Ring topology was in the
beginning of LAN area. In a ring topology, each system is connected to the next
as shown in the following picture.
Each device has a
transceiver which behaves like a repeater which moves the signal around the
ring; ideal for token passing access methods. In this topology signal
degeneration is low; only the device that holds the token can transmit which
reduces collisions. If you see its negative aspects it is difficult to locate a
problem cable segment; expensive hardware.
Star
Topology:
In a star topology each
station is connected to a central node. The central node can be either a hub or
a switch. The star topology does not have the problem as seen in bus topology.
The failure of a media does not affect the entire network. Other stations can
continue to operate until the damaged segment is repaired.
Commonly used for
10BASE5, 10BASE-T or 100BASE-TX types.
The advantages are cabling is inexpensive, easy to write, more reliable
and easier to manage because of the use of hubs which allow defective cable
segments to be routed around; locating and repairing bad cables is easier
because of the concentrators; network growth is easier.
The Disadvantages are all nodes receive the same signal therefore
dividing bandwidth; Maximum computers are 1,024 on a LAN. Maximum UTP (Un
Shielded Twisted Pair) length is 100 meters; distance between computers is 2.5
meters.
Mesh
Topology:
A mesh physical topology
is when every device on the network is connected to every device on the
network; most commonly used in WAN configurations helps find the quickest route
on the network; provides redundancy. Very expensive and not easy to set up.
Hybrid Topology:
A
hybrid topology is a combination of any two or more network topologies in such
a way that the resulting network does not have one of the standard forms. For examples,
a tree network connected to a tree network is still a tree network, but two-star
networks connected together exhibit hybrid network topologies. A hybrid
topology is always produced when two different basic network topologies are
connected.
The OSI Model
It
has seven layers. They are separate but related. Each layer has well defined
tasks and provides services to the corresponding lower layer while
transmission. In receiving mode, the lower layer provides the necessary
services to the upper layer. Any changes in one layer should not require
changes in other layers. This kind of standardization allows communication
across all types of computers.
The Seven layers of OSI and their
conceptual services –
·
Application
– (Layer – 7): allows application to use the network. The
user may want to access the network for various purposes. Like for sending
e-mail, transferring a file, surfing the web, dedicated service.
Services
– e-mail,
news groups, web applications, file transfer, remote host, directory services,
network management, file services
Easy to remember
these layers!..... Please Do Not Touch Sai Pet Animal
·
Presentation – (Layer – 6): Translates data into a form usable
by the application layer. The redirector operates here. Responsible for
protocol conversion, translating and encrypting data, and managing data
compression. Messages are sent between layers
Services – Pop, SMTP (email, post office
protocol, Simple Mail Transfer protocol), Usenet (for news groups), HTTP (hyper
text transfer protocol for web applications), FTP, TFTP (File Transfer
Protocol, Trivial FTP for file transfer), Telnet (Terminal Network, A general
purpose program enabling remote login into some other computer and function as
if it is directly connected to that remote computer), Domain name Server
(finding IP addresses for domain names), SNMP (simple network management
protocol).
·
Session – (Layer 5): Allows applications on connecting systems to standard
ports & establish a session. Provides synchronization between communicating
computers. Messages are sent between layers
Services – Various port numbers are POP (25),
USENET (532), HTTP (80), FTP (20/21), Telnet (23), DNS (53), SNMP (161/162)
etc…
·
Transport – (Layer 4): Responding for packet handling. Ensures error – free
delivery. Repackages messages (while receiving), divides messages into smaller
packets (while transmitting), and handles error handling. Segments of message
fragments are sent between layers.
Services – TCP – Connection – oriented
communication for application to ensure error free delivery; UDP –
connectionless communications and does not guarantee packet delivery between
transfer points.
·
Network – (Layer 3): Translate system names into addresses. Responsible for
addressing determining routes for sending, managing network traffic problems,
packet switching, routing, data congestion, and reassembling data. Datagrams
are sent between layers.
Services- Software & hardware addresses
and packet routing between hosts and networks (IP). Two versions IP4 (32bits)
& IP6(128bits)
·
Data Link – (Layer 2): Sends data from network layer to physical layer. Manages
physical layer communications between connecting systems. Data frames are sent
between layers
Services – SLIP/PPP, 802.2 SNAP, Ethernet
·
Physical – (Layer 1): Transmit data over a physical
medium. Defines cables, cards, and physical aspects. Data bits are sent.
Services: ISDN, ADSL, ATM, FDDI, CAT 1-5, Coaxial
cable
The
Internet Model
There are four layers in this
model. They are 1) Application Layer 2) Transport Layer 3) Network Layer 4)
Data Link & Physical Layer.
·
Application Layer: Most of the responsibilities of
the three top most layers of OSI model are in application layer of Internet
model. The services are as depicted in the fig.
·
Transport Layer: It has two protocols. TCP
(Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is are
liable protocol that allows two application layers to converse with each other.
While transmitting it divides the stream of characters into manageable
segments. While receiving it create stream of characters for application layer
from received segments from network layer. Its function is much more than as
depicted in OSI model. Some of the responsibilities of OSI’s session layer are
dissolved into internet models transport layer defined in OSI model. It is used
when fast delivery of packets is needed without worrying much about error
control.
·
Network Layer: The main protocol is IP (Internet
Protocol) is responsible for creating network layer packets called IP
datagrams. The datagrams travel network to network or LAN to WAN and the packets
may reach out sequence. It is the responsibility of upper layers to put them
into proper order.
·
Datalink & Physical Layer: The internet model does not
discuss much about these layers making this protocol machine independent to a
large extent. It is left to the user to choose the proper standard or protocol
according to what they desire.
FTP
Servers:
One of the oldest of the internet
services, File Transfer Protocol makes it possible to move one or more files
securely between computers while providing file security and organisation as
well as transfer control.
Mail
Servers:
Almost as ubiquitous and crucial as
web servers, mail servers move and store mail over corporate networks (via LANs
and WANs) and across the internet.
Proxy
Servers:
Proxy servers sit between a client
program (typically a web browser) and a external server (typically another
server on the web) to filter requests, improve performance, and share
connections.
Telnet
Servers:
A Telnet server enables users to
log on to a host computer and perform tasks as if they’re working on the remote
computer itself.
Web
Servers:
At its core, a web server serves
static content to a web browser by loading a file from a disk and serving it
across the network to a user’s web browser and server talking to each other
using HTTP his entire exchange.
Gateways:
The internet is the collection of
heterogeneous computers with different hardware and software platforms. Without
gateways computers will never be able to understand and communicate with each other.
Essentially, gateways perform protocol translation between networks. Gateways
are generally designed and used for LAN-WAN connections and not for inter LAN
communications. Gateways function is to do any necessary conversion of
protocols between networks. Gateways are customized and designed to perform a
specific function and are used on a case-by-case basis. Gateways may do
anything from converting protocols to converting application data. Gateways
make a connection between two totally different networks.
·
Transform
the packet format
·
Transform
the address format
·
Transform
the protocol
Network
interface cards (NIC),
also called network adapters include a cable socket allowing computers to be
connected to the network. All NICs have a unique address (sometimes called a
MAC address), placed in them by their manufacturer. Before sending data onto
the network, the network card also organizes data into frames and then sends
them out on the network. Notebook computers often use NICs that are plugged
into the PCMCIA port.
Wireless LAN adapters are needed
for WLANs.
NIC
card functions:
LAN adapters have their own onboard
architectures and they carry NIC functions out several important functions out
several important functions including
·
Monitoring
activity on the communication medium
·
Providing
each workstation/server with a unique identification address (MAC)
·
Recognizing
and receiving data transmitted to the computer
·
Creating
(building) the frames needed to transmit data on the communication medium
·
Controlling
LAN transmission speed
·
Transmission
error detection and recovery
Hubs/Switches:
Hubs act as junction boxes, linking
cables from several computers on a network. Hubs are usually sold with 4,8,16
or 24 ports. Some hubs allow connection of more than one kind of cabling, such
as UTP and coax. Hubs also repeat (reconstruct and strengthen) incoming
signals. This is important since all signals become weaker with distance. The
maximum LAN segment distance for a cable can therefore be extended using hubs.
In general use Hub can be referred
to any connecting device and can be considered as multipoint repeater. Hubs can
be used to create tree structure like topology (Technically it is bus
topology). Network point of view it is a logical device and does not have an
address. The added benefit of using Hub is it removes the length restriction
100 metres in 10BaseT.
A switch is more sophisticated than
hub and can remember and check node addresses. In fact, this phenomenon can
affect logical topology of the network! They physically resemble hubs and like
hubs, they vary in number of ports, stand-alone vs. stackable, and managed vs.
unmanaged. While a hub broadcasts data frames to all ports, the switch reads
the destination address of the data frame and only sends it to the
corresponding port. The effect is to turn the network into a group of
point-to-point circuits and thus changes the logical topology of the network
from a bus to a star.
Switched Ethernet still uses
CSMA/CD media access control, but collisions are less likely as each network
segment operates independently.
For example, computer
A can send a message to computer B at the same time that computer C sends one
to computer B. if two computers send frames to the same destination at the same
time, the switch stores the second data frame in memory until it has finished
sending the first, then forwards the second.
Switched Ethernet can dramatically
improve network performance. Shared Ethernet 10BaseT networks are only capable
of using about 50% of capacity before collision are problem. Switched Ethernet,
however, runs at upto 95% on 10BaseT. Using a 10/100 switch that uses a 100BaseT
connection for the server(s) and/or routers, i.e., the network segments experiencing
the highest volume of LAN traffic, can make another performance improvement.
File Transfer
Protocol (FTP)
This
allows you to transfer files between your host and another host machine. A shell
is provided which cables you to
·
Change
directories on the host or local machine
·
Display
directories and files
·
Change
the file transfer mode (binary or Text)
·
Execute
commands
·
Delete
or rename files
·
Open
and close connections to a host
Terminal Emulation
(telnet)
This
allows you to logon to a host using terminal emulation. You can execute
commands on the host and run application software.
Domain Name Servers
This
is a hierarchical naming system for identifying host computers on networks or
the internet. each host name is comprised of domain labels separated by periods.
If your machine is connected to the internet, you assign local domain name host
names only, and your higher-level domain name is assigned to you.
For
example, the domain name assigned to Osmania university is Osmania.ac.in has the higher-level domain names of ac (academic) and
in (India). Examples of the host computers at Osmania university are called
staff, results, and www. Their host names in the domain are staff.osmania.ac.in
& results.osmania.ac.in
Simple Network
Management Protocol (SNMP)
This
provides a means for managing a network environment. Each host, router ot
gateway running SNMP can be interrogated for information related to the
network.
Examples
of information are,
·
Names
·
Packets
transmitted and received
·
Errors
·
Routing
information
Web Browsers:
Simply
putting, a browser is a program that reads HTML (Hyper Text Markup Language,
the programming language of the web) and displays it to the viewer.
While
there is currently one recognised standard language used to write web pages
(HTML4), there are a myriad of browsers available to view it with. Choosing the
right one for your individual needs can help maximize your web experience,
which will also cut down on installations and uninstallations.
Currently
the two most popular browsers are Microsoft
Internet Explorer, and Netscape
Navigator, Microsoft Internet Explorer is by far more wide spread in use
and is one of the most popular browsers to gain wide use and supports most HTML
functions but not the newest attributes like frames or animated images.
Repeaters:
Since
a signal loses strength as it passes along a cable, it is often necessary to
boost the signal with a device called a repeater. The repeater electrically
amplifies the signal it receives and rebroadcasts it. Repeaters can be separate
devices or they can be incorporated into a concentrator.
They
are used when the total length of your network cable exceeds the standards set
for the type of cable being used.
A
good example of the use of repeaters would be in a local area network using a
star topology with unshielded twisted-pair cabling. The length limit for
unshielded twisted-pair cable is 100 meters. The most common configuration is
for each workstation to be connected by twisted-pair cable to a multi-port
active concentrator. The concentrator amplifies all the signals that pass
through it allowing for the total length of cable on the network to exceed the
100meter limit.
Bridges:
A
bridge is a device that allows you to segment a large network into two smaller,
more efficient networks. If you are adding to an older wiring scheme and want
the new network to be up-to-date, a bridge can connect the two.
A
bridge monitors the information traffic on both sides of the network so that it
can pass packets of information to the correct location. Most bridges can “listen”
to the network and automatically figure out the address of each computer on
both sides of the bridge. The bridge can inspect each message and, if necessary,
broadcast it on the other side of the network. The bridge manages the traffic to
maintain optimum performance on both sides of the network. You might say that
the bridge is like a traffic cop at a busy intersection during rush hour. It keeps
information flowing on both sides of the network, but it does not allow unnecessary
traffic through. Bridges can be used to connect different types of cabling, or
physical topologies. They must, however, be used between networks with the same
protocol.
Routers:
A
router translates information from one network to another; it is similar to a
super intelligent bridge. Routers select the best path to route a message,
based on the destination address and when to direct traffic to prevent head-on
collisions, and is smart enough to know when to direct traffic along back roads
and shortcuts.
While
bridges know the addresses of all computers on each side of the network,
routers know the addresses of computers, bridges, and other routers on the
network. Routers can even “listen” to the entire network to determine which
sections are busiest – they can then redirect data around those sections until
they clear up.
If
you have a school LAN that you want to connect to the internet, you will need
to purchase a router. In this case, the router serves as the translator between
the information on your LAN and the internet. It also determines the best route
to send the data over the internet.
Routers
can:
·
Direct
signal traffic efficiently
·
Route
messages between any two protocols
·
Route
messages between linear bus, star, and star wired ring topologies
·
Route
messages across fibre optic, coaxial, and twisted-pair cabling
Switch:
A concentrator is a
device that provides a central connection point for cables from work station,
servers and peripherals. In a star topology, twisted pair wire is run from each
work station to a central switch/hub. Most Switches are active.
No comments:
Post a Comment