Communication Network Architecture Network Architecture
Communication Network Architecture Network Architecture
Chapter 3
Communication Network Architecture
Network Architecture
A Network is nothing but a connection made through connection links between two or more
devices. Devices can be a computer, printer or any other device that is capable to send and
receive data. There are two ways to connect the devices:
1. Point-to-Point connection
2. Multipoint connection
Point-To-Point Connection
Example:
1
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
The point-to-point scheme provides separate communication channels for each pair of
computers. When more than two computers need to communicate with one another, the
number of connections grows very quickly as number of computer increases. Blow figure
illustrates that two computers need only one connection, three computers need three
connections and four computers need six connections.
As the Figure illustrates that the total number of connections grows more rapidly than the
total number of computers. Mathematically, the number of connections needed for N
computers is proportional to the square of N.
As there are five PCs, total ten connections will be required for point-to-point connection.
Out of these ten connections six are passing through the same location and thereby making
2
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
There are many physical mediums for point-to-point connectivity, such as simple serial
cables, mobile phones and telephone lines. Once the computers are connected, Point-to-point
protocol (PPP) handles link control, data control and protocol encapsulation.
Multipoint Connection
It is also called Multidrop configuration. In this connection two or more devices share a
single link. The networks having multipoint configuration are called Broadcast
Networks. Broadcast network provides the provision for broadcasting &
multicasting. Broadcasting is the process in which a single packet is received and processed
by all the machines in the network. In broadcast network, a message or a packet sent by any
machine is received by all other machines in a network. The packet contains address field that
specifies the receiver. Upon receiving a packet, every machine checks the address field of the
packet. If the transmitted packet is for that particular machine, it processes it; otherwise it just
ignores the packet.
If the links are used simultaneously between many devices, then it is spatially shared
line configuration.
If user takes turns while using the link, then it is time shared (temporal) line
configuration.
3
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Basis for
Point-to-Point Multipoint
comparison
Link There is dedicated link between two devices. The link is shared between more
It is a unicast connection than two devices.
Channel The channel's entire capacity is reserved for The channel's capacity is shared
Capacity the two connected devices. temporarily among the devices
connected to the link.
Transmitter and There is a single transmitter and a single There is a single transmitter and
Receiver receiver. multiple receivers.
Example Frame relay, T-carrier, X.25, etc. Frame relay, token ring, Ethernet,
ATM, etc.
1. When there is a single dedicated link only between two devices, it is a point-to-point
connection whereas, if a single link is shared by more than two devices then it is said to
be a multipoint connection.
2. In multipoint connection, the channel capacity is shared temporarily by the devices in
connection. On the other hand, in a point-to-point connection, the entire channel
capacity is reserved only for the two devices in the connection.
3. In point-to-point connection, there can only be a single transmitter and a single
receiver. On the other hand, in multipoint connection, there is a single transmitter, and
there can be multiple receivers.
Similarities:
The point-to-point and multipoint both are the types of line configuration that refers the
technique to connect two or more communication devices.
Networking devices
4
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Internetworking Devices
The interfaces and devices that are used to connect computing devices and
transmission media are called connectivity hardware or network connectivity devices.
Network connectivity hardware connects individual devices and transmission media.
Some of this Networking and Internetworking Devices are:
o Network Cable o Hubs
o Wi-Fi Card o Bridges
o RJ45 Connector o Switches
o Ethernet Card (Network o Routers
Interface Card) or (NIC) o Repeaters
o Modem o Gateway
Network Cable
To connect together different devices to make up a network, you need cables. Cables are still
used in most networks, rather than using only wireless, because they can carry much more
data per second, and are more secure (less open to hacking). The most common type of
network cable in use today looks like the one shown above, with plastic plugs on the ends
that snap into sockets on the network devices.
Inside the cable are several copper wires (some used for sending data in one direction, and
some for the other direction).
RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by
devices to physically connect to Ethernet based local area networks (LANs). Ethernet is a
technology that defines protocols for establishing a LAN. The cable used for Ethernet LANs
5
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
are twisted pair ones and have RJ45 connector pins at both ends. These pins go into the
corresponding socket on devices and connect the device to the network.
The NIC has RJ45 socket where network cable is physically plugged in.
Ethernet card speeds may vary depending upon the protocols it supports. Old Ethernet cards
had maximum speed of 10 Mbps. However, modern cards support fast Ethernets up to a
speed of 100 Mbps. Some cards even have capacity of 1 Gbps
6
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Wi-Fi Card
Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless
connection to any network. Wi-Fi card is a card used to connect any device to the local
network wirelessly. The physical area of the network which provides internet access through Wi-
Fi is called Wi-Fi hotspot. Hotspots can be set up at home, office or any public space.
A Wi-Fi card is used to add capabilities like teleconferencing, downloading digital camera
images, video chat, etc. to old devices. Modern devices come with their in-built wireless
network adapter.
Modem (modulator/ demodulator)
Modem is a combination of two devices − modulator and demodulator. It is a type of
signal converter.
Modem is responsible for converting analog to digital signals and/or digital to analog
signal. This process is called modulation.
Modem is a device that enables a computer to send or receive data over telephone or
cable lines. The data stored on the computer is digital whereas a telephone line or cable
wire can transmit only analog data. The main function of the modem is to convert digital
signal into analog and vice versa.
Modulator converts digital data into analog data when the data is being sent by
the computer.
Demodulator converts analog data signals into digital data when it is being
received by the computer.
So, simply put, a modem is required because computers are digital devices and the telephone
system is analogue. The modem converts from digital to analogue and from analogue to digital.
Hub
A hub is a device that connects a number of computers together to make a LAN.
The typical use of a hub is at the center of a star network (or as part of a hybrid network) - the
hub has cables plugged into it from each computer.
7
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
It is a multi-port repeater in which, signals received at a port and floods out that signal to
all other ports connected to the devices except the one that originated the signal.
A hub is a ‘dumb’ device: if it receives a message, it sends it to every computer on the
network. This means that hub-based networks are not very secure - everyone can listen
in to communications.
Bridge
A bridge is a network device that typically links together two different parts of a LAN.
It used bridge connects two separate networks to form a logical one by operating at the
data link layer of the OSI model.
It links independent parts of a LAN so that they act as a single LAN.
8
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Bridges rely on MAC addresses for their operation. Unlike repeaters, bridges examine the
packet's destination address before forwarding it to other segments. A bridge extends the
maximum distance of your network by connecting separate network segments, and selectively
pass signals from one medium segment to another.
Bridges are effective for a small number of LANs, bridges lose many of their benefits as the
number of LANs grows. Bridges only operates at the data link layer, and the best source routing
information is a component of the network layer.
Bridges offer following advantages over hubs:
Its concept is based upon store and forward technology.
By connecting different LANs, it can expand the geographical are of a network.
A bridge consists of two ports and different LANs can be connected through these ports.
Brides amplifies the signals and filter the data packets as required.
Divide a large network segment into smaller segments and hence reduce data traffic and
improves network performance.
Filter local data traffic by not allowing them to cross other network segments hence
reducing overall network traffic.
Provide exclusive bandwidth (10 Mbps) to each node connected to a port on a bridge as
opposed to shared bandwidth provided by hubs.
Can be used to connect network segments of dissimilar media.
Bridge is a device which is used for connecting similar or dissimilar Local Area
Networks (LANs).
Pro Cons
Can act as a repeater and extend distance Slower than repeaters due to the need to examine
addresses
Easy to install, load, and configure Can't perform effective balancing on larger networks
Can restrict flow and ease congestion More expensive than repeaters
Useful for protocols that can't be routed Can’t prevent broadcast storms
9
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Have good cost – to – performance ration Certain application might not run on bridge networks.
Switch
A switch, like a hub, is a device that connects a number of computers together to make a LAN.
Switch is large multiport bridge. The switch operates at layer 2 of the OSI model just like a
bridge that MAC addresses to determine where to forward the packet. The main differences
between switches and bridges, are the strength and speed offered by the switches. Bridges can
have maximum 16 ports while switches can offer hundreds of ports, each port offering exclusive
bandwidth of 10 or 100 Mbps.
The typical use of a switch is at the center of a star network (or as part of a hybrid network) -
the switch has cables plugged into it from each computer.
It uses packet switching technique to receive, store and forward data packets on the network.
On receiving a packet a switch, checks the destination address and transmits the packet to the
correct port. Before forwarding, the packets are checked for collision and other network errors.
The data is transmitted in full duplex mode
The switch maintains a list of network addresses of all the devices connected to it.
It is a more ‘intelligent’ device than a hub: if it receives a message, it checks who it is
addressed to, and only sends it to that specific computer. Because of this, networks that use
switches are more secure than those that use hubs, but also a little more expensive.
Switches can perform following functions.
Address learning.
Filtering and forwarding
Loop Avoidance
A switch is also a networking device and connects multiple devices. A switch connects the
multiple devices to create a Local Area Network. As a switch connects the multiple devices
together to form a LAN, so it is the responsibility of switch to deliver the arrived packet to the
specific device. A switch receives a packet; then it checks the destination address of a packet
and forwards it to the outgoing link for that destination if the link is free. The switch operates at
the data link layer and network layer.
Switches are classified as a Store-and-Forward Switch and a Cut-Through Switch. When a frame
arrives at Store-and-Forward switch, it stores the frame in a buffer till all the frame in a packet
has arrived. On the other hand, the Cut-Through switch forwards the packet as soon as the
destination address of the packet is revealed. Like hub, a switch never broadcast the packet to all
the connected devices instead it forwards the packet to the specific device only.
Router
10
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
A router is a network device that connects together two or more networks. A common use of a
router is to join a home or business network (LAN) to the Internet (WAN).
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to
computers on the LAN.
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. So a router is typically connected to at least
two LANs and the internet service provider (ISP). It receives its data in the form of packets,
which are data frames with their destination address added. Router also strengthens the signals
before transmitting them. That is why it is also called repeater.
Alternatively, the LAN connection might be wireless (Wi-Fi), making the device a wireless
router. (A wireless router is actually a router and wireless switch combined). These routers are
much more complex than the one you might have in your home.
Routing Table
A router reads its routing table to decide the best available route the packet can take to reach its
destination quickly and accurately. The routing table may be of these two types −
Static − in a static routing table the routes are fed manually. So it is suitable only for very
small networks that have maximum two to three routers.
Dynamic − in a dynamic routing table, the router communicates with other routers
through protocols to determine which routes are free. This is suited for larger networks
where manual feeding may not be feasible due to large number of routers.
A router is a device which is used for connecting similar and dissimilar networks.
In any network whenever data transmission occurs, it is done through a series of nodes
that are connected from source to destination. The shortest path to transmit the data from
source to destination is called as route and this process is called as routing and this is
achieved using routers.
The main purpose of a router is to select the best (shortest) possible path for the packet
during transmission.
Routers are combination of software and hardware. A simple network connected through
router is depicted below.
11
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
If node N3 wants to transmit data to node N11, it will be transmitted through routers with the
shortest path possible.
o Routers are the most complicated of the three devices so far, operating at the network
layer of the OSI model. While bridges are limited to examine data packets MAC
addresses, routers go beyond this and-can examine the network address-which has
routing information encoded in it. Routers can use this information to make intelligent
decisions about routes and paths.
Routers are normally responsible for performing the following functions:
Route selection - A router is maintaining the information in its routing table about how
to reach remote networks. It will then make routing decisions based on that information.
Logical addressing- A device that operates at layer 3 requires some form of logical
addressing. These addresses will be used to determine route selection.
Segmentation- Routers can be provided by a powerful method of segmenting your
networks to allow optimum utilization of available bandwidth.
No broadcasts: Because router operates at Layer 3 of the OSI mode), no Layer 2 broadcasts will
be forwarded through a router.
Manageability: Routers have a better knowledge of the network topology than bridges and
switches do and have the ability to support more protocols than bridges and switches
12
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Increased bandwidth: By segmenting your networks with routers, your nodes/ hosts will have
more access bandwidth
Packet fragmentation and reassembling: Routers provide, packet fragmentation / reassembly
functions, as well as better Security.
Disadvantages of using Routers
Considerably more difficult to install
More expensive than repeaters or bridges
Work only with routable protocols
Static routing can cause problems
Comparison b/n Router and Switch
Comparison Router Switch
Purpose Router connects different networks Switches connects multiple devices together
together. to create a network.
Layer Router works on the physical layer; The switch operates on data link layer and
data link layer and network layer. network layer.
Work Router determines the best path that A switch receives process and forwards the
packet should follow to reach the packet to intended computers.
destination computer.
Type Adaptive routing and Non- adaptive Circuit Switching, Packet Switching,
routing. Message Switching.
Gateway
It is a network device used to connect two or more dissimilar networks. Gateways perform much
higher-level translations than any other component and thus work at the Application layer of the
OSI module. When packets arrive at a gateway, all the information is stripped off the data until it
reaches the layer where it can translate the information-using the format needed for the
destination. With a gateway, data is translated between two different data formats or network
architectures.
It is used for connecting networks with different types of architectures. For Example:
Communication between a mobile device having 4G connection and landline device having 2G
connection can be done using gateway.
A gateway usually is a computer with multiple NICs connected to different networks. A gateway
can also be configured completely using software. As networks connect to a different network
through gateways, these gateways are usually hosting or end points of the network
Gateway uses packet switching technique to transmit data from one network to another. In this
way it is similar to a router, the only difference being router can transmit data only over
networks that use same protocols
13
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Pros Cons
Can connect completely different systems. Very expensive than other devices.
Specialize in one task only Difficult to install and configure. Depending on the level
of translation, can be very slow
Repeater
In all communication channels, signals get week after they travel some particular amount of
distance. So, it is necessary to boost up these week signals, which is done with the help of
repeaters.
When an electrical signal is sent across a medium, it fades along the distance (known as
attenuation) as a result of resistance from the medium itself. Naturally the longer the distance
that it travelled, the more the signal fades. Eventually tie signal fades to a, point where the
receiving station cannot recognize the original message (Or has trouble doing so).
In short, each transmission medium can be used for a certain distance. However, you can exceed
the physical medium's maximum effective distance by using an amplification, device called as
Repeater. It works at OSI physical layer. A repeater operates at the physical layer of the OSI
model and takes a signal from one LAN and sends it to another LAN- reconditioning and
retiming it in the process. The reconditioning usually amplifies and boosts the signal's power. If
the signal has travelled a distance it is weak, and so on, the amplification can also be done on
noise receivers.
The repeaters job is simple: it detects the signal, amplifies and retimes it, and sends it through all
the ports except the one on which the signal was seen. It is important to note that since the
repeater has no real knowledge of the data it is carrying, no error checking is performed.
Therefore, any error is passed from one segment to the next without any ability to stop it. Many
networks limit the number of repeaters between the transmitting and receiving stations. On other
side, by not performing any filtering, the -repeater does not slow down the network's speed or
performance. The signal has travelled a distance is weak, and so on, the amplification can also be
done on noise received.
14
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Advantages Disadvantages
Allow you to extend the network over large Have no knowledge of addressing or data
distances. types.
Do not affect the speed of network Can't ease network congestion problems
16
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those nodes etc. We can even have routing
logic, to re-configure the failed nodes.
Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to
unwanted load over the network.
17
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
taken by a peer entity. If the protocol stack is located in the operating system, as it often is, the
primitives are normally system calls. These calls cause a trap to kernel mode, which then turns
control of the machine over to the operating system to send the necessary packets. The set of
primitives available depends on the nature of the service being provided. The primitives for
connection-oriented service are different from those of connection-less service. There are five
types of service primitives:
LISTEN: When a server is ready to accept an incoming connection, it executes the
LISTEN primitive. It blocks waiting for an incoming connection.
CONNECT: It connects the server by establishing a connection. Response is awaited.
RECIEVE: Then the RECIEVE call blocks the server.
SEND: Then the client executes SEND primitive to transmit its request followed by the
execution of RECIEVE to get the reply. Send the message.
DISCONNECT: This primitive is used for terminating the connection. After this
primitive one can't send any message. When the client sends DISCONNECT packet then
the server also sends the DISCONNECT packet to acknowledge the client. When the
server package is received by client then the process is terminated.
Connection Oriented Service Primitives
There are 5 types of primitives for Connection Oriented Service:
Communication can be established in two ways between two or more devices that are
connection-oriented and connection-less. Network layers can offer these two different types of
services to its predecessor layer for transferring data. Connection-oriented services involve the
establishment and termination of the connection while connection-less services don’t require
any connection creation and termination processes for transferring data. Another difference is
connection-oriented communication uses a stream of data and is vulnerable to router failure
while connection-less communication uses messages and is robust to router failure.
There are two types of service
Connectionless service
Connection Oriented Services
19
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
More precisely, it sets up a connection uses that connection then terminates the connection.
Reliability is achieved by having recipient acknowledge each message. There
are sequencing and flow control, that’s the reason packets received at the receiving end are
always in order. It uses circuit switching for transmission of data.
Connection-oriented transport service priory constructs a virtual circuit between two remote
devices. To this end, COTS makes four different kinds of services available to the upper layers:
T-DATA This service is used to transfer data, it could provide uncertain service
and restricted amount of data but
still, it is reliable.
20
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
T-EXPEDITED-DATA This service is also used for transferring data, but it carries a limited
amount expedited data up to 16 octets (bytes).
In connectionless the data is transferred in one direction from source to destination without
checking that destination is still there or not or if it prepared to accept the message.
Authentication is not needed in this. Example of Connectionless service is UDP (User Datagram
Protocol) protocol.
Connection-less Transport services offer only one type of service to its upper layer that is T-
UNIT-DATA. It provides a single solitary data unit for all transmission. Each unit contains all of
the protocol control information necessary for delivery but does not include provision for
sequencing and flow control.
21
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Basis for
Connection-Oriented Service Connection-Less Service
Comparison
Prior Connection Necessary Not required
Requirement
Suitability Suitable for long and steady communication. Suitable for burst Transmission.
Packet Packets sequentially travel to their destination Packets reach the destination randomly
forwarding node and follows the same route. without following the same route.
Delay There is a delay in transfer of information, but Because to the absence of connection
once the connection is established faster establishment phase, the transmission is
delivery can be achieved. faster.
22
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.