Chapter 2 1 and 2 21
Chapter 2 1 and 2 21
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The
entire capacity of the link is reserved for transmission between those two devices. Most
point-to-point connections use an actual length of wire or cable to connect the two ends,
but other options, such as microwave or satellite links, are also possible. When you
change television channels by infrared remote control, you are establishing a point-to-
point connection between the remote control and the television's control system.
E.g.: -
1) PC to modem.
2) Workstation to workstation.
3) Server or mainframe to workstation.
4) PC to printer.
5) Microwave to microwave.
6) TV to remote control.
When a point-to-point subnet is used important interconnection topology. It
should look like in Fig (a)
Multipoint (multi-drop)
A multipoint (also called multi-drop) connection is one in which more than two
specific devices share a single link. In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally. If several devices can use the link
simultaneously, it is a spatially shared connection. If users must take turns, it is a
timeshared connection.
Topology
It defines physical or logical arrangement of links in network. Topology is
physical layout of computers, cables and other connected devices on a network. The
term topology refers to the way a network is laid out either physical or logically two or
more devices connect to a link or more links form a topology. The topology of a network
is the geometric representation of the relationship of all the links and linking devices
(called node) to each other.
There are two types of topologies-
1. Physical Topology
2. Logical Topology
Physical topology
The complete physical structure of transmission media is called physical topology.
This refers to the layout of cabling, location of nodes and interconnection between the
nodes and cabling.
Logical Topology
The logical topology is refers to how data is actually transferred in a network. This
represents the way that data passes through the network from one device to another.
E.g.: -(Ethernet) 10 base2 also known as thin net is an inexpensive network based on bus
topology.
Ring Topology
In Ring topology each node is connected to the two nearest nodes so the entire
network forms a circle. Rings are used in high performance network. A signal is passed
along the ring in one direction, from device to device, until it reaches its destination. Each
device in the ring incorporates a repeater. When a device receives a signal intended for
another device, its repeater regenerates the bits and
passes them along.
Token Ring -
Some ring networks use token passing. Token is a short message. A token is passed
around the ring until a PC wishes to send information to another PC. That PC modifies the
token adds an electronic address and data and sends it around the ring. Each PC in
sequence receives the token and the information and passes them to the next PC until
either the electronic address of computer matches or the token returns to its origin the
receiving PC returns a message to originator that the message has been received. The
sending PC than creates another token and begins transmitting the token. The token is
circulated until the station is ready to send.
E.g.: - FDDI is a fast fiber optic networks based on ring topology. FDDI (Fiber Distributed
data interface)
Disadvantages of ring
1. A single node failure leads to the collapse of the full network.
2. Unidirectional traffic can be disadvantage in a simple ring. A break in the ring
can disable the entire network; using dual ring can solve the weakness.
3. Expansion to the network can cause network disruption
Mesh topology
In a mesh topology every device has dedicated point-to-point link to every other
device. The term dedicated means that the link carries only between the two devices it
connects. A fully connected mesh network has n (n-1)/2 physical connections to link
devices.
To accommodate that many links every device on the network must have (n-1)
output ports because each device requires an interface for every other on the network.
Mesh topology are not usually practical. In addition unless each station frequently sends
signal to all the other stations and excessive amount of network bandwidth is wasted.
Mesh gets unmanageable beyond a very small number of devices. Most mesh
topology networks are not true mesh networks.
Mesh installation
Mesh topology N/w become more difficult to install as the no. of devices increases
because of the sheer quantity of connections that must be made. A true mesh topology of
seven devices would require 21 connections and six I/O ports.
Disadvantages
As it involves a lot of connection. The total no. of physical links and the no. of I/O
ports require to connect will be more and hence is prohibitively expensive.
Difficult to install and reconfigure specially as no. of devices increases.
Hardware required to connect each device is highly expensive.
The sheer bulk of the wiring can be greater than the available space (walls, ceiling
and floors) can accommodate. For these reasons a mesh topology is usually
implemented in a limited fashion.
Hybrid Topology
A network can be hybrid. For example, we can have a main star topology with each branch
connecting several stations in a bus topology as shown in Figure
Star ring
This is also called as star wired ring. The n/w cables are laid out much like a star
n/w but a ring is implemented in the central hub outgoing hubs can be connected through
the inner hubs effectively extending a loop of the ring. E.g. Token ring is considered a star
ring although its topology is physical a start its function logically in a ring.
Question Bank:-
What is topology?
Describe
1. Bus topology with diagram and state it’s any two merits and demerits.
2. Star topology with diagram and state it’s any two merits and demerits.
3. Ring topology with diagram and state it’s any two merits and demerits.
4. Mesh topology with diagram and state it’s any two merits and demerits.
1. Connectors:
Que. List the different types of connector used in communication? State its uses.
To connect cable between two computers.
Connectors are of different type such as –
1. Twisted Pair cable
2. Co-axial Cable
3. Fibre optic cable.
Connectors are type such as-
1. Jacks
2. Plugs
3. Sockets and ports
Example:
RS232 and V35 for serial interface
RJ45 and BNC connectors for Ethernet.
SC or ST connectors for fibre optic
BNC Connector
(Bayonet Nut Coupling) A commonly used plug and socket for audio, video and
networking applications that provides a tight connection. This connector has a center pin
connected to the center cable conductor and a metal tube connected to the outer cable
shield. A rotating ring outside the tube locks the cable to any female connector. BNCs are
used to connect a variety of different coaxial cable types. After the plug is inserted, it is
turned, causing pins in the socket to be pinched into a locking groove on the plug.
Fig.Repeater
Repeater as not an amplifier
An amplifier can’t discriminate between the intended signal and noise. It amplifies
equally everything fed into it. A repeater doesn’t amplify the signal. It regenerates it.
When it receives a weak end or corrupted signal it creates a copy bit at the original
strength.
The location of the repeater on a link is vital. A repeater must replace so that a
signal reaches it before any noise changes the meaning of any of its bits. A little noise can
alert the precision of a bits voltage with losing its identity.
Networks using a Star topology require a central point for the devices to connect.
Originally this device was called a concentrator since it consolidated the cable runs from
all network devices. The basic form of concentrator is the hub.
As shown in Figure; the hub is a hardware device that contains multiple, independent
ports that match the cable type of the network. Most common hubs interconnect Category
3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs
also exist. The hub is considered the least common denominator in device concentrators.
Hubs offer an inexpensive option for transporting data between devices, but hubs don't
offer any form of intelligence. Hubs can be active or passive.
Important Points
A hub is used as a central device.
Connects the computers in star topology.
Hubs are simple devices that direct data packets to all devices connected
to the hub.
Hubs regenerate and retime network signals
hubs work at the OSI physical layer
They cannot filter network traffic.
They cannot determine best path
They are really multi-port repeaters
Fig. HUB
There are three main types of hub:
Passive hub
A passive hub simply combines the signal of n/w segment. There is no signal
processing or regeneration because it does not boost the signal and in fact absorbs
some of the signal. A passive hub reduces by half the maximum, cabling distance
permitted.
4. Bridges
A bridge is used to join two network segments together, it allows computers on
either segment to access resources on the other. They can also be used to divide large
networks into smaller segments. Bridges have all the features of repeaters, but can have
more nodes, and since the network is divided, there is fewer computers competing for
resources on each segment thus improving network performance.
Bridges can also connect networks that run at different speeds, different
topologies, or different protocols. But they cannot, join an Ethernet segment with a Token
Ring segment, because these use different networking standards. Bridges operate at both
the Physical Layer and the MAC sub layer of the Data Link layer. Bridges read the MAC
header of each frame to determine on which side of the bridge the destination device is
located, the bridge then repeats the transmission to the segment where the device is
located.
Unlike the repeaters which simply passes on all the signals it receives a bridges
selectively determines the appropriate segment to which it should pass a signal. It does
this by reading the address of the entire signal it receives. The bridges read the physical
location of the source and destination computers from the addresses and store it to a
table.
The figure shows the messages or signals which do not need to cross the bridge (Message
from computer-A to Computer- D) and other half part shows the messages that needs to
pass through the bridge (Message from computer-A to Computer-G). Bridges also provide
security through this portioning of traffic.