Professional Documents
Culture Documents
Book Report PDF
Book Report PDF
Computer Network
Assignment-I
i) Network Topology
In every local area network (LAN), there are vital designated nodes that are necessary
for its continued upkeep. The nodes that keep a local area network running may include
things such as computers, routers, and other technologies; this is the concept of
network topology.
In total, there are four distinct categories: ring, star, mesh and bus.
Ring Topology
Ring topology describes a system in which every device in the network has a direct
connection to a pair of different devices in an arrangement that forms an enclosed
circle. Out of all of the different topologies, the ring topology system is one of the more
affordable variations.
Ring topology tends to provide a high bandwidth threshold and reach distance, and
different variations of ring topology have different directions of signal transference; for
example, in the token ring variation, the signal only travels in a single direction.
1
Star Topology
In the star topology mode, a central server is employed as the unifying hub for each of
the system’s devices. Rather than a continuous loop, each of the data nodes
simultaneously deliver their data into the central nexus from their respective directions
at once. While the star system is one of the more relatively easy topologies to install
and get running, users should be aware of the fact that there is a real risk of possible
overload due to the high demand of data capacity in the central server.
Mesh Topology
Much like the ring topology, mesh topologies have different variations within the
topology subcategory. There are full mesh topologies in which each of the devices has
a direct connection with all of the others, and in the partial mesh, only a portion of the
topologies are connected to one another. In the partial topology model, devices are
generally connected to those in which the highest volume of data is exchanged between
the two.
Bus Topology
Out of all of the different topology types, the bus is the most frequently used of all. The
bus topology is an essential component of a LAN’s Ethernet connection, in which it
2
serves as the central cable to which all of the network’s devices connect. The bus, also
referred to as the network’s backbone, is applicable to networks of all sizes; however,
it’s common for the bus topology to be most easily applied to smaller networks than
larger ones.
Hybrid Topologies
Though different topologies may suit different users with varying levels of efficiency,
they aren’t necessarily mutually exclusive. It’s possible for multiple topology types to be
combined into hybrid forms with multiple data exchange pathways.
The Open Systems Interconnection (OSI) model is a conceptual model created by the
International Organization for Standardization which enables diverse communication
systems to communicate using standard protocols. In plain English, the OSI provides a
3
standard for different computer systems to be able to communicate with each other.
The OSI model can be seen as a universal language for computer networking. It’s
based on the concept of splitting up a communication system into seven abstract layers,
each one stacked upon the last.
Layer 7 - Application
To further our bean dip analogy, the Application Layer is the one at the top - it’s what
most users see. In the OSI model, this is the layer that is the “closest to the end user”.
Applications that work at Layer 7 are the ones that users interact with directly. A web
browser (Google Chrome, Firefox, Safari, etc.) or other app - Skype, Outlook, Office -
are examples of Layer 7 applications.
Layer 6 - Presentation
The Presentation Layer represents the area that is independent of data representation
at the application layer. In general, it represents the preparation or translation of
application format to network format, or from network formatting to application format. In
other words, the layer “presents” data for the application or the network. A good
4
example of this is encryption and decryption of data for secure transmission - this
happens at Layer 6.
Layer 5 - Session
When two devices, computers or servers need to “speak” with one another, a session
needs to be created, and this is done at the Session Layer. Functions at this layer
involve setup, coordination (how long should a system wait for a response, for example)
and termination between the applications at each end of the session.
Layer 4 – Transport
The Transport Layer deals with the coordination of the data transfer between end
systems and hosts. How much data to send, at what rate, where it goes, etc. The best
known example of the Transport Layer is the Transmission Control Protocol (TCP),
which is built on top of the Internet Protocol (IP), commonly known as TCP/IP. TCP and
UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network
Layer.
Layer 3 - Network
Here at the Network Layer is where you’ll find most of the router functionality that most
networking professionals care about and love. In its most basic sense, this layer is
responsible for packet forwarding, including routing through different routers. You might
know that your Boston computer wants to connect to a server in California, but there are
millions of different paths to take. Routers at this layer help do this efficiently.
The Data Link Layer provides node-to-node data transfer (between two directly
connected nodes), and also handles error correction from the physical layer. Two
sublayers exist here as well - the Media Access Control (MAC) layer and the Logical
Link Control (LLC) layer. In the networking world, most switches operate at Layer 2.
Layer 1 - Physical
At the bottom of our OSI bean dip we have the Physical Layer, which represents the
electrical and physical representation of the system. This can include everything from
the cable type, radio frequency link (as in an 802.11 wireless systems), as well as the
layout of pins, voltages and other physical requirements. When a networking problem
occurs, many networking pros go right to the physical layer to check that all of the
5
cables are properly connected and that the power plug hasn’t been pulled from the
router, switch or computer
● Centralised
● Decentralised
● Paralleled
● Open distributed processing
6
7
● Government agencies use MAN to connect to the citizens and private industries.
● The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
8
● A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
● A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
● A Wide Area Network is widely used in the field of Business, government, and
education.
9
10
Reliability
Network channels and components may be unreliable, resulting in loss of bits while data
transfer. So, an important design issue is to make sure that the information transferred
is not distorted.
Scalability
Networks are continuously evolving. The sizes are continually increasing leading to
congestion. Also, when new technologies are applied to the added components, it may
lead to incompatibility issues. Hence, the design should be done so that the networks
are scalable and can accommodate such additions and alterations.
Addressing
Error Control
Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and error
correction methods so as to protect data packets while they are transferred.
Flow Control
If the rate at which data is produced by the sender is higher than the rate at which data
is received by the receiver, there are chances of overflowing the receiver. So, a proper
flow control mechanism needs to be implemented.
Resource Allocation
11
Computer networks provide services in the form of network resources to the end users.
The main design issue is to allocate and deallocate resources to processes. The
allocation/deallocation should occur so that minimal interference among the hosts
occurs and there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each message while it is being
transferred from the source to the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the bandwidth or time to each host.
Routing
There may be multiple paths from the source to the destination. Routing involves
choosing an optimal path among all possible paths, in terms of cost and time. There are
several routing algorithms that are used in network systems.
Security
12
S.N
GUIDED MEDIA UNGUIDED MEDIA
O.
13
Thank You
14