Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.

Slides:



Advertisements
Similar presentations
Shape of a Network.
Advertisements

CP2073 Networking Lecture 5.
LAN and WAN LAN (Local Area Networks) are small networks which are contained in a single building or small area. WAN (Wide Area Networks) are larger networks.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Network Topologies CS 1202.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
Network Topologies An introduction to Network Topologies and the Link Layer.
Network Topologies.
Networks. Bus Network Terminator‘Workstation’ ‘Client’ ‘Terminal’ ‘Node’ Computer Terminator Backbone Server (optional)
Basic Concepts of Computer Networks
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Network Design Essentials. Guide to Networking Essentials, Fifth Edition2 Contents 1. Examining the Basics of a Network Layout 2. Understanding Standard.
Network Design Essentials
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Information Technology Lecture No 3 By: Khurram Shahid.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
NETWORK TOPOLOGIES HNC COMPUTING - Network Concepts 1 Network Concepts Topologies.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
Network Topologies Lecturer: Hyder R. Hamandi. Network Topologies Physical topologies describe how the cables are run in the network A topology is a way.
Chapter 2 Network Topology
Intro to Network Design
NETWORK TOPOLOGY. NETWORK TOPOLOGY The layout of a network Two major classes Physical Network Topology The physical layout of the network i.e. the arrangement.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
1 Network Topology 2 Introduction 8Physical and Logical Topologies 8Topologies 8Bus 8Ring 8Star 8Extended Star 8Mesh 8Hybrid.
Network Topologies.
Network Concepts Topologies
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Chapter 5 Network Architecture. Physical Topologies Bus Ring Star.
-Network topology is the layout of the connection between the computers. -It is also known as the pattern in which computers.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
Prepared by:Ronnel P. Agulto, CpE Objectives Different types of topologies; Their advantages & disadvantages How to choose an appropriate topologies in.
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Chapter 2 Network topology and Networking devices.
Shape of a Network 10/10/07. Topology  The way the computers are cabled together  Four different layouts  Logical topology describes the way data travels.
Computer Network Architecture Lecture 2: Fundamental of Network.
TOPOLOGIES in COMPUTER NETWORKING Refers to the physical layout of the network devices and cabling and how all the components communicate with each other.
Computer Networks Part 2
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Network Topology Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Part III Datalink Layer 10.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Chapter 5 Networks Communicating and Sharing Resources
Network Topologies CS 1202.
Multiple Access Methods
Network Topology.
Network Topologies CS 1202.
Multiple Access Methods
Part III Datalink Layer 10.
Presentation transcript:

Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3

Lesson 3—Networking BASICS2 Objectives List and describe the characteristics of the mesh, bus, ring, star, and hybrid topologies. Tell what items should be considered when selecting a network topology.

Lesson 3—Networking BASICS3 Objectives (continued) Define channel access method. Give the advantages and disadvantages of contention, polling, token passing, and demand priority channel access methods.

Lesson 3—Networking BASICS4 Topologies Physical layout of network devices Four types: mesh, bus, ring, and star

Lesson 3—Networking BASICS5 Mesh Topology It is also called a point-to-point topology. Each device is connected directly to all other network devices. It provides fault tolerance. It is only found in wide area networks.

Lesson 3—Networking BASICS6 Mesh Topology

Lesson 3—Networking BASICS7 Bus Topology It is a multipoint topology. Each device shares the connection. The bus has one starting and one ending point. Packets stop at each device on the network. Only one device at a time can send.

Lesson 3—Networking BASICS8 Bus Topology

Lesson 3—Networking BASICS9 Ring Topology It is a circle with no ends. Packets are sent from one device to the next. It does not slow down as more devices are added.

Lesson 3—Networking BASICS10 Ring Topology

Lesson 3—Networking BASICS11 Star Topology All devices are connected to a central device (hub). The hub receives and forwards packets. It is the easiest topology to troubleshoot and manage. It has a single point of failure.

Lesson 3—Networking BASICS12 Star Topology

Lesson 3—Networking BASICS13 Hybrid Topologies They are variations of two or more topologies. Star bus – used to connect multiple hubs in a star topology with a bus. Star ring – wired like star, but functions like a ring.

Lesson 3—Networking BASICS14 Design Considerations The best topology involves matching with the environ- ment it is to be used in. The physical arrangement of computers do not dictate the necessary topology.

Lesson 3—Networking BASICS15 Channel Access Methods These are rules of cooperation to eliminate collisions. There are four types of channel access methods.

Lesson 3—Networking BASICS16 Contention Each device contends or fights for the ability to send a packet. Carrier Sense Multiple Access/Collision Detection (CSMA/CD) – devices must listen before transmitting. A collision causes two devices to wait for random intervals. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) – all devices wait for random intervals.

Lesson 3—Networking BASICS17 Polling Each computer is asked in sequence whether it needs to transmit. Polling provides equal access to all devices.

Lesson 3—Networking BASICS18 Token Passing A special token packet is passed around the network. A station must secure a token before sending a packet. It eliminates collisions.

Lesson 3—Networking BASICS19 Demand Priority The central device sends the demand signal and waits for an acknowledgment signal. It allows for certain devices to be given higher priority. It reduces network traffic.

Lesson 3—Networking BASICS20 Demand Priority

Lesson 3—Networking BASICS21 Summary Topology refers to the physical layout of the network devices and cabling and how all the components communicate with each other. Computer network topology refers to how the computer network is arranged. There are four basic types of computer network topologies: mesh, bus, ring, and star. A mesh topology is also called a point-to-point topology. Each device is connected directly to all other devices on the network. A mesh topology is sometimes used in a wide area network (WAN) setting to ensure that all the sites continue to transmit in the event of a cable failure or another similar problem. Mesh topologies are rarely used in a LAN.

Lesson 3—Networking BASICS22 Summary (continued) LANs typically use a multipoint topology in which each computer on the network has just one connection. This connection is attached to a single cable that is shared by all other devices on the network. The most common type of multipoint topology is a bus topology. A computer network bus topology is characterized by one starting point and one ending point. A bus network topology works well for smaller networks and is inexpensive to install. However, it can become slow when more devices are added to the network. A star topology describes a network in which all the devices are connected to a central device known as a hub, which is respon- sible for receiving and forwarding packets to other devices on the network. Because everything is centralized in a star topology, it is the easiest topology to manage and troubleshoot.

Lesson 3—Networking BASICS23 Summary (continued) A multipoint ring topology is the opposite of a bus. A bus has two end points, but a ring is a circle with no ends. All the devices on the network are connected to the ring. Unlike a bus topology, in which the network devices do not play an active role in the network, each device has additional network functions in a ring topology. A ring topology works well for a computer network with many devices attached to it. Not all topologies are strictly mesh, bus, star, or ring. Some variations of these topologies, known as hybrid topologies, are also used. These variations are actually combinations of two or more topologies.

Lesson 3—Networking BASICS24 Summary (continued) A star bus topology is typically used to connect multiple hubs in star topologies with a bus topology and provides additional fault tolerance. A star ring topology is wired like a star, but functions like a ring. The packets in a star ring do not go directly to the next device on the ring, but instead go to a central hub. For multipoint topologies to function properly, there must be rules of cooperation to ensure that transmissions arrive intact. These rules are called channel access methods. One type of channel access method is polling. Each computer on the network is asked, or polled, in sequence whether it wants to transmit. If it does, it sends its packet while everyone else waits; if it has nothing to send, the next computer is polled.

Lesson 3—Networking BASICS25 Summary (continued) Another type of channel access method is contention, which means that each device contends, or fights, for the ability to send a message. There are two types of contention methods. The first type of contention is called Carrier Sense Multiple Access/Collision Detection (CSMA/CD). CSMA/CD says that, before one computer starts to send a message, it should listen to determine whether another device is currently sending a packet. If a collision happens, all computers on the network are told to hold their transmissions. The two computers that caused the collision each wait a different amount of time before listening again to the medium and restarting the process.

Lesson 3—Networking BASICS26 Summary (continued) Another contention variation attempts to avoid collisions alto- gether. This is known as Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). CSMA/CA handles the situation differently. Instead of making just the two stations responsible for the collision wait a random amount of time before attempting to resend, CMSA/CA has all stations wait a random amount of time after the medium is clear. The channel access method of token passing involves a special packet called a token that is passed from one computer to the next on the network. A computer can send a message only if it has the token. If a computer does not need to send a packet, it passes the token on to the next computer. If a computer needs to send a packet, it waits for the token and then attaches the packet to it.

Lesson 3—Networking BASICS27 Summary (continued) The channel access method of demand priority is similar to raising a hand and waiting to be called on. If a computer wants to send a message, it first transmits a demand signal to a central device. Once the central device receives the demand signal, it sends an acknowledgment signal back to the computer; the computer can then begin sending its message.