Chapter 2 Network Topology

Slides:



Advertisements
Similar presentations
COMPUTER NETWORK TOPOLOGIES
Advertisements

Computer Network Topologies
Nilesh Agre Wedashree Jalukar Neelima Shahi Group Members.
Chapter 2 Network Models.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 1: Internetworking.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies. The concept of a topology. The basic function of computers on the LAN is to provide the user with an almost limitless set of applications.
Network Topologies.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Connecting LANs, (network devices) Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Network Design Essentials
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
Chapter Overview Network Communications.
Computers Are Your Future Chapter 8 Computers Are Your Future © 2008 Prentice-Hall, Inc.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1 Module 15: Network Structures n Topology n Network Types n Communication.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Intro to Network Design
 Topology Topology  Different types of topology Different types of topology  bus topologybus topology  ring topologyring topology  star topologystar.
NETWORKS NEED HISTORY HARDWARE REQD. SOFTWARE REQD. TOPOLOGIES.
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
Physical Topology Physical layout of the network nodes – Broad description of the network: no detail about device types, connection methods, addressing,...
The McGraw- AS Computing LAN Topologies. The McGraw- Categories of LAN Topology.
OBJECTIVE: o Describe various network topologies o Discuss the role of network devices o Understand Network Configuration Factors to deploy a new network.
Network Topologies.
Network Concepts Topologies
Chapter2 Networking Fundamentals
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 5 Network Architecture. Physical Topologies Bus Ring Star.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Lecture-2: Idea of Network LAN - Local Area Network WAN - Wide Area Network.
NETWORKS.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Types of computer networks LAN ( LOCAL AREA NETWORK ) WAN (WIDE AREA NETWROK )
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
 Describe the basic and hybrid LAN physical topologies and their uses, advantages, and disadvantages  Describe the backbone structures that form the.
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
LAN Topologies Part 1. What is topology? Topology is the physical or logical interconnection of communicating devices Physical Topology: LANtopology,
Networking Devices.
Click to edit Master subtitle style
Connecting LANs, Backbone Networks
Computer Network Topologies
Introduction to Computers
Instructor: Mr. Malik Zaib
Chapter 5 Networks Communicating and Sharing Resources
Firewalls Routers, Switches, Hubs VPNs
Chapter 2 Network Topology
Presentation transcript:

Chapter 2 Network Topology Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 2 Network Topology 1

Objectives Describe the difference between physical topology and logical topology Sketch the physical topologies of bus, star, ring, fully connected, and hybrid networks Explain what is meant by network hierarchy Computer Networking From LANs to WANs: Hardware, Software, and Security

Objectives (cont’d.) Describe how a subnet is used to manage addresses on a network Explain what a network access point is Discuss the differences between a public network and a private network Computer Networking From LANs to WANs: Hardware, Software, and Security

Physical Topology Versus Logical Topology Structure of connections between network computers Cloud Graphic symbol describing network Does not specify nature of connections Physical topology Intermediate network nodes, machines, and connection between intermediate nodes Logical topology Data packet network path Computer Networking From LANs to WANs: Hardware, Software, and Security

Physical Topology Versus Logical Topology (cont’d.) Figure 2-1 Network cloud connecting three machines Computer Networking From LANs to WANs: Hardware, Software, and Security

Physical Topology Versus Logical Topology (cont’d.) Figure 2-2 Physical network topology Network software protocols Properly reassemble packets into correct sequence Eliminate duplicated information Computer Networking From LANs to WANs: Hardware, Software, and Security

Physical Topology Versus Logical Topology (cont’d.) Virtual circuit between machines Used for large amounts of data Prearranged network path all packets travel Used for particular session between machines Virtual private network (VPN) Uses public network connections to establish private communication Encrypts data Computer Networking From LANs to WANs: Hardware, Software, and Security

Physical Topology Versus Logical Topology (cont’d.) Table 2-1 Grouping of 20 PCs into 3 virtual LANs Special switches allow virtual LANs (VLANs) Example for Table 2-1: Twenty computers connected to three VLAN-capable switches Grouped into two or more VLANs Computer Networking From LANs to WANs: Hardware, Software, and Security

Fully Connected Networks Figure 2-3 Network topologies See Figure 2-3(a) Most expensive to build Computer Networking From LANs to WANs: Hardware, Software, and Security

Fully Connected Networks (cont’d.) Number of links (L) required in fully connected network of N nodes: Number of connections at each node Equals total number of nodes minus one Table 2-2 Number of links in a fully connected network Computer Networking From LANs to WANs: Hardware, Software, and Security

Star Networks See Figure 2-3(b) All nodes connect to central communications hub (concentrator) Small networks Require single hub Four, eight, 16, 32, or more connections available Large networks Require multiple hubs Increases hardware, cabling costs Computer Networking From LANs to WANs: Hardware, Software, and Security

Star Networks (cont’d.) Advantage Can isolate failing nodes Hub characteristic Broadcasts data received on one port to all other ports Each network node has opportunity to see each packet Switch Learns where to send data Eliminates data broadcast traffic Provides star topology Computer Networking From LANs to WANs: Hardware, Software, and Security

Bus Networks See Figure 2-3(c) All nodes on common bus (cable) compete for possession Broadcast data when an idle bus is detected Collision Two or more nodes transmit data at the same time Handled by Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Nodes stop, wait before retransmitting Computer Networking From LANs to WANs: Hardware, Software, and Security

Bus Networks (cont’d.) Bus wiring not difficult Daisy-chained via T-connectors into one long segment Issues causing cause intermittent, excessive collisions Bad crimps on BNC connectors Poor connections in T-connectors Improperly terminated cable segment Time domain reflectometer (TDR) used in troubleshooting Bus network is easy to set up and cost-efficient Computer Networking From LANs to WANs: Hardware, Software, and Security

Ring Networks See Figure 2-3(d) Each node connected to exactly two other nodes Data circulates in ring Number of links Same as number of nodes (similar to Star) No central hub (difference from Star) Link failure worst-case scenario Message travels completely around ring (takes time) Central multistation access units (MAUs) Physical star connection outside Physical ring connection inside Computer Networking From LANs to WANs: Hardware, Software, and Security

Hybrid Networks Combines two or more network topologies components Requires careful planning Various rules dictate how individual components are connected and used Logical viewpoint and overall organization must be planned Computer Networking From LANs to WANs: Hardware, Software, and Security

Hybrid Networks (cont’d.) Figure 2-4 Hybrid network Computer Networking From LANs to WANs: Hardware, Software, and Security

Network Hierarchy Hierarchy Switches act like hubs Layered organization Switches act like hubs Differ by forwarding data selectively Switches enforce hierarchy Learn where data packets should be forwarded Based on destination addresses Computer Networking From LANs to WANs: Hardware, Software, and Security

Network Hierarchy (cont’d.) Figure 2-5 Hybrid network with hierarchy Computer Networking From LANs to WANs: Hardware, Software, and Security

Subnets IP address Subnetting: logical activity Unique for each network node 32-bit number Locates, identifies Internet nodes Subnetting: logical activity Accomplished using special subnet mask Logically ANDed with IP address to determine network address Subnet mask separates IP address Network portion and host portion Nodes on different logical subnets require router Computer Networking From LANs to WANs: Hardware, Software, and Security

Network Access Points Provide access to national, global network traffic Companies can install independent communication networks Connect to one or more NAPs Act as NAPs themselves Companies connected to a NAP Enter into peering agreements with each other Allows traffic exchange If traffic Internet-based Connection called a point-of-presence (POP) Computer Networking From LANs to WANs: Hardware, Software, and Security

Network Access Points (cont’d.) Figure 2-6 RWA Software national backbone Computer Networking From LANs to WANs: Hardware, Software, and Security

Public Networks Versus Private Networks Two most pervasive public networks Public Switched Telephone Network (PSTN) Broadband cable Public access requires limitations User bandwidth, legal matters, user location Private networks Bandwidth limitations dependent on monetary network infrastructure investment Higher maintenance costs per user Computer Networking From LANs to WANs: Hardware, Software, and Security

Public Networks Versus Private Networks (cont’d.) Ways to keep network private Keep all components inside locked building No Internet connection Allow Internet access through managed firewall Encrypt all information needing to remain private Computer Networking From LANs to WANs: Hardware, Software, and Security

Troubleshooting Techniques Intentional harm to network Know what is required to partition network Prevents communication Disrupts normal network operation Negatively affects security, reliability Network troubleshooting requirements Knowledge of topology Both physical and logical Understanding of how network is partitioned Testing and repairing can proceed smoothly Computer Networking From LANs to WANs: Hardware, Software, and Security

Troubleshooting Techniques (cont’d.) Figure 2-7 Partitioning a network Computer Networking From LANs to WANs: Hardware, Software, and Security

Summary Network cloud Computer network connection views Describes network without specifying nature of connections Computer network connection views Physical Logical VPN tunnel VLANs may exist on same physical network Network topologies Fully connected, star, bus, ring, and hybrid Computer Networking From LANs to WANs: Hardware, Software, and Security

Summary (cont’d.) Switch provides dedicated bandwidth Hub provides shared bandwidth Router required for nodes on different logical subnets to talk to each other Network Access Points (NAPs) Provide access to national, global network traffic POP Internet-based NAP connections Public networks: PSTN, broadband cable Private network: owned and managed by private organization Computer Networking From LANs to WANs: Hardware, Software, and Security