Network Topologies PDF

Document Details

Uploaded by Deleted User

Tags

network topologies network design computer networking network architecture

Summary

This document provides an overview of network topologies, discussing different types such as star, bus, ring, tree, and mesh topologies. It details the advantages and disadvantages of each topology, emphasizing their applications in various network designs.

Full Transcript

IT2203 Network Reference Models Network Topologies (Huawei, 2022) It is a schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection. Star Topology – in this type of topology, the computers are connected to a si...

IT2203 Network Reference Models Network Topologies (Huawei, 2022) It is a schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection. Star Topology – in this type of topology, the computers are connected to a single hub through a cable. This hub is the central node while all other nodes are connected to it. o Advantages: New nodes can be easily added to the network. Communication data must be forwarded by the central node, which facilitates network monitoring. o Disadvantages: Faults on the central node affect the entire network's communication. Bus Topology – a network type in which every computer and network device is connected to a single cable. When it has exactly two (2) endpoints, then it is called Linear Bus Topology. All nodes are connected through a bus (ex. coaxial cable). o Advantages: The installation is simple and cable resources are saved. Generally, the failure of a node does not affect the communication of the entire network. o Disadvantages: A bus fault affects the communication of the entire network. The information sent by a node can be received by all other nodes, resulting in low security. Ring Topology – forms a ring as each computer is connected to another computer, with the last one (1) connected to the first—exactly two (2) neighbors for each device. o Advantages: Cables resources are saved. o Disadvantages: It is difficult to add new nodes. The original ring must be interrupted before new nodes are inserted to form a new ring. Tree Topology – has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three (3) levels to the hierarchy. o Advantages: Multiple star networks can be quickly combined, facilitating network expansion. o Disadvantages: A fault on a node at a higher layer is more severe. Mesh Topology – a point-to-point connection to other nodes or devices. All the network nodes are connected. o Partial Mesh Topology – in this topology, some systems are connected in the same fashion as mesh topology, but some devices are only connected to two (2) or three (3) devices. ▪ Advantages: The cost of a partial-mesh network is lower than that of a full-mesh network. PARTIAL ▪ Disadvantages: The reliability of a partial-mesh network is lower than that of a full-mesh network. o Full Mesh Topology – each node or device is connected. ▪ Advantages: It has high reliability and high communication efficiency. ▪ Disadvantages: Each node requires a large number of physical ports and interconnection cables. As a result, the cost is high, and it is difficult to expand. FULL 02 Handout 1 *Property of STI  [email protected] Page 1 of 5 IT2203 Hybrid Topology – it consists of a mix of two (2) different types of topologies merging as one network. o In actual networking, multiple types of topologies may be combined based on the cost, communication efficiency, and reliability requirements. Common Network Devices (Huawei, 2022) Terminal device It is the end-device of the data communication system. It provides the necessary functions required by the user access protocol operations. This includes data terminal equipment (DTE) such as a PC, phone, handsets, printers, and servers. A network interface card (NIC) is a key component that connects directly to a device that allows access to a network such as an internet or a local network. Switch It is the device closest to end-users, used to access the network and switch data frames. Switches belonging at the access layer are usually Layer 2 switches, also known as Ethernet switches. A broadcast domain is a set of nodes that can receive broadcast packets from a node. The Ethernet switch can implement the following functions: o Data frame switching o Access to end-user devices o Basic access security functions o Layer 2 link redundancy. Router It is a network-layer device that forwards data packets on the Internet. A modem is a device that connects a network to the Internet. It takes signals from your Internet service provider (ISP) and translates them into signals connected to the local devices. Gateway is a term for a router that provides functions such as protocol conversion, route selection, and data exchange when networks using different architectures or protocols communicate with each other. Firewall It is a network security device used to ensure secure communication between two networks. o It monitors, restricts, and modifies data flows passing through it to shield information, structure, and running status of internal networks from the public network o It is located between two (2) networks with different trust levels (for example, between an intranet and the Internet). o It controls the communication between the two networks and forcibly implements unified security policies to prevent unauthorized access to important information resources. 02 Handout 1 *Property of STI  [email protected] Page 2 of 5 IT2203 Wireless Devices It is a network that uses radio waves, laser, and infrared signals to replace some or all transmission media in a wired LAN. Common Wi-Fi is a WLAN technology based on the IEEE 802.11 family of standards. o Fat Access Point (Fat AP) applies to homes. It works independently and needs to be configured separately. It has simple functions and low costs. o Fit Access Point (Fat AP) applies to medium- and large-sized enterprises. It needs to work with the AC and is managed and configured by the AC. o Access Controller (AC) is generally deployed at the aggregation layer of the entire network. The AC provides wireless data control services featuring large capacity, high performance, high reliability, easy installation, and easy maintenance. Networking based on Geographical Coverage Local Area Network (LAN) o A LAN generally covers an area of a few square kilometers. o The main function is to connect several terminals that are close to each other (within a family, within one or more buildings, within a campus, for example). Technologies used: Ethernet and Wi-Fi. Metropolitan Area Network (MAN) o A MAN is a large-sized LAN, requiring high costs but can provide a higher transmission rate. It improves the transmission media in LANs and expands the access scope of LANs (able to cover a university campus or city). o The main function is to connect hosts, databases, and LANs at different locations in the same city. o Technologies used: Ethernet (10 Gbit/s or 100 Gbit/s) and WiMAX. Wide Area Network (WAN) o A WAN generally covers an area of several kilometers or larger (thousands of kilometers for example). o It is mainly used to connect several LANs or MANs that are far from each other (for example, across cities or countries). Telecom operators' communication lines use HDLC and PPP. 02 Handout 1 *Property of STI  [email protected] Page 3 of 5 IT2203 OSI Reference Model (Huawei, 2020) The Open Systems Interconnection (OSI) model is a descriptive network scheme. The OSI model describes how information or data makes its way from application programs through a network medium to another application program located on another network. LAYER 7: APPLICATION LAYER is the OSI layer that is closest to the user. It provides network services to the user’s applications such as spreadsheet programs, word processing programs, and bank terminal programs. o The application layer establishes the availability of intended communication partners, synchronizes, and establishes agreement on procedures for error recovery and control of data integrity. LAYER 6: PRESENTATION LAYER ensures that the information that the application layer of one (1) system sends out is readable by the application layer of another system. o If necessary, the presentation layer translates between multiple data formats by using a common format. Provides encryption and compression of data. Examples: JPEG, MPEG, ASCII, HTML. LAYER 5: SESSION LAYER defines how to start, control and end conversations (called sessions) between applications. It also synchronizes dialogue between two (2) hosts’ presentation layers and manages their data exchange. LAYER 4: TRANSPORT LAYER regulates information flow to ensure end-to-end connectivity between host applications reliably and accurately. This layer segments data from the sending host’s system and reassembles the data into a data stream on the receiving host’s system. LAYER 3: NETWORK LAYER defines end-to-end delivery of packets. It defines how routing works (identifying endpoints) and how routes are learned so that the packets can be delivered. o The network layer defines how to fragment a packet into smaller packets to accommodate different media. Examples: Routers operate at Layer 3 - IP, IPX, AppleTalk. LAYER 2: DATA LINK LAYER provides access to the networking media and physical transmission across the media and this enables the data to locate its intended destination on a network. o The data link layer provides reliable transit of data across a physical link by using the Media Access Control (MAC) addresses. o This layer is concerned with network topology, network access, error notification, ordered delivery of frames, and flow control. Examples: Ethernet, Frame Relay, FDDI. LAYER 1: PHYSICAL LAYER deals with the physical characteristics of the transmission medium. It defines the electrical, mechanical, procedural, and functional specifications for achieving, maintaining, and deactivating the physical link between end systems. o Such characteristics as voltage levels, the timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. Examples: EIR/TIA-232, RJ45, NRZ. TCP/IP Model It is a networking model with a set of communication protocols for the Internet and similar networks. It is commonly known as TCP/IP because its Transmission Control Protocol and Internet Protocol (IP) were the first networking protocols defined in this model. Internet Protocol (IP) provides basic communication. Transmission Control Protocol (TCP) provides key functions that applications need. APPLICATION LAYER represents an interface through a variety of protocols that enable services to be applied to end-user application processes. These services include handling high-level protocols, issuing of representation, encoding, and dialog control. TRANSPORT LAYER is responsible for reliable end-to-end data delivery from the source host to the destination host. INTERNET LAYER (Network) is responsible for the delivery of service requests that respond from the transport layer and have them arrive at their destination through the “virtual network” image of the Internet. NETWORK ACCESS LAYER is also called the host-to-network layer, which is concerned with all of the issues that an IP packet requires to make a physical link to the network media. The network interface layer functions include mapping the IP addresses to physical hardware addresses and encapsulation of IP packets. 02 Handout 1 *Property of STI  [email protected] Page 4 of 5 IT2203 Comparison of OSI Reference Model to TCP/IP Model (Williams, 2021) The OSI Model is a logical and conceptual model that defines network communication used by systems open to interconnection and communication with other systems. On the other hand, TCP/IP helps you determine how a specific computer should be connected to the Internet and how you can be transmitted between them. OSI follows a vertical approach, whereas TCP/IP follows a horizontal approach. The OSI model’s, transport layer is only connection-oriented, whereas the TCP/IP model is both connection-oriented and connectionless. OSI model is developed by ISO (International Standard Organization), whereas TCP Model is developed by ARPANET (Advanced Research Project Agency Network). OSI model helps you standardize router, switch, motherboard, and other hardware whereas TCP/IP helps you establish a connection between different types of computers. References: Comer, D. (2019). The internet book: Everything you need to know about computer networking and how the Internet works. CRC Press. Huawei. (2020). HCIA-Datacom V1.0 Training Material. Karumanchi, N., Damodaram, A., & Rao, S. (2020). Elements of computer networking: An integrated approach. Career Monk. Kurose, T & Ross, K. (2021). Computer networking: A top-down approach. Pearson. Robertazzi, T. (2017). Introduction to computer networking. Springer International. Williams, L. (2021). TCP/IP vs OSI model: What’s the difference? [Web Article]. Retrieved on January 21, 2020, from https://www.guru99.com/difference-tcp-ip-vs-osi-model.html 02 Handout 1 *Property of STI  [email protected] Page 5 of 5

Use Quizgecko on...
Browser
Browser