SlideShare a Scribd company logo
Chapter 6:
Topologies and Access Methods
Network+ Guide to Networks
2
Objectives
Describe the basic and hybrid LAN physical
topologies, and their uses, advantages, and
disadvantages
Describe the backbone structures that form
the foundation for most LANs
Compare the different types of switching
used in data transmission
3
Objectives (continued)
Understand the transmission methods
underlying Ethernet, LocalTalk, Token Ring,
FDDI, and ATM networks
Describe the characteristics of different
wireless network technologies, including the
three IEEE 802.11 standards
4
Simple Physical Topologies
• Physical topology is the physical layout,
or pattern, of the nodes on a network
• Physical topologies are divided into three
fundamental geometric shapes: bus, ring,
and star
5
Simple Physical Topologies
(continued)
• Bus
• A bus topology consists of a single cable
connecting all nodes on a network without
intervening connectivity devices
• The single cable is called the bus and can support
only one channel for communication
• Most bus networks use coaxial cable as their
physical medium
• At the ends of each bus network are 50-ohm
resistors known as terminators
6
• Ring
• In a ring topology, each node is connected to the
two nearest nodes so that the entire network
forms a circle
• Data is transmitted clockwise, in one direction
(unidirectional), around the ring
• The fact that all workstations participate in delivery
makes the ring topology an active topology
• A ring topology also differs in that it has no “ends”
and data stops at its destination and, twisted-pair
or fiber-optic cabling is used as the physical
medium22
Simple Physical Topologies
(continued)
7
• In a star topology, every node on the
network is connected through a central
device, such as a hub or switch
• Star topologies are usually built with twisted-pair
or fiber-optic cabling
• Star topologies require more cabling than ring or
bus networks
• Each node is separately connected to a central
connectivity device, they are more fault-tolerant
Simple Physical Topologies
(continued)
8
• Star-Wired Ring
• The star-wired ring topology uses the physical
layout of a star in conjunction with the ring
topology’s data transmission method
• Data is sent around the star in a circular pattern
• This hybrid topology benefits from the fault
tolerance of the star topology
Hybrid Physical Topologies
9
• In a star-wired bus topology, groups of
workstations are star-connected to hubs
and then networked via a single bus
• With this design, you can cover longer distances
and easily interconnect or isolate different network
segments
Hybrid Physical Topologies
(continued)
10
• More expensive than using either the star or,
especially, the bus topology alone because it
requires more cabling and potentially more
connectivity devices
• The star-wired bus topology forms the basis for
modern Ethernet and Fast Ethernet networks
Hybrid Physical Topologies
(continued)
11
Backbone Networks
• A network backbone is the cabling that connects
the hubs, switches, and routers on a network
• Backbones usually are capable of more
throughput than the cabling that connects
workstations to hubs
12
Backbone Networks (continued)
• In networking, the term enterprise refers to an
entire organization, including its local and remote
offices, a mixture of computer systems, and a
number of departments
• The backbone is the most significant building
block of enterprise-wide networks
13
• Serial Backbone
• The simplest kind of backbone
• It consists of two or more internetworking devices
connected to each other by a single cable in a
daisy-chain fashion
• In networking, a daisy chain is simply a linked
series of devices
• Hubs and switches are often connected in a daisy
chain to extend a network
Backbone Networks (continued)
14
• Distributed Backbone
• Consists of a number of connectivity devices connected
to a series of central connectivity devices such as hubs,
switches, or routers, in a hierarchy
• This kind of topology allows for simple expansion and
limited capital outlay for growth, because more layers of
devices can be added to existing layers
Backbone Networks (continued)
15
• A more complicated distributed backbone connects
multiple LANs or LAN segments using routers
• Provides network administrators with the ability to
segregate workgroups and therefore manage them
more easily
Backbone Networks (continued)
16
• Collapsed Backbone
• Uses a router or switch as the single central
connection point for multiple subnetworks
• A single router or switch is the highest layer of the
backbone6
• The router or switch that makes up the collapsed
backbone must contain multiprocessors to handle
the heavy traffic going through it
• This arrangement allows you to interconnect
different types of subnetworks
Backbone Networks (continued)
17
• Parallel Backbone
• The most robust type of network backbone
• The most significant advantage of using a parallel
backbone is that its redundant (duplicate) links
ensure network connectivity to any area of the
enterprise
• Parallel backbones are more expensive than other
enterprise-wide topologies
• They make up for the additional cost by offering
increased performance and better fault tolerance
Backbone Networks (continued)
18
Logical Topologies
• Logical topology refers to the way in which data is
transmitted between nodes
• The most common logical topologies are bus and
ring
• In a bus logical topology, signals travel from one
network device to all other devices on the network
• In a ring logical topology signals follow a circular
path between sender and receiver
• Logical topologies is useful when troubleshooting
and designing networks
19
Switching
• A component of a network’s logical topology that
determines how connections are created between
nodes
• There are three methods for switching: circuit
switching, message switching, and packet
switching
20
• Circuit Switching
• A connection is established between two network
nodes before they begin transmitting data
• Bandwidth is dedicated to this connection and
remains available until the users terminate
communication between the two nodes
• While the nodes remain connected, all data
follows the same path initially selected by the
switch
Switching (continued)
21
• Message Switching
• Establishes a connection between two devices,
transfers the information to the second device, and
then breaks the connection
• The information is stored and forwarded from the
second device once a connection between that
device and a third device on the path is
established
Switching (continued)
22
• This “store and forward” routine continues until the
message reaches its destination
• Message switching requires that each device in
the data’s path have sufficient memory and
processing power to accept and store the
information before passing it to the next node
Switching (continued)
23
• Packet Switching is the most popular
method for connecting nodes on a
network
• Breaks data into packets before they are
transported
• Packets can travel any path on the network to their
destination
• When packets reach their destination node, the
node reassembles them based on their control
information
• Does not waste bandwidth by holding a
connection open until a message reaches its
destination
Switching (continued)
24
Ethernet
• Carrier Sense Multiple Access with
Collision Detection (CSMA/CD)
• The access method used in Ethernet
• The term “Carrier Sense” refers to the fact that
Ethernet NICs listen on the network and wait until
they detect (or sense) that no other nodes are
transmitting data over the signal (or carrier) on the
communications channel before they begin to
transmit
25
Ethernet (continued)
• The term “Multiple Access” refers to the fact that several
Ethernet nodes can be connected to a network and can
monitor traffic, or access the media, simultaneously
• The last part of the term CSMA/CD, “collision detection,”
refers to the way nodes respond to a collision
• When two transmissions interfere with each other; this is
known as a collision
26
• The NIC will issue a special 32-bit sequence that
indicates to the rest of the network nodes that the
its previous transmission was faulty and that those
data frames are invalid which is called jamming
• A collision domain is the portion of a network in
which collisions occur if two nodes transmit data at
the same time
• A data propagation delay is the length of time data
takes to travel from one point on the segment to
another point
Ethernet (continued)
27
• Switched Ethernet
• Traditional Ethernet LANs, called shared Ethernet,
supply a fixed amount of bandwidth that must be
shared by all devices on a segment, and all nodes
on that segment belong to the same collision
domain
• Switched Ethernet enables multiple nodes to
simultaneously transmit and receive data over
different logical network segments
• Using switched Ethernet increases the effective
bandwidth of a network segment because fewer
workstations must vie for the same time on the
wire
Ethernet (continued)
28
• Ethernet Frames
• Ethernet networks may use one (or a combination)
of four kinds of data frames: Ethernet_802.2
(“Raw”), Ethernet_802.3 (“Novell proprietary”),
Ethernet_II (“DIX”), and Ethernet_SNAP
• Each frame type differs slightly in the way it codes
and decodes packets of data traveling from one
device to another
Ethernet (continued)
29
• Using and Configuring Frames
• You can use multiple frame types on a network, but
you cannot expect interoperability between the
frame types
• Frame types are typically specified through a
device’s NIC configuration software
• Most NICs can automatically sense what types of
frames are running on a network and adjust
themselves to that specification which is a feature is
called autodetect, or autosense
Ethernet (continued)
30
• The preamble signals to the receiving node that
data is incoming and indicates when the data flow
is about to begin
• The start-of-frame delimiter (SFD) identifies where
the data field begins
Ethernet (continued)
31
• Each Ethernet frame also contains a 14-byte header,
which includes a destination address, a source
address, and an additional field that varies in function
and size, depending on the frame type
• The extra bytes are known as padding and have no
significance other than to fill out the frame
• Ethernet_II (“DIX”) and Ethernet_SNAP
• An Ethernet frame type developed by DEC, Intel, and
Xerox (abbreviated as DIX) before the IEEE began to
standardize Ethernet
Ethernet (continued)
32
• Ethernet_II frame type contains a 2-byte type field.
This type field identifies the Network layer protocol
(such as IP,ARP, RARP, or IPX) contained in the
frame
• The Ethernet_SNAP standard calls for additional
control fields
• Ethernet_SNAP frames allow less room for data
Ethernet (continued)
33
• Power over Ethernet
• Recently, IEEE has finalized a new standard,
802.3af, that specifies a method for supplying
electrical power over Ethernet connections, also
known as Power over Ethernet (PoE)
• The PoE standard specifies two types of devices:
power sourcing equipment (PSE) and powered
devices (PDs)
• Power sourcing equipment (PSE)
• Powered devices (PDs)
Ethernet (continued)
34
LocalTalk
• LocalTalk is a network access method designed by
Apple Computer, Inc. specifically for networking
Macintosh computers
• It provided a simple, cost-effective way of
interconnecting Macintosh devices
• LocalTalk uses a transmission method called Carrier
Sense Multiple Access with Collision Avoidance
(CSMA/CA)
• LocalTalk relies on the AppleTalk protocol, but it may
also support the Macintosh version of TCP/IP called
MacTCP
35
Token Ring
• A network technology first developed by IBM in the
1980s
• Token Ring networks have traditionally been more
expensive to implement than Ethernet networks
• The 100-Mbps Token Ring standard, finalized in
1999, is known as High-Speed Token Ring (HSTR)
• In token passing, a 3-byte packet, called a token, is
transmitted from one node to another in a circular
fashion around the ring
• The active monitor maintains the timing for ring
passing
36
• Token Ring Switching
• Token Ring networks can take advantage of
switching to better utilize limited bandwidth
• A Token Ring switch can subdivide a large
network ring into several smaller network rings
• Token Ring technology does not allow collisions
Token Ring (continued)
37
• Token Ring Frames
• Token Ring networks may use one of two
types of frames: the IEEE 802.5 or the IBM
Token Ring frame
• Every Token Ring frame includes Start Delimiter
(SD), Access Control (AC), and End Delimiter
(ED) fields
• Token Ring frames use a Frame Status (FS) to
provide low-level acknowledgment that the frame
was received whole
Token Ring (continued)
38
• A network technology whose standard was originally
specified by ANSI in the mid-1980s and later refined
by ISO
• FDDI (pronounced “fiddy”) uses a double ring of
multimode or single mode fiber to transmit data at
speeds of 100 Mbps
• FDDI is more reliable and more secure than
transmission methods that depend on copper wiring
• FDDI works well with Ethernet 100BaseTX
technology
• FDDI technology has a high cost relative to Fast
Ethernet
Fiber Distributed Data Interface
(FDDI)
39
Asynchronous Transfer Mode (ATM)
• An ITU networking standard describing Data Link layer
protocols for both network access and signal multiplexing
• ATM may run over fiber-optic or CAT 5 or higher UTP or
STP cable
• In ATM, a packet is called a cell and always consists of 48
bytes of data plus a 5-byte header
• ATM technology is that it relies on virtual circuits
• ATM a connection-oriented technology using virtual circuits
40
ATM (continued)
• Establishing a reliable connection allows ATM to
guarantee a specific Quality of Service (QoS) for
certain transmissions
• QoS is a standard that specifies that data will be
delivered within a certain period of time after it is
sent
• ATM networks can be integrated with Ethernet or
Token Ring networks through the use of LAN
Emulation (LANE)
41
Wireless Networks
• Each wireless technology is defined by a standard
that describes unique functions at both the
Physical and the Data Link layers of the OSI
Model
• These standards differ in their specified signaling
methods, geographic ranges, and frequency
usages, among other things.
• The most popular wireless standards used on
contemporary LANs are those developed by
IEEE’s 802.11 committee
42
• 802.11 Another name for Wireless Local
Area Networks (WLAN) standards
committee
• Access Method
• 802.11 standards specify the use of Carrier Sense
Multiple Access with Collision Avoidance
(CSMA/CA) to access a shared medium
• Use of ACK packets to verify every transmission
• RTS/CTS enables a source node to issue an RTS
signal to an access point requesting the exclusive
opportunity to transmit
Wireless Networks (continued)
43
• Association
• In the context of wireless networking,
communication that occurs between a station and
an access point to enable the station to connect to
the network via that access point
• As long as a station is on and has its wireless
protocols running, it periodically surveys its
surroundings for evidence of an access point, a
task known as scanning
Wireless Networks (continued)
44
• There are two types of scanning: active and passive
• In active scanning, the station transmits a special
frame, known as a probe, on all available
channels within its frequency range
• In passive scanning, a wireless station listens on
all channels within its frequency range for a
special signal, known as a beacon frame, issued
from an access point
• Service Set Identifier (SSID), a unique character
string used to identify an access point
• A station might choose a different access point
through a process called re-association
Wireless Networks (continued)
45
• Frames
• For each function, the 802.11 standard specifies a
frame type at the MAC sublayer
• These multiple frame types are divided into three
groups: management, control and data
• Management frames are those involved in association
and re-association, such as the probe and beacon
frames
• Control frames are those related to medium access
and data delivery, such as the ACK and RTS/CTS
frames
• Data frames are those that carry the data sent
between stations
Wireless Networks (continued)
46
• 802.11b
• Also known as “Wi-Fi,” for Wireless Fidelity
• Uses direct sequence spread spectrum (DSSS)
signaling
• 802.11b was the first to take hold and remains the
most popular
• It is also the least expensive of all the 802.11
WLAN technologies
Wireless Networks (continued)
47
• 802.11a
• 802.11a’s high throughput is attributable to its use
of higher frequencies, its unique method of
encoding data, and more available bandwidth
• Higher frequency signals require more power to
transmit and travel shorter distances than lower
frequency signals
• The additional access points, as well as the nature
of 802.11a equipment, make this standard more
expensive than either 802.11b or 802.11g
Wireless Networks (continued)
48
• 802.11g
• 802.11g benefits from being compatible with 802.11b
networks
• 802.11g has high throughput
• 802.11g’s compatibility with the more established 802.11b
has caused many network managers to choose it over
802.11a, despite 802.11a’s comparative advantages
• Laptops could roam between the ranges of the 802.11b and
802.11g access points without an interruption in service
Wireless Networks (continued)
49
• Bluetooth
• Bluetooth is a mobile wireless networking standard
that uses DSSS signaling in the 2.4-GHz band to
achieve a maximum theoretical throughput of 1
Mbps
• Bluetooth was designed to be used on small
networks composed of personal communications
devices, also known as personal area networks
(PANs)
• Bluetooth’s low throughput and short range makes
it impractical for business LANs.
Wireless Networks (continued)
50
• HomeRF
• HomeRF is a wireless networking specification
developed by the HomeRF Working Group
• The most unique aspect of the HomeRF standard
is that it was designed to allow both traditional
telephone signals and data signals to be
exchanged over the same wireless network
• Its working group was disbanded in January 2003
Wireless Networks (continued)
51
Summary
• Basic and hybrid LAN physical topologies,
and their uses, advantages, and
disadvantages
• Describe the backbone structures
• Compared the different types of switching
used in data transmission
52
Summary (continued)
• Transmission methods underlying
Ethernet, LocalTalk, Token Ring, FDDI,
and ATM networks
• Characteristics of different wireless
network technologies, including the three
IEEE 802.11 standards

More Related Content

What's hot

Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
JAIGANESH SEKAR
 
Basic concept of frame relay
Basic concept of frame relayBasic concept of frame relay
Basic concept of frame relay
NetProtocol Xpert
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
AKSHIT KOHLI
 
Lte protocols
Lte protocolsLte protocols
Lte protocols
ece_narender
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
Ahmed Ayman
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
Vo lte(eran8.1 03)
Vo lte(eran8.1 03)Vo lte(eran8.1 03)
Vo lte(eran8.1 03)
Musa Ahmed
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 

What's hot (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Dqdb
DqdbDqdb
Dqdb
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
Basic concept of frame relay
Basic concept of frame relayBasic concept of frame relay
Basic concept of frame relay
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Lte protocols
Lte protocolsLte protocols
Lte protocols
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Vo lte(eran8.1 03)
Vo lte(eran8.1 03)Vo lte(eran8.1 03)
Vo lte(eran8.1 03)
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 

Viewers also liked

Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
nizam143
 
Network access methods
Network access methodsNetwork access methods
Network access methodsJaleel James
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
Muhd Mu'izuddin
 
Mobile commerce 2
Mobile commerce 2Mobile commerce 2
Mobile commerce 2
Ahmed Elnaggar
 
Topologies
TopologiesTopologies
Topologies
Ahmed Elnaggar
 
Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)
Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)
Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)
Beat Signer
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
Raja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
Raja Waseem Akhtar
 

Viewers also liked (20)

Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
 
Network access methods
Network access methodsNetwork access methods
Network access methods
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Mobile commerce 2
Mobile commerce 2Mobile commerce 2
Mobile commerce 2
 
Topologies
TopologiesTopologies
Topologies
 
Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)
Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)
Access Methods - Lecture 9 - Introduction to Databases (1007156ANR)
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Network topology
Network topologyNetwork topology
Network topology
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 
Ch13 system administration
Ch13 system administration Ch13 system administration
Ch13 system administration
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Ch06
Ch06Ch06
Ch06
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Ch09 system administration
Ch09 system administration Ch09 system administration
Ch09 system administration
 
Ch08 system administration
Ch08 system administration Ch08 system administration
Ch08 system administration
 
Ch11
Ch11Ch11
Ch11
 
Ch08
Ch08Ch08
Ch08
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 

Similar to Chapter06 -- topologies and access methods

HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
SOLOMONCHINAEMEUCHEA
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
AASTHAJAJOO
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
Singh Bedi
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
sharone singh
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
Anushiya Ram
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
Mayura shelke
 
presentation on topology.pptx BY Farman ullah
presentation on topology.pptx BY Farman ullahpresentation on topology.pptx BY Farman ullah
presentation on topology.pptx BY Farman ullah
FarmanUllah153601
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
Computer network
Computer networkComputer network
Computer network
Simran Kaur
 
Computer Network
Computer NetworkComputer Network
Computer Network
Subhash Vadadoriya
 
Unit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdfUnit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdf
shuklagyanprakash578
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale1
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
dhanashrisabale1
 
Aerial links
Aerial linksAerial links
Aerial links
Talha Karim
 
Data comminication network
Data comminication networkData comminication network
Data comminication network
Harsh Patel
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
diaryinc
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
ArunaSekar1
 
Network Topology, multiplexer and demultiplexer
Network Topology, multiplexer and demultiplexerNetwork Topology, multiplexer and demultiplexer
Network Topology, multiplexer and demultiplexer
nitish sandhawar
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
ctedds
 

Similar to Chapter06 -- topologies and access methods (20)

HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
 
presentation on topology.pptx BY Farman ullah
presentation on topology.pptx BY Farman ullahpresentation on topology.pptx BY Farman ullah
presentation on topology.pptx BY Farman ullah
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Computer network
Computer networkComputer network
Computer network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Unit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdfUnit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdf
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Aerial links
Aerial linksAerial links
Aerial links
 
Data comminication network
Data comminication networkData comminication network
Data comminication network
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 
Network Topology, multiplexer and demultiplexer
Network Topology, multiplexer and demultiplexerNetwork Topology, multiplexer and demultiplexer
Network Topology, multiplexer and demultiplexer
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 

More from Raja Waseem Akhtar

The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
Raja Waseem Akhtar
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
Raja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
Raja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 

More from Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Chapter06 -- topologies and access methods

  • 1. Chapter 6: Topologies and Access Methods Network+ Guide to Networks
  • 2. 2 Objectives Describe the basic and hybrid LAN physical topologies, and their uses, advantages, and disadvantages Describe the backbone structures that form the foundation for most LANs Compare the different types of switching used in data transmission
  • 3. 3 Objectives (continued) Understand the transmission methods underlying Ethernet, LocalTalk, Token Ring, FDDI, and ATM networks Describe the characteristics of different wireless network technologies, including the three IEEE 802.11 standards
  • 4. 4 Simple Physical Topologies • Physical topology is the physical layout, or pattern, of the nodes on a network • Physical topologies are divided into three fundamental geometric shapes: bus, ring, and star
  • 5. 5 Simple Physical Topologies (continued) • Bus • A bus topology consists of a single cable connecting all nodes on a network without intervening connectivity devices • The single cable is called the bus and can support only one channel for communication • Most bus networks use coaxial cable as their physical medium • At the ends of each bus network are 50-ohm resistors known as terminators
  • 6. 6 • Ring • In a ring topology, each node is connected to the two nearest nodes so that the entire network forms a circle • Data is transmitted clockwise, in one direction (unidirectional), around the ring • The fact that all workstations participate in delivery makes the ring topology an active topology • A ring topology also differs in that it has no “ends” and data stops at its destination and, twisted-pair or fiber-optic cabling is used as the physical medium22 Simple Physical Topologies (continued)
  • 7. 7 • In a star topology, every node on the network is connected through a central device, such as a hub or switch • Star topologies are usually built with twisted-pair or fiber-optic cabling • Star topologies require more cabling than ring or bus networks • Each node is separately connected to a central connectivity device, they are more fault-tolerant Simple Physical Topologies (continued)
  • 8. 8 • Star-Wired Ring • The star-wired ring topology uses the physical layout of a star in conjunction with the ring topology’s data transmission method • Data is sent around the star in a circular pattern • This hybrid topology benefits from the fault tolerance of the star topology Hybrid Physical Topologies
  • 9. 9 • In a star-wired bus topology, groups of workstations are star-connected to hubs and then networked via a single bus • With this design, you can cover longer distances and easily interconnect or isolate different network segments Hybrid Physical Topologies (continued)
  • 10. 10 • More expensive than using either the star or, especially, the bus topology alone because it requires more cabling and potentially more connectivity devices • The star-wired bus topology forms the basis for modern Ethernet and Fast Ethernet networks Hybrid Physical Topologies (continued)
  • 11. 11 Backbone Networks • A network backbone is the cabling that connects the hubs, switches, and routers on a network • Backbones usually are capable of more throughput than the cabling that connects workstations to hubs
  • 12. 12 Backbone Networks (continued) • In networking, the term enterprise refers to an entire organization, including its local and remote offices, a mixture of computer systems, and a number of departments • The backbone is the most significant building block of enterprise-wide networks
  • 13. 13 • Serial Backbone • The simplest kind of backbone • It consists of two or more internetworking devices connected to each other by a single cable in a daisy-chain fashion • In networking, a daisy chain is simply a linked series of devices • Hubs and switches are often connected in a daisy chain to extend a network Backbone Networks (continued)
  • 14. 14 • Distributed Backbone • Consists of a number of connectivity devices connected to a series of central connectivity devices such as hubs, switches, or routers, in a hierarchy • This kind of topology allows for simple expansion and limited capital outlay for growth, because more layers of devices can be added to existing layers Backbone Networks (continued)
  • 15. 15 • A more complicated distributed backbone connects multiple LANs or LAN segments using routers • Provides network administrators with the ability to segregate workgroups and therefore manage them more easily Backbone Networks (continued)
  • 16. 16 • Collapsed Backbone • Uses a router or switch as the single central connection point for multiple subnetworks • A single router or switch is the highest layer of the backbone6 • The router or switch that makes up the collapsed backbone must contain multiprocessors to handle the heavy traffic going through it • This arrangement allows you to interconnect different types of subnetworks Backbone Networks (continued)
  • 17. 17 • Parallel Backbone • The most robust type of network backbone • The most significant advantage of using a parallel backbone is that its redundant (duplicate) links ensure network connectivity to any area of the enterprise • Parallel backbones are more expensive than other enterprise-wide topologies • They make up for the additional cost by offering increased performance and better fault tolerance Backbone Networks (continued)
  • 18. 18 Logical Topologies • Logical topology refers to the way in which data is transmitted between nodes • The most common logical topologies are bus and ring • In a bus logical topology, signals travel from one network device to all other devices on the network • In a ring logical topology signals follow a circular path between sender and receiver • Logical topologies is useful when troubleshooting and designing networks
  • 19. 19 Switching • A component of a network’s logical topology that determines how connections are created between nodes • There are three methods for switching: circuit switching, message switching, and packet switching
  • 20. 20 • Circuit Switching • A connection is established between two network nodes before they begin transmitting data • Bandwidth is dedicated to this connection and remains available until the users terminate communication between the two nodes • While the nodes remain connected, all data follows the same path initially selected by the switch Switching (continued)
  • 21. 21 • Message Switching • Establishes a connection between two devices, transfers the information to the second device, and then breaks the connection • The information is stored and forwarded from the second device once a connection between that device and a third device on the path is established Switching (continued)
  • 22. 22 • This “store and forward” routine continues until the message reaches its destination • Message switching requires that each device in the data’s path have sufficient memory and processing power to accept and store the information before passing it to the next node Switching (continued)
  • 23. 23 • Packet Switching is the most popular method for connecting nodes on a network • Breaks data into packets before they are transported • Packets can travel any path on the network to their destination • When packets reach their destination node, the node reassembles them based on their control information • Does not waste bandwidth by holding a connection open until a message reaches its destination Switching (continued)
  • 24. 24 Ethernet • Carrier Sense Multiple Access with Collision Detection (CSMA/CD) • The access method used in Ethernet • The term “Carrier Sense” refers to the fact that Ethernet NICs listen on the network and wait until they detect (or sense) that no other nodes are transmitting data over the signal (or carrier) on the communications channel before they begin to transmit
  • 25. 25 Ethernet (continued) • The term “Multiple Access” refers to the fact that several Ethernet nodes can be connected to a network and can monitor traffic, or access the media, simultaneously • The last part of the term CSMA/CD, “collision detection,” refers to the way nodes respond to a collision • When two transmissions interfere with each other; this is known as a collision
  • 26. 26 • The NIC will issue a special 32-bit sequence that indicates to the rest of the network nodes that the its previous transmission was faulty and that those data frames are invalid which is called jamming • A collision domain is the portion of a network in which collisions occur if two nodes transmit data at the same time • A data propagation delay is the length of time data takes to travel from one point on the segment to another point Ethernet (continued)
  • 27. 27 • Switched Ethernet • Traditional Ethernet LANs, called shared Ethernet, supply a fixed amount of bandwidth that must be shared by all devices on a segment, and all nodes on that segment belong to the same collision domain • Switched Ethernet enables multiple nodes to simultaneously transmit and receive data over different logical network segments • Using switched Ethernet increases the effective bandwidth of a network segment because fewer workstations must vie for the same time on the wire Ethernet (continued)
  • 28. 28 • Ethernet Frames • Ethernet networks may use one (or a combination) of four kinds of data frames: Ethernet_802.2 (“Raw”), Ethernet_802.3 (“Novell proprietary”), Ethernet_II (“DIX”), and Ethernet_SNAP • Each frame type differs slightly in the way it codes and decodes packets of data traveling from one device to another Ethernet (continued)
  • 29. 29 • Using and Configuring Frames • You can use multiple frame types on a network, but you cannot expect interoperability between the frame types • Frame types are typically specified through a device’s NIC configuration software • Most NICs can automatically sense what types of frames are running on a network and adjust themselves to that specification which is a feature is called autodetect, or autosense Ethernet (continued)
  • 30. 30 • The preamble signals to the receiving node that data is incoming and indicates when the data flow is about to begin • The start-of-frame delimiter (SFD) identifies where the data field begins Ethernet (continued)
  • 31. 31 • Each Ethernet frame also contains a 14-byte header, which includes a destination address, a source address, and an additional field that varies in function and size, depending on the frame type • The extra bytes are known as padding and have no significance other than to fill out the frame • Ethernet_II (“DIX”) and Ethernet_SNAP • An Ethernet frame type developed by DEC, Intel, and Xerox (abbreviated as DIX) before the IEEE began to standardize Ethernet Ethernet (continued)
  • 32. 32 • Ethernet_II frame type contains a 2-byte type field. This type field identifies the Network layer protocol (such as IP,ARP, RARP, or IPX) contained in the frame • The Ethernet_SNAP standard calls for additional control fields • Ethernet_SNAP frames allow less room for data Ethernet (continued)
  • 33. 33 • Power over Ethernet • Recently, IEEE has finalized a new standard, 802.3af, that specifies a method for supplying electrical power over Ethernet connections, also known as Power over Ethernet (PoE) • The PoE standard specifies two types of devices: power sourcing equipment (PSE) and powered devices (PDs) • Power sourcing equipment (PSE) • Powered devices (PDs) Ethernet (continued)
  • 34. 34 LocalTalk • LocalTalk is a network access method designed by Apple Computer, Inc. specifically for networking Macintosh computers • It provided a simple, cost-effective way of interconnecting Macintosh devices • LocalTalk uses a transmission method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) • LocalTalk relies on the AppleTalk protocol, but it may also support the Macintosh version of TCP/IP called MacTCP
  • 35. 35 Token Ring • A network technology first developed by IBM in the 1980s • Token Ring networks have traditionally been more expensive to implement than Ethernet networks • The 100-Mbps Token Ring standard, finalized in 1999, is known as High-Speed Token Ring (HSTR) • In token passing, a 3-byte packet, called a token, is transmitted from one node to another in a circular fashion around the ring • The active monitor maintains the timing for ring passing
  • 36. 36 • Token Ring Switching • Token Ring networks can take advantage of switching to better utilize limited bandwidth • A Token Ring switch can subdivide a large network ring into several smaller network rings • Token Ring technology does not allow collisions Token Ring (continued)
  • 37. 37 • Token Ring Frames • Token Ring networks may use one of two types of frames: the IEEE 802.5 or the IBM Token Ring frame • Every Token Ring frame includes Start Delimiter (SD), Access Control (AC), and End Delimiter (ED) fields • Token Ring frames use a Frame Status (FS) to provide low-level acknowledgment that the frame was received whole Token Ring (continued)
  • 38. 38 • A network technology whose standard was originally specified by ANSI in the mid-1980s and later refined by ISO • FDDI (pronounced “fiddy”) uses a double ring of multimode or single mode fiber to transmit data at speeds of 100 Mbps • FDDI is more reliable and more secure than transmission methods that depend on copper wiring • FDDI works well with Ethernet 100BaseTX technology • FDDI technology has a high cost relative to Fast Ethernet Fiber Distributed Data Interface (FDDI)
  • 39. 39 Asynchronous Transfer Mode (ATM) • An ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing • ATM may run over fiber-optic or CAT 5 or higher UTP or STP cable • In ATM, a packet is called a cell and always consists of 48 bytes of data plus a 5-byte header • ATM technology is that it relies on virtual circuits • ATM a connection-oriented technology using virtual circuits
  • 40. 40 ATM (continued) • Establishing a reliable connection allows ATM to guarantee a specific Quality of Service (QoS) for certain transmissions • QoS is a standard that specifies that data will be delivered within a certain period of time after it is sent • ATM networks can be integrated with Ethernet or Token Ring networks through the use of LAN Emulation (LANE)
  • 41. 41 Wireless Networks • Each wireless technology is defined by a standard that describes unique functions at both the Physical and the Data Link layers of the OSI Model • These standards differ in their specified signaling methods, geographic ranges, and frequency usages, among other things. • The most popular wireless standards used on contemporary LANs are those developed by IEEE’s 802.11 committee
  • 42. 42 • 802.11 Another name for Wireless Local Area Networks (WLAN) standards committee • Access Method • 802.11 standards specify the use of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to access a shared medium • Use of ACK packets to verify every transmission • RTS/CTS enables a source node to issue an RTS signal to an access point requesting the exclusive opportunity to transmit Wireless Networks (continued)
  • 43. 43 • Association • In the context of wireless networking, communication that occurs between a station and an access point to enable the station to connect to the network via that access point • As long as a station is on and has its wireless protocols running, it periodically surveys its surroundings for evidence of an access point, a task known as scanning Wireless Networks (continued)
  • 44. 44 • There are two types of scanning: active and passive • In active scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range • In passive scanning, a wireless station listens on all channels within its frequency range for a special signal, known as a beacon frame, issued from an access point • Service Set Identifier (SSID), a unique character string used to identify an access point • A station might choose a different access point through a process called re-association Wireless Networks (continued)
  • 45. 45 • Frames • For each function, the 802.11 standard specifies a frame type at the MAC sublayer • These multiple frame types are divided into three groups: management, control and data • Management frames are those involved in association and re-association, such as the probe and beacon frames • Control frames are those related to medium access and data delivery, such as the ACK and RTS/CTS frames • Data frames are those that carry the data sent between stations Wireless Networks (continued)
  • 46. 46 • 802.11b • Also known as “Wi-Fi,” for Wireless Fidelity • Uses direct sequence spread spectrum (DSSS) signaling • 802.11b was the first to take hold and remains the most popular • It is also the least expensive of all the 802.11 WLAN technologies Wireless Networks (continued)
  • 47. 47 • 802.11a • 802.11a’s high throughput is attributable to its use of higher frequencies, its unique method of encoding data, and more available bandwidth • Higher frequency signals require more power to transmit and travel shorter distances than lower frequency signals • The additional access points, as well as the nature of 802.11a equipment, make this standard more expensive than either 802.11b or 802.11g Wireless Networks (continued)
  • 48. 48 • 802.11g • 802.11g benefits from being compatible with 802.11b networks • 802.11g has high throughput • 802.11g’s compatibility with the more established 802.11b has caused many network managers to choose it over 802.11a, despite 802.11a’s comparative advantages • Laptops could roam between the ranges of the 802.11b and 802.11g access points without an interruption in service Wireless Networks (continued)
  • 49. 49 • Bluetooth • Bluetooth is a mobile wireless networking standard that uses DSSS signaling in the 2.4-GHz band to achieve a maximum theoretical throughput of 1 Mbps • Bluetooth was designed to be used on small networks composed of personal communications devices, also known as personal area networks (PANs) • Bluetooth’s low throughput and short range makes it impractical for business LANs. Wireless Networks (continued)
  • 50. 50 • HomeRF • HomeRF is a wireless networking specification developed by the HomeRF Working Group • The most unique aspect of the HomeRF standard is that it was designed to allow both traditional telephone signals and data signals to be exchanged over the same wireless network • Its working group was disbanded in January 2003 Wireless Networks (continued)
  • 51. 51 Summary • Basic and hybrid LAN physical topologies, and their uses, advantages, and disadvantages • Describe the backbone structures • Compared the different types of switching used in data transmission
  • 52. 52 Summary (continued) • Transmission methods underlying Ethernet, LocalTalk, Token Ring, FDDI, and ATM networks • Characteristics of different wireless network technologies, including the three IEEE 802.11 standards