Networking Assignment
Networking Assignment
What is Networking ?
Networking is the process that allows multiple computers to share information (data) and
resources. Through the integration of computers and other devices, users can communicate more
easily and efficiently. Networking involves creating a collection of linked computer systems.
These connections, known as networks, can be established through either cable or wireless
media. In any network, computers and devices are connected using a combination of hardware
and software, facilitating smooth communication and resource sharing.
(sameekshakhandelwal1712, 2024)
Types of Networking
PANs are the most basic type of computer networks. It is a network designed to connect devices
within a short distance, usually around one person. It enables personal devices, such as
smartphones, tablets, laptops, and wearables, to communicate and share data with one another.
PAN provides a network range of 1 to 100 meters from person to device for communication. It
has a high gearbox speed, is very easy to maintain, and is very inexpensive. This makes use of
Bluetooth, IrDA, and Zigbee technology. PANs include USB, computers, phones, tabletsprinters,
and PDAs. (srilathaturlapati, 2024)
1. Wireless Personal Area Networks: Wireless Personal Area Networks are created
simply by combining wireless technologies like WiFi and Bluetooth. It is a low-range
network.
2. Wired Personal Area Network: A USB is used to set up a wired personal area network.
Personal Area Network is relatively flexible and efficient for short network distances.
It needs easy setup and relatively low cost.
It does not require frequent installations and maintenance.
It is easy and portable.
Needs fewer technical skills to use.
Network Devices
General hardware elements of network nodes including NICs, Bridges, Hubs, Switches, and
Routers are used in all networks. In addition, there is a need to have a way of interconnecting
these building parts which can be done using galvanic cable and optical cable commonly known
as “optical fiber.” The following are the network devices. (sameekshakhandelwal1712, 2024)
NIC (Network Interface Card): Network card can be also called network adapter or
NIC (Network Interface Card) is a computer device which allows computers to exchange
information via a network. Physical access to the network media is provided and MAC
addresses are used as a lower level addressing mechanism in most cases. Every NIC has
its own unique number. This is usually done on a chip which is embedded on the credit
card. (sameekshakhandelwal1712, 2024)
Hub: A hub is a connection point of many twisted pairs or fiber optic Ethernet devices
that create the appearance of one network segment. The device can be thought of a multi-
port repeater as shown in the figure below. A network hub is a relatively unsophisticated
broadcast device. Any packet which comes to any port is retransmitted and forwarded out
of all the other ports and hubs do not manage flow of the packets. Packet collisions occur
due to the fact that each packet is transmitted through all other ports; this greatly hampers
the efficient exchange of information. (sameekshakhandelwal1712, 2024)
Bridges: It forwards broadcast data to all the ports but the one that has received the
transmission. While hubs, on the other hand, simply replicate incoming messages to all
connected ports, bridges, for example, are able to determine which MAC addresses are
reachable through particular ports. After a port and an address are linked, the bridge will
only transmit packets from the address to the port. (sameekshakhandelwal1712, 2024)
Switches: A switch is different from a hub in that it does not broadcast frames to all of
the ports that are connected but, instead, only to the ports that are involved in the
transmission and reception of frames. A switch divides the collision domain but the
switch portrays itself as a broadcast domain. The frame forwarding process is done by
switches based on MAC addresses. (sameekshakhandelwal1712, 2024)
Image: Network Switch
Routers: Routers are devices that are used to route data packets through a network by
examining headers and forwarding table. A router is a physical or a software appliance
that connects two or more data networks and manages the flow of data traffic between
them. A router can use address information in each data packet to check if the source and
the destination are located within the same network or if the data packet should be
rerouted between networks. When many routers are used in a large set of interconnected
networks, the routers exchange target system addresses so that every router can organize
a table of the optimal paths between any two systems on the connected networks.
(sameekshakhandelwal1712, 2024)
Image: Router
Network Topology
Network topology can be explained as the organization of various components in a given
network such as nodes, links or devices. It also states how those components that compose it are
organized and how they are associated with one another. Knowledge of different kinds of
network topologies is useful in creating effective and efficient networks. Some examples of LAN
topologies are bus, star, ring, mesh, tree, and many others each with strengths and weaknesses.
Different types of network topology with their merits and demerits are going to be explained in
this article. (GeeksForGeeks, 2024)
There are various types of Network Topologies
1. Point to Point Topology
2. Mesh Topology
3. Star Topology
4. Bus Topology
5. Ring Topology
6. Tree Topology
Mesh Topology
In a mesh topology, each and every single device will connect to another device through a
certain channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc. (srilathaturlapati, 2024)
Star Topology
In Star Topology, all the devices for a network are connected by a single cable to a central hub.
This one is fixed as a hub and all others are connected to the hub only. A hub can be merely
passive i.e., it is not an intelligent hub like broadcasting devices and at the same time, it can be
an intelligent hub, an active hub. The other important fact about active hubs is that they contain
repeaters in the active hubs. Coaxial cables also known as RJ-45 cables are used in a point to
point connection between the computers. Star Topology uses a number of Ethernet LAN
protocols such as CD (Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
(srilathaturlapati, 2024)
A star topology connects every device to a particular device and if N devices are
connected with each other in a star topology, then the number of cables required in
between them is N. So, it is easy to set up.
Every device calls for a single port say to connect to the hub in the network, thus the total
number of ports needed is N.
It is Robust. In that case, if one link fails only the link will be damaged and not other than
that.
Easy to identify and remove faults.
Star topology is inexpensive since star topology uses cheap coaxial cable.
(srilathaturlapati, 2024)
The problem that exists in this type of topology is if the concentrator (hub) that the whole
topology depends on is destroyed, then the whole system will come down.
The cost of installation is high.
Performance is measured and evaluated solely on the single concentrator that is the hub.
(srilathaturlapati, 2024)
Bus Topology
Bus topology is a network configuration in which each computer and network device is
connected to a single cable. It is bidirectional. Yes, it is a multi-point connection with a non-
robust topology because if the backbone fails, the entire topology collapses. In Bus Topology,
LAN ethernet connections use MAC (Media Access Control) protocols such as TDMA, Pure
Aloha, CDMA, Slotted Aloha, and so on. (srilathaturlapati, 2024)
When designing bus topology, if n devices are connected, then you need only one
backbone cable and n drop lines.
Coaxial or Twisted pair cables are typically associated with bus based networks that have
bandwidth of up to 10 Mbps.
The cable is comparatively cheaper than other topologies, but this is used to construct the
small networks.
Bus topology is recognized technology since both installation methods and problem
solving approaches are well understood.
For this kind of topology, the most used method is the CSMA. (srilathaturlapati, 2024)
A bus topology is slightly easier, although, like with any bus topology, a massive amount
of cabling will be needed.
If the common cable being used breaks down then the whole system will collapse.
When the traffic is high within the network it will lead to more collisions in the network
system. To avoid this, several protocols exists at MAC layer including Pure Aloha,
Slotted Aloha, CSMA/CD etc.
New device on the network would slow down network.
Security is extremely low. (srilathaturlapati, 2024)
Ring Topology
In a Ring Topology, it comprise a ring to connect devices with only two neighboring devices.
Many repeaters are used for Ring topology in case of many nodes because if one person has to
send some data to the last node in the ring topology with 100 nodes then the data will have to
pass through all the 99 nodes to reach the 100th node. Therefore to avoid data loss repeaters are
used in the network.
The data flows in one direction, i.e. it is unidirectional; however, it can be made bidirectional by
connecting each Network Node twice; this is known as Dual Ring Topology. Workstations in the
Ring Topology transmit data using the Token Ring Passing protocol. (srilathaturlapati, 2024)
Token passing: It is a form of connection where a token is transferred from one node to
another node.
Token: It's a frame that moves around the network. (srilathaturlapati, 2024)
One station is called active station which takes all the responsibility and perform all the
operations of the process.
For the station to be able to transmit the data it has to retain the token. Finally, the
following message is followed by a token that is to be made available for other stations to
hold.
If no station is sending the data in the ring then the token will pass through the ring.
There are two types of token release techniques: Early token release frees the token
immediately after sending the data while Delayed token release frees the token after the
receiver sends back an acknowledgment. (srilathaturlapati, 2024)
In case one of the nodes fails, the message passing in the entire network is negatively
affected.
Troubleshooting is difficult with this topology.
It is seen that if some new stations are added in between or some stations are removed,
the whole topology gets disturbed.
Less secure. (srilathaturlapati, 2024)
Tree Topology
This topology is the modification of the Star topology. This topology has directional arrangement
and works under hierarchy when it comes to data flow. In Tree Topology protocols like DHCP
and SAC (Standard Automatic Configuration) are practiced. (srilathaturlapati, 2024)
Image: Tree Topology
Since it can accommodate more devices to connect to a single central hub; it reduces the
physical distance taken by the signal to reach the devices.
It enables the network to become isolated and also select from various computers.
We can connect new devices to the existing network.
The very aspects such as error detection and error correction can be accomplished with
great ease in a tree topology.
If the central hub fails then the entire system fails right there too.
The cost is high due to cabling.
If new devices are added to the network it becomes very difficult to achieve
reconfiguration of the network.