(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
Network Topologies and Standards
1. Introduction to Computer Science
Networks
Lecture c
This material (Comp 4 Unit 6) was developed by Oregon Health & Science University, funded by the Department
of Health and Human Services, Office of the National Coordinator for Health Information Technology under
Award Number 90WT0001.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
2. Learning Objectives - 1
• Define what a communication network is
(Lecture a)
• Explain the purposes and benefits of a
communication network. (Lecture a)
• Explain the Internet and World Wide Web,
their histories, and their structures.
(Lecture a)
• Describe different ways of connecting to
the Internet. (Lecture a)
2
3. Learning Objectives - 2
• Explain the basics of network addressing
– Internet Protocol (IP) addresses
– Domain names
– Lease vs. purchase from an Internet service
provider (Lecture b)
• Introduce network classification by the
coverage size. (Lecture b)
3
4. Learning Objectives - 3
• Describe different network topologies.
(Lecture c)
• Outline different standards and protocols
that govern wired and wireless
communications. (Lecture c)
4
5. Learning Objectives - 4
• Describe benefits and disadvantages of
wireless communication. (Lecture d)
• Describe a typical wireless network setup.
(Lecture d)
• Describe network hardware. (Lecture d)
• Introduce networking logical models and
discuss Open Systems Interconnection
(OSI) model. (Lecture e)
5
6. Network Topologies
• Refers to network layout
• Two types exist
– Physical: How devices in the network are
connected with wires and cables
– Logical: How devices appear connected to the
user, i.e. how data flow through the network
regardless of physical design
6
7. Main Types of Physical Topologies
(Malyszkz, 2011, PD-US
7
8. Physical Topologies - Bus
• Host is connected to
other host by a single
network cable with
connectors
• If cable breaks, whole
network goes down!
• Not in use since late
1990s
(Foobaz, 2006, PD-US)
8
9. Physical Topologies –
Fully Connected and Mesh
• Each host is
connected to every
other host, usually
by a switch or
direct connection
– Some networks are
partial – not full –
mesh topologies
(Foobaz, 2006, PD-US)
9
10. Physical Topologies - Ring
• Each host is connected to the
network in a closed loop or
ring
• Found in highly secure
environments
• Typically utilize a token
passing scheme,
– Only one machine can transmit
on the network at a time
(Foobaz, 2006, PD-US)
10
11. Physical Topologies - Star
• Each network host
is connected to a
central switch
• Most common type
• Easiest type to set
up and maintain
• All traffic passes
through the switch
(Foobaz, 2006, PD-US)
11
12. Network Standards and
Protocols - 1
• Institute of Electrical and Electronics
Engineers (IEEE)
– Creates and publishes networking and many
other standards
– Wired network governed by IEEE 802.3
standard
– Wireless network governed by IEEE 802.11
standard
• Standards ensure compatibility of
products from various vendors 12
13. Network Standards and
Protocols - 2
• Protocols govern communications
– Example: You install an Intel NIC on your
computer and your friend installs a 3Com NIC
on her computer. Both computers can
communicate flawlessly because both NICs
adhere to IEEE standards for network
communication.
13
14. Standardized Communications
• IPs are a global standard
– IP addressing is required to function properly
– IP addressing allows any device with Internet
access to communicate with another
– TCP/IP transports HTTP across the Internet
for delivery to its destination
– Protocols such as HTTP allow any browser to
talk to any Web server
14
15. Network Standards
• Ethernet
• Token ring
• Wi-Fi
• WiMAX
• WAP (Wireless Application Protocol)
• RFID (Radio frequency Identification)
• Bluetooth
15
16. Ethernet Network Standard
• Concepts developed 1973-1975
• IEEE Standard 802.3
• Defines standards for wiring and signaling
• Standard defines frame formats, etc.
• Widely used today
16
17. Token Ring Network Standard
• Concepts developed in 1985
• IEEE 802.5 standard
• Named after its logical topology
• Communicating devices need to possess
the digital token that is passed around the
ring
• Put out of business by Ethernet
17
18. Wi-Fi Network Standard
• Concepts evolved 1997 – today
• IEEE 802.11 standard for wireless LANs
• Family of wireless protocols
• Standard defines throughput, frame formats,
etc.
• Uses frequencies (channels) for wireless
communication
– 802.11 A uses 5.0 GHz wireless band
– 802.11 B/G uses 2.4 GHz wireless band
– 802.11 N uses both bands
18
19. WiMAX Network Standard
• Developed in 2001
• IEEE 802.16 standard for WAN wireless
• Telecommunications protocol provides
fixed and fully mobile internet access
• Example
– WiMAX access was used to assist with
communications in Aceh, Indonesia, after the
tsunami in December 2004. WiMAX provided
broadband access that helped regenerate
communication to and from Aceh. 19
20. Wireless Application Protocol
(WAP)
• Open international standard for
application-layer network communications
in a wireless-communication environment
• Standard describes a protocol suite
allowing the interoperability of WAP
equipment and software
• Concept developed ca. 1997
• Most use involves accessing mobile web
from a mobile phone or from a PDA
20
21. Radio-Frequency Identification
(RFID)
• Tag incorporated into an object,
communicates using radio waves
• Most contain at least two parts
– Integrated circuit stores information
– Antenna for sending/receiving signals
• Many organizations govern standard
– International Organization for Standardization
(ISO)
– International Electrotechnical Commission
(IEC) 21
22. Bluetooth
• IEEE 802.15
standard
• Concept developed
ca. 1994 to present
• Open wireless
technology
standard for
exchanging data
over short
distances
• Used by
– Medical implants
– Keyboard/mouse
– Cell phone headsets
A Bluetooth USB dongle with a 100 m range.
(Mmckinley, 2009, PD-US)
22
23. Networks
Summary – Lecture c
• Describe different network topologies
• List and describe different network
standards and protocols
23
24. Networks
References – 1 – Lecture c
References
Wikipedia. Computer network. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Computer_network.
Wikipedia. Local area network. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Local_area_network.
Wikipedia. Metropolitan area networks. [Internet].2010 [cited 2011 Nov 07]. Available
from: http://en.wikipedia.org/wiki/Metropolitan_area_network.
Wikipedia. Network topology. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Network_topology.
Wikipedia. Institute of Electrical and Electronics Engineers. [Internet].2010 [cited 2011
Nov 07]. Available from: http://en.wikipedia.org/wiki/IEEE.
Wikipedia. Communications protocol. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Network_protocol.
Wikipedia. Ethernet. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Ethernet.
24
25. Networks
References – 2 – Lecture c
References
Wikipedia. IEEE 802.11. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/IEEE_802.11.
Wikipedia. Wi-Fi. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Wi-Fi.
Wikipedia. WiMAX. [Internet].2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Wi-max.
Wikipedia. Wireless Application Protocol. [Internet].2010 [cited 2011 Nov 07]. Available
from: http://en.wikipedia.org/wiki/Wireless_Application_Protocol.
Wikipedia. Radio-frequency identification. [Internet].2010 [cited 2011 Nov 07]. Available
from: http://en.wikipedia.org/wiki/RFID.
Images
Slide 5: Screenshot of Computer Name/Domain Changes window. (PD-US, 2011)
Slide 7: Network Topologies [image on the Internet]. Maksim (24 April 20144) [cited 2017
March 01]. Retrieved March 2017 from:
https://commons.wikimedia.org/wiki/File:NetworkTopologies.svg. (PD-US, 2011)
Slide 8: Bus Network [image on the Internet]. Myself, (19 February 2008) [cited 2011 Nov
07]. Retrieved Jan 2012 from:
https://commons.wikimedia.org/wiki/File:BusNetwork.svg. (PD-US, 2011)
25
26. Networks
References – 3 – Lecture c
Images
Slide 9: NetworkTopology - Mesh [image on the Internet]. Foobaz, (6 February 2014)
[cited 2011 Nov 07]. Retrieved Jan 2012 from:
https://en.wikipedia.org/wiki/File:NetworkTopology-Mesh.svg. (PD-US, 2011)
Slide 9: NetworkTopology – Fully Connected [image on the Internet]. Foobaz, (16
October 2016) [cited 2011 Nov 07]. Retrieved Jan 2012 from:
https://en.wikipedia.org/wiki/File:NetworkTopology-FullyConnected.png. (PD-US,
2011)
Slide 10: Ring Network [image on the Internet]. Foobaz, (19 February 2008) [cited 2011
Nov 07]. Retrieved Jan 2012 from: https://en.wikipedia.org/wiki/File:RingNetwork.svg.
(PD-US, 2011)
Slide 11: Star Network [image on the Internet]. Foobaz, (19 February 2008) [cited 2011
Nov 07]. Retrieved Jan 2012 from: https://en.wikipedia.org/wiki/File:StarNetwork.svg.
(PD-US, 2011)
Slide 22: Bluetooth USB Dongle [image on the Internet]. Mmckinley (01 January 2009)
[cited 2011 Nov 07]. Retrieved Jan 2012 from:
https://commons.wikimedia.org/wiki/File:Drone_4.jpg. (PD-US, 2011)
26
27. Introduction to Computer Science
Networks
Lecture c
This material was developed by Oregon
Health & Science University, funded by the
Department of Health and Human Services,
Office of the National Coordinator for Health
Information Technology under Award
Number 90WT0001.
27
Editor's Notes
Welcome to Introduction to Computer Science: Networks. This is Lecture c.
The component, Introduction to Computer Science, provides a basic overview of computer architecture; data organization, representation, and structure; structure of programming languages; and networking and data communication. It also includes some basic terminology from the world of computing.
The objectives for this unit on Networks are to:
Define what a communication network is,
Explain the purposes and benefits of a communication network,
Explain the Internet and World Wide Web, their histories, and their structures,
Describe different ways of connecting to the Internet,
Explain basics of network addressing: IP addresses and domain names, and how they can be leased or purchased from an Internet service provider.
Introduce network classification by the coverage size.
Describe different network topologies.
Outline different standards and protocols that govern wired and wireless communications.
Describe benefits and disadvantages of wireless communication
Describe a typical wireless network setup.
Describe network hardware.
And, finally, to introduce networking logical models and discuss Open Systems Interconnection, or OSI model.
How a network is organized or laid out is referred to as its topology. Two types of network topologies exist.
Physical topology details how the network is physically designed; in other words how devices in the network are connected with wires and cables.
Logical topology illustrates how devices appear to the user to be connected; in other words, how data flows through the network, regardless of its physical design.
First, consider physical topologies. There are many physical topology types. The main types are shown in the figure on the screen: ring, mesh, star, fully connected, line, tree, and bus topology. The next few slides show some of these in more detail.
One physical topology is known as a bus. In the figure on the slide, each host is connected to every other host by a single network cable with connectors. Each green dot in the figure represents a host. If any cable breaks, then the whole network goes down. Obviously, this type of network was not very reliable or scalable and has not been in use since the late 1990s.
Another type of physical topology is mesh. With mesh topologies, each host is connected to every other host in the network by a switch or by a direct connection to another host without the use of a switch. The image on the screen shows a full mesh topology where each host is directly connected to every other host in the network.
This type of physical topology usually relates to routers, not to computers, because when computers are in a full mesh, they are typically interconnected by a switch. In other words, all of the devices will connect to the switch, not to each other.
Another physical topology is the ring. Within a ring topology, each host is connected to the network in a closed loop or ring. This is an uncommon network type, usually found in highly secured environments. Ring topologies typically use an electronic token-passing scheme, which controls access to the network. By using this type of topology, only one machine can transmit on the network at any given time.
The physical star topology is the most common topology type. It is the easiest to set up and maintain. In this type of environment, all traffic passes through the switch that is at the middle or at the hub of the network. At the ends of the star are end devices. Examples of end devices are computers and printers.
Note that an extended star topology exists when a number of switches are connected to each other. This diagram does not show any end devices.
In an extended star topology, all hosts can communicate with all other hosts, assuming a proper design; internet protocol, or IP addressing; and appropriate network permissions.
The Institute of Electrical and Electronics Engineers, or IEEE, creates and publishes networking and other standards.
Wired networks are governed by IEEE 802.3 standard while wireless networks are governed by IEEE 802.11 standard.
Establishing standards is important since it ensures compatibility of products from various vendors.
Protocols govern communications used by the various products you might install on your computer.
For example, say that you purchase and install an Intel network interface card, or NIC. Your friend installs a 3Com NIC on their computer. Both computers can communicate flawlessly over the network because both NICs adhere to the applicable IEEE standards for network communication.
Internet protocols are a global standard. This ensures interoperability between the hardware and software installed on computers. For example, IP addressing is required for home and office networks to function properly. IP addressing allows any device with Internet or network access to communicate with any other device on the Internet.
The Transmission Control Protocol Internet Protocol, or TCP/IP, transports hypertext transfer protocol, or HTTP across the Internet for delivery to its destination. HTTP is the hypertext transfer protocol used on the World Wide Web. Protocols such as HTTP allow any Web browser to talk to any Web server.
Network standards include Ethernet, token ring, Wi-Fi, WIMAX, the wireless application protocol, or WAP, the radio frequency identification, or RFID, and Bluetooth. These standards will be described in more detail.
Starting with the Ethernet network standard, Ethernet gets its name from the physical concept of ether. In the late 1800s, scientists thought that some then-unknown medium was responsible for housing light particles as they passed through the air. The name they gave to this unknown medium was ether.
Ethernet cables and Ethernet as a standard were developed between 1973 and 1975. Ethernet is encompassed and promulgated in IEEE standard 802.3.
Ethernet's standard defines the standardization and rules that relate to wiring and signaling. It defines frame formats and how large fields are within frames. Ethernet is widely used in wired networking.
A frame is an electronic construct that organizes electronic communication into fields of fixed sizes. Switches and other devices are able to understand the contents of a frame and use information in its fields to forward electronic communication throughout the network.
The token ring network standard was developed in approximately 1985 and is part of the IEEE 802.5 standard. Token ring is named after its logical topology, since its physical topology is a star. In this type of topology, devices connect to each other, usually by a switch.
When devices connect to a switch through an Ethernet cable, communicating devices need to possess the digital or electronic token that is passed around the ring. Again, this is a logical ring, so the token passes from device to device. Therefore, a device passes the electronic token to the switch, which passes it to another device, and so on.
Devices pass the token until they need to communicate on the network. Then they hold the token until they are finished communicating.
In essence, Ethernet made token ring obsolete because Ethernet is much faster and easier to implement. To use a token ring network type, users must install token ring NICs and switches.
The Wi-Fi network standard relates to wireless devices. It began its evolution in 1997 and continues today. Wireless communication is based on the 802.11 standard for wireless local area networks, or LANs. In fact, Wi-Fi and 802.11 are synonyms, because they relate to the family of wireless protocols 802.11 A, B, G, and the Draft N protocol. The standard 802.11 defines throughput and frame formats that relate to the equipment being used for wireless communication.
When communication moves from a computer onto a wireless NIC, and then ultimately into the air, how does electronic communication get into the air? With a wired connection, how does the communication from a computer move from the NIC onto a piece of wire?
All of this is governed by the 802.11 standard for wireless and 802.3 standard for wired communication. The 802.11 standard defines frame formats. In other words, the standard defines the format of the electronic communication pieces so they can make the jump from the NIC onto the actual wire itself.
802.11A uses the 5.0 gigahertz wireless band for its communication. 802.11B and G both use the 2.4 gigahertz wireless band. Note that the 2.4 gigahertz frequency range operates in the same range as microwaves and older telephones. So a user communicating wirelessly in a home and running a microwave at the same time would experience interference to the wireless signal. The microwave would consume all of the wireless bandwidth, causing wireless communication to function less than perfectly, if at all.
802.11N on the other hand, uses both 5.0 and 2.4 gigahertz frequencies for its communication. This is why 802.11N is so much faster than the 802.11 A, B, or G types.
The WIMAX network standard was developed in 2001 and is referred to as the IEEE 802.16 standard that relates to WAN wireless networking. It is the telecommunications protocol that provides fixed and fully mobile Internet access. Note that WIMAX is different from Wi-Fi. Here is an example to clarify this point.
WIMAX access was used to assist with communications in the Aceh, Indonesia area after the tsunami in December 2004. WIMAX provided broadband access that helped regenerate communication to and from this province when no other communication was available. People with network devices were able to connect to the Internet using WIMAX connectivity.
The wireless application protocol or WAP is an open international standard for application layer network communications in a wireless communication environment.
The standard describes a protocol suite - a protocol suite is a number of protocols that are grouped together - allowing the interoperability of WAP equipment and software with many different network technologies. The concept was developed in approximately 1997 and is still relevant today.
Most uses of WAP involve accessing the Internet from a smart phone, a mobile phone, or a Personal Digital Assistant, also known as a PDA.
The radio frequency identification standard, or RFID, incorporates the use of an RFID tag in an object and then communicates using radio waves. Most RFID tags contain at least two parts.
First, there is the circuitry that stores information about the item related to the RFID tag.
Then there is the antenna for sending and receiving signals. Many organizations govern this standard, including the International Standards Organization, or ISO, and the International Electrotechnical Commission, or IEC.
In stores, RFID tags are placed on clothing, expensive items, and items that are easy to shoplift. They are heavily used for inventorying medical supplies and medicine. In fact, in many medical offices, if an employee needs to remove medicine from a cabinet, the RFID tag records its movement, and may even ask the employee to remove it from inventory.
The IEEE 802.15 standard that is relevant to Bluetooth was developed in approximately 1994 and is evolving to this day. Bluetooth represents an open, wireless technology standard for exchanging data over short distances, usually about 30 to 50 feet from fixed and mobile devices. Bluetooth is used in devices such as medical implants, keyboards, mouse devices, cell phone headsets, and other devices.
This concludes lecture c of Networks. In summary, this lecture discussed:
Different network topologies
And different network standards and protocols