Professional Documents
Culture Documents
Firew Tadele
Outline
Network Topology
Protocol Architecture
OSI Model
TCP/IP standard
1. Network topology
is the arrangement of the various elements (links, nodes, etc.) of a computer.
is the topological structure of a network, and may be depicted physically or
logically.
Physical: placement of the network's various components, including device
location and cable installation.
Logical: shows how data flows within a network, regardless of its physical
design.
Distances between nodes,, physical interconnections,, transmission rates, and/or
signal types may differ between two networks, yet their topologies may be
identical.
The common topologies for LANs are bus, tree, ring, star & Mesh.
Bus Topology
All stations attach, through a tap, directly to a linear transmission medium, or bus.
Bus is the central cable -- the main wire -- that connects all devices on a local-area network
(LAN). It is also called the backbone.
Full-duplex operation between the station and the tap allows data to be transmitted onto the bus
and received from the bus.
A transmission from any station propagates the length of the medium in both directions and can be
received by all other stations. Its disadvantage.
At each end of the bus is a terminator, which
absorbs any signal, removing it from the bus.
CONT.
Main Advantage:
• It's easy to connect a computer and typically it requires less cable
• It is cost effective.
• Used in small networks.
• It is easy to understand.
• Easy to expand joining two cables together.
Main Disadvantage:
• The entire network shuts down if there is a break in the main wire and it can be
difficult to identify the problem, if the network shuts down.
• If network traffic is heavy or nodes are more, the performance of the network
decreases.
• Cable has a limited length.
Tree topology
The network consists of a set of repeaters joined by point-to-point links in a closed loop.
The repeater is a comparatively simple device, capable of receiving data on one link
and transmitting them, bit by bit, on the other link as fast as they are received, with no
buffering at the repeater.
The data circulate around the ring in one direction (clockwise or counter clockwise).
As a frame circulates past all the other stations, the destination station recognizes its
address and copies the frame into a local buffer as it goes by.
The frame continues to circulate until it returns to the source station, where it is
removed.
Because multiple stations share the ring, medium access control is needed to determine
at what time each station may insert frames.
CONT.
• Is the layered structure of hardware and software that supports the exchange of data
between systems.
• The most widely used protocol architecture is the TCP/IP protocol suite and seven-
layer OSI model.
• Layer architecture:
simplifies the network design.
It is easy to debug network applications.
network management is easier.
• Network layers follow a set of rules, called protocol.
CONT.
is a model that allows any two different systems to communicate regardless of their
underlying architecture (hardware or software).
The OSI model is not a protocol; it is model for understanding and designing a
network architecture that is flexible, robust and interoperable.
The OSI model is built of seven ordered layers:
The interaction between layers in the OSI model
An exchange using the OSI model
Physical Layer
The physical layer coordinates the functions required to transmit a bit stream over a
physical medium.
It also defines the procedures and functions that physical devices and interfaces have
to perform for transmission to occur.
CONT.
The data link layer is responsible for transmitting frames from one node to the
next.
The data link layer is responsible for node-to-node delivery.
It makes the physical layer appear error free to the upper layer (network layer).
Node-to-node delivery CONT.
CONT.
The network layer is responsible for the delivery of packets from the original source
to the final destination.
The transport layer is responsible for delivery of a message from one process to another.
• The transport layer ensures that the whole message arrives intact and in order, overseeing
both error control and flow control at the process-to-process level.
CONT.
The session layer is the network dialog controller. It was designed to establish,
maintain, and synchronize the interaction between communicating devices.
The presentation layer was designed to handle the syntax (data format, coding,
and signal levels) and semantics (control information for coordination and error
handling) of the information exchanged between the two systems. It was designed for
data translation, encryption, decryption, and compression.
The application layer enables the user to access the network. It provides user
interfaces and support for services such as electronic email, remote file access,
WWW, and so on.
CONT.
Application layer
Application layer
Transport layer
Internet layer
Physical layer
THANK YOU!
QUESTIONS?