Professional Documents
Culture Documents
Chapter 6:
Topologies and Access Methods
Objectives
Describe the basic and hybrid LAN physical
topologies, and their uses, advantages, and
disadvantages
2
Objectives (continued)
3
Simple Physical Topologies
• Physical topology is the physical layout,
or pattern, of the nodes on a network
4
Simple Physical Topologies
(continued)
• Bus
• A bus topology consists of a single cable
connecting all nodes on a network without
intervening connectivity devices
• The single cable is called the bus and can support
only one channel for communication
• Most bus networks use coaxial cable as their
physical medium
• At the ends of each bus network are 50-ohm
resistors known as terminators
• Extra stations can be added in a daisy chain manner
5
• Standard is IEEE 802.3
• Thin Ethernet (10Base2) has a maximum segment
length of 200m
• Max no. of connections is 30 devices
• Four repeaters may be used to a total cable length of
1000m
• Max no. of nodes is 150
6
7
• Advantages
• Inexpensive to install
• Easy to add stations
• Use less cable than other topologies
• Works well for small networks
Disadvantages
• No longer recommended
• Backbone breaks, whole network down
• Limited no of devices can be attached
• Difficult to isolate problems
• Sharing same cable slows response rates
8
Simple Physical Topologies
(continued)
• Ring
• In a ring topology, each node is connected to the two
nearest nodes so that the entire network forms a circle
• Data is transmitted clockwise, in one direction
(unidirectional), around the ring
• The fact that all workstations participate in delivery makes
the ring topology an active topology
• A ring topology also differs in that it has no “ends” and data
stops at its destination and, twisted-pair or fiber-optic cabling
is used as the physical medium22
• Most common type is Token Ring (IEEE 802.5)
• A token contains the data, reaches the destination, data
extracted, acknowledgement of receipt sent back to transmitting
device, removed, empty token passed on for another device to
use
9
10
• Advantages
• Data packets travel at great speed
• No collisions
• Easier to fault find
• No terminators required
Disadvantages
• Requires more cable than a bus
• A break in the ring will bring it down
• Not as common as the bus – less devices
available
11
Simple Physical Topologies
(continued)
• In a star topology, every node on the
network is connected through a central
device, such as a hub or switch
• Star topologies are usually built with twisted-pair
or fiber-optic cabling
• Star topologies require more cabling than ring or
bus networks
• Each node is separately connected to a central
connectivity device, they are more fault-tolerant
12
13
14
• Advantages
• Easy to add devices as the network expands
• One cable failure does not bring down the
entire network (resilience)
• Hub provides centralised management
• Easy to find device and cable problems
• Can be upgraded to faster speeds
• Lots of support as it is the most used
15
• Disadvantages
• A star network requires more cable than a
ring or bus network
• Failure of the central hub can bring down
the entire network
• Costs are higher (installation and
equipment) than for most bus networks
16
Extended Star Topology
A Star
Network
which has
been
expanded to
include an
additional
hub or hubs.
17
Mesh Topology (Web)
18
Mesh Topology (2)
• Not common on LANs
• Most often used in WANs to interconnect
LANS
• Each node is connected to every other
node
• Allows communication to continue in the
event of a break in any one connection
• It is “Fault Tolerant”
19
Mesh Topology (3)
Disadvantages
Advantages
• Expensive
• Improves Fault • Difficult to install
Tolerance
• Difficult to
• Provides security manage
and privacy
• Difficult to
troubleshoot
20
Hybrid Topology
21
Hybrid Topology (2)
23
Hybrid Physical Topologies
(continued)
24
Hybrid Physical Topologies
(continued)
• More expensive than using either the star or,
especially, the bus topology alone because it
requires more cabling and potentially more
connectivity devices
25
Tree Topology
• A tree topology combines characteristics of
linear bus and star topologies.
• It consists of groups of star-configured
workstations connected to a linear bus
backbone cable .
• Tree topologies allow for the expansion of
an existing network, and enable schools to
configure a network to meet their needs.
26
27
Advantages
•Point-to-point wiring for individual segments.
•Supported by several hardware and software venders.
Disadvantages
Overall length of each segment is limited by the type of cabling
used.
If the backbone line breaks, the entire segment goes down.
More difficult to configure and wire than other topologies.
28
Backbone Networks
• A network backbone is the cabling that connects
the hubs, switches, and routers on a network
29
Backbone Networks (continued)
30
Backbone Networks (continued)
• Serial Backbone
• The simplest kind of backbone
• It consists of two or more internetworking devices
connected to each other by a single cable in a
daisy-chain fashion
• In networking, a daisy chain is simply a linked
series of devices
• Hubs and switches are often connected in a daisy
chain to extend a network
31
Backbone Networks (continued)
• Distributed Backbone
• Consists of a number of connectivity devices connected
to a series of central connectivity devices such as hubs,
switches, or routers, in a hierarchy
32
Backbone Networks (continued)
33
Backbone Networks (continued)
• Collapsed Backbone
• Uses a router or switch as the single central
connection point for multiple subnetworks
• A single router or switch is the highest layer of the
backbone6
• The router or switch that makes up the collapsed
backbone must contain multiprocessors to handle
the heavy traffic going through it
• This arrangement allows you to interconnect
different types of subnetworks
34
Backbone Networks (continued)
• Parallel Backbone
• The most robust type of network backbone
• The most significant advantage of using a parallel
backbone is that its redundant (duplicate) links
ensure network connectivity to any area of the
enterprise
• Parallel backbones are more expensive than other
enterprise-wide topologies
• They make up for the additional cost by offering
increased performance and better fault tolerance
35
Logical Topologies
36
Switching
37
Switching (continued)
• Circuit Switching
• A connection is established between two network
nodes before they begin transmitting data
39
Switching (continued)
40
Switching (continued)
• Packet Switching is the most popular
method for connecting nodes on a
network
• Breaks data into packets before they are
transported
• Packets can travel any path on the network to their
destination
• When packets reach their destination node, the
node reassembles them based on their control
information
• Does not waste bandwidth by holding a
connection open until a message reaches its
destination
41
Ethernet
• Carrier Sense Multiple Access with
Collision Detection (CSMA/CD)
42
Ethernet (continued)
43
Ethernet (continued)
• The NIC will issue a special 32-bit sequence that
indicates to the rest of the network nodes that the
its previous transmission was faulty and that those
data frames are invalid which is called jamming
44
Ethernet (continued)
• Switched Ethernet
• Traditional Ethernet LANs, called shared Ethernet,
supply a fixed amount of bandwidth that must be
shared by all devices on a segment, and all nodes
on that segment belong to the same collision
domain
• Switched Ethernet enables multiple nodes to
simultaneously transmit and receive data over
different logical network segments
• Using switched Ethernet increases the effective
bandwidth of a network segment because fewer
workstations must vie for the same time on the
wire
45
Ethernet (continued)
• Ethernet Frames
• Ethernet networks may use one (or a combination)
of four kinds of data frames: Ethernet_802.2
(“Raw”), Ethernet_802.3 (“Novell proprietary”),
Ethernet_II (“DIX”), and Ethernet_SNAP
46
Ethernet (continued)
• Using and Configuring Frames
• You can use multiple frame types on a network, but
you cannot expect interoperability between the
frame types
47
Ethernet (continued)
48
Ethernet (continued)
49
Ethernet (continued)
• Ethernet_II frame type contains a 2-byte type field.
This type field identifies the Network layer protocol
(such as IP,ARP, RARP, or IPX) contained in the
frame
50
Ethernet (continued)
51
LocalTalk
• LocalTalk is a network access method designed by
Apple Computer, Inc. specifically for networking
Macintosh computers
• It provided a simple, cost-effective way of
interconnecting Macintosh devices
• LocalTalk uses a transmission method called Carrier
Sense Multiple Access with Collision Avoidance
(CSMA/CA)
• LocalTalk relies on the AppleTalk protocol, but it may
also support the Macintosh version of TCP/IP called
MacTCP
52
Token Ring
53
Token Ring (continued)
54
Token Ring (continued)
55
Fiber Distributed Data Interface
(FDDI)
• A network technology whose standard was originally
specified by ANSI in the mid-1980s and later refined
by ISO
• FDDI (pronounced “fiddy”) uses a double ring of
multimode or single mode fiber to transmit data at
speeds of 100 Mbps
• FDDI is more reliable and more secure than
transmission methods that depend on copper wiring
• FDDI works well with Ethernet 100BaseTX
technology
• FDDI technology has a high cost relative to Fast
Ethernet
56
Asynchronous Transfer Mode (ATM)
57
ATM (continued)
• Establishing a reliable connection allows ATM to
guarantee a specific Quality of Service (QoS) for
certain transmissions
58
Wireless Networks
60
Wireless Networks (continued)
• Association
• In the context of wireless networking,
communication that occurs between a station and
an access point to enable the station to connect to
the network via that access point
61
Wireless Networks (continued)
• There are two types of scanning: active and passive
• In active scanning, the station transmits a special
frame, known as a probe, on all available
channels within its frequency range
• In passive scanning, a wireless station listens on
all channels within its frequency range for a
special signal, known as a beacon frame, issued
from an access point
• Service Set Identifier (SSID), a unique character
string used to identify an access point
• A station might choose a different access point
through a process called re-association
62
Wireless Networks (continued)
• Frames
• For each function, the 802.11 standard specifies a
frame type at the MAC sublayer
• These multiple frame types are divided into three
groups: management, control and data
• Management frames are those involved in association
and re-association, such as the probe and beacon
frames
• Control frames are those related to medium access
and data delivery, such as the ACK and RTS/CTS
frames
• Data frames are those that carry the data sent
between stations
63
Wireless Networks (continued)
• 802.11b
• Also known as “Wi-Fi,” for Wireless Fidelity
• Uses direct sequence spread spectrum (DSSS)
signaling
67
Wireless Networks (continued)
• HomeRF
• HomeRF is a wireless networking specification
developed by the HomeRF Working Group
69
Summary (continued)
70