The document discusses computer networks and networking concepts. It covers topics like network components, types of networks, network topologies including bus and ring topologies, and networking technologies like switches, routers, hubs, and servers. It also discusses internet-related topics such as the difference between the internet, intranet and extranet, and applications of extranets. The document appears to be teaching materials for a course on computer networks and internet technologies.
Computer Networking (Growth of number & power of computers is driving need for interconnection)
introduction, classification. Network Topology (The geometric structure of the interconnections among the participating computers and devices in the network)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
All but the most basic of networks require devices to provide connectivity and functionality. Understanding how these networking devices operate and identifying the tasks they perform are important skills for any network administrator and requirements for a Network+ candidate.
This brief guide introduces usually used networking devices that you may encounter in your career as Network Administrator. This guide is also useful for BCS students and for passionate network learners.
Computer Networking (Growth of number & power of computers is driving need for interconnection)
introduction, classification. Network Topology (The geometric structure of the interconnections among the participating computers and devices in the network)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
All but the most basic of networks require devices to provide connectivity and functionality. Understanding how these networking devices operate and identifying the tasks they perform are important skills for any network administrator and requirements for a Network+ candidate.
This brief guide introduces usually used networking devices that you may encounter in your career as Network Administrator. This guide is also useful for BCS students and for passionate network learners.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Enterprise or campus networks are usually large in size and are difficult to manage. Network administrators are required to frequently perform deliberate changes according to the organizational needs. VLANs are broadly used in enterprise or campus networks to improve scalability, flexibility, ease of management, and to reduce broadcast. Therefore it’s providing layer_2 security as it limits the number of the broadcast domains. Nowadays in this fast-growing industrial age, every company needs the speed of data transfer from one network to another network in manufacturing to cope up with the customer’s requirements. The basic objective of our project is to develop a versatile and low-cost INTER-VLAN-ROUTING which can be utilized in any industry or campus to eliminate this problem. INTER VLAN increases the performance of the network by providing flexibility to the users to log in to any network within the same group without changing their IP address. This also reduces complexity and it also cost-effective
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
Power Point Presentation on Computer Networking - Assignment on Networking Module of QA - Software Tester Course - Provided by Shift Education of Technology
Fundamentals of Computer Networking - Rafael SA
This presentation incorporates subjects such as TCP/IP, Networks Classification, OSI Model, DHCP, DNS Protocols and IPv4 and IPv6 Addressing schemes and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Enterprise or campus networks are usually large in size and are difficult to manage. Network administrators are required to frequently perform deliberate changes according to the organizational needs. VLANs are broadly used in enterprise or campus networks to improve scalability, flexibility, ease of management, and to reduce broadcast. Therefore it’s providing layer_2 security as it limits the number of the broadcast domains. Nowadays in this fast-growing industrial age, every company needs the speed of data transfer from one network to another network in manufacturing to cope up with the customer’s requirements. The basic objective of our project is to develop a versatile and low-cost INTER-VLAN-ROUTING which can be utilized in any industry or campus to eliminate this problem. INTER VLAN increases the performance of the network by providing flexibility to the users to log in to any network within the same group without changing their IP address. This also reduces complexity and it also cost-effective
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
Power Point Presentation on Computer Networking - Assignment on Networking Module of QA - Software Tester Course - Provided by Shift Education of Technology
Fundamentals of Computer Networking - Rafael SA
This presentation incorporates subjects such as TCP/IP, Networks Classification, OSI Model, DHCP, DNS Protocols and IPv4 and IPv6 Addressing schemes and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
3. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Computer Networks and Internet Technology
• Introduction to Computer Networks,
• Networking components,
• Classification and types of Networks,
• Network Topologies
• Overview with Advantages and Disadvantages, Communication Channels,
• Client Server Architecture,
• LAN concepts,
• Introduction to Internet (History, Concepts, & Myths),
• Difference between Internet, Intranet and Extranet,
• Domain Name Service,
• Internet Protocols and Addressing,
• Services of Internet,
• Internet and Support Technologies,
• Censorship and Privacy issues
4. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Introduction
• A computer network is a group of
computer systems and other computing
hardware devices that are linked together
through communication channels to
facilitate communication and resource-
sharing among a wide range of users.
Networks are commonly categorized
based on their characteristics.
5. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
5
To separate / connect one corporate division with
another.
To connect two LANs with different protocols.
To connect a LAN to the Internet.
To break a LAN into segments to relieve traffic
congestion.
To provide a security wall between two different types
of users.
Why Interconnect?
9. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network Interface Cards
A network card, network
adapter or NIC (network
interface card) is a piece of
computer hardware
designed to allow
computers to communicate
over a computer network. It
provides physical access to
a networking medium and
often provides a low-level
addressing system through
the use of MAC addresses.
It allows users to connect to
each other either by using
cables or wirelessly.
10. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
HUB
A hub interconnects two or
more workstations into a
local area network.
When a workstation
transmits to a hub, the hub
immediately resends the
data frame out all
connecting links.
A hub can be managed or
unmanaged. A managed
hub possesses enough
processing power that it
can be managed from a
remote location
11. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Bridge
A bridge (or bridge-like device) can be
used to connect two similar LANs,
such as two CSMA/CD LANs.
A bridge can also be used to connect
two closely similar LANs, such as a
CSMA/CD LAN and a token ring
LAN.
The bridge examines the destination
address in a frame and either forwards
this frame onto the next LAN or does
not.
The bridge examines the source
address in a frame and places this
address in a routing table, to be used
for future routing decisions
12. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Transparent Bridge
A transparent bridge does not need
programming but observes all traffic
and builds routing tables from this
observation.
This observation is called backward
learning.
Each bridge has two connections
(ports) and there is a routing table
associated with each port.
A bridge observes each frame that
arrives at a port, extracts the source
address from the frame, and places that
address in the port’s routing table.
A transparent bridge is found with
CSMA/CD (Carrier Sense Multiple
Access with collision Detection)
LANs
13. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
13
A transparent bridge can also convert one frame format to
another, but this does not happen too often anymore since
most networks are CSMA/CD.
Note that some people / manufacturers call a bridge such as
this a gateway or sometimes a router.
The bridge removes the headers and trailers from one
frame format and inserts (encapsulates) the headers and
trailers for the second frame format.
Transparent Bridges
14. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Remote Bridges
A remote bridge is capable of
passing a data frame from one
local area network to another
when the two LANs are separated
by a long distance and there is a
wide area network connecting the
two LANs.
A remote bridge takes the frame
before it leaves the first LAN and
encapsulates the WAN headers
and trailers.
When the packet arrives at the
destination remote bridge, that
bridge removes the WAN headers
and trailers leaving the original
frame.
15. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
15
A remote bridge is capable of passing a data frame
from one local area network to another when the two
LANs are separated by a long distance and there is a
wide area network connecting the two LANs.
A remote bridge takes the frame before it leaves the
first LAN and encapsulates the WAN headers and
trailers.
When the packet arrives at the destination remote
bridge, that bridge removes the WAN headers and
trailers leaving the original frame.
Remote Bridges
17. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Switches
The switch support multiple data transfers at one
time.
A switch that employs cut-through architecture is
passing on the frame before the entire frame has
arrived at the switch.
Multiple workstations connected to a switch use
dedicated segments. This is a very efficient way to
isolate heavy users from the network.
A switch can allow simultaneous access to multiple
servers, or multiple simultaneous connections to a
single server.
18. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
18
Whether shared or dedicated segments are
involved, the primary goal of a switch is to
isolate a particular pattern of traffic from other
patterns of traffic or from the remainder of the
network
Switches, because of their backplane, can also
allow multiple paths of communications to
simultaneously occur
Isolating Traffic Patterns with Switches
21. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
21
Isolating Traffic Patterns
with Switches
Using a pair of routers, it is possible to
interconnect to switched segments,
essentially creating one large local
area network
23. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
A full duplex switch allows for simultaneous
transmission and reception of data to and from a
workstation.
This full duplex connection helps to eliminate
collisions.
To support a full duplex connection to a switch, at least
two pairs of wires are necessary - one for the receive
operation and one for the transmit operation. Most
people install four pairs today, so wiring is not the
problem.
Full Duplex Switches
25. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network servers
Network servers provide the
storage necessary for LAN
software.
They are usually the focal
point for the network operating
system.
Increasingly, network servers
are functioning as bridges,
switches, and routers. By
adding the appropriate card, a
server can assume multiple
functions.
26. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Routers
The device that connects a LAN to a
WAN or a WAN to a WAN.
A router accepts an outgoing packet,
removes any LAN headers and trailers,
and encapsulates the necessary WAN
headers and trailers.
Because a router has to make wide area
network routing decisions, the router
has to dig down into the network layer
of the packet to retrieve the network
destination address.
Thus, routers are often called “layer 3
devices”. They operate at the third
layer, or OSI network layer, of the
packet.
Routers often incorporate firewall
functions.
27. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Server
A server is a powerful computer that provides one or more services to a
network and its users.
On a local area network services will include: managing user accounts to
enable users to log in to the network, running software, enabling saving
to a shared area, printing and access to the internet.
Servers are left on at all times and are not used by individuals on a day-
to-day basis.
28. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Internetwork
• Two or more networks or network segments
connected using devices that operate at layer 3
(the 'network' layer) of the OSI Basic Reference
Model, such as a router. Any interconnection
among or between public, private, commercial,
industrial, or governmental networks may also be
defined as an internetwork.
• The interconnected networks use the Internet
Protocol. There are at least three variants of
internetwork, depending on who administers and
who participates in them:
• Internet
• Intranet
• Extranet 28
29. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Internet
The Internet is a
collection of
interconnected computer
networks, linked by
copper wires, fiber-optic
cables, wireless
connections, etc.; in
contrast, the Web is a
collection of
interconnected
documents and other
resources, linked by
hyperlinks and URLs.
Network of networks.
30. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Intranet
An intranet is a set of
interconnected networks,
using the Internet
Protocol and uses IP-
based tools such as web
browsers, that is under
the control of a single
administrative entity.
That administrative entity
closes the intranet to the
rest of the world, and
allows only specific
users. Most commonly,
an intranet is the internal
network of a company or
other enterprise
31. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Extranet
An extranet is a network or
internetwork that is limited in scope
to a single organization or entity but
which also has limited connections
to the networks of one or more
other usually, but not necessarily,
trusted organizations or entities
(e.g. a company's customers may
be given access to some part of its
intranet creating in this way an
extranet, while at the same time the
customers may not be considered
'trusted' from a security standpoint).
Technically, an extranet may also
be categorized as a CAN, MAN,
WAN, or other type of network,
although, by definition, an extranet
cannot consist of a single LAN; it
must have at least one connection
with an external network.
32. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Applications of an Extranet
• Extranets can be used for a wide variety of
applications. Educational institutions, medical facilities,
and military bases often include extranets in order to
secure confidential information while still allowing
users to access the Internet. For example, a school is
likely to use an extranet in order to allow teachers and
other moderators to make changes to a specific
section of the school website. Because extranets have
access to the Internet, teachers are able to modify
these sections from not only their classroom, but also
from home or another location. As was mentioned
earlier, companies are also likely to have an extranet
in order for changes to be made while employees are
away from the office.
33. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages and Disadvantages of Extranet
Advantages
•
Extranets are able to transfer
large amounts of information.
• Are also able to provide a
secure location in which a
company and its partners or
clients are able to
communicate with each other
or make transaction.
• Are also able to communicate
with other extranets, many
individuals and groups alike
can exchange information at
the same time.
Disadvantages
• Extranets are not as secure as
intranets are because they are
connected to the Internet.
• This can allow hackers and thieves to
break into the network and steal or
overhear valuable or confidential
information.
• Extranets are also very expensive to
maintain as the company must pay for
hardware, software, training, and other
costs associated with extranets.
• Fortunately, third party vendors such
as an application service provider may
be able to reduce these costs
significantly.
•
34. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network topology
• It is the study of the arrangement or mapping of
the elements (links, nodes, etc.) of a network,
especially the physical (real) and logical (virtual)
interconnections between nodes.
• A local area network (LAN) is one example of a
network that exhibits both a physical topology
and a logical topology.
• Any given node in the LAN will have one or more
links to one or more other nodes in the network
and the mapping of these links and nodes onto a
graph results in a geometrical shape that
determines the physical topology of the network.
• The physical and logical topologies might be
identical in any particular network but they also
may be different.
34
35. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Any particular network topology is determined
only by the graphical mapping of the
configuration of physical and/or logical
connections between nodes .
• Network Topology is, therefore, technically a
part of graph theory. Distances between
nodes, physical interconnections, transmission
rates, and/or signal types may differ in two
networks and yet their topologies may be
identical.
35
38. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
• When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
• The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
• The configuration of a bus topology is quite simpler as compared to other
topologies.
• The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
• The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
39. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• CSMA: It is a media access control used to control the data flow so
that data integrity is maintained, i.e., the packets do not get lost.
There are two alternative ways of handling the problems that occur
when two nodes send the messages simultaneously.
• CSMA CD: CSMA CD (Collision detection) is an access method
used to detect the collision. Once the collision is detected, the
sender will stop transmitting the data. Therefore, it works on
"recovery after the collision".
• CSMA CA: CSMA CA (Collision Avoidance) is an access method
used to avoid the collision by checking whether the transmission
media is busy or not. If busy, then the sender waits until the media
becomes idle. This technique effectively reduces the possibility of
the collision. It does not work on "recovery after the collision".
40. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages
• Low-cost cable: In bus topology,
nodes are directly connected to the
cable without passing through a hub.
Therefore, the initial cost of installation
is low.
• Moderate data speeds: Coaxial or
twisted pair cables are mainly used in
bus-based networks that support upto
10 Mbps.
• Familiar technology: Bus topology is
a familiar technology as the installation
and troubleshooting techniques are
well known, and hardware components
are easily available.
• Limited failure: A failure in one node
will not have any effect on other
nodes.
Disadvantages
• Extensive cabling: A bus topology is quite
simpler, but still it requires a lot of cabling.
• Difficult troubleshooting: It requires
specialized test equipment to determine the
cable faults. If any fault occurs in the cable,
then it would disrupt the communication for
all the nodes.
• Signal interference: If two nodes send the
messages simultaneously, then the signals
of both the nodes collide with each other.
• Reconfiguration difficult: Adding new
devices to the network would slow down the
network.
• Attenuation: Attenuation is a loss of signal
leads to communication issues. Repeaters
are used to regenerate the signal.
42. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will
retransmit to the next node.
• The data flows in one direction, i.e., it is unidirectional.
• The data flows in a single loop continuously known as an endless
loop.
• It has no terminated ends, i.e., each node is connected to other
node and having no termination point.
• The data in a ring topology flow in a clockwise direction.
• The most common access method of the ring topology is token
passing.
• Token passing: It is a network access method in which token is passed
from one node to another node.
• Token: It is a frame that circulates around the network.
43. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Working of Token passing
• A token moves around the network, and it is
passed from computer to computer until it
reaches the destination.
• The sender modifies the token by putting the
address along with the data.
• The data is passed from one device to another
device until the destination address matches.
Once the token received by the destination
device, then it sends the acknowledgment to the
sender.
• In a ring topology, a token is used as a carrier.
44. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages of Ring
topology:
• Network Management: Faulty devices can
be removed from the network without bringing
the network down.
• Product availability: Many hardware and
software tools for network operation and
monitoring are available.
• Cost: Twisted pair cabling is inexpensive and
easily available. Therefore, the installation
cost is very low.
• Reliable: It is a more reliable network
because the communication system is not
dependent on the single host computer.
Disadvantages of Ring topology:
• Difficult troubleshooting: It requires
specialized test equipment to determine the
cable faults. If any fault occurs in the cable,
then it would disrupt the communication for all
the nodes.
• Failure: The breakdown in one station leads
to the failure of the overall network.
• Reconfiguration difficult: Adding new
devices to the network would slow down the
network.
• Delay: Communication delay is directly
proportional to the number of nodes. Adding
new devices increases the communication
delay.
46. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• Star topology is an arrangement of the network in which every
node is connected to the central hub, switch or a central
computer.
• The central computer is known as a server, and the peripheral
devices attached to the server are known as clients.
• Coaxial cable or RJ-45 cables are used to connect the
computers.
• Hubs or Switches are mainly used as connection devices in
a physical star topology.
• Star topology is the most popular topology in network
implementation.
47. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages of Star topology
• Efficient troubleshooting: Troubleshooting is quite efficient in a star
topology as compared to bus topology. In a bus topology, the
manager has to inspect the kilometers of cable. In a star topology, all
the stations are connected to the centralized network. Therefore, the
network administrator has to go to the single station to troubleshoot
the problem.
• Network control: Complex network control features can be easily
implemented in the star topology. Any changes made in the star
topology are automatically accommodated.
• Limited failure: As each station is connected to the central hub with
its own cable, therefore failure in one cable will not affect the entire
network.
• Familiar technology: Star topology is a familiar technology as its
tools are cost-effective.
• Easily expandable: It is easily expandable as new stations can be
added to the open ports on the hub.
• Cost effective: Star topology networks are cost-effective as it uses
inexpensive coaxial cable.
• High data speeds: It supports a bandwidth of approx 100Mbps.
Ethernet 100BaseT is one of the most popular Star topology
networks.
Disadvantages of Star
topology
• A Central point of
failure: If the central hub
or switch goes down,
then all the connected
nodes will not be able to
communicate with each
other.
• Cable: Sometimes cable
routing becomes difficult
when a significant
amount of routing is
required.
49. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Tree Topology
• Tree topology combines the characteristics of bus topology and
star topology.
• A tree topology is a type of structure in which all the computers
are connected with each other in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and
all other nodes are the descendants of the root node.
• There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.
50. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• Advantages of Tree topology
• Support for broadband
transmission: Tree topology is mainly used
to provide broadband transmission, i.e.,
signals are sent over long distances without
being attenuated.
• Easily expandable: We can add the new
device to the existing network. Therefore,
we can say that tree topology is easily
expandable.
• Easily manageable: In tree topology, the
whole network is divided into segments
known as star networks which can be easily
managed and maintained.
• Error detection: Error detection and error
correction are very easy in a tree topology.
• Limited failure: The breakdown in one
station does not affect the entire network.
• Point-to-point wiring: It has point-to-point
wiring for individual segments.
• Disadvantages of Tree topology
• Difficult troubleshooting: If any
fault occurs in the node, then it
becomes difficult to troubleshoot
the problem.
• High cost: Devices required for
broadband transmission are very
costly.
• Failure: A tree topology mainly
relies on main bus cable and
failure in main bus cable will
damage the overall network.
• Reconfiguration difficult: If new
devices are added, then it
becomes difficult to reconfigure.
52. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections.
• There are multiple paths from one computer to another computer.
• It does not contain the switch, hub or any central computer which
acts as a central point of communication.
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
• Where n is the number of nodes that represents the network.
53. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Mesh Topolog
• Mesh topology is divided into two
categories:
• Fully connected mesh topology
• Partially connected mesh topology
• Full Mesh Topology: In a full mesh
topology, each computer is connected to
all the computers available in the network.
• Partial Mesh Topology: In a partial mesh
topology, not all but certain computers are
connected to those computers with which
54. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages of Mesh topology:
• Reliable: The mesh topology networks are
very reliable as if any link breakdown will not
affect the communication between connected
computers.
• Fast Communication: Communication is very
fast between the nodes.
• Easier Reconfiguration: Adding new devices
would not disrupt the communication between
other devices.
Disadvantages of Mesh topology
• Cost: A mesh topology contains a large
number of connected devices such as a router
and more transmission media than other
topologies.
• Management: Mesh topology networks are
very large and very difficult to maintain and
manage. If the network is not monitored
carefully, then the communication link failure
goes undetected.
• Efficiency: In this topology, redundant
connections are high that reduces the
efficiency of the network.
56. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The combination of various different topologies is known
as Hybrid topology.
• A Hybrid topology is a connection between different links and
nodes to transfer the data.
• When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are
connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.
57. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Advantages of Hybrid Topology
• Reliable: If a fault occurs in any part of the network
will not affect the functioning of the rest of the
network.
• Scalable: Size of the network can be easily
expanded by adding new devices without affecting
the functionality of the existing network.
• Flexible: This topology is very flexible as it can be
designed according to the requirements of the
organization.
• Effective: Hybrid topology is very effective as it can
be designed in such a way that the strength of the
network is maximized and weakness of the network
is minimized.
• Disadvantages of Hybrid topology
• Complex design: The major drawback of the
Hybrid topology is the design of the Hybrid
network. It is very difficult to design the
architecture of the Hybrid network.
• Costly Hub: The Hubs used in the Hybrid
topology are very expensive as these hubs
are different from usual Hubs used in other
topologies.
• Costly infrastructure: The infrastructure cost
is very high as a hybrid network requires a lot
of cabling, network devices, etc.
•
58. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network Model
• A communication subsystem is a complex piece of Hardware and
software. Early attempts for implementing the software for such
subsystems were based on a single, complex, unstructured
program with many interacting components. The resultant
software was very difficult to test and modify.
• To overcome such problem, the ISO has developed a layered
approach. In a layered approach, networking concept is divided
into several layers, and each layer is assigned a particular task.
• Therefore, we can say that networking tasks depend upon the
layers.
59. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Layered Architecture
• The main aim of the layered architecture is to divide the design into small pieces.
• Each lower layer adds its services to the higher layer to provide a full set of services
to manage communications and run the applications.
• It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
• It ensures the independence between layers by providing the services from lower to
higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.
• The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower to a
higher layer and hiding the details from the layers of how the services are
implemented.
60. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The basic elements of layered architecture are services,
protocols, and interfaces.
• Service: It is a set of actions that a layer provides to the higher layer.
• Protocol: It defines a set of rules that a layer uses to exchange the
information with peer entity. These rules mainly concern about both the
contents and order of the messages used.
• Interface: It is a way through which the message is transferred from one
layer to another layer.
• In a layer n architecture, layer n on one machine will
have a communication with the layer n on another
machine and the rules used in a conversation are known
as a layer-n protocol.
61. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• In case of layered architecture, no data is
transferred from layer n of one machine to layer n of
another machine. Instead, each layer passes the
data to the layer immediately just below it, until the
lowest layer is reached.
• Below layer 1 is the physical medium through which
the actual communication takes place.
• In a layered architecture, unmanageable tasks are
divided into several small and manageable tasks.
• The data is passed from the upper layer to lower
layer through an interface. A Layered architecture
provides a clean-cut interface so that minimum
information is shared among different layers. It also
ensures that the implementation of one layer can be
easily replaced by another implementation.
• A set of layers and protocols is known as network
architecture.
62. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Why do we require Layered architecture?
• Divide-and-conquer approach: Divide-and-conquer approach makes a
design process in such a way that the unmanageable tasks are divided into
small and manageable tasks. In short, we can say that this approach
reduces the complexity of the design.
• Modularity: Layered architecture is more modular. Modularity provides the
independence of layers, which is easier to understand and implement.
• Easy to modify: It ensures the independence of layers so that
implementation in one layer can be changed without affecting other layers.
• Easy to test: Each layer of the layered architecture can be analyzed and
tested individually.
63. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
OSI Model
• OSI stands for Open System Interconnection is a reference model that describes how
information from a software
• application in one computer
• moves through a physical medium to the software application in another computer.
• OSI consists of seven layers, and each layer performs a particular network function.
• OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
• OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
• Each layer is self-contained, so that task assigned to each layer can be performed
independently.
64. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The OSI model is divided into two layers:
upper layers and lower layers.
• The upper layer of the OSI model mainly
deals with the application related issues, and
they are implemented only in the software.
The application layer is closest to the end
user. Both the end user and the application
layer interact with the software applications.
An upper layer refers to the layer just above
another layer.
• The lower layer of the OSI model deals with
the data transport issues. The data link layer
and the physical layer are implemented in
hardware and software. The physical layer is
the lowest layer of the OSI model and is
closest to the physical medium. The physical
layer is mainly responsible for placing the
information on the physical medium.
65. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
67. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Application Layer: This layer is responsible for providing interface to the application user. This layer
encompasses protocols which directly interact with the user.
• Presentation Layer: This layer defines how data in the native format of remote host should be
presented in the native format of host.
• Session Layer: This layer maintains sessions between remote hosts. For example, once
user/password authentication is done, the remote host maintains this session for a while and does
not ask for authentication again in that time span.
• Transport Layer: This layer is responsible for end-to-end delivery between hosts.
• Network Layer: This layer is responsible for address assignment and uniquely addressing hosts in a
network.
• Data Link Layer: This layer is responsible for reading and writing data from and onto the line. Link
errors are detected at this layer.
• Physical Layer: This layer defines the hardware, cabling wiring, power output, pulse rate etc.
69. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Internet Model
• Internet uses TCP/IP protocol suite, also
known as Internet suite. This defines
Internet Model which contains four layered
architecture. OSI Model is general
communication model, but Internet Model
is what the internet uses for all its
communication. The internet is
independent of its underlying network
architecture so is its Model.
70. AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
TCP/IP
• Application Layer: This layer defines the protocol which
enables user to interact with the network.For example,
FTP, HTTP etc.
• Transport Layer: This layer defines how data should flow
between hosts. Major protocol at this layer is Transmission
Control Protocol (TCP). This layer ensures data delivered
between hosts is in-order and is responsible for end-to-end
delivery.
• Internet Layer: Internet Protocol (IP) works on this layer.
This layer facilitates host addressing and recognition. This
layer defines routing.
• Link Layer: This layer provides mechanism of sending and
receiving actual data. Unlike its OSI Model counterpart, this
layer is independent of underlying network architecture and
hardware.