Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Network topologies man
Network topologies analyses
Network topologies man
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Network topologies man
Network Topologies:
The connection lines between the devices connected within a network define the topology of a network. The arrangement of the components of network within a network is called network topology. Some topologies are:
Bus Topology.
Ring Topology.
Star Topology.
Mesh Topology.
Tree Topology.
Hybrid Topology.
You should definitely search for the topology diagrams for the above mentioned topologies.
Bus Topology:
In this topology, every device is connected to the same line of a cable. In this topology, data us transmitted only in one direction.
Ring Topology:
Every device is connected with the cable in the form of a ring. In this topology, data is transmitted in a sequential manner.
Star Topology:
In star topology,
…show more content…
Number of channels to link a particular number of channel is decided by the formula n (n-1)/2
Where ‘n’ is the number of devices to be connected.
Tree Topology:
In this topology, there is a device which called root, and all the other devices are connected on different levels to that root device.
Hybrid Topology:
In hybrid topology, above mentioned two or more topologies are used.
Communication Technologies:
There 3 types of communication technology in networking.
Internet.
Intranet.
Extranet.
Internet:
Different devices which are interconnected with each other and communicate with each other, form an internet.
Intranet:
It is a network of limited devices connected with each other. It is a private network, in which computers communicate with each other which are within the same network. No outside device can communicate with devices connected in intranet.
Extranet:
It is also a kind of intranet, but the only difference is some authorized computers from outside of that private network can also communicate with devices within the network.
Note: Wireless devices connect to the internet via Access
…show more content…
It has 7 layers, every layer has its own operational functionality. All the operations which are performed in networking, work on any one of these layers. Before going into further details, consider the diagram below, which represents the 7 layers along with the description of the task they actually do. All the readers are recommended to learn the names of the layers along with their function in detail as it is important from interview perspective. All the operations which are performed by network components or any kind of operation which includes network protocols work on any of these layers. For example, consider a network application based on File Transfer Protocol (FTP), will operate on the first layer of the OSI. It means that this network application will undergo all the operations defined by the layers below application layer. Considering the application, we are talking about, it will hence undergo following procedure when it will be under execution:
I. Connecting to the network (Application Layer).
II. Arranging data to be transmitted in a standard for (Presentation
The World Wide Web and the internet is not the same thing, and they are often confused with being the one and same. However, the internet existed long before the www (World Wide Web). The internet refers to the massive network of computers stretching all over the world. The word internet also found its origin through this, the word comes from the two words interconnected and network. Though we can all with each other through internet, all the computers are not connected to the one and same mega computer. For each network there are one or several computers that hold the information that is needed to access all the information. This arrangement is known as the client-server architecture.
“Network topology is the arrangement of the various network elements such as node, link, of computer network. Basically, it is topological structure of a network which ether be physically or logically.”
In conclusion, a local area network is made up of computers and a myriad of devices, such as routers, servers, switches, and firewalls. In order for it to connect to the Internet, a router must be installed. Servers provide special functions such as printing, file sharing, etc. Switches connect the computers together from different parts of the network. Firewalls prevent unauthorized access. There are a host of other devices that may be used as well. These devices are hubs, gateways, repeaters, wireless access points,
Two of the pairs of two represent network and host, One identifies the network an the second part indentifies the node, or host.
In this topology, all nodes are connected to a central device, usually a hub or a switch. Each connected device has a dedicated, point-to-point connection between the device and the hub. The star network topology is by far the most widely implemented topology in use today.
MAC Layer Connections: Management connections and data transport connections are two connections in this layer. The management connections have three types: basic, primary, and secondary. A basic connection and primary connection are created for each MS when they join the network. A basic connection is used for short and urgent management message. And a primary connection is used for delay-tolerant management messages. The secondary connection is used for IP summarized management messages such as dynamic host configuration protocol [DHCP], and simple network management protocol [SNMP]. Transport connections can be provisioned or can be recognized on demand. They are used for user traffic flows. Unicast or multicast can be used for transmission.
To attempt to define a network in a few sentences would be a fool’s errand. A network could be seen as simply a grid of interconnecting connections between multiple bodies. However when this vision is applied to real-world systems, they all start to differ. There is not anything that exists in the universe that is not part of a network. A network is the result of different parts or members which have similarities in parts of their identity. This similarity that they have in common, they will also have with other bodies forming a network between them. Most of these factors of identity are different from those of most others. As a result, each factor will be in common with different other members of different networks. Each factor includes this body in a multitude of networks. This means that no one thing is in one and only one network, but is included in many.
Generally speaking, typical scenario of communications networks interaction consists in a bunch of devices trying to communicate with each other by using the same medium. Home wireless networks, cellular networks, Ethernet environments are only a few examples of this setting.
Networks are designed in a number of ways, based on the geographical area, the technology used, user group specific, application based etc. But we can roughly categorize the communication networks in 2 broad categories, based on transmission: Connection-Oriented and Connectionless.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
Figure 2.11 above shows the network topology in a single lab. In the lab, a star topology is used to connect a printer, a wireless access point and 50 personal computers with a single special device known as switch. Instead of using hub, a switch is used to identify which computer system is connecting to which port. Switch knows exactly where a frame is received from and which port it wants to send to, without increasing the network response time. Unlike a hub which divides the bandwidth among the systems when multiple PCs are broadcasting, switch enables system users to access the maximum amount of bandwidth regardless the number of PCs transmitting. Thus, a switch is considered as a better choice than a hub because it maintains the performance instead of degrading.
TCP/IP operates at both levels 3 and 4 of the OSI model. The TCP portion of TCP/IP operates at level 3 (Network) as its primary function is to control the flow of data. IP operates at level 4 (Transport) of the OSI model. IP is the protocol responsible for the actual transmission of packet across the network.
Network topologies have some advantages and some disadvantages as well. This essay discusses the main advantages and disadvantages of three of these main topology technologies, to mention, the ring, the bus, and the star, showing the associated wiring types for each one of these topologies.
LANs systems can be defined and connected in many different ways. This is the reason for the standardization for every one can have a common ground to start from. “The LANs described Herein are distinguished from other types of data networks in that they are optimized for a moderate size geographic area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication facilities in different parts of a country or are used as a public utility. These LANs are also different from networks, such as backplane buses, that are optimized for the interconnection of devices on a desk top or components within a single piece of equipment.”(IEEE 802 Standard 1990) That is the standard definition for LANs by Institute of Electrical and Electronics Engineer committee 802. They are the committee used to set the standard in workmanship and operations for technicians that set-up and perform maintenance on LANs systems. And through all the technical words what they are trying to say is a LAN is a small area network that distributes information among computer in a small work environment unlike WANs that distribute information across global areas.
This report will describe the two forms of data communications in terms of the physical interfaces and modes of operation. It will describe the features of data communications equipment in relation to synchronous and asynchronous communication including modems, network terminating units and sending and receiving equipment.