You are on page 1of 135

Network & Networking

Rashedul Hasan
Network

Networks are an interconnection of


computers. These computers can be
linked together using a wide variety of
different cabling types, and for a wide
variety of different purposes.
The basic reasons why computers are
networked are to share resources (files,
printers, modems, fax machines) to
share application software (MS Office)
increase productivity (make it easier to
share data amongst users)
Network

A quick definition is that ‘A computer network


is the combination of hardware, software, and
protocols that allows computers to
communicate. Like computers, computer
networks are general-purpose devices’.
In his textbook, Tanenbaum says
‘The old model of a single computer serving all
of the organization’s computational needs has
been replaced by one in which a large number
of separate but interconnected computers do
the job. These systems are called computer
networks.”
Network

Therefore a network consists of two or more


computers that are linked in order to share
resources (such as printers and CDs), exchange
files, or allow electronic communications. The
computers on a network may be linked
through cables, telephone lines, radio waves,
satellites, or infrared light beams.
Networking

Networking is the practice of linking two or


more computing devices together for the
purpose of sharing data. Networks are built
with a mix of computer hardware and
computer software.
Advantages of network

• Sharing of peripheral devices:


• Sharing of program:
• Access to data:
• High Reliability:
Sharing of peripheral devices:

Networking enables users to share hardware


like scanners and printers. In that case
Organization does not need to buy printer or
other peripheral devices for every user.
Sharing of program:

In most organizations, people use the same


software. It is less expensive for a company to
buy software that will serve many employees
than to buy separate software for each of the
employees.
It can even let users run programs that are not
installed on their own computers but are
installed elsewhere in the network.
Access to data:

Networking allows users access to data stored


on others' computers. This keeps everyone up-
to-date on the latest data.
High Reliability

Goal of computer networks is to provide high


reliability by having alternative sources of supply.
For example, all files could be replicated on two or
three machines, so if one of them is unavailable
(due to hardware failure), the other copies could
be used. In addition, the presence of multiple CPUs
means that if one goes down, the others may be
able to take over its work, although at reduced
performance. For military, banking, air traffic
control, nuclear reactor safety, and many other
applications the ability to continue operating in
the face of hardware problems is of utmost
importance.
Disadvantages of Network

• Accessing anything across a network is slower


than accessing your own computer.
• More complexity adds new problems to
handle.
• Less customization is possible for shared
programs and folders. Everyone will have to
follow the same way for storing and naming
files so others can find the right files.
Classification of Network

• Local Area Network (LAN)


• Wide Area Network (WAN)
• Metropolitan Area Network (MAN)
• Personal Area Network (PAN)
• Virtual Private Network (VPN)
A Personal Area Network (PAN)

• A Personal Area Network (PAN) is a computer


network used for communication among
computer devices close to one person. The
reach of a PAN is typically a few meters.
• Some examples of devices that are used in a
PAN are printers, fax machines, telephones,
PDAs and scanners.
Local Area Network (LAN)

LAN covers only a small geographic area.


Local Area Network (LAN)

A local area network (LAN) is a computer


network covering a small physical area, like a
home, office, or small group of buildings, such
as a school, or an airport. This is a network
covering a small geographic area, like a home,
office, or building.
Local Area Network (LAN)
Most LANs connect workstations and personal computers.
Each node (individual computer) in a LAN has its own CPU
with which it executes programs, but it is also able to
access data and devices anywhere on the LAN. This means
that many users can share expensive devices, such as laser
printers, as well as data. Users can also use the LAN to
communicate with each other, by sending e-mail or
engaging in chat sessions.
There are many different types of LANs Ethernets being the
most common for PCs.
LANs are capable of transmitting data at very fast rates,
much faster than data can be transmitted over a telephone
line; but the distances are limited, and there is also a limit
on the number of computers that can be attached to a
single LAN.
Metropolitan Area Network
(MAN)

MAN does not extend beyond the boundaries of the immediate town/city
Metropolitan Area Network
(MAN)
A Metropolitan Area Network (MAN) is a
network that connects two or more Local
Area Networks. It does not extend beyond
the boundaries of the immediate
town/city. Its geographic scope falls
between a WAN and LAN. That is MANs are
larger than local-area networks (LANs), but
smaller than wide-area networks (WANs).
MANs are usually characterized by very
high-speed connections using fiber optical
cable or other digital media.
Example of MAN could be ATM.
Wide Area Network (WAN)

WAN can cross Metropolitan, Regional, or National boundaries


Wide Area Network (WAN)
A Wide Area Network (WAN) is a computer
network that covers a broad area i.e., any
network whose communications links cross
metropolitan, regional, or national boundaries.
The largest and most well-known example of a
WAN is the Internet
A WAN is a data communications network that
covers a relatively broad geographic area (i.e.
one city to another and one country to another
country)
Internet is actually a WAN
Virtual Private Networks

A virtual private network based on the


Internet Protocol provides a secure
connection between two points across the
Internet, enabling private communications to
travel securely over the public infrastructure
A Virtual Private Network using the
Internet

Figure 8-15
Virtual Private Networks

Companies all over the world are building virtual


private networks (VPN) to help reduce costs and
make it easier for customers, suppliers, and
employees to communicate. And why not? The
Internet technology offers a much cheaper
alternative to the high cost of building and
maintaining their own technology or using other
technologies that aren't built on the open
standards of the Internet. VPNs also offer
companies an extra layer of security protection
through the tunneling process because of the
"wrapping" effect not offered generic
transmissions.
LAN Vs. WAN
Distinguishing point LAN WAN

Geographic Distribution Limited Broad


[Usually a few Kilometers] [May be Several Thousand KM.]

Data Rate Transmission rate is higher Transmission rate is lower


[10Mbps-1Gbps] [1200Bps-2Mbps]

Error Rate Fewer data transmission error Higher data transmission error

Communication Link Twisted pair Cable Telephone line


Coaxial cable Microwave Link
Fiber optics Satellite

Communication Cost Negligible Very high.


Types of Networks
Type Area

Local Area Network (LAN) Up to 500 meters (half a mile); an office


or floor of a building

Personal Area Network (PAN) network used for communication


among computer devices close to one
person.
Metropolitan Area Network (MAN) A city or metropolitan area

Wide Area Network (WAN) Transcontinental or global area


Network Architecture

• Client-server Network
• Peer-to-Peer
Peer-to-Peer

On a peer-to-peer network, all


microcomputers on the network can
communicate directly with one another
without relying on a server.
Peer-to-Peer networks are much more common
in homes.
This differs from client/server architectures,
in which some computers are dedicated to
serving the others. Peer-to-peer networks are
generally simpler and less expensive, but they
usually do not offer the same performance
under heavy loads.
Peer-to-Peer
Peer-to-Peer
Peer-to-peer network operating systems allow
users to share resources and files located on
their computers and to access shared resources
found on other computers. However, they do
not have a file server or a centralized
management source (See fig. 1). In a peer-to-
peer network, all computers are considered
equal; they all have the same abilities to use
the resources available on the network. Peer-
to-peer networks are designed primarily for
small to medium local area networks.
AppleShare and Windows for Workgroups are
examples of programs that can function as
peer-to-peer network operating systems.
Advantages of a peer-to-peer
network:

• Less initial expense - No need for a dedicated


server.
• Setup - An operating system (such as Windows
XP) already in place may only need to be
reconfigured for peer-to-peer operations.
Disadvantages of a peer-to-
peer network:

• Decentralized - No central repository for files


and applications.
• Security - Does not provide the security
available on a client/server network.
Client-server Network
Client-server network consists of clients, which are
microcomputers that request data, and Servers, which are
used to supply data. Server is a powerful microcomputer
that can manage shared devices.
Client-server networks are much more common in business.
The client contains the user interface and may perform
some or all of the application processing. Servers can be
high-speed microcomputers, minicomputers or even
mainframes.
A database server maintains the databases and processes
requests from the client to extract data from or update the
database.
An application server provides additional business
processing for the clients.
Client-server Network
Client/Server Network
Client/Server
Client/server network operating systems allow the
network to centralize functions and applications in
one or more dedicated file servers. The file servers
become the heart of the system, providing access
to resources and providing security. Individual
workstations (clients) have access to the resources
available on the file servers. The network operating
system provides the mechanism to integrate all the
components of the network and allow multiple
users to simultaneously share the same resources
irrespective of physical location. Novell Netware
and Windows 2000 Server are examples of
client/server network operating systems.
Advantages of a client/server
network:

• Centralized - Resources and data security


are controlled through the server.
• Scalability - Any or all elements can be
replaced individually as needs increase.
• Flexibility - New technology can be easily
integrated into system.
• Interoperability - All components
(client/network/server) work together.
• Accessibility - Server can be accessed
remotely and across multiple platforms.
Disadvantages of a
client/server network:

• Expense - Requires initial investment in


dedicated server.
• Maintenance - Large networks will require a
staff to ensure efficient operation.
• Dependence - When server goes down,
operations will cease across the network.
What is Network Cabling?

Cable is the medium through which


information usually moves from one network
device to another. There are several types of
cable which are commonly used with LANs. In
some cases, a network will utilize only one
type of cable, other networks will use a
variety of cable types. The type of cable
chosen for a network is related to the
network's topology, protocol, and size.
Understanding the characteristics of different
types of cable and how they relate to other
aspects of a network is necessary for the
development of a successful network.
Network Cabling

• Unshielded Twisted Pair (UTP) Cable


• Shielded Twisted Pair (STP) Cable
• Coaxial Cable
• Fiber Optic Cable
Twisted Pair Cable
A twisted wire consists
of two bunches of thin
copper wires, twisted
around each other.
• Extensively used in
telephone circuits,
• Bandwidth :250 Khz.
• Good for short-distance
communications.
• Used in LAN.
STP & UTP

Twisted pair cabling comes in two varieties:


• Shielded
• and Unshielded.
Unshielded Twisted Pair (UTP)
Cable
Unshielded Twisted Pair (UTP)
Cable
The quality of UTP may vary from telephone-
grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket.
Each pair is twisted with a different number of
twists per inch to help eliminate interference
from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the
supported transmission rate and the greater the
cost per foot. The EIA/TIA (Electronic Industry
Association/Telecommunication Industry
Association) has established standards of UTP and
rated six categories of wire (additional categories
are emerging).
Categories of Unshielded Twisted
Pair
Category Speed Use

1 1 Mbps Voice Only (Telephone Wire)

2 4 Mbps
LocalTalk & Telephone (Rarely used)

3 16 Mbps 10BaseT Ethernet

4 20 Mbps Token Ring (Rarely used)

5 100 Mbps (2 pair) 100BaseT Ethernet


1000 Mbps (4 pair) Gigabit Ethernet
5e 1,000 Mbps Gigabit Ethernet

6 10,000 Mbps Gigabit Ethernet


Unshielded Twisted Pair
Connector

RJ-45 connector
Unshielded Twisted Pair
Connector

The standard connector for unshielded


twisted pair cabling is an RJ-45 connector.
This is a plastic connector that looks like a
large telephone-style connector (See fig.
2). A slot allows the RJ-45 to be inserted
only one way. RJ stands for Registered
Jack, implying that the connector follows a
standard borrowed from the telephone
industry. This standard designates which
wire goes with each pin inside the
connector.
Shielded Twisted Pair (STP)
Cable

Although UTP cable is the least expensive


cable, it may be susceptible to radio and
electrical frequency interference (it should
not be too close to electric motors,
fluorescent lights, etc.). If you must place
cable in environments with lots of
potential interference, or if you must place
cable in extremely sensitive environments
that may be susceptible to the electrical
current in the UTP, shielded twisted pair
may be the solution. Shielded cables can
also help to extend the maximum distance
of the cables.
Shielded Twisted Pair (STP)
Cable
• Shielded twisted pair cable is available in
three different configurations:
• Each pair of wires is individually shielded
with foil.
• There is a foil or braid shield inside the
jacket covering all wires (as a group).
• There is a shield around each individual
pair, as well as around the entire group of
wires (referred to as double shield twisted
pair).
Coaxial Cable

Used extensively
in LANs.
High bandwidth
Up to 400 MHz.
Data rates: 100
Mbits/s.
Problems : signal
loss at high
frequencies
Coaxial Cable

Coaxial Cable is a group of specially


wrapped and insulated wire lines capable
of transmitting data at high rates.
Coaxial Cable is widely used for cable
television.
Coaxial cabling has a single copper
conductor at its center. A plastic layer
provides insulation between the center
conductor and a braided metal shield (See
fig. 3). The metal shield helps to block any
outside interference from
Coaxial Cable

Although coaxial cabling is difficult to install, it is highly


resistant to signal interference.
In addition, it can support greater cable lengths between
network devices than twisted pair cable.
Coaxial Cable
The two types of coaxial Cable

Thin coaxial cable is also referred to as


thinnet. 10Base2 refers to the specifications
for thin coaxial cable carrying Ethernet
signals. The 2 refers to the approximate
maximum segment length being 200 meters. In
actual fact the maximum segment length is
185 meters. Thin coaxial cable has been
popular in LAN.
The two types of coaxial Cable

Thick coaxial cable is also referred to as


thicknet. 10Base5 refers to the
specifications for thick coaxial cable
carrying Ethernet signals. The 5 refers to
the maximum segment length being 500
meters. Thick coaxial cable has an extra
protective plastic cover that helps keep
moisture away from the center conductor.
This makes thick coaxial a great choice
when running longer lengths in a linear bus
network.
Coaxial Cable Connectors

BNC connector
Coaxial Cable Connectors

The most common type of connector used


with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector. Different
types of adapters are available for BNC
connectors, including a T-connector, barrel
connector, and terminator. Connectors on
the cable are the weakest points in any
network. To help avoid problems with your
network, always use the BNC connectors
that crimp can easily.
Fiber Optic Cable
Fiber Optic Cable
Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by


several layers of protective materials. It transmits light rather than
electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that
contain a large amount of electrical interference.
Fiber Optic Cable

It consists of dozens or hundreds of thin


threads of glass or plastic used as data
transmission medium.
Fiber optic transmits light signals instead of
electrical signal. As light travels much faster
than electricity, optical fibers can transmit
data much higher than twisted pair or coaxial
cable.
Fiber Optic Cable

Fiber optic cable has the ability to transmit


signals over much longer distances than
coaxial and twisted pair. It also has the
capability to carry information at vastly
greater speeds. This capacity broadens
communication possibilities to include services
such as video conferencing and interactive
services.
Fiber Optic Cable

There are two common types of fiber cables --


single mode and multimode.
Multimode cable has a larger diameter;
however, both cables provide high bandwidth
at high speeds.
Single mode can provide more distance, but it
is more expensive.
Wireless Communication
Channel

• Infrared
• Microwave
• Communication satellite
• Bluetooth
• WiFi
• WiMAX
Infrared

Infrared wireless transmission sends data


signals using infrared-light waves. Infrared
ports can be found on some laptop,
printers as well as wireless mouse.
The drawbacks are that Line of sight
communication is required-there must be
an unobstructed view between transmitter
and receiver. Moreover transmission is
confined to short distance.
Microwave radio

It can transmit voice and data through the


atmosphere as super high frequencies radio
waves called microwave.
Microwave are Line of sight, they can not
bend around corners or around the Earth’s
curvature, so there must be an
unobstructed view between transmitter
and receiver. Thus microwave station is
needed to build within 20-30 miles of each
other with no obstruction in between.
Communication Satellite

Communication Satellite is microwave relay


stations in orbit around the Earth. It can
overcome certain disadvantage of Microwave
radio transmission. Transmitting from the
ground station to a satellite is called up
linking; the reverse is called down linking.
Bluetooth

It is short range wireless digital standard


aimed at linking Cell phone, PDAs, Computer
and peripherals up to distance of 30 feet.
Wi-Fi

WiFi is a short-range wireless digital standard


aimed at helping machine inside office to
communicate at high speed and share internet
connection at distance up to 300 feet. Wi-Fi can be
installed on your existing computers and connect
them through a router hub. If you have several
computers at home or in the office, a Wi-Fi
network can help save money by negating the need
for additional phone lines for Internet access or to
use a single peripheral device such as a printer
among several different computers. Each computer
requires a wireless NIC (network interface card)
containing a built-in radio and antenna. These
cards are relatively inexpensive and you can avoid
duplicating more expensive equipment by using a
wireless network.
Wi-Fi

You can also access Wi-Fi networks in


public areas such as libraries, Internet
cafes, hotels and airports. Access points to
a wireless network are also called hot
spots and are proliferating in many public
places. You should be aware of the dangers
in using these hot spots because of the lack
of strong security typical of wireless
networks and interference problems as
more users try to access the network.
WiMAX
WiMAX stands for Worldwide Interoperability for
micro wave access.
WiMAX aims to provide wireless Data communication
over long distance. It aims specifically at WMAN
(Wireless Metropolitan Area Network). Because of
limitations in frequency ranges associated with Wi-
Fi, Bluetooth and other technologies, many users are
left out of the Internet evolution. Therefore a new
technology called WiMax is being developed to help
fill the gaps all across the country. WiMax increases
the range of transmissions up to approximately 30
miles and increases the transmission speeds
significantly over that available on regular telephone
lines and dial-up modems.
A Bluetooth Network (PAN)

Figure 9-5
An 802.11 Wireless LAN

Figure 9-6
Wireless LAN

A wireless LAN or WLAN or wireless local area


network involves in linking two or more
computers or devices without wire. This gives
users the mobility to move around within a
broad coverage area and still be connected to
the network.
Wireless LAN

More and more networks are operating without


cables, in the wireless mode. Wireless LANs use
high frequency radio signals, infrared light beams,
or lasers to communicate between the
workstations and the file server or hubs. Each
workstation and file server on a wireless network
has some sort of transceiver/antenna to send and
receive the data. Information is relayed between
transceivers as if they were physically connected.
For longer distance, wireless communications can
also take place through cellular telephone
technology, microwave transmission, or by
satellite.
Wireless LAN

The two most common types of infrared


communications used in schools are line-of-sight
and scattered broadcast. Line-of-sight
communication means that there must be an
unblocked direct line between the workstation and
the transceiver. If a person walks within the line-
of-sight while there is a transmission, the
information would need to be sent again. This kind
of obstruction can slow down the wireless network.
Scattered infrared communication is a broadcast of
infrared transmissions sent out in multiple
directions that bounces off walls and ceilings until
it eventually hits the receiver. Networking
communications with laser are virtually the same
as line-of-sight infrared networks.
Wireless standards and speeds

The Wi-Fi Alliance is a global, non-profit


organization that helps to ensure standards
and interoperability for wireless networks, and
wireless networks are often referred to as WiFi
(Wireless Fidelity). The original Wi-Fi standard
(IEEE 802.11) was adopted in 1997. Since then
many variations have emerged (and will
continue to emerge). Wi-Fi networks use the
Ethernet protocol.
Wireless standards and speeds
Wi-Fi

Standard Max Speed Typical Range

802.11a 54 Mbps 150 feet

802.11b 11 Mbps 300 feet

802.11g 54 Mbps 300 feet


Advantages of wireless networks

• Mobility - With a laptop computer or mobile device,


access can be available throughout a school, at the
mall, on an airplane, etc. More an more businesses are
also offering free WiFi access.
• Fast setup - If your computer has a wireless adapter,
locating a wireless network can be as simple as clicking
"Connect to a Network" -- in some cases, you will
connect automatically to networks within range.
• Cost - Setting up a wireless network can be much more
cost effective than buying and installing cables.
• Expandability - Adding new computers to a wireless
network is as easy as turning the computer on (as long
as you do not exceed the maximum number of devices).
Disadvantages of wireless
networks:

• Security - Wireless networks are much more susceptible to


unauthorized use. If you set up a wireless network, be sure
to include maximum security. You should always enable
WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected
Access), which will improve security and help to prevent
virtual intruders and freeloaders.
• Interference - Because wireless networks use radio signals
and similar techniques for transmission, they are
susceptible to interference from lights and electronic
devices.
• Inconsistent connections - How many times have you hears
"Wait a minute, I just lost my connection?" Because of the
interference caused by electrical devices and/or items
blocking the path of transmission, wireless connections are
not nearly as stable as those through a dedicated cable.
Disadvantages of wireless
networks:

• Power consumption - The wireless transmitter in a


laptop requires a significant amount of power;
therefore, the battery life of laptops can be
adversely impacted. If you are planning a laptop
project in your classroom, be sure to have power
plugs and/or additional batteries available.
• Speed - The transmission speed of wireless
networks is improving; however, faster options
(such as gigabit Ethernet) are available via cables.
In addition, if set up a wireless network at home,
and you are connecting to the Internet via a DSL
modem (at perhaps 3 Mbps), your wireless access
to the Internet will have a maximum of 3 Mbps
connection speed.
What is Networking Hardware?

Networking
hardware includes
all computers,
peripherals,
interface cards and
other equipment
needed to perform
data-processing and
communications
within the network.
Basic Networking Hardware
• File Servers
• Workstations
• Network Interface Cards
• Switches
• Repeaters
• Bridges
• Routers
File Servers
File Servers
File Servers

A file server stands at the heart of most


networks. It is a very fast computer with a
large amount of RAM and storage space, along
with a fast network interface card. The
network operating system software resides on
this computer, along with any software
applications and data files that need to be
shared.
File Servers

The file server controls the communication


of information between the nodes on a
network. For example, it may be asked to
send a word processor program to one
workstation, receive a database file from
another workstation, and store an e-mail
message during the same time period. This
requires a computer that can store a lot of
information and share it very quickly. File
servers should have at least the following
characteristics:
File Servers
• 800 megahertz or faster microprocessor
(Pentium 3 or 4, G4 or G5)
• A fast hard drive with at least 120 gigabytes
of storage
• A RAID (Redundant Array of Inexpensive Disks)
to preserve data after a disk casualty
• A tape back-up unit (i.e. DAT, JAZ, Zip, or CD-
RW drive)
• Numerous expansion slots
• Fast network interface card
• At least of 512 MB of RAM
Workstations

The entire user computers connected to a


network is called workstations. A typical
workstation is a computer that is configured
with a network interface card, networking
software, and the appropriate cables.
Workstations do not necessarily need floppy
disk drives because files can be saved on the
file server. Almost any computer can serve as a
network workstation.
Network Interface Cards
Network Interface Cards

The network interface card (NIC) provides the


physical connection between the network and the
computer workstation. Most NICs are internal, and
they are included in the purchase of most
computers. Network interface cards are a major
factor in determining the speed and performance
of a network. It is a good idea to use the fastest
network card available for the type of workstation
you are using.
The most common network interface connections
are Ethernet cards (LocalTalk connectors and Token
Ring cards are seldom used in current networks).
Ethernet Cards
Ethernet cards are usually purchased
separately from a computer, although many
computers (such as the Macintosh) now
include an option for a pre-installed Ethernet
card. Ethernet cards contain connections for
either coaxial or twisted pair cables (or
both). If it is designed for coaxial cable, the
connection will be BNC. If it is designed for
twisted pair, it will have a RJ-45 connection.
Some Ethernet cards also contain an AUI
connector. This can be used to attach coaxial,
twisted pair, or fiber optics cable to an
Ethernet card. When this method is used
there is always an external transceiver
attached to the workstation.
Ethernet Cards

Fig. 1. Ethernet card.


From top to bottom:
RJ-45, AUI, and BNC connectors
Local Talk Connectors

Local Talk is Apple's built-in solution for


networking older Macintosh computers. It
utilized a special adapter box and a cable that
plugged into the printer port of a Macintosh. A
major disadvantage of Local Talk was that it is
slow (only 230 Kbps) in comparison to
Ethernet; therefore, it is rarely used in
current networks.
Token Ring Cards

Token Ring network cards look similar to


Ethernet cards and were popular in IBM
computers. They are seldom used with current
networks.
Switches
Switches
Switches

A concentrator is a device that provides a


central connection point for cables from
workstations, servers, and peripherals. In a
star topology, twisted-pair wire is run from
each workstation to a central switch/hub.
Most switches are active, that is they
electrically amplify the signal as it moves
from one device to another. Switches no
longer broadcast network packets as hubs
did in the past, they memorize addressing
of computers and send the information to
the correct location directly.
Switches

• Usually configured with 8, 12, or 24 RJ-45


ports
• Often used in a star or tree topology
• Sold with specialized software for port
management
• Also called hubs
• Usually installed in a standardized metal
rack that also may store net modems,
bridges, or routers
Repeaters
Repeaters
Repeaters
Repeaters

Since a signal loses strength as it passes


along a cable, it is often necessary to boost
the signal with a device called a repeater.
The repeater electrically amplifies the
signal it receives and rebroadcasts it.
Repeaters can be separate devices or they
can be incorporated into a concentrator.
They are used when the total length of
your network cable exceeds the standards
set for the type of cable being used.
Repeaters

A good example of the use of repeaters


would be in a local area network using a
star topology with unshielded twisted-pair
cabling. The length limit for unshielded
twisted-pair cable is 100 meters. The most
common configuration is for each
workstation to be connected by twisted-
pair cable to a multi-port active
concentrator. The concentrator amplifies
all the signals that pass through it allowing
for the total length of cable on the
network to exceed the 100 meter limit.
Bridges
Bridges

A bridge is a device that allows you to segment


a large network into two smaller, more
efficient networks. If you are adding to an
older wiring scheme and want the new
network to be up-to-date, a bridge can
connect the two.
Bridges

A bridge monitors the information traffic on


both sides of the network so that it can pass
packets of information to the correct location.
Most bridges can "listen" to the network and
automatically figure out the address of each
computer on both sides of the bridge. The
bridge can inspect each message and, if
necessary, broadcast it on the other side of
the network.
Bridges

The bridge manages the traffic to maintain


optimum performance on both sides of the
network. You might say that the bridge is
like a traffic cop at a busy intersection
during rush hour. It keeps information
flowing on both sides of the network, but
it does not allow unnecessary traffic
through. Bridges can be used to connect
different types of cabling, or physical
topologies. They must, however, be used
between networks with the same protocol.
Routers
Routers
Routers
A router translates information from one network to
another; it is similar to a super-intelligent bridge.
Routers select the best path to route a message, based
on the destination address and origin. The router can
direct traffic to prevent head-on collisions, and is smart
enough to know when to direct traffic along back roads
and shortcuts.
While bridges know the addresses of all computers on
each side of the network, routers know the addresses of
computers, bridges, and other routers on the network.
Routers can even "listen" to the entire network to
determine which sections are busiest -- they can then
redirect data around those sections until they clear up.
Routers
If you have a LAN that you want to connect to the
Internet, you will need to purchase a router. In this
case, the router serves as the translator between the
information on your LAN and the Internet. It also
determines the best route to send the data over the
Internet. Routers can:
• Direct signal traffic efficiently
• Route messages between any two protocols
• Route messages between linear bus, star, and star-
wired ring topologies
• Route messages across fiber optic, coaxial, and
twisted-pair cabling
What is a Topology?

The physical topology of a network refers


to the configuration of cables, computers,
and other peripherals. Physical topology
should not be confused with logical
topology which is the method used to pass
information between workstations.
Network topology is the study of the
arrangement or mapping of the elements
of a network. A network topology
represents Network’s layout or structure
from the point of view of data flow.
Topology
Linear Bus
Linear Bus

A linear bus topology consists of a main run


of cable with a terminator at each end.
All nodes (file server, workstations, and
peripherals) are connected to the linear
cable.
It is that type of network topology in which
all communication devices are connected
to a common channel with no central
server.
Alternatively A bus network topology is a
network architecture in which a set of
clients are connected via a shared
communications line, called a bus.
Advantages of a Linear Bus
Topology

• Easy to connect a computer or peripheral


to a linear bus.
Well suited for temporary or small
networks not requiring high speeds (quick
setup)
• Cheaper than other topologies.
• Cost effective as only a single cable is used
• Cable faults are easily identified
• Requires less cable length than a star
topology.
Disadvantages of a Linear Bus
Topology
• Entire network shuts down if there is a break
in the main cable.
• Limited cable length and number of stations.
• Maintenance costs may be higher in the long
run.
• Performance degrades as additional computers
are added or on heavy traffic.
• It works best with limited number of nodes.
• It is slower than the other topologies.
• Terminators are required at both ends of the
backbone cable.
Star
Star
Star networks are one of the most common computer
network topologies. In its simplest form, all
microcomputers and other communications devices are
connected to a central server.
A star topology is designed with each node (file server,
workstations, and peripherals) connected directly to a
central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or
concentrator before continuing to its destination. The
hub, switch, or concentrator manages and controls all
functions of the network. It also acts as a repeater for
the data flow. This configuration is common with twisted
pair cable; however, it can also be used with coaxial
cable or fiber optic cable.
Advantages of a Star Topology

• Easy to install and wire.


• It has minimal line cost.
• Transmission delays between two nodes do not
increase by adding new nodes to network,
because any two nodes are connected via two
links only.
• If any nodes other than the host node fail,
remaining nodes are unaffected.
• No disruptions to the network when connecting or
removing devices.
• Easy to detect faults and to remove parts.
Disadvantages of a Star
Topology
• The primary disadvantage of a star topology is the high
dependence of the system on the functioning of the
central server/hub/Node.
• The failure of the central hub makes the network Stop
immediately.
• The performances of the network also depend on the
capabilities of the hub.
• Network size is limited by the number of connections that
can be made to the hub.
• Requires more cable length than a linear topology.
• If the hub, switch, or concentrator fails, nodes attached
are disabled.
• More expensive than linear bus topologies because of the
cost of the hubs, etc.
Tree or Expanded Star
Tree or Expanded Star

A tree topology combines characteristics of


linear bus and star topologies. It consists of
groups of star-configured workstations
connected to a linear bus backbone cable.
Tree topologies allow for the expansion of an
existing network, and enable business to
configure a network to meet their needs.
Advantages of a Tree Topology

• Point-to-point wiring for individual segments.


• Supported by several hardware and software
venders.
Disadvantages of a Tree
Topology

• Overall length of each segment is limited by


the type of cabling used.
• If the backbone line breaks, the entire
segment goes down.
• More difficult to configure and wire than other
topologies.
5-4-3 Rule
A consideration in setting up a tree topology using Ethernet
protocol is the 5-4-3 rule. One aspect of the Ethernet
protocol requires that a signal sent out on the network
cable reach every part of the network within a specified
length of time. Each concentrator or repeater that a signal
goes through adds a small amount of time. This leads to
the rule that between any two nodes on the network there
can only be a maximum of 5 segments, connected through
4 repeaters/concentrators. In addition, only 3 of the
segments may be populated (trunk) segments if they are
made of coaxial cable. A populated segment is one that has
one or more nodes attached to it . In Figure 4, the 5-4-3
rule is adhered to. The furthest two nodes on the network
have 4 segments and 3 repeaters/concentrators between
them.
5-4-3 Rule

This rule does not apply to other network


protocols or Ethernet networks where all fiber
optic cabling or a combination of a fiber
backbone with UTP cabling is used. If there is
a combination of fiber optic backbone and UTP
cabling, the rule is simply translated to a 7-6-5
rule.
Ring Topology
Ring Topology

A ring network is a network topology in which


each node (microcomputers) connects to
exactly two other nodes, forming a single
continuous pathway for signals through each
node - a ring.
Advantages

• Very orderly network where every device


has access to the token and the
opportunity to transmit
• Performs better than a star topology under
heavy network load
• Can create much larger network using
Token Ring
• Does not require network server to manage
the connectivity between the computers
Disadvantages

• If one connection is broken, the entire


network stops working.
• Moves, adds and changes of devices can affect
the network
• Network adapter cards are much more
expensive than Ethernet cards and hubs
• Much slower than an Ethernet network under
normal load.
Considerations When Choosing
a Topology
• Money. A linear bus network may be the least
expensive way to install a network; you do not
have to purchase concentrators.
• Length of cable needed. The linear bus network
uses shorter lengths of cable.
• Future growth. With a star topology, expanding a
network is easily done by adding another
concentrator.
• Cable type. The most common cable in schools is
unshielded twisted pair, which is most often used
with star topologies.
Summary Chart
Physical Topology Common Cable Common Protocol

Linear Bus Twisted Pair Ethernet


Coaxial
Fiber

Star Twisted Pair Ethernet


Fiber

Tree Twisted Pair Ethernet


Coaxial
Fiber
Network Operating System
Software

The following links include some of the more


popular peer-to-peer and client/server
network operating systems.
• Macintosh OSX
• Microsoft Windows Server
• Novell
• UNIX

You might also like