Professional Documents
Culture Documents
5. NETWORKING TECHNOLOGY
Page 157
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
(6) The base band or broad band transmission modes are shown in following figure.
(c) Attenuation :-
(1) Attenuation is measure of how much a signal weakens as it travels through a medium
(2) As signals pass through the medium , part of the signal is absorbed and makes the signal weak.
(3) Attenuation decides the cable length when signal strength falls below certain limits , then at
receiving station noise may appear
(4) Repeaters are used to regenerate signals .
(4) Therefore , the network designer must settle for something ,which is cheaper and robust.
(2) Installation requirement: (1)Some transmission media requires skills labour to install . This increases
cost of network and it may cause certain delay.
What is the advantages of computer networks ? Distinguish between LAN and WAN ?
Ans. :
(1) Computer network is an interconnected collection of autonomous computers of system of computers
capable of sharing resources controlling services.
(2) The main advantage of computer network are :
i. Network provides resource sharing .
ii. It provides exchange of information and software .
iii. It provides high reliability by using other machine if one machine fails in network like military
banking ,air, and traffic control
iv. Access to any file or data .
v. Finally the system is saving money by network.
(3) The difference between WAN and LAN are as follows:
WAN LAN
(1) A WAN (Wide Area Network )is the A LAN (Local Area Network) is a group of computer
interconnection of LAN or MAN can be interconnected with in a small area such as room
located entirely within a state ,country or building or campus .
around the world.
Data transfer rate is comparatively slower Data transfer speed comparatively high such as
(2) such as in Kbits/ sec. thousand bits per second to million bits per second.
IN WAN links may be established by using CO-axial cable generally used to connect the computer
telephone cable or microwave towers or and other devices.
(3) satellite.
In this network short circuit errors ,noise Due to short distance ,short circuits errors or other
errors atmospheric errors are higher than noise errors are minimum.
any other networks
(4)
For e.g. Pager For e.g. A computer lab in college.
Page 159
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
Page 160
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
4) Attenuation :- Due to attenuation thinnet cable can transmit signal reliably up to 185 mtrs ,where as
thicknet cable can run up-to 500 mtrs .
5) EMI :- As coaxial cable consist of central cooper conductor , it is sensitive to EMI ,but shielding
reduces its sensitivity to EMI . Coaxial cable is less sensitive to EMI than UTP cable.
(c) Advantages :-
I) This medium is expensive and easy to install .
II) Since wires are twisted , it reduces EMI and also avoids RF radiations .
(d) Disadvantages :-
I) they can be used only for short distances communication .
II) The typical speed of computer data is 1200 bits /seconds . (bps)
Page 161
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
3) The shield is connected to the ground potion of the electronic device to which cable is connected . Ground
position is electrical reference point.
4) A properly grounded shield prevents signals from getting into or out of the cable.
5) The characteristics of shielded twisted pair are given as below ;
i) Cost: - The cost of STP cable is more than that of coaxial cable or UTP cable , Its cost is less
than that of thick coaxial or fiber optic cable.
ii) Installation : - The installation required for STP cable depends upon the type of network
,different connects are used.
iii) Capacity: -STP cable has a theoretical capacity of 500 MBPS . Practically it is around 155
MBPS with 100 meters cable run . The most common data rate for STP cable is 16 MBPS.
iv) Attenuation : - All twisted pair cables have attenuation .This limit the length of cable . 100 meter
cable limit is most common.
Write a short note on unshielded twisted pair cable with its characteristics ?
Ans. :
1) UTP consist of a number of twisted pair with plastic cable.
2) It is commonly used in telephone systems . Now-a- days UTP cable is being used in LAN instead of
coaxial cable .
3) A UTP cable is as shown in fig.
Page 162
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
1) Cost :- UTP cable is more cheaper than any other cable . The cost of category 5 twisted pair cable is
high.
2) Installation :- UTP cable is easy to install . The equipments required are low cost . UTP systems can
easily reconfigured.
3) Capacity : -For UTP cable data rate capacity up to 100 MBPS can be achieved .
4) Attenuation :- UTP cable has similar attenuation characteristics as that of other copper cables . UTP
cable run is restricted to few hundreds meters 100 m is most common limit.
5) EMI : - UTP cable does not have shield . Hence it is more sensitive to EMI than coaxial or STP cable .
Using latest technology ,noise can be avoided.
Page 163
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
Compare the characteristics of fiber optic cable and coaxial cable Mention at least 3 points
1)Cost : -Cost of coaxial cable is less than that of fiber optic cable . Fiber optic cables are more expensive.
2) Installation :- Installation of coaxial cable is cheaper than easier than that of fiber optic cable .
3) Capacity :- IN general data transmission capacity of coaxial cable is 10MBPS , while that of fiber optic
cable .is 100MBPS .
4)EMI : - Coaxial cable is less sensitive to EMI ,while fiber optic cable has no sensitivity to EMI .
5)Attenuation : - It is more in coaxial cable . In fiber optic cable ,attenuation is very less.
Page 164
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
(b) Microwaves :-
1) Microwaves travels in straight lines therefore narrowly focused , concentrating all the energy
into the beam .
2) Since microwaves travels in straight lines , for longer distances periodic repeator are necessary .
3) Unlike radiowave , at lower frequency microwave can not penetrate building.
Page 165
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
Topologies
*Topology is define as the arrangement of nodes , cables and connectivity devices that makes up the network.
*Topology also refers the way in which network of computers are connected.
*There are two categories of topology:
a) Physical topology
b) Logical topology
*Physical topology describes the actual layout of the network transmission media. It defines the actually the
network look like.
*Logical topology describes the logical path way of the signal among the network.
*Physical and Logical topologies take several form . The most common are
a) Bus topology
b) Ring topology
c) Star topology
d) Tree topology
e) Mesh topology
Bus Topology
*Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all
devices. A single cable, the backbone functions as a shared communication medium that devices attach .A
device wanting to communicate with another device on the network sends a broadcast message onto the wire
that all other devices see, but only the intended recipient actually accepts and processes the message.
*A BUS physical topology is shown in the following figure
Page 166
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
Bus Topology
*Most of the buses transmits signal in both the directions on backbone cable and hence all workstation are able
to receive the signal. But some buses are unidirectional and data is transmitted only in one direction of the
backbone cable. Hence only down stream devices can receive the signals.
*The backbone cable carries transmission message along the cable. As the message arrives at a workstation, it
checks whether address matches to its own or not. If not ,it does no more and the message goes to next
workstation
*The bus cable is terminated at each end by placing terminator to prevent signals from reflecting back
*Advantages :
*The bus topology can be extended with sub branches to form another topology.
*Breakdown or any failure node does not affect other nodes communication.
RING TOPOLOGY
*Ring topology are wired in a circle . Each node is connected to its neighbours on either side , and the data
transmits along the ring in one direction only.
*Each device incorporates a receiver and a transmitter and serves as a repeater that passes the signal onto the
next device in the ring.
Page 167
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
RING TOPOLOGY
*RING topologies are suited for networks that uses token passing method . The token passes around the ring
,and the only node that holds the token can transmits the data.
* The commonly used implementation for RING topology is token ring at 4- 16 MBPS.
*Advantages :
*Disadvantages:
*Difficult connections.
STAR TOPOLOGY
*In star topology all the workstations are connected to central hub .
*The hub receives signal from a workstation and routes it to the proper destination.
*STAR physical topology is often implemented to implement BUS or RING logical topology.
STAR TOPOLOGY
*Advantages :
*Adding a new workstation is easier than that in BUS and RING topology.
*The control is centralized due to use of hub.
Page 168
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
*Disadvantages:
*Hub failure affects all user.
*Hubs are slightly expensive.
*STAR topology requires more cabling than BUS and RING topology .Hence it costs more.
TREE TOPOLOGY
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices
connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid
approach supports future expandability of the network much better than a bus (limited in the number of devices
due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.
MESH TOPOLOGY
Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh
network can take any of several possible paths from source to destination. (Recall that even in a ring, although
two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet,
employ mesh routing.
MESH TOPOLOGY
A mesh network in which every device connects to every other is called a full mesh. As shown in the
illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
Page 169
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
Ethernet
*Ethernet is a local area network technology , with networks tradionally operating within single building.
*Atmost , Ethernet devices can have a few hundred meters of cable between them . Modern technology allows
ethernet to span up to 10 kms.
*Ethernet devices are connected to a common shared medium that provides the path along which the electronic
signals will travel. Previously , this medium was co-axial cables . But now a days twisted pair cable or fibre
optic cable are also used.
*Ethernet network transmits data in small units called frames.
*Each frame must contain source address as well as destination address , which identifies receipant and sender
of message. The address will uniquely identify nodes. No two Ethernet device can have same address.
*Ethernet network is shown in following figure.
Computer Computer
A C
Computer Computer
B D
In the figure above when computer A sends message to computer C, computer B and D will also get the
message and check whether the destination address matches to its own address or not , if not, will discard the
frame.
HUB
*Hub is a connectivity device in which cables can be connected without soldering wires to centralize network
traffic through a single connecting point.
*It manages the cabling in the network and send the signal to the other components of the network . Following
figure shows a network inter-connected with hub.
HUB
Page 170
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
*A backbone cable runs vertical up in the building and a repeater is used to attach an Ethernet segment running
in each floor of the office to the backbone cable.
*No two Ethernet workstation can have more than two repeaters between them , if they have to communicate
reliably.
*The main disadvantage of repeater is that they repeat noise in the system.
*Separate power supply is required for each repeater.
Routers
*Routers are inter network connectivity device. They are used to connect two topologically similar or dissimilar
LAN’s i.e. the LAN’s can be Ethernet and token ring . Each LAN is logically separate and is assigned an
address.
*Routers can use network address to assist efficient delivery pf message. Delivering packets according to
logical network address is called routing. Routers perform routing.
*Routers are intelligent.
*Routers can also be used to divide large, busy LAN’s into smaller segments.
*Routers are employed to connect LAN to wide area network (WAN).
*Routers are of two types :
Page 171
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
a) Static routers .
b) Dynamic routers.
*Static router do not determine paths(routes), but you need to specify them.
*Dynamic routers have capacity to determine paths
*Token ring uses token passing architecture. The topology is physically a STAR . But it uses logical ring to
pass the token.
R T
T R
R T
T R
*Each token ring network device is connected to a central concentrator, called as multi station access unit
(MAU). Because of MAU, a single computer failure will not take the entire LAN down.
*Token passing network moves a small frame, called as token around the network
*The node which passes token have right to send information.
*If the node possessing token has no information to send, then it passes token to next node. Each node can hold
token for maximum period of time.
* If the node possessing token does not have information to send, then it passes token to next workstation ,
which checks whether information belongs to it or not, then sends it to next node. The information frame
circulates the ring until it reaches to the destination.
*While the information frame is circulating, no token is on the network, which means that other nodes must
wait to transmit.
Page 172
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
Discuss access methods of networking. OR Discuss any two access methods of networking?
OR Explain the following access methods brief (i) Contention (ii) Token passing
Explain in brief Token passing and Polling access methods.
Ans. :
(1) An access methods is a set of rules governing how the network nodes share the transmission medium.
(2) There are three most important types of media access methods :
(a) Contention (b) Polling (c) Token passing
(3) Contention :
(a) In contention, any computer in the network can transmit at any time (first come first served).
(b) This system breaks down when two computers attempt to transmit at the same time. This is a case of
collision.
(c) To avoid collision, carrier sensing mechanism is used. Here each computer listens to the network
before attempting to transmit. If network is busy, it waits until network quiets down.
(d) In carrier detection, computers continue to listen to the network as they transmit. If computer detects
another signal that interferes with the signal it is sending, it stops transmitting. Both computers then wait
random amount of time and attempt to transmit.
(e) Contension methods are most popular media access control methods on LANs.
(4) Polling :
(a) In polling based systems, there is a device (called controller or master device) to poll other devices
on the networks to see whether they are ready to either transmit or receive data.
(b) This access methods is not widely used on network because the polling itself can cause a fair
amount of network traffic.
(5) Token passing :
(a) Token passing utilizes a frame called a token, which circulates around the network.
(b) A computer that needs to transmit must wait until it receives the token.
(c) When computer receives token, it is permitted to transmit.
(d) When computer completes transmitting, it is passes the token frame to the next station or token ring
network.
Page 173
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
(6) Modems are classified into two categories according to transmission method :
1. Asynchronous modems
2. Synchronous modems
Page 174
JUNIOR SCIENCE COLLEGE
ANDHERI / BORIVALI / DADAR / NERUL / POWAI / THANE
5) The active hub interconnect the network and also amplifies the signal received apart from splitting and
retransmitting it to the destination. This hub contains electronic circuits.
6) Passive hub only splits and transmits signal received and it can not amplify it. This do not contain any
electronic component.
7) Switching hub are quickly routes the signals between ports of hubs. It can be used in place of router.
II) Repeater :
1) A repeater is a hardware unit mostly used in Ethernet to extend.
2) A repeater reshapes and amplifies the signal from one Ethernet segment to another.
Figure shows network with repeaters :
3) A backbone cable runs vertical up in the building and a repeater is used to attach an Ethernet segment
running in each floor of the office to the backbone cable.
4) No two Ethernet workstations can have more than two repeaters between them, if they have to communicate
reliably.
5) The main disadvantage of repeaters is that repeat noise in he system.
6) Separate power supply is needed for repeaters.