[go: up one dir, main page]

0% found this document useful (0 votes)
314 views22 pages

Communication Network Architecture Network Architecture

The document discusses network architecture and the different types of network connections. It provides details on: - Point-to-point connections which link two devices directly with a dedicated connection. Examples given are a computer connected by telephone line or a remote control and TV. - Multipoint connections which allow devices to share a single connection link. This includes both time-shared and spatially-shared configurations. - The differences between point-to-point and multipoint connections in terms of dedicated vs shared links and channels and single vs multiple receivers. - Common networking and internetworking devices like hubs, bridges, switches, routers and examples of cables and connectors used.

Uploaded by

Getnete degemu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
314 views22 pages

Communication Network Architecture Network Architecture

The document discusses network architecture and the different types of network connections. It provides details on: - Point-to-point connections which link two devices directly with a dedicated connection. Examples given are a computer connected by telephone line or a remote control and TV. - Multipoint connections which allow devices to share a single connection link. This includes both time-shared and spatially-shared configurations. - The differences between point-to-point and multipoint connections in terms of dedicated vs shared links and channels and single vs multiple receivers. - Common networking and internetworking devices like hubs, bridges, switches, routers and examples of cables and connectors used.

Uploaded by

Getnete degemu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Wolkite University College of Computing and Informatics Department of IT

Chapter 3
Communication Network Architecture
Network Architecture

Network Architecture is the complete framework of an organization's computer network. The


diagram of the network architecture provides a full picture of the established network with
detailed view of all the resources accessible. It includes hardware components used for
communication, cabling and device types, network layout and topologies, physical and
wireless connections, implemented areas and future plans. In addition, the software rules and
protocols also constitute to the network architecture. This architecture is always designed by
a network manager/administrator with coordination of network engineers and other design
engineers.

Network Line Configuration in Computer Networks

A Network is nothing but a connection made through connection links between two or more
devices. Devices can be a computer, printer or any other device that is capable to send and
receive data. There are two ways to connect the devices:

1. Point-to-Point connection
2. Multipoint connection

Point-To-Point Connection

It is a protocol which is used as a communication link between two devices. It is simple to


establish. We can connect the two devices by means of a pair of wires or using a microwave
or satellite link.

Example:

 Connection is a computer connected by telephone line.


 Connection between remote control and Television for changing the channels.

1
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

The point-to-point scheme provides separate communication channels for each pair of
computers. When more than two computers need to communicate with one another, the
number of connections grows very quickly as number of computer increases. Blow figure
illustrates that two computers need only one connection, three computers need three
connections and four computers need six connections.
As the Figure illustrates that the total number of connections grows more rapidly than the
total number of computers. Mathematically, the number of connections needed for N
computers is proportional to the square of N.

Point-to-point connections required =N (N-1)/2.


Adding the Nth computer requires N-l new connections which becomes a very expensive
option. Moreover, many connections may follow the same physical path. Figure shows a
point- to-point connection for five computers located at two different locations, say, ground
and first floor of a building.
                                              

As there are five PCs, total ten connections will be required for point-to-point connection.
Out of these ten connections six are passing through the same location and thereby making

2
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

point-to-point connection an expensive one. Increasing the PC by one in the above


configuration at location 2 as shown in Figure will increase the total number of connections
to fifteen. Out 'of these connections eight connections will pass through the same area.
Point-to-point protocol is widely used for the heavier and faster connections necessary for
broadband communications.

There are many physical mediums for point-to-point connectivity, such as simple serial
cables, mobile phones and telephone lines. Once the computers are connected, Point-to-point
protocol (PPP) handles link control, data control and protocol encapsulation.

Multipoint Connection

It is also called Multidrop configuration. In this connection two or more devices share a
single link. The networks having multipoint configuration are called Broadcast
Networks. Broadcast network provides the provision for broadcasting &
multicasting. Broadcasting is the process in which a single packet is received and processed
by all the machines in the network. In broadcast network, a message or a packet sent by any
machine is received by all other machines in a network. The packet contains address field that
specifies the receiver. Upon receiving a packet, every machine checks the address field of the
packet. If the transmitted packet is for that particular machine, it processes it; otherwise it just
ignores the packet. 

There are two kinds of Multipoint Connections/ Configuration:

 Time shared (temporal) line configuration


 Spatially shared line configuration.

 If the links are used simultaneously between many devices, then it is spatially shared
line configuration.
 If user takes turns while using the link, then it is time shared (temporal) line
configuration.

           

3
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Difference between Point-to-point and Multipoint Connection

Basis for
Point-to-Point Multipoint
comparison
Link There is dedicated link between two devices. The link is shared between more
It is a unicast connection than two devices.

Channel The channel's entire capacity is reserved for The channel's capacity is shared
Capacity the two connected devices. temporarily among the devices
connected to the link.

Transmitter and There is a single transmitter and a single There is a single transmitter and
Receiver receiver. multiple receivers.

Example Frame relay, T-carrier, X.25, etc. Frame relay, token ring, Ethernet,
ATM, etc.

Key Differences between Point-to-Point and Multipoint Connection

1. When there is a single dedicated link only between two devices, it is a point-to-point
connection whereas, if a single link is shared by more than two devices then it is said to
be a multipoint connection.
2. In multipoint connection, the channel capacity is shared temporarily by the devices in
connection. On the other hand, in a point-to-point connection, the entire channel
capacity is reserved only for the two devices in the connection.
3. In point-to-point connection, there can only be a single transmitter and a single
receiver. On the other hand, in multipoint connection, there is a single transmitter, and
there can be multiple receivers.
Similarities:

The point-to-point and multipoint both are the types of line configuration that refers the
technique to connect two or more communication devices.

Networking and Internetworking Devices

Networking devices

 Networking devices hold the key to generate a network through which


communication can occur. These devices are responsible smooth data transmission
among different nodes of same network and/or nodes of different network.
 Hardware or software devices that are used to connect computers, printers, fax
machines and other electronic devices to a network are called network devices. These
devices transfer data in a fast, secure and correct way over same or different networks.

4
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Network devices may be inter-network or intra-network. Some devices are installed


on the device, like NIC card or RJ45 connector, whereas some are part of the network,
like router, switch, etc.

Internetworking Devices

 The interfaces and devices that are used to connect computing devices and
transmission media are called connectivity hardware or network connectivity devices.
 Network connectivity hardware connects individual devices and transmission media.
Some of this Networking and Internetworking Devices are:
o Network Cable o Hubs
o Wi-Fi Card o Bridges
o RJ45 Connector o Switches
o Ethernet Card (Network o Routers
Interface Card) or (NIC) o Repeaters
o Modem o Gateway

Network Cable

To connect together different devices to make up a network, you need cables. Cables are still
used in most networks, rather than using only wireless, because they can carry much more
data per second, and are more secure (less open to hacking). The most common type of
network cable in use today looks like the one shown above, with plastic plugs on the ends
that snap into sockets on the network devices.

Inside the cable are several copper wires (some used for sending data in one direction, and
some for the other direction).

RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by
devices to physically connect to Ethernet based local area networks (LANs). Ethernet is a
technology that defines protocols for establishing a LAN. The cable used for Ethernet LANs

5
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

are twisted pair ones and have RJ45 connector pins at both ends. These pins go into the
corresponding socket on devices and connect the device to the network.

Ethernet Card (Network Interface Card) or (NIC)


Ethernet card, also known as network interface card (NIC), is a hardware component used
by computers to connect to Ethernet LAN and communicate with other devices on the LAN.
Most modern computers have these devices built into the motherboard, but in some
computers, you have to add an extra expansion card (small circuit board). Some computers,
such as laptops, have two NICs: one for wired connections, and one for wireless connections
(which uses radio signals instead of wires)

The NIC has RJ45 socket where network cable is physically plugged in.

Ethernet card speeds may vary depending upon the protocols it supports. Old Ethernet cards
had maximum speed of 10 Mbps. However, modern cards support fast Ethernets up to a
speed of 100 Mbps. Some cards even have capacity of 1 Gbps

6
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Wi-Fi Card
Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless
connection to any network. Wi-Fi card is a card used to connect any device to the local
network wirelessly. The physical area of the network which provides internet access through Wi-
Fi is called Wi-Fi hotspot. Hotspots can be set up at home, office or any public space.

A Wi-Fi card is used to add capabilities like teleconferencing, downloading digital camera
images, video chat, etc. to old devices. Modern devices come with their in-built wireless
network adapter.
Modem (modulator/ demodulator)
 Modem is a combination of two devices − modulator and demodulator. It is a type of
signal converter.
 Modem is responsible for converting analog to digital signals and/or digital to analog
signal. This process is called modulation.
 Modem is a device that enables a computer to send or receive data over telephone or
cable lines. The data stored on the computer is digital whereas a telephone line or cable
wire can transmit only analog data. The main function of the modem is to convert digital
signal into analog and vice versa.
 Modulator converts digital data into analog data when the data is being sent by
the computer.
 Demodulator converts analog data signals into digital data when it is being
received by the computer.

So, simply put, a modem is required because computers are digital devices and the telephone
system is analogue. The modem converts from digital to analogue and from analogue to digital.

Hub
A hub is a device that connects a number of computers together to make a LAN.
The typical use of a hub is at the center of a star network (or as part of a hybrid network) - the
hub has cables plugged into it from each computer.

7
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

 It is a multi-port repeater in which, signals received at a port and floods out that signal to
all other ports connected to the devices except the one that originated the signal.
 A hub is a ‘dumb’ device: if it receives a message, it sends it to every computer on the
network. This means that hub-based networks are not very secure - everyone can listen
in to communications.

It provides point-to-multipoint connections; it is basically a shared device and works at physical


layer of the OSI model. It is often located in a wiring closet and is a point of concentration for
wiring.
There are three types of hub namely,
 Passive hub
 Active hub
 Intelligent hub
Passive hub: connects cable segment together. No signal regeneration is performed. So, each
segment is allowed to be extended to only half the maximum effective distance.
An active hub: is like a passive hub except it regenerates or amplifies signals. The main
drawback of active hub is that some active hubs amplify cable noise as well as signal.
An intelligent hub: in addition to signal regeneration, also helps in performing network
management functions. The SNMP (simple network management protocol) agents must be
embedded in a hub to carry out network related functions.

Bridge

 A bridge is a network device that typically links together two different parts of a LAN.
 It used bridge connects two separate networks to form a logical one by operating at the
data link layer of the OSI model.
 It links independent parts of a LAN so that they act as a single LAN.

8
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Bridges rely on MAC addresses for their operation. Unlike repeaters, bridges examine the
packet's destination address before forwarding it to other segments. A bridge extends the
maximum distance of your network by connecting separate network segments, and selectively
pass signals from one medium segment to another.
Bridges are effective for a small number of LANs, bridges lose many of their benefits as the
number of LANs grows. Bridges only operates at the data link layer, and the best source routing
information is a component of the network layer.
Bridges offer following advantages over hubs:
 Its concept is based upon store and forward technology.
 By connecting different LANs, it can expand the geographical are of a network.
 A bridge consists of two ports and different LANs can be connected through these ports.

 Brides amplifies the signals and filter the data packets as required.
 Divide a large network segment into smaller segments and hence reduce data traffic and
improves network performance.
 Filter local data traffic by not allowing them to cross other network segments hence
reducing overall network traffic.
 Provide exclusive bandwidth (10 Mbps) to each node connected to a port on a bridge as
opposed to shared bandwidth provided by hubs.
 Can be used to connect network segments of dissimilar media.
 Bridge is a device which is used for connecting similar or dissimilar Local Area
Networks (LANs).

Pro Cons

Can act as a repeater and extend distance Slower than repeaters due to the need to examine
addresses
Easy to install, load, and configure Can't perform effective balancing on larger networks

Can restrict flow and ease congestion More expensive than repeaters

Useful for protocols that can't be routed Can’t prevent broadcast storms

9
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Have good cost – to – performance ration Certain application might not run on bridge networks.

Switch
A switch, like a hub, is a device that connects a number of computers together to make a LAN.
Switch is large multiport bridge. The switch operates at layer 2 of the OSI model just like a
bridge that MAC addresses to determine where to forward the packet. The main differences
between switches and bridges, are the strength and speed offered by the switches. Bridges can
have maximum 16 ports while switches can offer hundreds of ports, each port offering exclusive
bandwidth of 10 or 100 Mbps.
The typical use of a switch is at the center of a star network (or as part of a hybrid network) -
the switch has cables plugged into it from each computer.
It uses packet switching technique to receive, store and forward data packets on the network.
On receiving a packet a switch, checks the destination address and transmits the packet to the
correct port. Before forwarding, the packets are checked for collision and other network errors.
The data is transmitted in full duplex mode
The switch maintains a list of network addresses of all the devices connected to it.
It is a more ‘intelligent’ device than a hub: if it receives a message, it checks who it is
addressed to, and only sends it to that specific computer. Because of this, networks that use
switches are more secure than those that use hubs, but also a little more expensive.
Switches can perform following functions.
 Address learning.
 Filtering and forwarding
 Loop Avoidance

A switch is also a networking device and connects multiple devices. A switch connects the
multiple devices to create a Local Area Network. As a switch connects the multiple devices
together to form a LAN, so it is the responsibility of switch to deliver the arrived packet to the
specific device.  A switch receives a packet; then it checks the destination address of a packet
and forwards it to the outgoing link for that destination if the link is free. The switch operates at
the data link layer and network layer.
Switches are classified as a Store-and-Forward Switch and a Cut-Through Switch. When a frame
arrives at Store-and-Forward switch, it stores the frame in a buffer till all the frame in a packet
has arrived. On the other hand, the Cut-Through switch forwards the packet as soon as the
destination address of the packet is revealed. Like hub, a switch never broadcast the packet to all
the connected devices instead it forwards the packet to the specific device only.

Router

10
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

A router is a network device that connects together two or more networks. A common use of a
router is to join a home or business network (LAN) to the Internet (WAN).
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to
computers on the LAN.
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. So a router is typically connected to at least
two LANs and the internet service provider (ISP). It receives its data in the form of packets,
which are data frames with their destination address added. Router also strengthens the signals
before transmitting them. That is why it is also called repeater.

Alternatively, the LAN connection might be wireless (Wi-Fi), making the device a wireless
router. (A wireless router is actually a router and wireless switch combined). These routers are
much more complex than the one you might have in your home.

Routing Table
A router reads its routing table to decide the best available route the packet can take to reach its
destination quickly and accurately. The routing table may be of these two types −
 Static − in a static routing table the routes are fed manually. So it is suitable only for very
small networks that have maximum two to three routers.
 Dynamic − in a dynamic routing table, the router communicates with other routers
through protocols to determine which routes are free. This is suited for larger networks
where manual feeding may not be feasible due to large number of routers.
 A router is a device which is used for connecting similar and dissimilar networks.
 In any network whenever data transmission occurs, it is done through a series of nodes
that are connected from source to destination. The shortest path to transmit the data from
source to destination is called as route and this process is called as routing and this is
achieved using routers.
 The main purpose of a router is to select the best (shortest) possible path for the packet
during transmission.
 Routers are combination of software and hardware. A simple network connected through
router is depicted below.

11
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

If node N3 wants to transmit data to node N11, it will be transmitted through routers with the
shortest path possible.

o Routers are the most complicated of the three devices so far, operating at the network
layer of the OSI model. While bridges are limited to examine data packets MAC
addresses, routers go beyond this and-can examine the network address-which has
routing information encoded in it. Routers can use this information to make intelligent
decisions about routes and paths.
Routers are normally responsible for performing the following functions:

 Route selection - A router is maintaining the information in its routing table about how
to reach remote networks. It will then make routing decisions based on that information.
 Logical addressing- A device that operates at layer 3 requires some form of logical
addressing. These addresses will be used to determine route selection.
 Segmentation- Routers can be provided by a powerful method of segmenting your
networks to allow optimum utilization of available bandwidth.

There are two types of Routing techniques,


Adaptive routing: In adaptive routing, each time a router chooses a new path for each packet.
There are some routing algorithms like Distance Vector routing, Link State routing, Dijkstra
algorithm, etc. that computes the shortest and cheapest path for transmission of a packet.
Non-adaptive routing: In Non-adaptive routing, once a path has been selected, the router send
all the packets for that destination through that selected path only.

Advantages of using Routers

No broadcasts: Because router operates at Layer 3 of the OSI mode), no Layer 2 broadcasts will
be forwarded through a router.
Manageability: Routers have a better knowledge of the network topology than bridges and
switches do and have the ability to support more protocols than bridges and switches
12
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Increased bandwidth: By segmenting your networks with routers, your nodes/ hosts will have
more access bandwidth
Packet fragmentation and reassembling: Routers provide, packet fragmentation / reassembly
functions, as well as better Security.
Disadvantages of using Routers
 Considerably more difficult to install
 More expensive than repeaters or bridges
 Work only with routable protocols
 Static routing can cause problems
Comparison b/n Router and Switch
Comparison Router Switch
Purpose Router connects different networks Switches connects multiple devices together
together. to create a network.

Layer Router works on the physical layer; The switch operates on data link layer and
data link layer and network layer. network layer.

Work Router determines the best path that A switch receives process and forwards the
packet should follow to reach the packet to intended computers.
destination computer.

Type Adaptive routing and Non- adaptive Circuit Switching, Packet Switching,
routing. Message Switching.

Gateway
It is a network device used to connect two or more dissimilar networks. Gateways perform much
higher-level translations than any other component and thus work at the Application layer of the
OSI module. When packets arrive at a gateway, all the information is stripped off the data until it
reaches the layer where it can translate the information-using the format needed for the
destination. With a gateway, data is translated between two different data formats or network
architectures.
It is used for connecting networks with different types of architectures. For Example:
Communication between a mobile device having 4G connection and landline device having 2G
connection can be done using gateway.
A gateway usually is a computer with multiple NICs connected to different networks. A gateway
can also be configured completely using software. As networks connect to a different network
through gateways, these gateways are usually hosting or end points of the network

Gateway uses packet switching technique to transmit data from one network to another. In this
way it is similar to a router, the only difference being router can transmit data only over
networks that use same protocols
13
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Pros Cons
Can connect completely different systems. Very expensive than other devices.

Specialize in one task only Difficult to install and configure. Depending on the level
of translation, can be very slow

Repeater
In all communication channels, signals get week after they travel some particular amount of
distance. So, it is necessary to boost up these week signals, which is done with the help of
repeaters.

When an electrical signal is sent across a medium, it fades along the distance (known as
attenuation) as a result of resistance from the medium itself. Naturally the longer the distance
that it travelled, the more the signal fades. Eventually tie signal fades to a, point where the
receiving station cannot recognize the original message (Or has trouble doing so).
In short, each transmission medium can be used for a certain distance. However, you can exceed
the physical medium's maximum effective distance by using an amplification, device called as
Repeater. It works at OSI physical layer. A repeater operates at the physical layer of the OSI
model and takes a signal from one LAN and sends it to another LAN- reconditioning and
retiming it in the process. The reconditioning usually amplifies and boosts the signal's power. If
the signal has travelled a distance it is weak, and so on, the amplification can also be done on
noise receivers.
The repeaters job is simple: it detects the signal, amplifies and retimes it, and sends it through all
the ports except the one on which the signal was seen. It is important to note that since the
repeater has no real knowledge of the data it is carrying, no error checking is performed.
Therefore, any error is passed from one segment to the next without any ability to stop it. Many
networks limit the number of repeaters between the transmitting and receiving stations. On other
side, by not performing any filtering, the -repeater does not slow down the network's speed or
performance. The signal has travelled a distance is weak, and so on, the amplification can also be
done on noise received.

Pros and Cons of repeaters

14
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Advantages Disadvantages

Allow you to extend the network over large Have no knowledge of addressing or data
distances. types.

Do not affect the speed of network Can't ease network congestion problems

Can connect network segments of different media. network

Types of Network Topology


Network Topology is the schematic description of a network arrangement, connecting various
nodes (sender and receiver) through lines of connection.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.

Features of Bus Topology


o It transmits data only in one direction.
o Every device is connected to a single cable
Advantages of Bus Topology
o It is cost effective.
o Cable required is least compared to another network topology.
o Used in small networks.
o It is easy to understand.
o Easy to expand joining two cables together.
Disadvantages of Bus Topology
o Cables fails then whole network fails.
o If network traffic is heavy or nodes are more the performance of the network decreases.
o Cable has a limited length.
o It is slower than the ring topology.
Star Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.

Features of Star Topology


 Every node has its own dedicated connection to the hub.
 Hub acts as a repeater for data flow.
15
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

 Can be used with twisted pair, Optical Fiber or coaxial cable.


Advantages of Star Topology
 Fast performance with few nodes and low network traffic.
 Hub can be upgraded easily.
 Easy to troubleshoot.
 Easy to setup and modify.
 Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
 Cost of installation is high.
 Expensive to use.
 If the hub fails then the whole network is stopped because all the nodes depend on the
hub.
 Performance is based on the hub that is it depends on its capacity
Ring Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.

Features of Ring Topology


 A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.
 The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
 In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the
network up.
 Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
Advantages of Ring Topology
 Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
 Cheap to install and expand
Disadvantages of Ring Topology
 Troubleshooting is difficult in ring topology.
 Adding or deleting the computers disturbs the network activity.
 Failure of one computer disturbs the whole network.
Mesh Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected
to each other. Mesh has n (n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are:
Routing
Flooding

16
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

 Routing

In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those nodes etc. We can even have routing
logic, to re-configure the failed nodes.

 Flooding

In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to
unwanted load over the network.

Features of Mesh Topology


 Fully connected.
 Robust.
 Not flexible.
Advantages of Mesh Topology
 Each connection can carry its own data load.
 It is robust.
 Fault is diagnosed easily.
 Provides security and privacy.
Disadvantages of Mesh Topology
 Installation and configuration are difficult.
 Cabling cost is more.
 Bulk wiring is required.
Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.

Features of Tree Topology


 Ideal if workstations are located in groups.
 Used in Wide Area Network.
Advantages of Tree Topology
 Extension of bus and star topologies.

17
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

 Expansion of nodes is possible and easy.


 Easily managed and maintained.
 Error detection is easily done.
Disadvantages of Tree Topology
 Heavily cabled.
 Costly.
 If more nodes are added maintenance is difficult.
 Central hub fails, network fails.
Hybrid Topology
It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).

Features of Hybrid Topology


 It is a combination of two or topologies
 Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
 Reliable as Error detecting and troubleshooting is easy.
 Effective.
 Scalable as size can be increased easily.
 Flexible.
Disadvantages of Hybrid Topology
 Complex in design.
 Costly.
Connection oriented and Connection less service
What does it mean Services?
These are the operations that a layer can provide to the layer above it in the OSI Reference
model. It defines the operation and states a layer is ready to perform but it does not specify
anything about the implementation of these operations.

What are Service Primitives?


A service is formally specified by a set of primitives (operations) available to a user process to
access the service. These primitives tell the service to perform some action or report on an action
18
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

taken by a peer entity. If the protocol stack is located in the operating system, as it often is, the
primitives are normally system calls. These calls cause a trap to kernel mode, which then turns
control of the machine over to the operating system to send the necessary packets. The set of
primitives available depends on the nature of the service being provided. The primitives for
connection-oriented service are different from those of connection-less service. There are five
types of service primitives:
 LISTEN: When a server is ready to accept an incoming connection, it executes the
LISTEN primitive. It blocks waiting for an incoming connection.
 CONNECT: It connects the server by establishing a connection. Response is awaited.
 RECIEVE: Then the RECIEVE call blocks the server.
 SEND: Then the client executes SEND primitive to transmit its request followed by the
execution of RECIEVE to get the reply. Send the message.
 DISCONNECT: This primitive is used for terminating the connection. After this
primitive one can't send any message. When the client sends DISCONNECT packet then
the server also sends the DISCONNECT packet to acknowledge the client. When the
server package is received by client then the process is terminated.
Connection Oriented Service Primitives
There are 5 types of primitives for Connection Oriented Service:

LISTEN Block waiting for an incoming connection


CONNECTION Establish a connection with a waiting peer
RECEIVE Block waiting for an incoming message
SEND Sending a message to the peer
DISCONNECT Terminate a connection

Connectionless Service Primitives

UNIDATA This primitive sends a packet of data


Primitive for enquiring about the performance of the
FACILITY, REPORT
network, like delivery statistics.

Connection oriented and Connection less service

Communication can be established in two ways between two or more devices that are
connection-oriented and connection-less. Network layers can offer these two different types of
services to its predecessor layer for transferring data. Connection-oriented services involve the
establishment and termination of the connection while connection-less services don’t require
any connection creation and termination processes for transferring data. Another difference is
connection-oriented communication uses a stream of data and is vulnerable to router failure
while connection-less communication uses messages and is robust to router failure.
There are two types of service

 Connectionless service
 Connection Oriented Services

There is a sequence of operation to be followed by the users of connection-oriented service.


These are:
 Connection is established.
 Information is sent.
 Connection is released.

19
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Connection-oriented service is analogous to the telephone system that requires communication


entities to establish a connection before sending data. TCP provides Connection-oriented
services as does ATM, Frame Relay and MPLS hardware. It uses handshake process to
establish the connection between the sender and receiver.

In connection-oriented service we have to establish a connection before starting the


communication. When connection is established, we send the message or the information and
then we release the connection.
Connection oriented service is more reliable than connectionless service. We can send the
message in connection-oriented service if there is an error at the receivers end. Example of
connection oriented is TCP (Transmission Control Protocol) protocol.

A handshake process includes some steps which are:

 Client requests server to set up a connection for transfer of data.


 Server program notifies its TCP that connection can be accepted.
 The client transmits a SYN segment to the server.
 The server sends SYN+ACK to the client.
 Client transmits 3rd segment i.e. just ACK segment.
 Then server terminates the connection.

More precisely, it sets up a connection uses that connection then terminates the connection.
Reliability is achieved by having recipient acknowledge each message. There
are sequencing and flow control, that’s the reason packets received at the receiving end are
always in order. It uses circuit switching for transmission of data.

Connection-oriented transport service priory constructs a virtual circuit between two remote
devices. To this end, COTS makes four different kinds of services available to the upper layers:

T-CONNECT This service enables a full duplex transport connection on a remote


device with a peer function.

T-DATA This service is used to transfer data, it could provide uncertain service
and restricted amount of data but 
still, it is reliable.

20
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

T-EXPEDITED-DATA This service is also used for transferring data, but it carries a limited
amount expedited data up to 16 octets (bytes).

T-DISCONNECT It is used to terminate the Transport connection and to reject a


connection request also.

Where, T stands for Transfer.


Connection less Services
Connection-less service is analogous to the postal system. In which packets of data (usually
known as a datagram) is transmitted from source to destination directly. Each packet is treated
as an individual entity, which allows communication entities to send data before establishing
communication. Each packet carries a destination address to identify the intended recipient.
Packets don’t follow a fixed path that is the reason the packets received at receiver end can be
out of order. It uses packet switching for transmission of data.

In connectionless the data is transferred in one direction from source to destination without
checking that destination is still there or not or if it prepared to accept the message.
Authentication is not needed in this. Example of Connectionless service is UDP (User Datagram
Protocol) protocol.

Connection-less Transport services offer only one type of service to its upper layer that is T-
UNIT-DATA. It provides a single solitary data unit for all transmission. Each unit contains all of
the protocol control information necessary for delivery but does not include provision for
sequencing and flow control.

21
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT

Basis for
Connection-Oriented Service Connection-Less Service
Comparison
Prior Connection Necessary Not required
Requirement

Reliability Ensures reliable transfer of data. Not guaranteed.

Congestion Unlikely Occur likely.

Transferring It can be implemented using circuit switching It is implemented using packet


mode and virtual circuit. switching.

Lost data Feasible Practically, not possible.


retransmission

Suitability Suitable for long and steady communication. Suitable for burst Transmission.

Signaling Used for connection establishment. There is no concept of signaling.

Packet Packets sequentially travel to their destination Packets reach the destination randomly
forwarding node and follows the same route. without following the same route.

Delay There is a delay in transfer of information, but Because to the absence of connection
once the connection is established faster establishment phase, the transmission is
delivery can be achieved. faster.

Resource Need to be allocated. No prior allocation of the resource is


Allocation required.

Security Authentication is needed Does not need any authentication.

22
DC&CN Chapter 3 Lecture Note Prepared by Abraham A.

You might also like