0% found this document useful (0 votes)
21 views40 pages

DCCN Topolgy DCCN

The document discusses the TCP/IP protocol suite and various network topologies. It provides the following key points: - The TCP/IP protocol suite has five layers - application, transport, internet, host to network, and physical/data link. It was developed by the Department of Defense in the 1960s. - Common network topologies include bus, ring, star, tree, mesh, and hybrid. Bus topology connects all nodes to a single backbone cable. Star topology connects all nodes to a central hub/switch. Mesh topology provides multiple redundant connections between nodes. - Factors like ease of setup/troubleshooting, expansion capabilities, reliability, and cost effectiveness vary between the different topology types and

Uploaded by

158 Ashlesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views40 pages

DCCN Topolgy DCCN

The document discusses the TCP/IP protocol suite and various network topologies. It provides the following key points: - The TCP/IP protocol suite has five layers - application, transport, internet, host to network, and physical/data link. It was developed by the Department of Defense in the 1960s. - Common network topologies include bus, ring, star, tree, mesh, and hybrid. Bus topology connects all nodes to a single backbone cable. Star topology connects all nodes to a central hub/switch. Mesh topology provides multiple redundant connections between nodes. - Factors like ease of setup/troubleshooting, expansion capabilities, reliability, and cost effectiveness vary between the different topology types and

Uploaded by

158 Ashlesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

UNIT 1

TCP/IP PROTOCOL SUITE,


NETWORKS TOPOLOGY
TCP/IP PROTOCOL SUITE

• DesignedanddevelopedbyDepartment of Defense (DoD) in 1960s


andisbasedon standardprotocols.

• TheTCP/IP modelwasdeveloped prior to the OSI model.


• TheTCP/IP modelconsistsof five layers
• Application Layer
• Transport Layer
• Internet Layer
• Host to Network layer/ PhysicalandDatalink Layer
TCP/IP PROTOCOL SUITE CONTD..
TCP/IP VSOSI MODEL
HOST TO NETWORK LAYER
(PHYSICAL AND DATALINK
LAYER)
• Host to network layeristhelowest layer of theTCP/IP model.
• It isthecombinationof thePhysical layer and Data Link layerdefined
in theOSI referencemodel.
• Protocols presentin thislayerallowsfor physical transmission of
data.
• Thislayer ismainlyresponsible for thetransmission of the data
between two devices on the same network.
• Protocols usedbythislayerareethernet, token ring, FDDI, X.25,
frame relay.
INTERNET LAYER

• An internet layeristhesecond layer of theTCP/IP model.


• An internet layerisalsoknownasthenetwork layer.
• It definestheprotocols whichareresponsible for logical transmission
of data over the entire network.

• Protocols usedin thislayer are


• IP- Internet Protocol
• ICMP – Internet Control MessageProtocol.
• ARP– Address ResolutionProtocol.
INTERNET LAYERCONTD..

• IP- Internet Protocol


• Responsiblefor delivering packets from thesourcehostto thedestination
hostbylookingattheIP addresses in thepacket headers.
• IPhas2versions: IPv4andIPv6.

• ICMP – Internet Control MessageProtocol


• It isencapsulatedwithinIPdatagramsandisresponsiblefor providing hostswith
information aboutnetworkproblems.

• ARP– AddressResolutionProtocol
• Usedto find thephysicaladdressfrom theIP address
TRANSPORT LAYER

• Thetransport layerisresponsible for thereliability, flow control, and


correction of data whichisbeingsentover the network.
• Thetwoprotocols usedin thetransport layerareUser Datagram
protocol and Transmission control protocol.
• User Datagram Protocol (UDP)
• It provides connectionlessserviceandend-to-end delivery of transmission.
• It isanunreliableprotocol asit discoverstheerrors but not specifythe error.
• User DatagramProtocol discoverstheerror, andICMP protocol reports theerror to
thesenderthatuserdatagramhasbeendamaged.
TRANSPORT LAYERCONTD..

• TransmissionControl Protocol:(TCP)
• It isaConnection Oriented Protocol -A connectionmustbeestablishedbetween
both endsof atransmissionbefore either cantransmitdata.
• TCP isa reliable protocol asit detectstheerror andretransmitsthedamaged
frames.
• Therefore, it ensures all the segments must be received and acknowledged.
• At thesendingend,TCP dividesthewholemessageinto smallerunitsknownas
segment
• eachsegmentcontainsasequence number whichisrequired for reordering
theframesto form anoriginalmessage.
• At thereceivingend,TCP collects all the segments and reorders them basedon
sequence numbers.
APPLICATION LAYER

• An applicationlayeristhetopmost layer in theTCP/IPmodel.


• It isresponsible for handling high-level protocols
• Thislayerallowstheuser to interact with the application.
• When oneapplication layer protocol wants to communicate with
another application layer, it forwards itsdatato thetransport layer.
• Example:Web browser usingHTTP protocol to interactwiththe
network whereHTTP protocol isanapplicationlayer protocol.
APPLICATION LAYERCONTD.

• Protocols usedin thislayer are


• HTTP: HTTP standsfor Hypertext transfer protocol.
• accessthedataover theworld wide web
• SNMP: SNMPstandsfor SimpleNetwork Management Protocol.
• frameworkusedfor managingthedeviceson theinternet
• SMTP: SMTPstandsfor Simplemailtransferprotocol.
• supportsthee-mail
• DNS: DNS standsfor Domain NameSystem.
• Converts Domain nameinto IP address
• TELNET: It isanabbreviationfor Terminal Network.
• Establishestheconnectionbetweenthelocalcomputerandremote computer
• FTP: FTPstandsfor FileTransferProtocol.
• Transmittingthefilesfrom onecomputerto anothercomputer.
NETWORKS TOPOLOGY

• Topology definesthestructure of thenetwork of howall


thecomponentsareinterconnected to eachother.
BUSTOPOLOGY

• Bustopology isdesignedin suchawaythatallthestationsareconnected


through asingle cable known as a backbone cable.

• Eachnodeiseither connectedto thebackbone cable by drop cable or


directly connected to the backbone cable.
• When anodewantsto sendamessageover thenetwork, it putsamessage
over the network.
• All the stations availablein thenetwork will receive the message whetherit has
beenaddressedor not.
BUSTOPOLOGY CONTD.

• It ismainlyusedin 802.3 (ethernet) and 802.4 standard


networks.

• Theconfiguration of abustopologyisquite simpler ascompared


to other topologies.

• Themostcommonaccessmethodof thebustopologies
isCSMA (Carrier SenseMultiple Access).
• CSMA- mediaaccesscontrol usedto control thedataflow sothat
dataintegrity ismaintained,i.e., thepacketsdo not getlost.
BUSTOPOLOGY
ADVANTAGES OF BUS TOPOLOGY

• It iscost effective.
• Lessnumberof Cablerequired whencomparedto other
network topology.

• Usedin smallnetworks.
• Easyto expandbyjoiningtwocablestogether.
DISADVANTAGES OF BUS TOPOLOGY

• Cablesfailsthenwholenetwork fails.
• If network traffic is heavy or nodesaremore, the
performance of thenetwork decreases.

• Cablehasa limited length.


• It isslowerthantheringtopology.
RING TOPOLOGY

• Ringtopology islike a bus topology, but withconnectedends.


• Thenodethatreceives the message from the previous
computer willretransmit to the next node.

• The data flows in one direction, i.e., it isunidirectional.


• The data flows in asingle loop continuously known asan
endless loop.
RING TOPOLOGY CONTD.

• It hasno terminated ends, i.e., eachnodeisconnectedto


other nodeandhavingno terminationpoint.

• Thedatain aring topology flowin a clockwise direction.


• Themostcommonaccessmethodof thering topology istoken
passing.
• Token passing: It isanetwork accessmethodin whichtokenispassed
from onenodeto another node.
• Token: It isaframethatcirculatesaroundthe network.
RING TOPOLOGY
ADVANTAGES OF RING TOPOLOGY

• Thepossibilityof collision isminimumin thistypeof


topology.

• Cheapto installandexpand.
DISADVANTAGES OF RING
TOPOLOGY

• Troubleshooting isdifficultin ring topology.


• Addingor deletingthecomputersdisturbs thenetwork
activity.

• Failureof onecomputer disturbs thewhole network.


STAR TOPOLOGY

• Startopologyisanarrangementof thenetwork in whichevery nodeis


connectedto thecentral hub, switch or a central computer.
• Thecentral computer isknownasaserver, andtheperipheraldevices
attachedto theserver areknownasclients.
• Coaxial cable or RJ-45 cables areusedto connectthe computers.
• Hubsor Switchesaremainlyusedasconnectiondevicesin aphysical
star topology.
• Startopologyisthemostpopulartopologyin network implementation.
STAR TOPOLOGY
ADVANTAGES OF STAR TOPOLOGY

• Fastperformance withfewnodesandlownetworktraffic.
• Hub canbeupgradedeasily.
• Easyto troubleshoot.
• Easyto setupandmodify.
• Only failednodesuffers, rest of thenodescanwork
smoothly.
DISADVANTAGES OF STAR
TOPOLOGY

• Cost of installationishigh.
• Expensiveto use.
• If thehubfailsthenthewholenetwork isstoppedbecauseall
thenodesdependon the hub.
TREE TOPOLOGY

• Tree topology combinesthe characteristics of bus topology


and star topology.
• A tree topology isatypeof structure in whichallthecomputersare
connectedwitheachother in hierarchical fashion.
• Thetop-most nodein tree topology isknownasaroot node, and all
other nodesarethedescendants of theroot node.
• There isonly one path existsbetweentwonodesfor thedata
transmission.
• Thus,it formsaparent-childhierarchy.
TREE TOPOLOGY
ADVANTAGES OF TREE
TOPOLOGY
• Extensionof busandstar topologies.
• Expansionof nodesispossibleandeasy.
• Easilymanagedand maintained.
• Error detectioniseasilydone.
DISADVANTAGES OF TREE
TOPOLOGY

• Heavily cabled.
• Costly.
• If more nodesareaddedmaintenanceis difficult.
• Central hubfails,network fails.
MESH TOPOLOGY

• Meshtechnologyisanarrangementof thenetwork in which


computersareinterconnected witheachother through various
redundant connections.

• There aremultiple paths from onecomputer to anothercomputer.


• It doesnot contain the switch, hub or any central computer
whichactsasacentralpoint of communication.
• TheInternet isanexampleof themeshtopology.
MESHTOPOLOGY CONTD.

• Meshtopology ismainlyusedfor WA N implementations where


communicationfailuresareacritical concern.

• Meshtopology ismainlyusedfor wireless networks.


• Meshtopology canbeformed byusingtheformula:
Number of cables = (n*(n-1))/2;
• Where n is the number of nodes that represents the network.
MESH TOPOLOGY
ADVANTAGES OF MESH TOPOLOGY

• Eachconnectioncancarry itsowndata load.


• It isrobust.
• Faultisdiagnosedeasily.
• Providessecurity andprivacy.
DISADVANTAGES OF MESH
TOPOLOGY

• Installationandconfiguration is difficult.
• Cablingcostismore.
• Bulkwiringisrequired.
HYBRID TOPOLOGY

• When twoor more different topologiesarecombinedtogether


istermed asHybridtopology
• if similar topologiesconnectedwitheachother will not result in Hybrid
topology.

• For example,
• if there existaring topology in onebranchof ICICI bankandbus
topology in anotherbranchof ICICI bank,connectingthesetwo
topologieswill result in Hybrid topology.
HYBRID TOPOLOGY
ADVANTAGES OF HYBRID TOPOLOGY

• ReliablebecauseError detectingandtrouble shooting is


easy.

• Effective.
• Scalableassizecanbeincreased easily.
• Flexible.
DISADVANTAGES OF HYBRID
TOPOLOGY

• Complexindesign.
• Costly.
THANK
YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy