way centralized administration and support can be achieved.
Note: Network administration tasks include:
•
Managing users and security.
•
Making resources available.
•
Maintaining applications and data.
•
Installing and upgrading application and operating system software.
2.4 Disadvantage of Networking
However, with these advantages come a number of potential disadvantages. Some of the
disadvantages and challenges of networking are discussed as follow:
Security/Privacy
Making important and sensitive information available to every user of the network is not normally
desirable. For example, information about employees’ salaries should not be freely available for
anybody to look at. Data security is therefore an important concern in a networked environment.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 4
Data Communication and Computer Networks
Viruses
If a virus is introduced to the network, either intentionally or unintentionally, it will rapidly spread
around all of the workstations and could start to cause havoc to peoples' files or to the efficient
working of the network.
Network failure
If the file server fails then no-one on the network can access any files or folders. This means
that nobody can do any work. For an organization, this would be extremely costly and disruptive. If
a cable, hub or switch on the network fails, this would mean that any computers connected to that
part of the network couldn't be used to access network resources. They could still be used as
individual, stand-alone machines.
Slow service
As more users log onto the network and request files, send things to be printed and open more
software applications, the network can start to slow down. There is only a limited amount of
bandwidth and the more data that is travelling around the network, the slower things become.
Figure 4: Summary of computer network uses
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 5
Data Communication and Computer Networks
2.5 Computer Networking Terminologies
• Stand-Alone Computer: A computer that is not connected to a network
• Peers: are Computers which use and provide network resources.
• Clients: are Computers that uses but do not provide network resources
• Servers: are Powerful computers that provide network resources. Server computer has
powerful processors, large size memory (RAM), hard disk with High storage capacity
(RAID) and more powerful network adapter/network interface card (NIC)
• Media: A communication channel (bounded/unbounded) that make physical connections.
• Network Resources: any service or device, such as files, printers, or other items, made
available for use by members of the network.
Example: Shared data, Shared printers and other peripherals, & shared applications
• Node: each device in the network
2.6 Network Types
Geographically a network may be spanned across your table, among Bluetooth enabled
devices, ranging not more than few meters. It may be spanned across a whole building, including
intermediate devices to connect all floors. Moreover may be spanned across a whole city or across
multiple cities or provinces. It may also be one network covering whole world.
Generally network can be grouped in three major categories depending on its size and the
geographical scope they cover.
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
Local Area Network (LAN)
A local area network (LAN) is the basic building block of any computer network. A LAN can range
from simple (two computers connected by a cable) to complex (hundreds of connected computers
and peripherals throughout a major corporation). (See Figure 5). The distinguishing feature of a
LAN is that it is confined to a limited geographic area usually within a building or a campus. LANs
are found in most organizations, businesses, government offices, educational institutions, and in
home computing environment.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 6
Data Communication and Computer Networks
Figure 5: A Local Area Network (LAN)
LANs are primarily designed to allow resources to be shared between personal computers or
workstations. The resources to be shared can include hardware (e.g., a printer), software (e.g., an
application program), or data. In addition to size, LANs are distinguished from other types of
networks by their transmission media and topology. In general, a given LAN will use only one
type of transmission medium. The most common LAN topologies are bus, ring, and star.
Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range. Today, however,
speeds are normally 100 or 1000 Mbps. Wireless LANs are the newest evolution in LAN
technology.
Wide Area Network (WAN)
Wide area networks are networks that cover very large geographical area such as a country or the
whole world. WAN has no geographical limit (see Figure 6). Because a WAN has no geographical
limitations, it can connect computers and other devices in separate cities or on opposite sides of the
world. A WAN is made up of a number of interconnected LANs. A typical WANs are the telephone
networks operated by most long distance telephone companies. Large companies having offices
scattered around the world use WAN to connect their computers. Perhaps the ultimate WAN is the
Internet.
WAN unlike LAN usually use combination of several types of communication media such as
cables, satellites, Microwaves, fiber-optics.
Figure 6: A Wide Area Network (WAN)
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 7
Data Communication and Computer Networks
Typical examples of WAN:
Internet: It is a global collection of networks, both big and small. It is a giant network.
Intranet: Are similar to World Wide Web (WWW) where centrally stored hypertext
documents can be accessed using the web. Unlike the WWW, intranets are available only to
user within the company network system. Intranet is a very common service in large
networked organizations.
Extranet: Although similar to intranet, extranet provides selected users from outside the
organization to access data from the internal network. Extranets are commonly used by
suppliers to provide data to company clients.
Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is a network with a size between a LAN and a WAN. It is a
collection of LANs linked together with high performance hardware within a university or college
campus. It normally covers the area inside a town or a city. MAN is designed for customers who
need a high-speed connectivity, normally to the Internet, and have endpoints spread over a city or
part of city.
A good example of a MAN is the part of the telephone company network that can provide a highspeed DSL line to the customer (we will discuss DSL in later chapters). Another example is the
cable TV network that originally was designed for cable TV, but today can also be used for highspeed data connection to the Internet.
MAN can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data Interface
(FDDI). Metro Ethernet is a service which is provided by ISPs. This service enables its users to
expand their Local Area Networks. For example, MAN can help an organization to connect all of its
offices in a city. The backbone of MAN is high-capacity and high-speed fiber optics. MAN works
in between Local Area Network and Wide Area Network. It provides uplink for LANs to WANs or
internet
Figure 7: A Metropolitan Area Network (MAN)
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 8
Data Communication and Computer Networks
LAN Vs. WAN
LANs typically have much higher transmission rates than WANS. Most LANs are able to transmit
data at around 100Mbps (million bits per second), whereas WANs generally transmit at less than
10Mbps. Another difference is the error rates in transmission: the likely number of errors in data
transmission is higher for a WAN than for a LAN.
This distinction between LANs and WANs is made because of the locality principle. The locality
principle in computer networking states that computers are much more likely to want to
communicate with other computers that are geographically close, than with those that are distant.
For example, if you want to request a printout from your PC, it makes much more sense to use the
printer in the next room rather than one that is hundreds of kilometers away. Because of the locality
principle network designers tend to use higher performance hardware within a LAN compared to
the connections between different LANs that form a WAN.
As a general we can distinguish the difference of network type, in addition to geographical span
coverage, based on the following key points
Type of media they used
Data transmission rate
Type of service they provide
Cost
2.7 Type of Connection
As discussed in previous section a network is two or more devices connected through links. A link
is a communications pathway that transfers data from one device to another. For visualization
purposes, it is simplest to imagine any link as a line drawn between two points. For communication
to occur, two devices must be connected in some way to the same link at the same time. There are
two possible types of connections:
Point-to-point
Multipoint.
Point-to-point
A point-to-point connection provides a dedicated link between two devices.
The entire capacity of the link is reserved for transmission between those two devices.
Most point-to-point connections use an actual length of wire or cable to connect the two ends,
but other options, such as microwave or satellite links, are also possible.
When you change television channels by infrared remote control, you are establishing a
point-to-point connection between the remote control and the television's control system
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 9
Data Communication and Computer Networks
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link.
In a multipoint environment, the capacity of the channel is shared, either spatially or
temporally.
If several devices can use the link simultaneously, it is a spatially shared connection.
If users must take turns, it is a timeshared connection.
2.8 Network Topologies
The term topology, or more specifically, network topology, refers to the arrangement of computers,
cables, and other components on a network. It is a map of the physical network. "Topology" is the
standard term that most network professionals use when they refer to the network's basic design. In
addition to the term "topology," you will find several other terms that are used to define a network's
design:
Physical layout
Design
Diagram
Map
The topology of a network is the geometric representation of the relationship of all the links and
linking devices (usually called nodes) to one another.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 10
Data Communication and Computer Networks
The type of topology you use affects the type and capabilities. In general the choice of one topology
over another will have an impact on the:
Type of equipment that the network needs
Capabilities of the network
Growth of the network
Way the network is managed
Developing a sense of how to use the different topologies is a key to understanding the capabilities
of the different types of networks.
Before computers can share resources or perform other communication tasks they must be
connected. Most networks use cable to connect one computer to another. However, it is not as
simple as just plugging a computer into a cable connecting to other computers. Different types of
cable combined with different network cards, network operating systems, and other components
require different types of arrangements. To work well, a network topology takes planning. For
example, a particular topology can determine not only the type of cable used but also how the
cabling runs through floors, ceilings, and walls. Topology can also determine how computers
communicate on the network. Different topologies require different communication methods, and
these methods have a great influence on the network.
The topology is both physical and logical:
Physical topology describes how the physical components on a network are connected
Logical topology describes the way network data flows through the physical components
The most common types of standard physical topologies, which we are going to analyze, are:
Bus Topology
Star/Hub Topology
Ring Topology
Mesh Topology
In addition to the basic network topology, the following also used:
Hybrid Topology
Tree Topology
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 11
Data Communication and Computer Networks
2.8.1) Bus Topology
Bus Topology is the simplest of network topologies and often referred to as a "linear bus" because
the computers are connected in a straight line. In this type of topology, all the nodes (computers as
well as servers) are connected to the single cable (called bus/trunk or also called backbone or
segment) that carries the data, by the help of interface connectors. This central cable is the backbone
of the network and is known as Bus (thus the name). Every workstation communicates with the
other device through this Bus.
A signal/traffic generated from the source is broadcasted and it travels to all workstations
connected to bus cable. Although the message is broadcasted but only the intended recipient, whose
MAC address or IP address matches, accepts it. If the MAC /IP address of machine doesn’t match
with the intended address, machine discards the signal.
Because only one computer at a time can send data on a bus network, the number of computers
attached to the bus will affect network performance. The more computers there are on a bus, so will
the network traffic and the more computers will be waiting to put data on the bus. This can greatly
decrease the performance and available bandwidth of your network and, consequently, the slower
the network will be. This works well in a small network of 2-5 computers. Bus topology is fairly old
news and you probably won't be seeing much of these around in any modern office or home.
Computers on a bus either transmit data to other computers on the network or listen for data from
other computers on the network. They are not responsible for moving data from one computer to the
next.
Signal bounce:- Because the data, or electronic signal, is sent to the entire network, it travels from
one end of the cable to the other. If the signal is allowed to continue uninterrupted, it will keep
bouncing back and forth along the cable and prevent other computers from sending signals.
Therefore, the signal must be stopped after it has had a chance to reach the proper destination
address.
Terminator:- To stop the signal from bouncing, a component called a terminator is placed/added at
each ends of the central cable to absorb free signals and to prevent bouncing of signals. Absorbing
the signal clears the cable so that other computers can send data.
In a bus topology, if a break in the cable occurs the two ends of the cable at the break will not have
terminators, so the signal will bounce, and all network activity will stop. This is one of several
possible reasons why a network will go "down." The computers on the network will still be able to
function as stand-alone computers; however, as long as the segment is broken, they will not be able
to communicate with each other or otherwise access shared resources.
A barrel connector can be used to extend it. Figure 8 shows a typical bus topology.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 12
Data Communication and Computer Networks
Figure 8: The bus topology
As you can see in the above example, all computers are attached to a continuous cable, which
connects them in a straight line. The arrows clearly indicate that the packet generated by Node 1 is
transmitted to all computers on the network, regardless the destination of this packet.
Also, because of the way the electrical signals are transmitted over this cable, its ends must be
terminated by special terminators that work as "shock absorbers", absorbing the signal so it won't
reflect back to where it came from. The value of 50Ohms has been selected after carefully taking in
consideration all the electrical characteristics of the cable used, the voltage that the signal which
runs through the cables, the maximum and minimum length of the bus and a few more.
Advantages of Bus Topology
It is cost effective.
It is easy to install and understand.
Cable required is least compared to other network topology.
Easy to add extra workstations or expand joining two cables together
Used in small networks. Good for LAN and best choice for temporary networks
Disadvantages of Bus Topology
There is a limit on central cable length and number of nodes that can be connected.
Dependency on central cable. If the main cable (i.e. bus ) encounters some problem or
broken, whole network breaks down or whole network fails.
Proper termination is required to dump signals. Use of terminators is must.
It is difficult to detect and troubleshoot fault at individual station.
Maintenance costs can get higher with time.
It is not suitable for networks with heavy traffic.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 13
Data Communication and Computer Networks
If network traffic is heavy or nodes are more the performance of the network decreases and
data can travel slowly.
Data collisions can happen as the network becomes busy
Security is very low because all the computers receive the sent signal from the source.
2.8.2) Star Topology
In the star topology, all the components of network are connected to the central device called “hub”
which may be a hub, a router or a switch by a cable segments. Unlike Bus topology (discussed
earlier), where nodes were connected to central cable, here all the workstations are connected to
central device with a point-to-point connection. So it can be said that every computer is indirectly
connected to every other node by the help of “hub”.
Figure 9 shows eight computers and a hub connected in a star topology. All Signals are transmitted
from the sending computer on the star topology passes through the central device before reaching
the intended destination. Hub acts as a junction to connect different nodes present in Star Network,
and at the same time it manages and controls whole of the network. Depending on which central
device is used, “hub” can act as repeater or signal booster. Central device can also communicate
with other hubs of different network. Unshielded Twisted Pair (UTP) Ethernet cable is used to
connect workstations to central node.
Figure 9: The star topology
Because each computer is connected to a central point, this topology requires a great deal of cable
in a large network installation. Also, if the central point fails, the entire network goes down. If one
computer or the cable that connects it to the hub fails on a star network, only the failed computer
will not be able to send or receive network data. The rest of the network continues to function
normally.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 14
Data Communication and Computer Networks
The Star or Hub topology is one of the most common network topologies found in most offices and
home networks. It has become very popular in contrast to the bus type (which we just spoke about),
because of the cost and the ease of troubleshooting.
Advantages of Star Topology
Fast performance with few nodes and low network traffic.
Hub can be upgraded easily.
Easy to setup and modify as well as to troubleshoot.
Easy to expand. In star topology new nodes can be added easily without affecting rest of the
network. Similarly components can also be removed easily.
Failure of one node or link doesn’t affect the rest of network. At the same time it's easy to
detect the failure and troubleshoot it.
Star networks are very reliable. If one connection fails, it does not affect other users
Very few data collisions as each workstation has its own cable to the server
Centralized management. It helps in monitoring the network.
Good security - no workstation can interact with another without going through the server
first
Disadvantages of Star Topology
Cost of installation is high and Expensive to use. Because the use of hub, a router or a
switch as central device increases the overall cost of the network..
Too much dependency on central device has its own drawbacks. If it fails whole network
goes down.
Performance and as well number of nodes which can be added in such topology is depended
on capacity of central device.
The most expensive network layout to install because of the amount of cables needed
Installing the network usually needs experts to set it up
Extra hardware such as hubs and switches may be needed
If the server crashes or stops working then nobody will be able to access their files or use the
network.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 15
Data Communication and Computer Networks
2.8.3) Ring Topology
In the ring topology, computers are connected on a single circle of cable forming a closed loop.
Unlike the bus topology, there are no terminated ends. The signals travel around the loop in one
direction and pass through each computer, which acts as a repeater to boost the signal and send it to
the next computer. On a larger scale, multiple LANs can be connected to each other in a ring
topology by using Thicknet coaxial or fiber-optic cable. Figure 10 shows a typical ring topology
with six workstations.
Messages in a ring network pass in one direction, from node to node. As a message travels around
the ring, each node examines the destination address attached to the message. If the address is the
same as the address assigned to the node, the node accepts the message; otherwise, it regenerates
the signal and passes the message along to the next node in the circle. Such regeneration allows a
ring network to cover larger distances than star and bus networks. It can also be designed to bypass
any malfunctioning or failed node. The method by which the data is transmitted around the ring is
called token passing. A token is a special series of bits that contains control information. Possession
of the token allows a network device to transmit data to the network. Each network has only one
token.
Token Passing (in brief): Token contains a piece of information which along with data is sent by
the source computer. This token then passes to next node, which checks if the signal is intended to
it. If yes, it receives it and passes the empty to into the network, otherwise passes token along with
the data to next node. This process continues until the signal reaches its intended destination.
The nodes with token are the ones only allowed to send data. Other nodes have to wait for an empty
token to reach them. This network is usually found in offices, schools and small buildings.
Figure 10: The ring topology
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 16
Data Communication and Computer Networks
Advantages of Ring Topology
Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
Transmission of data is fairly simple as it only travels in one direction
No data collisions
Cheap to install and expand
Extra computers can be added easily with little effect on performance - although you have to
shut down the network to be able to do this.
There is no need for network server to control the connectivity between workstations.
Each computer has equal access to resources.
Disadvantages of Ring Topology
Indentifying and troubleshooting network problem is difficult.
Because of the closed loop, adding or deleting a new nodes can be difficult and may disturbs
the network activity.
Failure of one computer disturbs the whole network.
If a single machine is switched off, the network doesn't work
If a cable breaks, the network doesn't work
Data must pass through every computer until it reaches its destination. This can make it
slower than other network layouts.
Network is highly dependent on the wire which connects different components
2.8.4) Mesh Topology
A mesh topology network offers superior redundancy and reliability. In a mesh network topology,
each of the network node, computer and other devices, are interconnected with one another by
separate cabling (See Figure 11). Every node not only sends its own signals but also relays data
from other nodes. In fact a true mesh topology is the one where every node is connected to every
other node in the network. This type of topology is very expensive as there are many redundant
connections, thus it is not mostly used in computer networks. It is commonly used in wireless
networks. Flooding or routing technique is used to transmit data over mesh topology.
Routing:- In routing, the nodes have a routing logic, as per the network requirements. Like routing
logic to direct the data to reach the destination using the shortest distance. Or, routing logic which
has information about the broken links, and it avoids those node etc. We can even have routing
logic, to re-configure the failed nodes.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 17
Data Communication and Computer Networks
Flooding:- In flooding, the same data is transmitted to all the network nodes, hence no routing logic
is required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted
load over the network.
Figure 11: The mesh topology
Mesh topology is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-2)/2 physical channels to link n devices.
Types of Mesh Network topologies
1.
Partial Mesh Topology: This is far more practical as compared to full mesh topology. Here,
some of the systems are connected in similar fashion as in mesh topology while rests of the
systems are only connected to 1 or 2 devices. It can be said that in partial mesh, the
workstations are ‘indirectly’ connected to other devices. This one is less costly and also
reduces redundancy.
2.
Full Mesh Topology: Each and every nodes or devices are connected to each other. Even after
considering the redundancy factor and cost of this network, its main advantage is that the
network traffic can be redirected to other nodes if one of the nodes goes down. Full mesh
topology is used only for backbone networks.
Advantages of Mesh Topology
Each connection can carry its own data load. Data can be transmitted from different devices
simultaneously. This topology can withstand high traffic.
Backup capabilities. Even if one of the components fails there is always an alternative
present. So data transfer doesn’t get affected.
Expansion and modification in topology can be done without disrupting other nodes
Fault is diagnosed easily.
Provides security and privacy.
It is robust.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 18
Data Communication and Computer Networks
Disadvantages of Mesh Topology
Set-up (Installation and configuration) and maintenance of this topology is very difficult. Even
administration of the network is tough.
Because it uses more cables the overall cost of this network is way too high as compared to other
network topologies.
Bulk wiring is required.
There are high chances of redundancy in many of the network connections.
2.8.5) Hybrid Topology
Hybrid, as the name suggests, is mixture of two different things. Similarly in this type of topology
we integrate/combined two or more different standard topologies to form a resultant topology which
has good points(as well as weaknesses) of all the constituent basic topologies rather than having
characteristics of one specific topology. This combination of topologies is done according to the
requirements of the organization. For example, if there exists a ring topology in one office
department while a bus topology in another department, connecting these two will result in Hybrid
topology. Remember connecting two similar topologies cannot be termed as Hybrid topology. StarRing and Star-Bus networks are most common examples of hybrid network.
Star-Bus
The star bus is a combination of the bus and star topologies. In a star-bus topology, several star
topology networks are linked together with linear bus trunks. Figure 12 shows a typical star-bus
topology.
In this topology, one computer goes down/fails, it will not affect the rest of the network. The other
computers can continue to communicate. However, if the central component, or hub, that attaches
all computers in a star, fails, then you have big problems since no computer will be able to
communicate. If a hub is linked to other hubs, those connections will be broken as well.
Figure 12: The star-bus topology
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 19
Data Communication and Computer Networks
Star-Ring
The star-ring (sometimes called a star-wired ring) appears similar to the star-bus. Both the star-ring
and the star bus are centered in a hub that contains the actual ring or bus. In the Star-Ring topology,
the computers are connected to a central component as in a star network. These components,
however, are wired to form a ring network. Figure 13 shows a star-ring network. Linear-bus trunks
connect the hubs in a star bus, while the hubs in a star-ring are connected in a star pattern by the
main hub. Like the star-bus topology, if a single computer fails, it will not affect the rest of the
network. By using token passing, each computer in a star-ring topology has an equal chance of
communicating. This allows for greater network traffic between segments than in a star-bus
topology.
Figure 13: The star-ring topology
Advantages of Hybrid Topology
Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of
the network.
Scalable: It's easy to increase the size of network by adding new components, without
disturbing existing architecture.
Flexible: Hybrid Network can be designed according to the requirements of the organization
and by optimizing the available resources. Special care can be given to nodes where traffic
is high as well as where chances of fault are high.
Effective: Hybrid topology is the combination of two or more topologies, so we can design
it in such a way that strengths of constituent topologies are maximized while there
weaknesses are neutralized. For example we saw Ring Topology has good data reliability
(achieved by use of tokens) and Star topology has high tolerance capability (as each node is
not directly connected to other but through central device), so these two can be used
effectively in hybrid star-ring topology.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 20
Data Communication and Computer Networks
Disadvantages of Hybrid Topology
Complexity of Design: One of the biggest drawback of hybrid topology is its design. Its not
easy to design this type of architecture and its a tough job for designers. Configuration and
installation process needs to be very efficient.
Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with
different architectures and should be function even if a part of network is down.
Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot
of cables, cooling systems, sophisticate network devices, etc.
2.8.6) Tree Topology
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in
Physical Star network Topology, computers (nodes) are connected by each other through central
hub. And we also saw in Bus Topology, work station devices are connected by the common cable
called Bus. After understanding these two network configurations, we can understand tree topology
better. In Tree Topology, the number of Star networks are connected using Bus. This main cable
seems like a main stem of a tree, and other star networks as the branches. It is also called Expanded
Star Topology. Ethernet protocol is commonly used in this type of topology. The diagram below
will make it clear.
Figure 14: The tree topology
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 21
Data Communication and Computer Networks
(a) Clustered star topology
(b) Hierarchical Star Topology
Advantages of Tree Topology
It is an extension of Star and bus Topologies, so in networks where these topologies can't be
implemented individually for reasons related to scalability, tree topology is the best
alternative.
Expansion of Network is possible and easy.
Here, we divide the whole network into segments (star networks), which can be easily
managed and maintained.
Error detection and correction is easily done.
Each segment is provided with dedicated point-to-point wiring to the central hub.
If one segment is damaged, other segments are not affected.
Disadvantages of Tree Topology
Heavily cabled and Costly.
Central hub fails, network fails.
Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks
whole network is crippled.
As more and more nodes and segments are added, the maintenance becomes difficult.
Scalability of the network depends on the type of cable used.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 22
Data Communication and Computer Networks
Selecting a Topology
There are many factors to consider when deciding which topology best suits the needs of an
organization. Some of those factors to be taken into consideration while choosing a Network
topology are
1) Scale of your project (in terms of number of components to be connected).
2) Amount of traffic expected on the network.
3) Budget allotted for the network i.e. amount of money you are willing to invest.
4) Required response time
The following table provides some guidelines for selecting a topology
Topology Advantages and Disadvantages
Topology
Bus
Advantages
Disadvantages
Use of cable is economical.
Media is inexpensive and easy to
work with.
System is simple and reliable.
Bus is easy to extend.
Easy to connect a node to a
bus/trunk
•
•
•
•
Ring
Star
•
•
•
•
Mesh
•
Network can slow down in heavy
traffic.
Problems are difficult to isolate. If the
cable is damaged anywhere along its
length or either end of the cable loses its
termination, the entire network fail.
Terminators are required at both ends of
the backbone cable
Not advisable to install in a large
building
Lacks central control
Failure of one computer can impact the
rest of the network, because each
computer acts as a repeater to boost the
signal and send it to the next computer.
Problems are hard to isolate.
Network reconfiguration disrupts
operation.
•
System provides equal access for all •
computers.
Performance is even/uniform
despite many users.
•
There is no reliance on a central
•
hub. all messages pass through all
devices.
Modifying system and adding new • If the centralized point fails, the
computers is easy.
network fails. Hence the network
vulnerable to breakdown as it is
Centralized monitoring and
essentially controlled by one device
management are possible.
Failure of one computer does not
affect the rest of the network.
Faults are easier to locate and
isolate
System is expensive to install because it
System provides increased
redundancy and reliability as well as uses a lot of cabling.
ease of troubleshooting.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 23
Data Communication and Computer Networks
2.9 Logical Topologies example: Token ring LANs
One method of transmitting data around a ring is called token passing. (A token is a special series of
bits that travels around a token-ring network. Each network has only one token.) The token is
passed from computer to computer until it gets to a computer that has data to send. Figure 11 shows
a token ring topology with the token. The sending computer modifies the token, puts an electronic
address on the data, and sends it around the ring.
The data passes by each computer until it finds the one with an address that matches the address on
the data. The receiving computer returns a message to the sending computer indicating that the data
has been received. After verification, the sending computer creates a new token and releases it on
the network. The token circulates within the ring until a workstation needs it to send data.
Therefore the token ring network uses a logical ring topology – the token travels around in a circle
from computer to computer. However, the physical topology of a token ring network is a star – the
wires connecting the computers to each other are connected via a central hub. This is sometimes
referred to as a “star-shaped ring” network.
Figure 15: The token ring topology
The token ring avoids a common problem with bus topologies. If there are many computers on the
network a bus will often be busy, seriously affecting network performance. However, with a token
ring the network is never busy – each computer must simply wait for the token to arrive and add its
message.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 24
Data Communication and Computer Networks
2.10 Network Models/Architecture
Computer networks can be discriminated into various types based on how the computers in a
network are configured and how they access information, or simply based on the roles of the
computer found in the network. Accordingly it classified as follow:
1. Peer-to-peer network
2. Client-server network
3. Hybrid network
Peer-To-Peer Network
In such network configuration, all the connected systems (computers and printers) can
communicate directly with each other without relying on other intermediary server. In a peer-topeer network, there are no dedicated servers, and there is no hierarchy among the computers. All the
computers are equal and therefore are known as peers. Each computer functions as both a client and
a server, and there is no administrator responsible for the entire network. The user at each computer
determines what data on that computer is shared on the network. Peer-to-peer networks are also
sometimes called workgroups.
Implementation of Peer-to-Peer network is relatively simple, because each computer functions as a
client and a server, there is no need for a powerful central server or for the other components
required for a high-capacity network.
Peer-to-peer networks can be less expensive than server-based networks. Although appropriate for
small networks (can connect up to 10 computers). Also, the networking software does not require
the same standard of performance and level of security as the networking software designed for
dedicated servers. However, it lacks the ability to implement centralized management of users, files,
and security features and tends to slow down performance as the number of connected computers
increase.
Figure 16: Peer-to-peer network architecture
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 25
Data Communication and Computer Networks
Peer-to-peer networks are good choices for environments where:
•
There are 10 users or fewer
•
Users share resources, such as printers, but no specialized servers exist
•
Security is not an issue
•
The organization and the network will experience only limited growth within the
foreseeable future
Where these factors apply, a peer-to-peer network will probably be a better choice than a serverbased network.
Advantages of Peer-to-peer networking
It is easy to install and so is the configuration of computers on this network,
All the resources and contents are shared by all the peers, unlike server-client architecture
where Server shares all the contents and resources.
P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect
the functioning of other peers. In case of Client –Server network, if server goes down whole
network gets affected.
There is no need for full-time System Administrator. Every user is the administrator of his
machine. User can control their shared resources.
The over-all cost of building and maintaining this type of network is comparatively very
less.
Disadvantages(drawbacks) of Peer to peer architecture
In this network, the whole system is decentralized thus it is difficult to administer. That is
one person cannot determine the whole accessibility setting of whole network.
Security in this system is very less viruses, spywares, Trojans, etc malwares can easily
transmitted over this P-2-P architecture.
Data recovery or backup is very difficult. Each computer should have its own back-up
system
Lot of movies, music and other copyrighted files are transferred using this type of file
transfer. P2P is the technology used in torrents.
Peer to peer networks are good to connect small number (around 10) of computer and places
where high level of security is not required. In case of business network where sensitive data
can be present this type of architecture is not advisable or preferred.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 26
Data Communication and Computer Networks
Client-Server Network
In an environment with more than 10 users, a peer-to-peer network with computers acting as both
servers and clients will probably not be adequate. Therefore, most networks have dedicated servers.
A dedicated server is one that functions only as a server and is not used as a client or workstation.
Servers are described as "dedicated" because they are not themselves clients, and because they are
optimized to service requests from network clients quickly and to ensure the security of files and
directories. Server-based networks have become the standard models for networking.
Client/Server architecture consists of client computers (workstations) that require a network service
and servers that provide the network service. Servers are usually very powerful computers both in
processing power and in their storage capacity. Different servers can be configured depending on
the need of the organizations, such as:
File servers – provide centralized data storage which will be shared among the LAN users.
Print server – control one or more printers and provide print service to LAN users.
Database server – centrally store database and provide data to client application in the LAN.
Web server – store web pages that will be viewed using browsers in the network.
Email server – used to manage and control email communications across the network.
As networks increase in size (as the number of connected computers, and the physical distance and
traffic between them, grows), more than one server is usually needed. Spreading the networking
tasks among several servers ensures that each task will be performed as efficiently as possible.
Servers must perform varied and complex tasks. Servers for large networks have become
specialized to accommodate the expanding needs of users. For example, a network may have
separate servers for file storage, printing, email and for storing and running application software.
Figure 17: Client-Server network architecture
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 27
Data Communication and Computer Networks
Advantages of Client Server Networks
Centralization: Unlike P2P, where there is no central administration, here in this
architecture there is a centralized control. Servers help in administering the whole set-up.
Access rights and resource allocation is done by Servers.
Proper Management: All the files are stored at the same place. In this way, management of
files becomes easy. Also it becomes easier to find files.
Back-up and Recovery possible: As all the data is stored on server it's easy to make a backup of it. Also, in case of some break-down if data is lost, it can be recovered easily and
efficiently. While in peer computing we have to take back-up at every workstation
Upgrading and Scalability in Client-server set-up: Changes can be made easily by just
upgrading the server. Also new resources and systems can be added by making necessary
changes in server.
Accessibility: From various platforms in the network, server can be accessed remotely.
Security: Rules defining security and access rights can be defined at the time of set-up of
server.
Easily file update: As new information is uploaded in database, each workstation need not
have its own storage capacities increased (as may be the case in peer-to-peer systems). All
the changes are made only in central computer on which server database exists.
Disadvantages of Client Server Architecture
Congestion in Network: Too many requests from the clients may lead to congestion, which
rarely takes place in P2P network. Overload can lead to breaking-down of servers. In peerto-peer, the total bandwidth of the network increases as the number of peers increase.
Not as robust: As a P2P and if the server fails, the whole network goes down. Also, if you
are downloading a file from server and it gets abandoned due to some error, download stops
altogether. However, if there would have been peers, they would have provided the broken
parts of file.
Cost: It is very expensive to install and manage this type of computing.
Need professional IT people to maintain the servers and other technical details of network.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 28
Data Communication and Computer Networks
Selecting Network Configuration
The distinction between peer-to-peer and server-based networks is important because each type has
different capabilities. The type of network you choose to implement will depend on various factors
such as the:
Size of the organization.
Level of security required.
Type of business.
Level of administrative support available.
Amount of network traffic.
Needs of the network users.
Network budget.
Size:- Peer-to-peer networks are also called workgroups. The term "workgroup" implies a small
group of people. There are typically 10 or fewer computers in a peer-to-peer network.
Cost:- Peer-to-peer networks are relatively simple. Because each computer functions as a client and
a server, there is no need for a powerful central server or for the other components required for a
high-capacity network. Peer-to-peer networks can be less expensive than server-based networks.
Operating Systems:- In a peer-to-peer network, the networking software does not require the same
standard of performance and level of security as the networking software designed for dedicated
servers. Dedicated servers function only as servers and not as clients or workstations. Peer-to-peer
networking is built into many operating systems. In those cases, no additional software is required
to set up a peer-to-peer network.
Administration:- In a typical peer-to-peer network, no system manager oversees administration
for the entire network. Instead, individual users administer their own computers.
Security:- On a computer network, security (making computers and data stored on them safe from
harm or unauthorized access) consists of setting a password on a resource, such as a directory, that
is shared on the network. All peer-to-peer network users set their own security, and shared resources
can exist on any computer rather than on a centralized server only; consequently, centralized control
is very difficult to maintain. This lack of control has a big impact on network security because some
users may not implement any security measures at all. If security is an issue, a server-based network
might be a better choice. In a server-based environment, one administrator who sets the policy and
applies it to every user on the network can manage security.
Hardware Considerations:- Client computer hardware can be limited to the needs of the user
because clients do not need the additional random access memory (RAM) and disk storage needed
to provide server services. A typical client computer often has no more than a Pentium processor
and 32 megabytes (MB) of RAM.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 29
Data Communication and Computer Networks
Number of Users:- A server-based network can support thousands of users. This type of network
would be impossible to manage as a peer-to-peer network, but current monitoring and networkmanagement utilities make it possible to operate a server-based network for large numbers of users.
Comparison of Network Types
Consideration
Peer-to-Peer Network
Server-Based Network
Size
Good for 10 or fewer computers Limited only by server and
network hardware
Security
Security established by the user
of each computer
Extensive and consistent
resource and user security
Administration
Individual users responsible for
their own administration; no
full-time administrator
necessary
Centrally located for network
control; requires at least one
knowledgeable administrator
2.11 Survey of Network Operating System (NOS)
The core of a network is the network operating system. Just as a computer cannot operate without
an operating system, a network of computers cannot operate without a network operating system.
A network operating system must support mechanisms that enable applications to communicate
with one another: for example, applications that enable multiple computers to work jointly on a
single task, such as a mathematical calculation. A network operating system must also support
multiple processors, clusters of disk drives, and data security features. Finally, a network operating
system must be reliable and be able to recover quickly from errors.
Depending upon the network operating system's manufacturer, a desktop computer's networking
software can be added either to the computer's own operating system or be integrated with it.
Network operating system software is integrated into a number of popular operating systems,
including Microsoft Windows. In short the NOS loaded on server has the following functions:
NOS manages network resources
Controls the flow of data
Maintain security
Tracks user accounts
NOS enables clients to access remote drives as if they were on the clients own machine
Allow servers to process requests from clients and decide whether that client can use a
particular resource
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 30
Data Communication and Computer Networks
Examples of NOS:- Novel Netware,
- Windows NT server
- Windows 2000/2k server
- Windows 2000/2k advanced server
- UNIX
Note: Part of the NOS must run from the client, and part of it must run from the server
All NOSs can exist within a network and they can operate with one another. This feature is called
Interoperability which makes it easier for corporations/business/company with different client and
server to create a network even though the client and the servers all use different operating systems.
Desktop operating system listed below include the software necessary to establish communication
with a network server. The network software that is built into your computer operating system
handles the communication between your workstation and the network server
- Windows 95
- Windows 98/ first edition / second edition
- Windows NT workstation
- Windows Millennium (me)
- Windows 2000 professional
- Windows XP professional/Home
NOS has two components known as Network server software and Network client software. In most
cases, software must be installed on the server and client for interoperability.
Network server software
Installed on a file server
Controls file access from the server hard disk
Manages the print queue
Tracks user id and password
Network client software
Installed on the local hard disk of each workstation
Gathers your login information
Handles drive mapping
And directs printout to the network printer
The server and client software components do not necessarily have to match the network client
software that is provided as part of windows 95, 98, NT workstation, and 2000 professional that
allows you to access servers running a variety of software including Linux, UNIX and NOvel
Netware, windows NT server and windows 2000 server.
Note: Many desktop operating systems have some server capabilities. You could for example set
up a small network by installing windows 98 on server and windows 95, 98, NT workstation, or
2000 professional on the workstations.
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 31
Data Communication and Computer Networks
Summary of Key Points
What Is a Network?
•
The primary reasons for networking are to share information, to share hardware and
software (reducing cost), and to centralize administration and support
•
Potential disadvantages of computer networks are lack of security when dealing with
sensitive information, and the danger of computer viruses infecting the system
•
A local area network (LAN) is the smallest form of network and is the building block for
larger networks
•
A wide area network (WAN) is a collection of LANs and has no geographical limitation
•
The locality principle in computer networking states that a computer is more likely to
communicate with a computer that is nearby, than with one that is distant
•
A campus area network (CAN/MAN) is a collection of LANs linked together on a university
or college campus
•
A metropolitan area network (MAN) is a collection of LANs linked together within a town
or city
Network Topologies
•
The physical layout of computers on a network is called a topology
•
There are four primary topologies: star, bus, ring, and mesh
•
Topologies can be physical (actual wiring) or logical (the way they work)
•
In a bus topology, the computers are connected in a linear fashion on a single cable
•
Bus topologies require a terminator on each end of the cable
•
In a star topology, all computers are connected to a centralized hub
•
Mesh topologies connect all computers in a network to one another with separate cables
•
Hybrid topologies combine one or more of the primary topology types. Common examples
of hybrid topologies are the star bus and star-ring topologies
•
In token-ring topology, the computers are connected physically in a star shape, but logically
in a ring or circle. The data is passed from one computer to another around the circle
Network Models
•
Networks are classified into two principal groups based on how they share information:
peer-to-peer networks and server-based networks
•
In a peer-to-peer network, all computers are equal. They can either share their resources or
use resources on other computers
•
In server-based network, one or more computers act as servers and provide the resources to
the network. Other computers are the clients and use the resources provided by the server
Introduction to Computer Networks
Compiled by Chere L. (M.Tech)
Page 32
Download