Network Topologies An introduction to Network Topologies and the Link Layer.

Slides:



Advertisements
Similar presentations
Shape of a Network.
Advertisements

LAN and WAN LAN (Local Area Networks) are small networks which are contained in a single building or small area. WAN (Wide Area Networks) are larger networks.
Computer Network Topologies
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CSCI 4550/8556 Computer Networks Comer, Chapter 8: LAN Technology and Network Topologies.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Media, LAN Technologies, and Network Topologies Lecture 5.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
NETWORK TOPOLOGIES HNC COMPUTING - Network Concepts 1 Network Concepts Topologies.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Introduction network Protocol
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Networks.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
 Topology Topology  Different types of topology Different types of topology  bus topologybus topology  ring topologyring topology  star topologystar.
Physical Topology Physical layout of the network nodes – Broad description of the network: no detail about device types, connection methods, addressing,...
1 Network Topology 2 Introduction 8Physical and Logical Topologies 8Topologies 8Bus 8Ring 8Star 8Extended Star 8Mesh 8Hybrid.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Network Topologies.
Network Concepts Topologies
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
SHAPE OF A NETWORK COPYRIGHT BTS TOPOLOGY The way the computers are cabled together Four different layouts Logical topology describes the way data travels.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Chapter 2 Network topology and Networking devices.
Shape of a Network 10/10/07. Topology  The way the computers are cabled together  Four different layouts  Logical topology describes the way data travels.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Network Topology Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
COMPUTER NETWORKS CS610 Lecture-7 Hammad Khalid Khan.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Chapter 8 LAN Technologies and Network Topology
Multiple Access Methods
Network Protocols.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Local Area Networks: Topologies
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Multiple Access Methods
Presentation transcript:

Network Topologies An introduction to Network Topologies and the Link Layer

Direct Point to Point Communication Advantages  Exclusive connections between computers  Useful over long distances  Easy to enforce security since only two computers have exclusive access to the one connection  Every computer has a direct connection with each other.

Direct Point-to-Point Communication Disadvantages  Expensive to implement over a Local Area network  The more computers connected, the more direct connections that are required increasing the cost of the network. For LANS shared communications are more feasible.

LAN Local Area Network Use Shared Communication channels where each computer take a “turn” to communicate over a single medium or network. Using shared communication channels are a cost effective way to implement a LAN

LAN Topologies

Star Topology All computers on the network are connected to a central point The central point is usually a Hub or switch The logical layout may resemble a star while the physical layout may not. The Hub or switch is often located in a separate room or closet where networking staff have exclusive access to them.

Example of a Star Topology

Star Topology Continued Advantage: If one computer fails communication on the network remains intact Disadvantage: More wiring is required for a Star Topology and this increases the cost of the network.

Example of a Star network (ATM) Uses an ATM switch in the center of the network Used for Fiber Communication  Fiber communication is in one direction only.  There is a strand for sending and a strand for receiving The switch will receive the data from the sender and transmit it directly to the intended receiver.

Ring Topology Each computer is connected to each other forming a logical ring Communication of the ring is in one direction The Logical structure of the network is a ring, but computers may be located anywhere in a given building.

Example of a Ring Topology

Ring Topology Cont. Advantages: Makes it easier for many computers to coordinate communication with each other on the Network. Disadvantage: If there is a break in the line, i.e. a computer failure, communication on the network stops.

Self Healing Token Ring Networks Fixes the disadvantages of Ring networks (Breaks in the line) The Ring contains two Rings  An outer ring where most of the communication takes place  An Inner ring – only used when there is a break in the communication line When there is a break in the communication line, all traffic is diverted to the Inner Ring.

Example of a Self Healing Token Ring Network SONET

Bus Topology Each computer is attached logically in a straight path. The physical location of the computers are independent from the topology (each computer can be located on separate floors). The ends of a bus network must be terminated or echo noise will result.

Example of a Bus Topology

Bus Topology Cont. Advantage: requires less wiring than star topology networks (often the reason why it was used in earlier LAN’s) Disadvantage: Like the ring, if there is a break in a wire or a computer is down, the network communication is broken.

Ethernet Standards and Protocols

Manchester Encoding As signals are transmitted on the transmission media, they are timed with specific time slices. Each one and zero that is sent over the network are interpreted by the receiver in the middle of each time slice.

Manchester Encoding Cont. Considered to be edge trigered.  The rising edge of a signal will be interpreted as a 1.  The falling edge of a signal will be interpreted as a 0. The sender and receiver are synchronized by the use of a preamble.  64 alternating ones and zero’s are sent to synchronize the sender and receiver.  Once received, the receiver can accurately determine the time slices for the message sent.

CSMA (Carrier Sense on Multiple Access Networks) Uses electrical activity on the network to determine status. Each message that is sent is sent in the form of a frame (packet) Each sender will check the network for a “clear” (No Carrier signals are present) opportunity to send a message. Checking for a Carrier signal is called Carrier Sense (Where CSMA)

CSMA/CD (Collision Detection) CSMA/CD uses the same technology as CSMA, but provides a means to detect multiple computers sending at the same time (collisions). Collisions cause the original message to become changed. Detecting the changes in the original messages detects the collision that occurred.

CSMA/CD Cont. When a collision is detect retransmission is needed. Each computer will retransmit after waiting a random amount of time and then retransmit their original messages. If a collision occurs again, each computer again will pick a greater amount of time to wait and then retransmit their messages.

CSMA/CA (Collision Avoidance) Used primarily in Wireless networks and APPLETALK With wireless networks it is difficult to “Detect” a collision on the network due to distance. The sender sends a control message to the receiver.

CSMA/CA Receiver will send an acknowledgement if it is ready to receive a message. There can still be collisions with the control messages sent. In the case of collisions, both senders can back off a random amount of time before resending the control message.

AppleTalk (Local Talk) A wired implementation of the CMSA/CA Standard. Similar to the wireless version, a sender sends a small signal to reserve the BUS (network) All other computers refrain from using the network until the sender transmits its frame.

AppleTalk (CMSA/CA) Cont. Advantages:  Cheap to implement in hardware.  The control message is relatively small so there is little overhead created for transmission of data. Disadvantages: Even with the low overhead, the transmission speed tops out at kbps

Token Ring Network Standards

The use of Tokens Sometimes called Token Passing Networks An electronic signal is passed around the ring to each computer. If a Sender wishes to send a message, that sender will reserve the “token” and then send its Frame

The use of Tokens Cont. When the frame is sent the token is released Each computer on the ring then has an equal chance to get the token and send a frame. If no computer reserves the “token”, the “token” is just passed from computer to computer on the ring until it is picked up.