Professional Documents
Culture Documents
Best-Fit Topology Last
Best-Fit Topology Last
HARD
WARE
ANET
WORK
ING
LEVEL
III
LEARNING GUIDE # 05
MODULE TITLE: Determining Best-Fit
Topology
MODULE CODE: ICT HNS3 02 1110
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
SYMBOLS
These symbols are located at the left margin of the module. These illustrate the actions that should be
taken or resource to be used at a particular stage in the module.
LO Learning
Outcome Self-Check
Answer Key
Resources
Reading Assessment
Activity
Remember/Tips
Use Computer
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
LO
Identify key information sources
Determine user needs
Develop best topology
Chapter one
The stand-alone computer was not enough for the following reasons:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Copying files onto floppy disks and giving them to others to copy onto their
computers was sometimes referred to as the "sneakernet” as illustrated in the figure
below. This early form of computer networking is one that many of us have used
and perhaps still use today.
FDD,HDD,CD-ROM-DRIVE etc
4. Sharing Programs/Software
Airline reservation.
The following figure illustrates the benefit of computer networking
Sharing Programs/Software
Application (software) sharing occurs when several users at different locations run
application programs that are installed centrally in one location (application
server). Software (applications) that are installed centrally can be managed and
upgraded centrally. Such systems are mostly common in financial system where
the main application is stored centrally and users in different sections of the
finance department are able to run the system from the network.
It is effective for several reasons
Less disk storage space is required because the program is stored only once on the
server, instead of being stored on the hard disk s of multiple stand alone computers
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
When a new version of the software is released, it is easier to update on copy of the
program on the server than to update many copies stored on stand –alone
computer.
Purchasing a software license for a network can be less expensive than purchasing
a single- user license for every workstation on the network
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Sharing data – users in a certain network environment have the liberty of sharing
data and information across the network. Data sharing enables different users to
work on a certain file concurrently. Few examples of data sharing are:
o Database: - databases are often managed centrally and several users
can have access to the database at same time. For example, in a
networked banking system, different bank branches can have access to
the central account database. This enables bank clients to carry their
transactions on any branch bank office.
o Email: email communication can be achieved over the network
enabling networked users in the company to communicate messages
across the network using email.
Your user ID and password are the basis for your user account. A user account
provides access to network resources and accumulates information about your
network use by tracking when you log in and log out.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
broken cable; with other configurations, one broken cable can stop
the entire network.
Terminologies
• Clients are computers that uses but do not provide network resources
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Network Types
Network can be grouped in two major categories depending on the geographical
scope they cover.
LAN refers to networks that have small geographical coverage usually within a
building or a campus.
LANs are found in most organizations, businesses, government offices,
educational institutions, and in home computing environment.
Wide area networks are networks that cover very large geographical area such as a
country or the whole world. Typical WANs are the telephone networks operated
by most long distance telephone companies. Large companies having offices
scattered around the world use WAN to connect their computers. WAN usually
use combination of several types of communication media such as cables,
satellites, Microwaves, fiber-optics.
Because a WAN has no geographical limitations, it can connect computers and
other devices in separate cities or on opposite sides of the world. A multinational
corporation with linked computers in different countries is using a WAN. Probably
the ultimate WAN is the Internet.
Examples of WAN:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Twisted-Pair Cable
In its simplest form, twisted-pair cable consists of two insulated strands of copper
wire twisted around each other.
There are two type of twisted pair cable:
Unshielded twisted-pair cables (UTP cables)
shielded twisted-pair cables (STP cables)
A number of twisted-pair wires are often grouped together and enclosed in a
protective sheath to form a cable. The total number of pairs in a cable varies.
The twisting cancels out electrical noise from adjacent pairs and from other
external sources such as motors, relays, and transformers.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
UTP cable
• Consists of four twisted pairs of copper wire with three twists per foot .
• Certifies UTP for data transmissions
• Bandwidth = 4 MBPS
• Category 3
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Bandwidth = 16 MBPS
• Category 4
One potential problem with all types of cabling is crosstalk. The figure below
shows crosstalk between two UTP cables. Crosstalk is defined the situation in
which, signals from one line interfering with signals from another line. UTP is
particularly susceptible to crosstalk, but the greater the number of twists per foot of
cable, the more effective the protection against crosstalk.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Crosstalk occurs when signals from one line bleed into another line
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Several components are available to help organize large UTP installations and
make them easier to work with. The figure below shows various twisted-pair
cabling components.
Distribution racks and rack shelves Distribution racks and rack shelves can
create more room for cables where there isn't much floor space. Using them is
a good way to organize a network that has a lot of connections.
Expandable patch panelsThese come in various versions that support up to 96
ports and transmission speeds of up to 100 Mbps.
RJ-45 jackssingle or double connector snap into patch panels and wall plates
Pros/Advantage
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Provides better performance than UTP in environments with high noise levels
of unwanted electrical signals.
Provides higher transmission rate than UTP
Cons/Disadvantage
It is more labor-intensive than UTP to install.
More expensive than UTP
Susceptible to ground faults through the shield.
Coaxial Cable
In its simplest form, coaxial cable consists of a core of copper wire surrounded by
insulation, a braided metal shielding, and an outer cover. The term shielding refers
to the woven or stranded metal mesh (or other material) that surrounds some
signals, called noise, so that they do not get onto the cable and distort the data.
Cable that contains one layer of foil insulation and one layer of braided metal
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
This wire core can be either solid or stranded. If the core is solid, it is usually
copper.
Surrounding the core is a dielectric insulating layer that separates it from the wire
mesh. The braided wire mesh acts as a ground and protects the core from
The conducting core and the wire mesh must always be kept separate from each
other. If they touch, the cable will experience a short, and noise or stray signals on
the mesh will flow onto the copper wire. An electrical short occurs when any two
conducting wires or a conducting wire and a ground come into contact with each
other. This contact causes a direct flow of current (or data) in an unintended path.
In the case of household electrical wiring, a short will cause sparking and the
blowing of a fuse or circuit breaker. With electronic devices that use low voltages,
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
the result is not as dramatic and is often undetectable. These low-voltage shorts
generally cause the failure of a device; and the short, in turn, destroys the data.
cabling. Notice that attenuation is the loss of signal strength that begins to occur
The stranded, protective sleeve absorbs stray electronic signals so that they do not
affect data being sent over the inner copper cable. For this reason, coaxial cabling
is a good choice for longer distances and for reliably supporting higher data rates
with less sophisticated equipment.
Which type of coaxial cable you select depends on the needs of your particular
network.
Thinnet CableThinnet cable is a flexible coaxial cable about 0.64 centimeters
(0.25 inches) thick. Because this type of coaxial cable is flexible and easy to work
with, it can be used in almost any type of network installation.
Thinnet coaxial cable can carry a signal for a distance of up to approximately 185
meters (about 607 feet) before the signal starts to suffer from attenuation.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The thicker the copper core, the farther the cable can carry signals. This means that
thicknet can carry signals farther than thinnet cable. Thicknet cable can carry a
signal for 500 meters (about 1640 feet). Therefore, because of thicknet's ability to
support data transfer over longer distances, it is sometimes used as a backbone to
connect several smaller thinnet-based networks.
Thinnet vs. Thicknet Cable As a general rule, the thicker the cable, the more
difficult it is to work with. Thin cable is flexible, easy to install, and relatively
inexpensive. Thick cable does not bend easily and is, therefore, harder to install.
This is a consideration when an installation calls for pulling cable through tight
spaces such as conduits and troughs. Thick cable is more expensive than thin cable,
but will carry a signal farther.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Both thinnet and thicknet cable use a connection component, known as a BNC
connector, to make the connections between the cable and the computers. There
are several important components in the BNC family, including the following:
The BNC cable connector: The Figure below shows a BNC cable
connector. The BNC cable connector is either soldered or crimped to the end of a
cable.
The BNCT connectorthe figure below shows a BNCT connector. This connector
joins the network interface card (NIC) in the computer to the network cable.
BNCT connector
The BNC barrel connector .The figure below shows a BNC barrel
connector. This connector is used to join two lengths of thinnet cable to make one
longer length.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A BNC terminator closes each end of the bus cable to absorb stray
signals. Otherwise, the signal will bounce and all network activity will
stop.
BNC terminator
NOTE
The origin of the acronym "BNC" is unclear, and there have been many names
Councelman." Because there is no consensus on the proper name and because the
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Coax advantages
characteristics )
• Better bandwidth
• Relatively inexpensive
Coax disadvantages
• Due to its high metallic content, coax cable is usually more expensive
than UTP
problem)
Optical Media
Fiber-Optic Cable
Optical fiber cable contains glass (or in some cases, plastic) fibers rather than
copper wire.
Signals are transmitted across these fibers in the form of light pulses rather
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Optical fiber strands are thin filaments of glass consisting of an inner core and
an outer cladding.
Both the core and the cladding are glass (plastic), and each has a different
refractive index (light passing capability) less dense medium has more
When these light pulses strike the cladding (dense medium) they are reflected
back into the core because the cladding has a lower refractive index than the
core. This keeps the transmitted signal within the core as it travels down the
fiber.
The diameter of the core varies with the type of optical fiber. Single-mode optical
fiber has a core diameter of approximately 8.5 µm while the most commonly used
type of multimode optical fiber has a core diameter of 62.5 µm. The cladding
greater than that of twisted-pair or coax cable. For this and other reasons, the
Optical signals through glass encounter less loss than electrical signals
through copper. This translates into lower attenuation and higher bandwidth
greater speeds.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
High level of immunity to EMI/RFI since signals are sent as light and not as
electricity.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Note: we use Fusion Splicer shown in the figure below to connect fiber optic
cable to the network hardware
Selecting Cabling
To determine which cabling is the best for a particular site you need to answer the
following questions:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The better the cable protects against internal and external electrical noise, the
farther and faster the cable will carry a clear signal. However, the better the speed,
clarity, and security of the cable, the higher the cabling cost.
Cabling Considerations
As with most network components, there are trade-offs with the type of cable you
purchase. If you work for a large organization and choose the least expensive
cable, the accountants might initially be pleased, but you might soon notice that the
LAN is inadequate in both transmission speed and data security.
Which cabling you select will depend on the needs of a particular site. The cabling
you purchase to set up a LAN for a small business has different requirements from
those of a larger organization, such as a major banking institution.
Installation Logistics
How easy is the cable to install and work with? In a small installation where
distances are short and security isn't a major issue, it does not make sense to
choose thick, cumbersome, and expensive cable.
Shielding
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The level of shielding required will affect cable cost. Almost every network uses
some form of shielded cable. The noisier the area in which the cable is run, the
more shielding will be required.
Crosstalk
Crosstalk and noise can cause serious problems in large networks where data
integrity is crucial. Inexpensive cabling has low resistance to outside electrical
fields generated by power lines, motors, relays, and radio transmitters. This makes
it susceptible to both noise and crosstalk.
Transmission Rates
Transmission rates are measured in megabits per second. A standard reference
point for current LAN transmission over copper cable is 100 Mbps. Fiber-optic
cable transmits at more than 1 Gbps.
Cost
Higher grades of cables can carry data securely over long distances, but they are
relatively expensive; lower-grade cables, which provide less data security over
shorter distances, are relatively inexpensive.
Signal Attenuation
Different cable types have different rates of attenuation; therefore, cable
specifications recommend specific length limits for the different types. If a signal
suffers too much attenuation, the receiving computer will be unable to interpret it.
Most networks have error-checking systems that will generate a retransmission if
the signal is too weak to be understood. However, retransmission takes time and
slows down the network.
Table Cable Comparison Summary
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Cable Cable
Cable cost More than UTP More than UTP: Least More than
Usable cable 185 meters 500 meters UTP and STP: 2 kilometers
feet)
STP: 16-500
Mbps
STP: Less
flexible than
UTP
preinstalled
STP:
Moderately
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
easy
resistance
transmission
rates than
UTP
and integrity
Cable Cable
1
This column provides information for both unshielded twisted-pair (UTP) and
twisted-pair (STP) cable.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
2
Usable cable length can vary with specific network installations. As technology
improves, usable cable length also increases.
Media converters
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
AUI/transceiver cable
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
1. Analog
2. Digital
Analog Signals
Digital Signals
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
1. Analog signal
Frequency is the number of times per second that the wave cycle repeats or
oscillates. Shorter wave length produce higher frequencies b/c the waves are
closer together
The unit used to measure the frequency is Hertz which means cycles/second. The
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
the highest frequency the signal uses and the lowest frequency it uses.
2. Digital signal
A signal which is discrete with respect to time is called digital signal. Such signal
can be modeled using binary number system as shown in the figure below.
data transfer rate - the amount of data that can be carried from one
Note: The bandwidth of digital signals is usually measured in bits per second (BPS).
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
second, for a given communication setting. This rate is just the baud
rate divided by the bits per frame. In the case above, we have a total
transmission, then get rid of the parity bit and reduce the stop bits to
one. The character frame then has (assuming seven data bits) a total
of only nine bits. If you are still transmitting at 9600 baud, then you
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
BROADBAND TRANSMISSION
• Since there are many channels available for transmission, more than one
device can transmit at a time; therefore, simultaneous transmissions can
occur without collisions.
• Broadband transmission can transfer large quantities of
information at a time.
Crimping Standards
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Example: T568B
Steps
You must strip the jacket 3 to 5 cm using striper
• There are orange, green, blue, and brown pairs. Each pair has one wire
with solid-color insulation and one wire that is white with bands of the
pair’s color
• Arrange the wires in their correct order, as per the standard given
above
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Cut the wires straight across so that no more than 1.25 cm (a half inch)
of wires are exposed from the jacket. This controls terminal cross-talk
interference
• Be sure to cut straight across or the wires will not all reach the pins
when you push them into the connector
• Hold the RJ-45 connector away from you (with the hole in the back
toward you) and the spring clip down
• Insert your wires into the connector, white-orange on left
• Push the wires all the way to the end
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Or
Example: T568B
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Punch Down Tool is used for Connecting on RJ-45 Jack using one of the two
standards
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Standard products
1. Crimp tool
2. Sheath striper
3. Pair of snips
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Note:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Network interface cards (NICs) provide the interface between cables, and
computers.
The cards are installed in an expansion slot in each computer and server on the
network.
After the NIC has been installed, the network cable is attached to the card's port
to make the actual physical connection between the computer and the rest of the
network.
A sample NIC
The role of the NIC is to:
Control the flow of data between the computer and the cabling system.
Receive incoming data from the cable and translate it into bytes that can be
Stated at a more technical level, the NIC contains the hardware and firmware
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
implements the Logical Link Control and Media Access Control functions in
Before data can be sent over the network, the NIC must change it from a form the
computer can understand to a form that can travel over a network cable.
Data moves through a computer along paths called buses. These are actually
several data paths placed side by side. Because the paths are side by side
(parallel), data can move along them in lateral groups instead of in a single (serial)
data stream.
On the network cable, however, data must travel in a single stream of bits. When
because one bit follows another. In other words, the cable is a one-lane highway,
and the data always travels in one direction. The computer is either sending or
The NIC takes data that is traveling in parallel as a group and restructures it so
that it will flow through the 1-bit-serial path of the network cable. Figure 2 shows
electrical or optical signals that can travel on the network's cables. The component
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Network Address
In addition to transforming data, the NIC also has to advertise its own location, or
address, to the rest of the network to distinguish it from all the other cards on
the network.
hardwire these addresses into chips on the card by a process known as "burning"
the address into the card. With this process, each NIC—and therefore each
The NIC also participates in several other functions in sequence as it takes data
from the computer and gets it ready for the network cable:
The computer and NIC must communicate in order to move data from the computer
to the card.
The computer's bus moves the data from the computer's memory to the NIC.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Because data can often move faster on the bus or the cable than the NIC can
handle, the data is sent to the card's buffer, a reserved portion of RAM. Here it
To select the appropriate NIC for your network, you first need to determine the
As discussed in the previous lesson, each type of cable has different physical
characteristics that the NIC must accommodate. Each card is built to accept at
least one type of cable. Coaxial, twisted-pair, and fiber-optic are the most common
cable types.
Some NICs have more than one interface connector. For example, it is not
A thicknet network connection uses a 15-pin attachment unit interface (AUI) cable
to connect the 15-pin (DB-15 ,DB stands for data bus) connector on the back of
transceiver uses a vampire tap to connect to the thicknet cable. Figure 3 shows a
unit interface (AUI) cable to connect the 15-pin (DB-15) connector on the back of
the NIC to an external transceiver
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
So far, this lesson has focused on standard network interface cards. In the
majority of situations, you will be using one of these cards to connect each
computer to the physical network. In reality, some situations will require the use of
The remainder of this lesson introduces you to three varieties of these specialized
cards.
Wireless NICs
network.
Installation software.
These NICs can be used to create an all-wireless LAN or to add wireless stations to
a cabled LAN.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Usually, these NICs are used to communicate with a component called a wireless
concentrator that acts as a transceiver to send and receive signals.
Fiber-Optic NICs
"Fiber to the desktop" has become a catch phrase for the computing industry. As
and multimedia data streams that are common on today's intranets, fiber-optic
cards have recently become cost-competitive, and it's expected that their use will
someday be commonplace.
Remote-Boot PROMs
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
workstations do not have individual floppy-disk drives. Without these, users are
not able to copy information to floppy or hard disks and, therefore, cannot take
However, because computers normally start from either a floppy or a hard disk,
there has to be another source for the software that initially starts (boots) the
memory) that contains the hardwired code that starts the computer from the
With remote-boot PROMs, diskless workstations can join the network when
they start.
PCMCIANIC
formed in 1989, with more than 320 members in the computer and electronic
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Server
Servers are usually very powerful computers both in processing power and in their
storage capacity. Different dedicated servers can be configured depending on the
need of the organizations, such as:
Types of server
File servers – servers that provide centralized data storage which will be shared
among the LAN users.
Print server – servers that control one or more printers and provide print
service to LAN users.
Database server – servers that centrally store database and provide data to
client application in the LAN.
Web server – servers that store web pages that will be viewed using browsers
in the network.
Email server – servers that are used to manage and control email
communications across the network.
Workstation
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
LAN Architecture
1. What is LAN architecture?
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
2. Access methods
– CSMA/CD
– CSMA/CA
– TOKEN PASSING
– DEMAND PRIORITY
3 Transmission technique
7.1. What is network architecture?
If asked to define the word architecture, one may answer that it is the design and related
information needed to construct something. Just as the architecture of a building determines its
appearance and function, LAN architecture defines the appearance and influences the function of
the LAN.
The appearance of the LAN is primarily determined by its transmission channel infrastructure—
normally, this is its cabling system. The function of a LAN is influenced by the manner in which
the devices on the LAN communicate with each other.
The word architecture groups together the fundamental technical ingredients that, combined
together, make a LAN.
Five components are used to define the architecture of a LAN. They are as follows:
Transmission medium
This defines what is used to connect the devices on the LAN.
Topology
This defines how the transmission medium is used to connect the devices on the LAN.
Access method
This is the way in which a station on the LAN obtains the opportunity to send or receive signals
over the transmission medium.
Transmission technique
This is the manner by which the signals or messages sent by a station travel through the
transmission medium.
Transmission speed
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
This is the rate at which the signals or messages are able to travel through the transmission
medium.
Note: In this CHAPTER access method and transmission technique will be discussed. The others
are already discussed in CHAPTER 1 and 2.
Ethernet
The original Ethernet standard was developed in 1983 and had a maximum speed of 10 Mbps
(phenomenal at the time) over coaxial cable. The Ethernet protocol allows for bus, star, or tree
topologies, depending on the type of cables used and other factors. This heavy coaxial cabling
was expensive to purchase, install, and maintain, and very difficult to retrofit into existing
facilities.
The current standards are now built around the use of twisted pair wire. Common twisted pair
standards are 10BaseT, 100BaseT, and 1000BaseT. The number (10, 100, 1000) ands for the
speed of transmission (10/100/1000 megabits per second); the "Base" stands for "baseband"
meaning it has full control of the wire on a single frequency; and the "T" stands for "twisted
pair" cable. Fiber cable can also be used at this level in 10BaseFL.
Fast Ethernet
The Fast Ethernet protocol supports transmission up to 100 Mbps. Fast Ethernet requires the use
of different, more expensive network concentrators/hubs and network interface cards. In
addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet standards
include:
100BaseT - 100 Mbps over 2-pair category 5 or better UTP cable.
100BaseFX - 100 Mbps over fiber cable.
100BaseSX -100 Mbps over multimode fiber cable.
100BaseBX - 100 Mbps over single mode fiber cable.
Gigabit Ethernet
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Gigabit Ethernet standard is a protocol that has a transmission speed of 1 Gbps (1000 Mbps). It
can be used with both fiber optic cabling and copper. (see the Cabling section for more
information).
1000BaseT - 1000 Mbps over 2-pair category 5 or better UTP cable.
1000BaseTX - 1000 Mbps over 2-pair category 6 or better UTP cable.
1000BaseFX - 1000 Mbps over fiber cable.
1000BaseSX -1000 Mbps over multimode fiber cable.
1000BaseBX - 1000 Mbps over single mode fiber cable.
The Ethernet standards continue to evolve. with 10 Gigabit Ethernet (10,000 Mbps) and 100
Gigabit Ethernet (100,000 Mbps),
Ethernet Protocol Summary
Protocol Cable Speed
Ethernet Twisted Pair, Coaxial, Fiber 10 Mbps
Fast Ethernet Twisted Pair, Fiber 100 Mbps
Gigabit Ethernet Twisted Pair, Fiber 1000 Mbps
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Figure 1Collision occurs if two computers put data on the cable at the same time
If data is to be sent over the network from one user to another, or accessed from a server, there
must be some way for the data to access the cable without running into other data. And the
receiving computer must have reasonable assurance that the data has not been destroyed in a data
collision during transmission.
Access methods need to be consistent in the way they handle data. If different computers were to
use different access methods, the network would fail because some methods would dominate the
cable.
Access methods prevent computers from gaining simultaneous access to the cable. By making
sure that only one computer at a time can put data on the network cable, access methods ensure
that the sending and receiving of network data is an orderly process.
The four Major Access Methods designed to prevent simultaneous use of the network media
include:
Carrier-Sense Multiple Access Methods (With Collision Detection) –CSMA/CD
Carrier-Sense Multiple Access Methods ( With Collision Avoidance)-CSMA/CA
Token-Passing Methods That Allow Only a Single OpportunityTo Send Data.
Demand-Priority Methods.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Only when a computer "senses" that the cable is free and that there is no traffic on the cable can
it send data. Once the computer has transmitted data on the cable, no other computer can transmit
data until the original data has reached its destination and the cable is free again. Remember, if
two or more computers happen to send data at exactly the same time, there will be a data
collision. When that happens, the two computers involved stop transmitting for a random period
of time and then attempt to retransmit. Each computer determines its own waiting period; this
reduces the chance that the computers will once again transmit simultaneously.
With these points in mind, the name of the access method—carrier-sense multiple access with
collision detection (CSMA/CD)—makes sense. Computers listen to or "sense" the cable (carrier-
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
sense). Commonly, many computers on the network attempt to transmit data (multiple access);
each one first listens to detect any possible collisions. If a computer detects a possible collision,
it waits for a random period of time before retransmitting (collision detection).
After each collision, both computers will have to try to retransmit their data. If the network is
very busy, there is a chance that the attempts by both computers will result in collisions with
packets from other computers on the network. If this happens, four computers (the two original
computers and the two computers whose transmitted packets collided with the original
computer's retransmitted packets) will have to attempt to retransmit. These proliferating
retransmissions can slow the network to a near standstill.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The occurrence of this problem depends on the number of users attempting to use the network
and which applications they are using. Database applications tend to put more traffic on the
network than word-processing applications do.
Depending on the hardware components, the cabling, and the networking software, using a
CSMA/CD network with many users running several database applications can be very
frustrating because of heavy network traffic.
Step 1
Anode listens to the network activity for a carrier signal (CS) that indicates
the network is in use. At any given time, multiple nodes may be listening. If a
node hears a signal, the node defers (backs off) for a random amount of time.
Step 2
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Hearing no carrier signal (CS), a node sends its packet (s) onto the network
and monitor the channel to make certain there are no collisions. Note that the
transmission moves in both directions along the bus. This is necessary to
ensure that all nodes get the message at the same time, so that each node hears
the same network.
Step 3
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Because of the multiple access (MA) property, another node may have done
the same thing, so that the two messages are moving along the bus at the same
time.
Step 4
In such a case, a collision occurs. The packets are garbled/distorted. The node
closest to the collision detects it and sends out a Jamming signal, notifying all
nodes that a collision has taken place. A node involved in a collision backs off
for a randomly determined amount of time before trying again to access the
network. On a busy network, such an attempt may be repeated many times
before the transmission is successful. If collisions are still detected after many
attempts, the user may be informed that the network is too busy to transmit.
Note:
• It is a contention method
• With more traffic, collision avoidance and collisions tend to increase, which slows the
network down, so CSMA/CD can be a slow-access method.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Using a CSMA/CD network with many users running several database applications can
be very frustrating because of heavy network traffic.
• CSMA/CD works best when most network activity is light.
• To use this access method, a node must be able to detect network activity (carrier sense
(CS) and to detect collisions (Collision detection (CD). Both of these capabilities are
implemented in hardware on board of the NIC.
• Used by Ethernet networks
• It is a probabilistic access method
Step 1
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Anode listens to the network activity for a carrier signal (CS) that indicates the network is in use.
At any given time, multiple nodes may be listening. If a node hears a signal, the node defers
(backs off) for a random amount of time.
Step 2
Hearing no CS, a node sends a request to send (RTS) signal onto the network. The signal is
broadcast in both directions.
Step 3
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
If it is sending to a particular node (directed transmission), the sender waits for a clear to send
(CTS) reply. If no reply is received within a predefined time, the node assumes there is a
collision and backs off for a random amount of time.
Step 4
If a CTS is received, of if the message is intended as a broadcast transmission, the node begins
sending its packet(s). In the case of a broadcast transmission, the node doesn’t wait for CTS
Note:
• Broadcasting the intent (i.e. RTS) to transmit data increases the amount of traffic on the
cable and slows down network performance.
• This method is used by Apple’s LocalTalk networks
• It is a probabilistic access method
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
While the token is in use by one computer, other computers cannot transmit data. Because only
one computer at a time can use the token, no contention and no collision take place, and no time
is spent waiting for computers to resend tokens due to network traffic on the cable.
Token passing is a deterministic media access method in which a token is passed from node to
node according to a predefined sequence. A token is a special packet , or frame which is created
by the first computer turned on. At any given time, the token can be available or in use. When
an available token reaches a node that node can access the network.
A deterministic access method guarantees that every node will get access to the network within a
given length of time , usually on the order of few hundred microseconds or milliseconds which is
called token holding time (THT).
Because each node gets its turn within a fixed period, deterministic access methods are more
efficient on networks that have heavy traffic.
Network architecture that supports token passing as an access method include ARCnet, FDDI,
and IBM’s Token Ring.
Note:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Networks that use token passing generally have some provision for setting the priority with
which a node gets the token. Higher-level protocols can specify that a message is important and
should receive higher priority.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Demand priority is an access method used in 100Base VG (VG stands for Voice
grad) or 100VG-AnyLAN networks. It is 10 times faster than the original Ethernet
speeds. This technology is quickly outdated because of its overhead due to port
scanning. The original Ethernet is updated to fast Ethernet (100mbps) to replace
100VG-AnyLAN.
Demand priority shifts network access control from the workstation to the hub.
This access method works with star topology.
Demand priority is a relatively new access method designed for the 100-Mbps
Ethernet standard known as 100VG-AnyLAN. It has been sanctioned and
standardized by the Institute of Electrical and Electronic Engineers (IEEE) in its
802.12 specification, which is discussed later in the coming chapters.
This access method is based on the fact that repeaters and end nodes are the two
components that make up all 100VG-AnyLAN networks. Figure 4 shows a
demand-priority network. The repeaters manage network access by doing round-
robin searches for requests to send from all nodes on the network. The repeater, or
hub, is responsible for noting all addresses, links, and end nodes and verifying that
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
they are all functioning. According to the 100VG-AnyLAN definition, an end node
can be a computer, bridge, router, or switch.
Demand-Priority Considerations
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
In a demand-priority network, there is communication only between the sending computer, the
hub, and the destination computer. This is more efficient than CSMA/CD, which broadcasts
transmissions to the entire network. In demand priority, each hub knows only about the end
nodes and repeaters directly connected to it, whereas in a CSMA/CD environment, each hub
knows the address of every node in the network.
Demand priority offers several advantages over CSMA/CD including:
The use of four pairs of wires.
By using four pairs of wires, computers can transmit and receive at the same time.
Transmissions through the hub.
Transmissions are not broadcast to all the other computers on the network. The computers do not
contend on their own for access to the cable, but operate under the centralized control of the hub.
The channel access method of demand priority is similar to raising a hand and
waiting to be called on. If a computer wants to send a message, it first transmits a
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
demand signal to a central device. Once the central device receives the demand
signal, it sends an acknowledgment signal back to the computer; the computer can
then begin sending its message.
The following table summarizes the major features of each access method.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
clear and important. Data are words, numbers, sound, graphics, and
video that describe people, events, things, ideas etc. Data are raw
facts that are not currently being used in a decision process and
usually take the form of historical records that are recorded and filed
external sources.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Communication
– is the process of sharing ideas, information,
and message with others in particular time and
place.
– is the process of exchanging information
between two parties in effective manner
• FormsofCommunicationinclude:
– Verbal communication: Writing and taking
– Non-verbal communications: Facial expressions,
body language
– Visual communication: The use of images or
pictures, such as painting, photography, video,
or films
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Telecommunication:
The term Telecommunication is composed of two words:
“tele” and “communication”. The prefix “tele” is
derived from Greek word that means “far”
– Tele means distance
– Hence Telecommunication means communicating at
a distance
– The term Telecommunication is used to describe
a number of computing and communication
technologies developed for the purpose of
exchanging information, data , message and
ideas with others across long distance in
effective way
• is the transmission of signals over a distance for
the purpose of communication
• In modern times, this process almost always
involves the sending of electromagnetic waves by
electronic transmitters but in earlier years it may
have involved the use of smoke signals, drums, or
semaphore.
• devices that assist the process, include the
television, radio, and telephone,
• Telegraphy
– Samuel F. B. Morse in USA demonstrated the 1st
telegraph system in New York in 1837.
– The 1st truly electronic medium was the
Telegraph, which sent and received electrical
signals over long-distance wire.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• Telephone
– In 1876 Alexander Graham Bell was the 1st to
patent and produce a telephone: a device that
transmitted voice over wires.
– Currently, the telephone networks have also
provided the electronic networks for new
computer-based systems like the Internet.
– Computers can be linked together and data
transmitted over telephone line, even
internationally via satellite, by connecting
computers to the telephone network.
Communication model
The essential elements of communication systems
are:
– Source system: source and transmitter
– Transmission facility: Transmission media
– Destination system: Receiver and destination
Based on these essential elements of communication
systems, we can have a communication model as shown
next
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
source, there may be more than one destination, depending upon how
Classifications:-
Transmission
Any communications channel has a direction associated with it. Based on this
direction of communication, we can categorize COMCHA into three.
I. Simplex channel
II. Half-duplex channel
III. Full-duplex channel
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Simplex channel
Half-duplex channel
speaks while the other listens. After a pause, the other party speaks
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Full-duplex channel
Note:
Unicast: Sending for one receiver only
• Circuit switching:
• Packet switching:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
to the connection.
path though the network, rather data are sent out in a sequence of
Network Topologies
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Bus topology is fairly old news and you probably won't be seeing
much of these around in any modern office or home.
With the Bus topology, all workstations are connected directly to
the main backbone that carries the data. Traffic generated by any
computer will travel across the backbone and be received by all
workstations. This works well in a small network of 2-5
computers, but as the number of computers increases, so will the
network traffic and this can greatly decrease the performance and
available bandwidth of your network. Bus topology is illustrated
in the figures below.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Note:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
• The bus/backbone cable has one starting and one ending point.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
concentrator.
The Star or Hub topology is one of the most common network
topologies found in most offices and home networks (it is
Predominant type of topology).
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Note:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
n ( n−1 )
Note: if a mesh network has n nodes, there will be 2
cables
Advantages
Improves Fault Tolerance
Disadvantages
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Expensive
Difficult to install
Difficult to manage
Difficult to troubleshoot
Physical Star-Bus
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Logical topology
As mentioned before,logical topology describes the way network data flows through the
Example: 1
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The MAU (Multistation Access Unit) looks like an ordinary Hub, but data is passed internally
using a logical ring as described below pictorially.
Inside the MAU, data flows in ring manner as illustrated in the figure below.
Example-2
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The Hub is at the centre, and defines a Star Topology. The Hub itself
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
In addition to the purchase cost of network hardware and software, consider these three key
factors when determining which network topology would be most cost-
effective:
Network Architecture
Network Configuration
Types of LAN
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The three broad classification of LAN, based on how the computers in a network
are configured and how they access information, or simply based on the roles of
the computer found in the network are:-
1. Peer-to-peer LAN/peer-based LAN/workgroups LAN
2. Client-server LAN/ server-based LAN
3. Hybrid LAN
Note: Computers are categorized into three based on their role in LAN. These are
client, server and peer.
PEER-TO-PEER LAN
In such network configuration, all the connected systems (computers and printers)
can communicate directly with each other without relying on other intermediary
server. Implementation of Peer-to-Peer network is relatively simple, cheap and can
connect up to 10 computers. Although appropriate for small networks, it lacks the
ability to implement centralized management of users, files, and security features
and tends to slow down performance as the number of connected computers
increase.
Although a peer-to-peer network might meet the needs of small organizations, it is
not appropriate for all environments. In a typical peer-to-peer network, no network
manager oversees administration for the entire network. Instead, individual users
administer their own computers.
All users can share any of their resources in any manner they choose. These
resources include data in shared folder, printers, fax cards, and so on.
On a computer network, security (making computers and data stored on them safe
from harm or unauthorized access) consists of setting a password on a resource,
such as a folder, that is shared on the network. All peer-to-peer network users set
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
their own security, and shared resources can exist on any computer rather than on a
centralized server only; consequently, centralized control is very difficult to
maintain. This lack of control has a big impact on network security because some
users may not implement any security measures at all. If security is an issue, a
server-based network might be a better choice.
/workgroups LAN
Advantage:
Users can control resource sharing
Disadvantage
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
computers increase.
CLIENT-SERVER LAN:
Client/Server architecture consists of client computers (workstations) that require
a network service and servers that provide the network service. Servers are usually
very powerful computers both in processing power and in their storage capacity.
Different dedicated servers can be configured depending on the need of the
organizations, such as:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
File servers – servers that provide centralized data storage which will be shared
among the LAN users.
Print server – servers that control one or more printers and provide print
service to LAN users.
Database server – servers that centrally store database and provide data to
client application in the LAN.
Web server – servers that store web pages that will be viewed using browsers
in the network.
Email server – servers that are used to manage and control email
communications across the network.
Note:
A dedicated server is one that functions only as a server and is not used as a client
or workstation. Servers are described as "dedicated" because they are not
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
themselves clients, and because they are optimized to service requests from
network clients quickly and to ensure the security of files and folder. Server-based
networks have become the standard models for networking.
Has central file storage, which allows all users to work from
data
thousand of users
resources
Disadvantage
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Note:
The security advantage of peer-to-peer LAN is that each user controls access to
their own resources. The security disadvantage of peer-to-peer LAN is that you
cannot differentiate among LAN users when you allow access to a resource. The
security advantage of server-base LAN is that each user is allowed access to only
those resources that the user has the privilege to access. A disadvantage is that
someone must centrally administer the security on your LAN.
HYBRID LAN
Hybrid networks have all three types of computers (peer, client and server)
operating on them. This means that while most shared resources are located on
servers, network users still have access to any resources being shared by peers in
your workgroup.
Hence hybrid network is a client-server network that also has peers sharing
resources. Most networks are actually hybrid networks.
Advantages and disadvantages of Hybrid network
Advantages:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Disadvantage:
Note:
The type of LAN you choose to implement will depend on factors such as the:
Chapter two
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Communication Protocol: -define the manner in which peer processes communicate b/n
computer hardware devices. The protocols give the rule for such things as the passing of
messages, the exact formats of the message and how to handle error conditions.
If two computers are communicating and they both follow the protocol(s) properly, the exchange
is successful, regardless of what types of the machines they are and what operating systems are
running on the machines. As long as the machines have software that can manage the protocol,
communication is possible.
Essentially, therefore, a communication protocol is a set of rules that coordinates the exchange of
information.
What is Host?
A host is typically refers to a computer that provide information or communication service.
What are a Gateway, a Router and Routing?
A gateway or Router: - is a computer that interconnects two or more networks and passes
packets from one to another.
The process by which the paths that packets travel across the network or inter-network are
chosen is known as routing.
Protocol Layering
A wide range of problems may arise in packet-based data communication. These include the
following:
Host failure: A host or gateway may fail due to a hardware or software crash.
Link failure: A transmission link may be damaged or disconnected.
Networkcongestion: networks have a finite capacity which cannot be exceeded.
Packetdelayorloss: Packets are sometimes lost during transmission or may experience
excessive delay.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
delays than for it to be one hundred percent reliable. In such situations an unreliable
service is implemented by omitting the requirement for acknowledgements for the data
received. Error checking may be done by the receiver on each block of data, and when
one is detected (even when it is only single unknown) the complete data block discarded.
o When unreliable service is implemented in a given layer, reliability is typically
implemented on some higher layer
OPEN SYSTEMS INTERCONNECTION (OSI) MODEL
Network Communications
Network activity involves sending data from one computer to another. This complex process can
be broken into discrete, sequential tasks. The sending computer must:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Network client software operates at many different levels within the sending and
receiving computers. Each of these levels, or tasks, is governed by one or more
protocols. These protocols, or rules of behavior, are standard specifications for
formatting and moving the data. When the sending and receiving computers follow
the same protocols, communication is assured. Because of this layered structure,
this is often referred to as the protocol stack.
With the rapid growth of networking hardware and software, a need arose for
standard protocols that could allow hardware and software from different vendors
to communicate. In response, two primary sets of standards were developed: the
OSI reference model and a modification of that standard called Project 802.
The OSI reference model is the best-known and most widely used guide for
visualizing networking environments. Manufacturers adhere to the OSI reference
model when they design network products. It provides a description of how
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A Layered Architecture
The OSI reference model architecture divides network communication into seven
layers. Each layer covers different network activities, equipment, or protocols.
Layering specifies different functions and services as data moves from one
computer through the network cabling to another computer. The OSI reference
model defines how each layer communicates and works with the layers
immediately above and below it. For example, the session layer communicates and
works with the presentation and transport layers.
Each layer provides some service or action that prepares the data for delivery over
the network to another computer. The lowest layers define the network's physical
media and related tasks, such as putting data bits onto the network interface cards
(NICs) and cable. The highest layers define how applications access
communication services. The higher the layer, the more complex its task.
The layers are separated from each other by boundaries called interfaces. All
requests are passed from one layer, through the interface, to the next layer. Each
layer builds upon the standards and activities of the layer below it.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
At the receiving end, the packet passes through the layers in reverse order. A
software utility at each layer reads the information on the packet, strips it away,
and passes the packet up to the next layer. When the packet is finally passed up
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
to the application layer, the addressing information has been stripped away and the
packet is in its original form, which is readable by the receiver.
With the exception of the lowest layer in the OSI networking model, no layer can
pass information directly to its counterpart on another computer. Instead,
information on the sending computer must be passed down through each
successive layer until it reaches the physical layer. The information then moves
across the networking cable to the receiving computer and up that computer's
networking layers until it arrives at the corresponding layer. For example, when the
network layer sends information from computer A, the information moves down
through the data-link and physical layers on the sending side, over the cable, and
up the physical and data-link layers on the receiving side to its final destination at
the network layer on computer B.
The following sections describe the purpose of each of the seven layers of the OSI
reference model, and identify the services that each provides to adjacent layers.
Beginning at the top of the stack (layer 7, the application layer), we work down to
the bottom (layer 1, the physical layer).
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Application Layer
Layer 7, the topmost layer of the OSI reference model, is the application layer.
This layer relates to the services that directly support user applications, such as
software for file transfers, database access, and e-mail. In other words, it serves as
a window through which application processes can access network services. A
message to be sent across the network enters the OSI reference model at this point
and exits the OSI reference model's application layer on the receiving computer.
Application-layer protocols can be programs in themselves, such as File Transfer
Protocol (FTP), or they can be used by other programs, such as Simple Mail
Transfer Protocol (SMTP), used by most e-mail programs, to redirect data to the
network. The lower layers support the tasks that are performed at the application
layer. These tasks include general network access, flow control, and error recovery.
Presentation Layer
Layer 6, the presentation layer, defines the format used to exchange data among
networked computers. Think of it as the network's translator. When computers
from dissimilar systems—such as IBM, Apple, and Sun—need to communicate, a
certain amount of translation and byte reordering must be done. Within the sending
computer, the presentation layer translates data from the format sent down from the
application layer into a commonly recognized, intermediary format. At the
receiving computer, this layer translates the intermediary format into a format that
can be useful to that computer's application layer. The presentation layer is
responsible for converting protocols, translating the data, encrypting the data,
changing or converting the character set, and expanding graphics commands. The
presentation layer also manages data compression to reduce the number of bits that
need to be transmitted.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Session Layer
Layer 5, the session layer, allows two applications on different computers to open,
use, and close a connection called a session. (A session is a highly structured
dialog between two workstations.) The session layer is responsible for managing
this dialog. It performs name-recognition and other functions, such as security, that
are needed to allow two applications to communicate over the network.
The session layer synchronizes user tasks by placing checkpoints in the data
stream. The checkpoints break the data into smaller groups for error detection. This
way, if the network fails, only the data after the last checkpoint has to be
retransmitted. This layer also implements dialog control between communicating
processes, such as regulating which side transmits, when, and for how long.
Transport Layer
Layer 4, the transport layer, provides an additional connection level beneath the
session layer. The transport layer ensures that packets are delivered error free, in
sequence, and without losses or duplications. At the sending computer, this layer
repackages messages, dividing long messages into several packets and collecting
small packets together in one package. This process ensures that packets are
transmitted efficiently over the network. At the receiving computer, the transport
layer opens the packets, reassembles the original messages, and, typically, sends an
acknowledgment that the message was received. If a duplicate packet arrives, this
layer will recognize the duplicate and discard it.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The transport layer provides flow control and error handling, and participates
in solving problems concerned with the transmission and reception of packets.
Transmission Control Protocol (TCP) and Sequenced Packet Exchange (SPX)
are examples of transport-layer protocols.
Network Layer
Layer 3, the network layer, is responsible for addressing messages and translating
logical addresses and names into physical addresses. This layer also determines the
route from the source to the destination computer. It determines which path the
data should take based on network conditions, priority of service, and other factors.
It also manages traffic problems on the network, such as switching and routing of
packets and controlling the congestion of data.
If the network adapter on the router cannot transmit a data chunk as large as the
source computer sends, the network layer on the router compensates by breaking
the data into smaller units. At the destination end, the network layer reassembles
the data. Internet Protocol (IP) and Internetwork Packet Exchange (IPX) are
examples of network-layer protocols.
Data-Link Layer
Layer 2, the data-link layer, sends data frames from the network layer to the
physical layer. It controls the electrical impulses that enter and leave the network
cable. On the receiving end, the data-link layer packages raw bits from the physical
layer into data frames. (A data frame is an organized, logical structure in which
data can be placed). The electrical representation of the data (bit patterns, encoding
methods, and tokens) is known to this layer only.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Figure 1.8.2 shows a simple data frame. In this example, the sender ID represents
the address of the computer that is sending the information; the destination ID
represents the address of the computer to which the information is being sent. The
control information is used for frame type, routing, and segmentation information.
The data is the information itself. The cyclical redundancy check (CRC) provides
error correction and verification information to ensure that the data frame is
received correctly.
The data-link layer is responsible for providing error-free transfer of these frames
from one computer to another through the physical layer. This allows the network
layer to anticipate virtually error-free transmission over the network connection.
Usually, when the data-link layer sends a frame, it waits for an acknowledgment
from the recipient. The recipient data-link layer detects any problems with the
frame that might have occurred during transmission. Frames that were damaged
during transmission or were not acknowledged are then re-sent.
Physical Layer
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Layer 1, the bottom layer of the OSI reference model, is the physical layer. This
layer transmits the unstructured, raw bit stream over a physical medium (such as
the network cable). The physical layer is totally hardware-oriented and deals with
all aspects of establishing and maintaining a physical link between communicating
computers. The physical layer also carries the signals that transmit data generated
by each of the higher layers.
This layer defines how the cable is attached to the NIC. For example, it defines
how many pins the connector has and the function of each. It also defines which
transmission technique will be used to send data over the network cable.
This layer provides data encoding and bit synchronization. The physical layer is
responsible for transmitting bits (zeros and ones) from one computer to another,
ensuring that when a transmitting host sends a 1 bit, it is received as a 1 bit, not a 0
bit. Because different types of media physically transmit bits (light or electrical
signals) differently, the physical layer also defines the duration of each impulse
and how each bit is translated into the appropriate electrical or optical impulse for
the network cable.
This layer is often referred to as the "hardware layer." Although the rest of the
layers can be implemented as firmware (chip-level functions on the NIC), rather
than actual software, the other layers are software in relation to this first layer.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Transport To Throw
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
internetworking protocol.
management.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Internet layer
Transport layer
Application layer
Each of these layers corresponds to one or more layers of the OSI reference model.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
interface between the network architecture (such as token ring, Ethernet) and the
Internet layer.
Internet Layer
The Internet layer, corresponding to the network layer of the OSI reference model,
uses several protocols for routing and delivering packets. Routers are protocol
dependent. They function at this layer of the model and are used to forward packets
from one network or segment to another. Several protocols work within the
Internet layer.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
packets (such as missing e-mail messages) from endlessly wandering the network.
When the TTL counts down to zero, the packet is eliminated from the network.
Before an IP packet can be forwarded to another host, the hardware address of the
receiving machine must be known. The ARP determines hardware address (MAC
addresses) that corresponds to an IP address. If ARP does not contain the address
in its own cache, it broadcasts a request for the address. All hosts on the network
process the request and, if they contain a map to that address, pass the address back
to the requestor. The packet is then sent on its way, and the new information
address is stored in the router's cache.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
it responds by checking its routing table for the machine number of the requesting
node and sending the appropriate IP number back to the requesting node.
The ICMP is used by IP and higher-level protocols to send and receive status
reports about information being transmitted. Routers commonly use ICMP to
control the flow, or speed, of data between themselves. If the flow of data is too
fast for a router, it requests that other routers slow down.
The two basic categories of ICMP messages are reporting errors and sending
queries.
Transport Layer
The transport layer, corresponding to the transport layer of the OSI reference
model, is responsible for establishing and maintaining end-to-end communication
between two hosts. The transport layer provides acknowledgment of receipt, flow
control, and sequencing of packets. It also handles retransmissions of packets. The
transport layer can use either TCP or User Datagram Protocol (UDP) protocols
depending on the requirements of the transmission.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
smaller pieces.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
applications and services typically use the first 1023 ports. The Internet Assigned
Numbers Authority (IANA) has assigned these as standard, or default, ports. Any
client applications dynamically assign port numbers as needed. A port and a node
address together make up a socket.
Services and applications use sockets to establish connections with another host. If
applications need to guarantee the delivery of data, the socket chooses the
connection-oriented service (TCP). If the applications do not need to guarantee
data delivery, the socket chooses the connectionless service (UDP).
A sliding window is used by TCP for transferring data between hosts. It regulates
how much information can be passed over a TCP connection before the receiving
host must send an acknowledgement. Each computer has both a send and a receive
window that it utilizes to buffer data and make the communication process more
efficient. A sliding window allows the sending computer to transmit data in a
stream without having to wait for each packet to be acknowledged. This allows the
receiving machine to receive packets out of order and reorganize them while it
waits for more packets. The sending window keeps track of data that has been sent,
and if an acknowledgement is not received within a given amount of time, the
packets are re-sent.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Application Layer
Corresponding to the session, presentation, and application layers of the OSI
reference model, the application layer connects applications to the network. Two
application programming interfaces (APIs) provide access to the TCP/IP transport
protocols—Windows Sockets and NetBIOS.
that API created for the BSD Unix operating system. WinSock
exist near the top of the TCP/IP reference model. Any program or
application written using the WinSock API can communicate with any
NETWORK PROTOCOLS
Introduction to Protocols
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
countries. Rules of protocol apply in the same way in the computer environment.
When several computers are networked, the rules and technical procedures
governing their communication and interaction are called protocols.
Keep three points in mind when you think about protocols in a network
environment:
different tasks. Each protocol has its own advantages and restrictions.
that works at the physical layer ensures that the data packet passes
through the network interface card (NIC) and out onto the network
cable.
levels in a single protocol stack. The levels in the protocol stack "map,"
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The protocol steps must be carried out in a consistent order that is the same
on every computer in the network. In the sending computer, these steps must
be executed from the top down. In the receiving computer, these steps must be
carried out from the bottom up.
1. Break the data into smaller sections, called packets, which the
belongs to it.
3. Prepare the data for transmission through the NIC and out onto
Protocols at the receiving computer carry out the same series of steps in reverse
order. They:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
2. Bring the data packets into the computer through the NIC.
Both sending and receiving computers need to perform each step in the same way
so that the data will have the same structure when it is received as it did when it
was sent.
For example, two different protocols might each break data into
Repeaters
As signals travel along a cable, they degrade and become distorted in a process
called "attenuation." If a cable is long enough, attenuation will finally make a
signal unrecognizable. Installing a repeater enables signals to travel farther.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A repeater works at the physical layer of the OSI Reference Model to regenerate
the network's signals and resend them out on other segments. Figure below shows
how repeaters regenerate weak signals.
The repeater takes a weak signal from one segment, regenerates it, and passes it to
the next segment. To pass data through the repeater from one segment to the next,
the packets and the Logical Link Control (LLC) protocols must be identical on
each segment. A repeater will not enable communication, for example, between an
802.3 LAN (Ethernet) and an 802.5 LAN (Token Ring).
Repeaters do not translate or filter signals. For a repeater to work, both segments
that the repeater joins must use the same access method. The two most common
access methods are carrier-sense multiple-access with collision detection
(CSMA/CD) and token passing. A repeater cannot connect a segment using
CSMA/CD to a segment using the token-passing access method. That is, a repeater
cannot translate an Ethernet packet into a Token Ring packet.
As shown in Figure below, repeaters can move packets from one kind of physical
media to another. They can take an Ethernet packet coming from a thinnet coaxial-
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Repeater Considerations
Repeaters afford the least expensive way to expand a network. When the need
arises to extend the physical network beyond its distance or node limitations,
consider using a repeater to link segments if neither segment is generating much
traffic or limiting costs is a major consideration.
No Isolation or Filtering: Repeaters send every bit of data from one cable
segment to another, even if the data consists of malformed packets or packets not
destined for use on the network. This means that a problem with one segment can
disrupt every other segment. Repeaters do not act as filters to restrict the flow of
problem traffic.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Repeaters will also pass a broadcast storm along from one segment to the next,
back and forth along the network. A broadcast storm occurs when so many
broadcast messages are on the network that the number is approaching the network
bandwidth limit. If a device is responding to a packet that is continuously
circulating on the network, or a packet is continuously attempting to contact a
system that never replies, network performance will be degraded.
HUB/CONCENTRATOR
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Active Hubs
Most hubs are active; that is, they regenerate and retransmit signals in the same
way as a repeater does. Because hubs usually have eight to twelve ports for
network computers to connect to, they are sometimes called multi-port repeaters.
Active hubs require electrical power to run.
Passive Hubs
Some types of hubs are passive; examples include wiring panels or punch-down
blocks. They act as connection points and do not amplify or regenerate the signal;
the signal passes through the hub. Passive hubs do not require electrical power
to run.
Hybrid Hubs
Advanced hubs that will accommodate several different types of cables are called
hybrid hubs. The following figure shows a main hub (the hybrid) with three sub-
hubs.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Hub Considerations
Hub-based systems are versatile and offer several advantages over systems that do
not use hubs.
types.
A hub can be used as the central hardware component in a star topology. Hubs can
also be used to expand the size of a LAN. Although using hubs won't convert a
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
LAN into a WAN, connecting or adding hubs to a LAN can effectively increase
the number of workstations. This method of growing a LAN is popular, but does
come with many design limitations. Figure 3.4.1 shows how several 10BaseT hubs
can be connected to expand a network.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Cables attach the individual clients and servers to the MSAU, which
works like other passive hubs. Figure below shows a hub in which the
Figure Hub showing the internal ring and clockwise token path
Hub Capacity
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Other vendors offer hubs with more capacity; the capacity depends on the vendor
and the hub model.
When one Token Ring is full—that is, when every port on an MSAU has a
computer connected to it—adding another ring (MSAU) can enlarge the network.
The only rule that must be followed is that each MSAU must be connected in such
a way so that it becomes part of the ring. Figure 3.4.5 shows 1, 2, and 3 MSAU
connected and maintaining a logical ring. An MSAU's ring-in and ring-out
connection points make use of patch cables to connect many MSAUs on top of
each other while still forming a continuous ring inside the MSAUs.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
BRIDGE
Like a repeater, a bridge can join segments or workgroup LANs. Figure 2.5.1
shows a bridge connecting two network segments. However, a bridge can also
divide a network to isolate traffic or problems. For example, if the volume of
traffic from one or two computers or a single department is flooding the network
with data and slowing down the entire operation, a bridge could isolate those
computers or that department.
of attached computers.
more efficient.
Ethernet.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Because bridges work at the data-link layer of the OSI reference model, all
information contained in the higher levels of the OSI reference model is
unavailable to them. Rather than distinguish between one protocol and another,
bridges simply pass all protocols along the network. All protocols pass across
bridges, so it is up to the individual computers to determine which protocols they
can recognize.
The data-link layer has two sublayers: the Logical Link Control (LLC) sublayer
and the Media Access Control (MAC) sublayer. Bridges work at the MAC
sublayer and are sometimes referred to as MAC-layer bridges.
A MAC-layer bridge:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A bridge works on the principle that each network node has its own address.
A bridge forwards packets based on the address of the destination node.
Bridges actually have some degree of intelligence in that they learn where to
forward data. As traffic passes through the bridge, information about the computer
addresses is stored in the bridge's RAM. The bridge uses this RAM to build a
routing table based on source addresses.
Initially, the bridge's routing table is empty. As nodes transmit packets, the source
address is copied to the routing table. With this address information (See Figure
2.5.2); the bridge learns which computers are on which segment of the network.
Creating the Routing Table Bridges build their routing tables based on the
addresses of computers that have transmitted data on the network. Specifically,
bridges use source addresses—the address of the device that initiates the
transmission—to create a routing table.
the routing table. If the source address is not there, it is added to the
table. The bridge then compares the destination address with the
routing-table database.
address.
forwards the packet to all its ports except the one on which it
originated.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
segment 1, the packet does not get forwarded across the bridge to
segment 2.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Therefore, bridges can use routing tables to reduce the traffic on the network by
controlling which packets get forwarded to other segments. This controlling
(or restricting) of the flow of network traffic is known as "segmenting network
traffic."
A large network is not limited to one bridge. Multiple bridges can be used to
combine several small networks into one large network.
Remote Bridges
Only one bridge is necessary to link two cable segments. However, where two
separate LANs are located at a great distance from each other (See Figure 2.5.4),
they can be joined into a single network. Implementing two remote bridges
connected with synchronous modems to a dedicated, data-grade telephone line can
do this.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Because remote LAN segments can be joined over telephone lines, it is possible
for multiple LANs to be joined by more than one path. In this situation, it is
possible that data might get into a continuous loop. To handle this possibility,
the 802.1 Network Management Committee of the Institute of Electrical and
Electronic Engineers (IEEE) has implemented the spanning tree algorithm (STA).
Under STA, software can sense the existence of more than one route, determine
which would be the most efficient, and then configure the bridge to use that one.
Other paths are disconnected using software, although the disconnected routes can
be reactivated if the primary route becomes unavailable.
Bridges work at a higher OSI layer than repeaters. This means that bridges have
more intelligence than repeaters and can take more data features into
account.
While bridges resemble repeaters in that they can regenerate data, bridges do this
at the packet level. This means that bridges can send packets over long distances
using a variety of long-distance media.
Bridge Considerations
Bridges have all of the features of repeaters, but also accommodate more nodes.
They provide better network performance than repeaters. Because bridged
networks have been divided, fewer computers compete for available resources on
each segment.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
To look at it another way, if a large Ethernet network were divided into two
segments connected by a bridge, each new network would carry fewer packets,
have fewer collisions, and operate more efficiently. Although each network would
be separate, the bridge would pass appropriate traffic between them.
Implementing a bridge
Switch
A switch is the next rung up the evolutionary ladder from bridges. In modern star-topology
networking, when you need bridging functionality you often buy a switch. But bridging is not
the only benefit of switch implementation. Switches also provide the benefit of micro-LAN
segmentation, which means that every node connected to a switched port receives its own
dedicated bandwidth.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Switches are multiport bridges. Sometimes they are called smart hubs or switching hub. They
filter traffic between the ports on the switch by using the MAC address of computers
transmitting through them. Switches can be used when greater performance is needed or when
collisions need to be reduced. The following figure illustrates a switched network.
Router
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Routers work at the network layer of the OSI reference model. This means they
can switch and route packets across multiple networks. They do this by exchanging
protocol-specific information between separate networks. Routers read complex
network addressing information in the packet and, because they function at a
higher layer in the OSI reference model than bridges, they have access to
additional information.
Routers have access to more of the information in packets than bridges have and
use this information to improve packet deliveries. Routers are used in complex
networks because they provide better traffic management. Routers can share status
and routing information with one another and use this information to bypass slow
or malfunctioning connections.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
As shown in Figure 2.6.1, a router uses its data-routing table to select the best route
for the data based on costs and available paths.
"routing table," it has a different meaning for bridges than it does for
routers.
numbers that allow them to communicate with other routers and local
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
forwarded.
routers are slower than most bridges. As packets are passed from
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Ring network.
allow corrupted data to get passed onto the network. Because they do
not pass corrupted data or broadcast data storms, routers put little
stress on networks.
Routers do not look at the destination node address; they look only at
the network address. Routers will pass information only if the network
address is known. This ability to control the data passing through the
large network into many separate networks, and because routers do not
pass or even handle every packet, they act as a safety barrier between
Routable Protocols Not all protocols are routable. Protocols that are
routable include:
DECnet.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
OSI.
DDP (AppleTalk).
Equipment Corporation.
paths. Because routers can link segments that use completely different
paths available for the router to use. This means that if one router
does not function, the data can still be passed over alternate routes.
A router can listen to a network and identify which parts are busiest.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
one path is very busy, the router identifies an alternative path and
A router decides the path the data packet will follow by determining
routers build routing tables and use these in routing algorithms such as
the following:
Types of Routers
Static.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Dynamic.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Gateway
In general, the role of the gateway is to overcome problems associated with
protocol incompatibility. This is a problem, which most often occurs when totally
different systems, usually developed independently, need to be linked.
Note:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Backbone
Bandwidth
Redundancy
Remote connection
reliability.
available.
Design Methodology
1. Analyse requirements
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Step 1... - Analyze Requirements (of the network and its users)
Business issues
Technology issues
Administrative issues
Gather Data -
o Corporate Structure
o Applications in use
o Current topology
o Mission-critical data
o Mission-critical operations
Business requirements
Technical requirements
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Availability requirements -
o Throughput
o Response time
o Access to resources
Design Rule: First and foremost you must understand the customer.
Client/Server applications
Host/terminal applications
Routing protocols
Star Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Star topology -
to-point links.
network
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
were attached to the same wire (media), when in fact they are located
Media contention
o too many devices, all with a high demand for the network
segment
Excessive broadcasts
Overloaded backbone
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Ethernet Technology
Broadcast domain - The set of all devices that will receive broadcast
frames originating from any device within the set. Broadcast domains
All broadcasts from any host in the same broadcast domain are visible
connectivity.
The scalability of the collision domain depends on total traffic, and the
Network Design
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The major pieces of this topology design can be broken into three
Includes wire media type such as CAT5 UTP and fiber-optic cable
wiring schemes.
Design Goal: Build this layer of the OSI model with speed and expansion
capabilities.
Design Goals:
LAN segment.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
broadcast domains.
addressing.
Design Goals:
o Build a path between LAN segments that will filter the flow
of data packets.
The Physical layer controls the way data is transmitted between source
Physical layer - Layer 1 of the OSI reference model. The physical layer
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Electrical (copper)
o coaxial
o twisted pair
Fiber-optic
o multimode
o single-mode
Wiring configurations
o Distance limitations
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
The MDF is the Point of Presence (POP) for outside services from
In a simple star with only one wiring closet, the main distribution facility
(MDF) will include one or more horizontal cross connect (HCC) patch
panels. HCC patch cables will be used to connect the Layer 1 'horizontal
cabling' with the Layer 2 LAN switch ports. The uplink port of the LAN
using 'patch cable' also. At this point the end host will have a complete
run and the size (number of ports) of the HCC patch panels will be
Design Hint: Review the user’s requirements to determine what the user expects
for the number of horizontal cable runs to each room that the MDF or IDF will be
servicing in its catchment area.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
cabling
LAN segment
Catchment areas - Zone that falls within area that can be served by an
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
the future
IDFs with the MDF, along with how many spare cables are
closets.
The purpose of Layer 2 (Data Link Layer) devices in the network are to
provide 'flow control', 'error detection & correction', and 'reduce congestion' in
the network. The two most common Layer 2 devices (other than the
NIC, which every host on the network has to have) are Bridges and LAN
switches.
LAN switch’s (Layer 2 Switch) can allocate bandwidth on a per port basis
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Asymmetric Switching -
devices.
By installing LAN switching at the MDF and IDFs we can start to look
at the size of our collision domains and the speed for each horizontal
cable and vertical cable run. Since the vertical cable will be carrying all
of the data traffic between the MDF and the IDFs, the capacity of
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
When using hubs, the size of the collision domain increases and
bandwidth is shared.
domain. All hosts connected to the shared LAN hub share the same
link
Layer 3 - Routing
allow for segmentation of the LAN into unique networks both physical and
logical. Routers also allow for connectivity to wide area networks (WANS)
unknown addresses must be flooded out every port. The router also is
the central point in the LAN for traffic destination of the WAN port.
into two distinct classes - (1) 'enterprise servers' and (2) 'workgroup
servers'. Within the MDF and IDFs, the Layer 2 LAN switches must
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
services only have to travel to the MDF and will not be transmitted
servers will only have to travel network infrastructure to that IDF and
What to Document:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Reasons to Document:
load
Chapter 5
Network Address
IP addressing
IP addresses are represented by a 32-bit unsigned binary value.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
(DNS).
The IP address
IP addresses are used by the IP protocol to uniquely identify a
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
one of three
with 128.2 being the network number and 7.9 being the host
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Class-based IP addresses
The first bits of the IP address specify how the rest of the
address should be separated into its network and host part. The
4.2.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Where:
Class A addresses: These addresses use 7 bits for the <network> and 24
bits for the <host> portion of the IP address. This allows for 2 7-2 (126)
networks each with 224-2 (16777214) hosts; a total of over 2 billion
addresses.
Class B addresses: These addresses use 14 bits for the <network> and 16
bits for the <host> portion of the IP address. This allows for 2 14-2 (16382)
networks each with 216-2 (65534) hosts; a total of over 1 billion addresses.
Class C addresses: These addresses use 21 bits for the <network> and 8
bits for the <host> portion of the IP address. That allows for 2 21-2
(2097150) networks each with 28-2 (254) hosts; a total of over half a billion
addresses.
Class D addresses: These addresses are reserved for multicasting (a sort of
broadcasting, but in a limited area, and only to hosts using the same class D
address).
Class E addresses: These addresses are reserved for future use.
A Class A address is suitable for networks with an extremely large
than 254 hosts) must use Class B addresses. However, the number of
feared that if this growth had been allowed to continue unabated, all
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
became apparent that if this trend continued, the last Class B network
shown in the next section, the host number can be further subdivided:
Reserved IP addresses
A component of an IP address with a value all bits 0 or all bits 1 has
a special meaning:
All bits 0: An address with all bits zero in the host number portion is
interpreted as this host (IP address with <host address>=0). All bits zero in
the network number portion is thisnetwork (IP address with <network
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
IP subnets
Due to the explosive growth of the Internet, the principle of
occur when:
A new type of physical network is installed at a location.
Growth of the number of hosts requires splitting the local network into two
or more separate networks.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
concept of IP
outside world.
This remote host still regards the local part of the IP address as
a host number.
bits in the local portion can be used to form the subnet. The
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
belonging to the original network number are set to ones but are
not used (in some platform configurations, this value was actually
The special treatment of all bits zero and all bits one applies to
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
In this example, there are several other possibilities for assigning the
subnet and host portions of the address. The number of subnets and
network has 16 bits to be divided between the subnet number and the
When assigning the subnet part of the local address, the objective is
bits at the beginning of the local address part for the subnet number.
Types of subnetting
There are two types of subnetting: static and variable length.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
subnetting
Static subnetting
Static subnetting implies that all subnets obtained from the same
network use the same subnet mask.
This is simple to implement and easy to maintain, it may waste
address space in small networks. Consider a network of four hosts
using a subnet mask of 255.255.255.0. This allocation wastes 250 IP
addresses.
All hosts and routers are required to support static subnetting.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
the subnets are used to hide the different masks from hosts.
9 67 38 1 decimal notation
(9.67.38.1)
having
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
indicate the actual host addresses. Figure 4.4 shows the subnetted
Figure 4.4. IP - Class A address with subnet mask and subnet address
A bit mask, known as the subnet mask, is used to identify which bits of
the original host address field indicate the subnet number. In the
Because of the all bits 0 and all bits 1 restrictions, this defines 2 18-2
The value applied to the subnet number takes the value of the full
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
===================================== logical_AND
address)
IP will recognize all host addresses as being on the local network for
environments
subnet of network 9 with the given subnet mask. This number bears no
resemblance to the actual IP address that this host has been assigned
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
by the network administrator. The values of all zeroes and all ones in
Note:
routers now support the use of all zeroes and all ones in the <subnet>
field.
address range into five separate networks each with the following
number of hosts:
static subnetting divides the network into four subnets each with 64
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
hosts or eight subnets each with 32 hosts. This subnet allocation does
into four subnets each with 64 hosts. The fourth subnet can be
further divided into two subnets each with 32 hosts by using a mask of
requirements.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
IP routing
An important function of the IP layer is IP routing. This provides
• Hosts or networks for which the router has been given explicit
definitions.
Hosts or networks for which the router has received an ICMP redirect message.
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Direct routing
If the destination host is attached to the same physical network
routing.
Indirect routing
Indirect routing occurs when the destination host is not
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Figure 4.3. IP - Direct and indirect routes - Host C has a direct route
Resource sharing
File sharing
Hardware sharing
Software sharing
7. Documentation
6.1. Overview of documentation
6.2. Current hardware configuration
6.3. the installed software
6.4. Any patches, and special settings.
6.5. Documenting Network Performance
6.6. Documenting Server Performance
6.7. Other Documentation: README files ,The manufacturer’s technical
support CD-ROM ,The manufacturer’s technical support website
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Self-Check 1
Answer the questions on the following questionnaire; provide the answer sheet to your
trainer.
Check your answers by looking at the feedback sheets; ask for the assistance of the
trainer whenever necessary.
Satisfactory
Questions
Response
The trainee should answer the following questions YES NO
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A. Inexpensive to Install
B. Requires Administrative Time
C. File Server May Fail
D. The dangers of computer virus
E. All except A
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A) 100 meters
B) 185 meters
C) 500 meters
D) 2 kilometers
E) 200 meters
A. Modem C) Repeater
B. Network Interface Card D) Hub
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
A. Cat1 C) cat2
B. Coaxial cable D) All
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
and Support?
Feedback to Trainee:
Answer Key
Part one
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
1. False
2. True
3. True
4. False
5. False
Part two
1. A
2. C
3. A
4. E
5. A
6. D
7. A
8. B
9. B
10. D
11. C
12. A
13. A
14. D
15. D
Performance Criteria
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Satisfactory
Assessment Criteria
Response
The trainee will be assessed through the following criteria: YES NO
Answered all the interview questions clearly
Feedback to Trainee:
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10
Nefas Silk INFORMATION UNIT Hardware & Networking Level III
TVET College SHEET
MODULE Determining Best-Fit Topology
Best-Fit Topology version 1.0 Year 2012 prepared By: Mezgebe M. Page 10