SlideShare une entreprise Scribd logo
1  sur  6
Lecture 2
Transmission Rate: The amount of data transferred per unit time from source to
destination is called as transmission rate. Remember one thing, that the transmission rate
is the property of machine (the rate at which machine is sending). Units are bits/sec.

Propagation Delay: The amount of time taken per unit time, for the data to reach the
destination and acknowledgment to come back to the source is called as propagation
delay. Units are sec.

Data Rate or Channel Capacity or Link Capacity: The amount of data per unit time
which the medium is sending or transmitting through itself is called as Data Rate. Units
are bits/sec. Remember that Data Rate or channel capacity is the property of medium and
not of the machine. We will discuss later about the mathematical formulae given by
Nyquist to calculate the data rate or channel capacity of a noiseless medium and another
formulae by Shannon, called as Shannon channel capacity, which calculates the data rate
for a noisy medium.

Topology: Topology is defined as how the nodes in a network are physically placed.

Key Elements of a LAN
      The key elements of a LAN are
   1. Topology
   2. Transmission Medium
   3. Medium Access Control

Together these elements decide the cost and capacity of the LAN, but also the type of
data that can be transmitted, the speed and efficiency of applications.

In terms of communication network, topology is defined as the way nodes or systems in a
network are physically laid out. The common topologies for LAN are bus, tree, ring, star
and mesh.

Classification of Distance on the basis of Physical Layout or topology
There are five possible classifications on the basis of topology or physical layout.
   1. Bus
   2. Star
   3. Ring
   4. Mesh

Bus Topology
         Bus topology is characterized by the use of multipoint medium. In bus topology,
all stations attach through appropriate hardware interfacing known as tap, to the
transmission medium as shown in figure below.
A transmission from any station propagates the length of the medium in both the
directions and can be received by all other stations in the network. At each end of the bus
is a terminator, which absorbs any signal, and thus removing it from the bus.

In bus topology, any transmission made, will propagate through the medium and will be
received by all stations in the network, so we require some way of indicating for whom
the transmission is intended, i.e. who is the intended recipient. To solve this problem,
station transmits in small blocks, called as frames, and each frame contains the date and
frame header. Each station has a physical address, and this physical address is included in
the frame header. The transmission happens as shown below.




There is another problem associated with the bus topology, and it is controlling the access
of the medium i.e. Medium Access Control. If two stations wish to transmit at the same
moment of time, then their frames will collide and hence garbled up. So some mechanism
is needed for controlling the access of medium among the stations. This we will discuss
later in MAC.
Tree Topology
        Actually bus is a special case of tree, with only one trunk and no branches. The
transmission medium is a branching cable with no closed loops as shown in the figure
below. The tree layout begins at a point known as headend. One or more cables start at
the headend, and each of these may have branches. As with the bus, transmission from
any station will propagate throughout the medium, received by all the stations and finally
at each end there are terminators, which absorb the signals.




In bus topology, any transmission made, will propagate through the medium and will be
received by all stations in the network, so we require some way of indicating for whom
the transmission is intended, i.e. who is the intended recipient. To solve this problem,
station transmits in small blocks, called as frames, and each frame contains the date and
frame header. Each station has a physical address, and this physical address is included in
the frame header.

Transmission Media for Bus LANs
There are four possible alternatives that can be used for Bus LANs
   1. Twisted Pair:
   2. Baseband Coaxial Cable
   3. Broadband Coaxial Cable
   4. Optical Fiber

Ring Topology
        In ring topology, the network consists of stations joined together in a ring like
fashion through point-to-point links. These links are unidirectional i.e. data circulate
around the ring in one direction. In ring topology token passing technique is used. a
special control frame called as token. Generally this token propagates around the logical
ring, with only the token holder being permitted to transmit frame. Since only one station
can hold the token at a time, and there is only one token in the ring, no collisions can
occur. This access method is called as token passing. After a station get hold of the
token, he starts transmitting the data. A token with the data is known as frame, so a frame
is placed on the transmission medium, which also contains the address of intended
recipient. All the station in the network can receive the packet, but only intended receipt
will copy the contents of the frame, and finally when the frame reaches again to the
source, he removes the data from the frame.
The above diagram shows, how frame transmission happens in the case of ring LAN.


Star Topology
        In the star LAN topology, each station is directly connected to a common central
node. Each station attaches to a central node via two point-to-point links, one for
transmission and one for reception. The central node act as frame switching device. An
incoming frame is buffered in the central node and then retransmitted on an outgoing link
to the destination station.
Mesh Topology
   There is another topology, in which each computer is directly connected to every other
computer in the network; such a topology is called as mesh topology.
The only disadvantage with Mesh topology is that lots of wires are required whereas
there are lots of advantages.
    1. No central dependency.
    2. Data can be transmitted directly from one computer to another computer or
        indirectly if any link is broken. So this means Mesh topology is reliable and
        robust also compared to other topologies.

For more discussion on LAN topology refer to Brendan Tangney.
You should be able to answer the following question.
What is the difference between various topologies, and also you should be able to write
short notes on each topology, covering every point.

Classification of Network on the basis of Distance
There are three classification of LAN on the basis of distance
       1. LAN
       2. MAN
       3. WAN

LAN: LAN is an acronym for Local Area Network. A LAN is a kind of network, where
the network spans within a range of certain Km, in other words network is local. For
Example: Computers communicated to each other in a lab forms a LAN. Infact multiple
departmental labs in a campus or university connected to each other form a network of
LANs i.e. A campus, where computers in mechanical lab are connected with each other,
that may in turn be connected to computers civil engineering through a networking
device like bridge or switch or hub.
    1. So LAN means, connecting computers in local area.
    2. In LAN networking devices like hubs, repeaters or bridges are used.
    3. LAN topology generally consists of Bus and Ring.
    4. LAN forms a multipoint network.
    5. LAN topology has a major overhead of medium allocation, as LAN form a
        multipoint network which means, multiple devise share the network so who
        should gain access to the network (It’s obvious that all of them cannot access the
        network simultaneously). We will discuss this problem in detail later, and this
        problem is known as Medium Allocation Problem.




                                      Example of LAN

MAN: MAN is an acronym for Metropolitan Area Network. A MAN is a network, where
the network spans across the cities i.e. interconnecting cities. For example, an
organization has an office in Muscat and another office in salalah, so connecting the
computers of office in Muscat with the office in salalah forms a MAN.
1. So MAN means, connecting computers or network across cities.
   2. Routers are used for interconnecting networks present in two different cities.
   3. We are concerned about routing efficient strategies.

WAN: WAN is an acronym for Wide Area Network. A WAN is a network, where the
network spans across continents i.e. connecting countries. For example an organization
has one office in Oman, office in INDIA and another office in USA, so connecting the
computer of all the three offices together through a network is called as WAN.
    1. In WAN networking devices like routers and satellites are used.
    2. So WAN means, connecting computers or network across continents.
    3. WAN topology may consist of star, tree, mesh, satellite.




                                   Example of WAN
Subnet is the above diagram can be defined as a network which consist of routers, a
network that consist of network devices and helps in connecting two distant networks is
called as subnet.

Contenu connexe

Tendances

Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocolNowrinJahanSiam
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail descriptionBathshebaparimala
 
Line configuration
Line configurationLine configuration
Line configurationAshish Vats
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Topology
TopologyTopology
TopologyMaths
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topologySwarnima Tiwari
 

Tendances (20)

Topology
TopologyTopology
Topology
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
Topology
TopologyTopology
Topology
 
Line configuration
Line configurationLine configuration
Line configuration
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Topology
TopologyTopology
Topology
 
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
E04402030037
E04402030037E04402030037
E04402030037
 
Data communication q and a
Data communication q and aData communication q and a
Data communication q and a
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

En vedette

Java script objects 2
Java script objects 2Java script objects 2
Java script objects 2H K
 
Java script frame history
Java script frame historyJava script frame history
Java script frame historyH K
 
Set
SetSet
SetH K
 
Html basics 6 image
Html basics 6 imageHtml basics 6 image
Html basics 6 imageH K
 
Java script frame window
Java script frame windowJava script frame window
Java script frame windowH K
 
Html basics 11 form validation
Html basics 11 form validationHtml basics 11 form validation
Html basics 11 form validationH K
 
Solution2
Solution2Solution2
Solution2H K
 
Week5
Week5Week5
Week5H K
 
Lecture4 isoosi
Lecture4 isoosiLecture4 isoosi
Lecture4 isoosiH K
 
Assignment4
Assignment4Assignment4
Assignment4H K
 
Assignment sw
Assignment swAssignment sw
Assignment swH K
 
Lecture1 introductiontonetwork
Lecture1 introductiontonetworkLecture1 introductiontonetwork
Lecture1 introductiontonetworkH K
 
Html basics 3 font align
Html basics 3 font alignHtml basics 3 font align
Html basics 3 font alignH K
 
Html basics 1
Html basics 1Html basics 1
Html basics 1H K
 
Induction
InductionInduction
InductionH K
 
Html basics 10 form
Html basics 10 formHtml basics 10 form
Html basics 10 formH K
 
Html basics 7 table
Html basics 7 tableHtml basics 7 table
Html basics 7 tableH K
 
Week7
Week7Week7
Week7H K
 

En vedette (18)

Java script objects 2
Java script objects 2Java script objects 2
Java script objects 2
 
Java script frame history
Java script frame historyJava script frame history
Java script frame history
 
Set
SetSet
Set
 
Html basics 6 image
Html basics 6 imageHtml basics 6 image
Html basics 6 image
 
Java script frame window
Java script frame windowJava script frame window
Java script frame window
 
Html basics 11 form validation
Html basics 11 form validationHtml basics 11 form validation
Html basics 11 form validation
 
Solution2
Solution2Solution2
Solution2
 
Week5
Week5Week5
Week5
 
Lecture4 isoosi
Lecture4 isoosiLecture4 isoosi
Lecture4 isoosi
 
Assignment4
Assignment4Assignment4
Assignment4
 
Assignment sw
Assignment swAssignment sw
Assignment sw
 
Lecture1 introductiontonetwork
Lecture1 introductiontonetworkLecture1 introductiontonetwork
Lecture1 introductiontonetwork
 
Html basics 3 font align
Html basics 3 font alignHtml basics 3 font align
Html basics 3 font align
 
Html basics 1
Html basics 1Html basics 1
Html basics 1
 
Induction
InductionInduction
Induction
 
Html basics 10 form
Html basics 10 formHtml basics 10 form
Html basics 10 form
 
Html basics 7 table
Html basics 7 tableHtml basics 7 table
Html basics 7 table
 
Week7
Week7Week7
Week7
 

Similaire à Lecture2 networkclassification

Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Assignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxAssignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxIhtishamAhmad20
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptxEvadeDube
 
Types Of Networks
Types Of NetworksTypes Of Networks
Types Of Networksjia234
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptxkulmiye2
 
Data communication
Data communication Data communication
Data communication Awaisch3
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx14941
 
La3 Computer Network
La3 Computer NetworkLa3 Computer Network
La3 Computer NetworkCma Mohd
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network Sandeep Kumar
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notesDr.YNM
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer NetworksShohanaakterKakon
 
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxUnit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxgurjardeep68
 

Similaire à Lecture2 networkclassification (20)

Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Assignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxAssignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docx
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer Network
computer Networkcomputer Network
computer Network
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptx
 
Types Of Networks
Types Of NetworksTypes Of Networks
Types Of Networks
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Data communication
Data communication Data communication
Data communication
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
 
CN QNAs.pdf
CN QNAs.pdfCN QNAs.pdf
CN QNAs.pdf
 
La3 Computer Network
La3 Computer NetworkLa3 Computer Network
La3 Computer Network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
CN UNIT I.pptx
CN UNIT I.pptxCN UNIT I.pptx
CN UNIT I.pptx
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer Networks
 
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxUnit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
 

Plus de H K

Assignment4
Assignment4Assignment4
Assignment4H K
 
Assignment3
Assignment3Assignment3
Assignment3H K
 
Solution3
Solution3Solution3
Solution3H K
 
Mid-
Mid-Mid-
Mid-H K
 
Assignment4
Assignment4Assignment4
Assignment4H K
 
Dm assignment3
Dm assignment3Dm assignment3
Dm assignment3H K
 
Proof
ProofProof
ProofH K
 
Resolution
ResolutionResolution
ResolutionH K
 
Assignment description
Assignment descriptionAssignment description
Assignment descriptionH K
 
Dm assignment2
Dm assignment2Dm assignment2
Dm assignment2H K
 
Dm assignment1
Dm assignment1Dm assignment1
Dm assignment1H K
 
Logic
LogicLogic
LogicH K
 
Introduction
IntroductionIntroduction
IntroductionH K
 
Assignment 2 sol
Assignment 2 solAssignment 2 sol
Assignment 2 solH K
 
Assignment sw solution
Assignment sw solutionAssignment sw solution
Assignment sw solutionH K
 
Violinphoenix
ViolinphoenixViolinphoenix
ViolinphoenixH K
 
Ie project
Ie projectIe project
Ie projectH K
 
Assignment cn subnetting
Assignment cn subnettingAssignment cn subnetting
Assignment cn subnettingH K
 
Assignment uplaodfile
Assignment uplaodfileAssignment uplaodfile
Assignment uplaodfileH K
 
Assignment sw
Assignment swAssignment sw
Assignment swH K
 

Plus de H K (20)

Assignment4
Assignment4Assignment4
Assignment4
 
Assignment3
Assignment3Assignment3
Assignment3
 
Solution3
Solution3Solution3
Solution3
 
Mid-
Mid-Mid-
Mid-
 
Assignment4
Assignment4Assignment4
Assignment4
 
Dm assignment3
Dm assignment3Dm assignment3
Dm assignment3
 
Proof
ProofProof
Proof
 
Resolution
ResolutionResolution
Resolution
 
Assignment description
Assignment descriptionAssignment description
Assignment description
 
Dm assignment2
Dm assignment2Dm assignment2
Dm assignment2
 
Dm assignment1
Dm assignment1Dm assignment1
Dm assignment1
 
Logic
LogicLogic
Logic
 
Introduction
IntroductionIntroduction
Introduction
 
Assignment 2 sol
Assignment 2 solAssignment 2 sol
Assignment 2 sol
 
Assignment sw solution
Assignment sw solutionAssignment sw solution
Assignment sw solution
 
Violinphoenix
ViolinphoenixViolinphoenix
Violinphoenix
 
Ie project
Ie projectIe project
Ie project
 
Assignment cn subnetting
Assignment cn subnettingAssignment cn subnetting
Assignment cn subnetting
 
Assignment uplaodfile
Assignment uplaodfileAssignment uplaodfile
Assignment uplaodfile
 
Assignment sw
Assignment swAssignment sw
Assignment sw
 

Dernier

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Lecture2 networkclassification

  • 1. Lecture 2 Transmission Rate: The amount of data transferred per unit time from source to destination is called as transmission rate. Remember one thing, that the transmission rate is the property of machine (the rate at which machine is sending). Units are bits/sec. Propagation Delay: The amount of time taken per unit time, for the data to reach the destination and acknowledgment to come back to the source is called as propagation delay. Units are sec. Data Rate or Channel Capacity or Link Capacity: The amount of data per unit time which the medium is sending or transmitting through itself is called as Data Rate. Units are bits/sec. Remember that Data Rate or channel capacity is the property of medium and not of the machine. We will discuss later about the mathematical formulae given by Nyquist to calculate the data rate or channel capacity of a noiseless medium and another formulae by Shannon, called as Shannon channel capacity, which calculates the data rate for a noisy medium. Topology: Topology is defined as how the nodes in a network are physically placed. Key Elements of a LAN The key elements of a LAN are 1. Topology 2. Transmission Medium 3. Medium Access Control Together these elements decide the cost and capacity of the LAN, but also the type of data that can be transmitted, the speed and efficiency of applications. In terms of communication network, topology is defined as the way nodes or systems in a network are physically laid out. The common topologies for LAN are bus, tree, ring, star and mesh. Classification of Distance on the basis of Physical Layout or topology There are five possible classifications on the basis of topology or physical layout. 1. Bus 2. Star 3. Ring 4. Mesh Bus Topology Bus topology is characterized by the use of multipoint medium. In bus topology, all stations attach through appropriate hardware interfacing known as tap, to the transmission medium as shown in figure below.
  • 2. A transmission from any station propagates the length of the medium in both the directions and can be received by all other stations in the network. At each end of the bus is a terminator, which absorbs any signal, and thus removing it from the bus. In bus topology, any transmission made, will propagate through the medium and will be received by all stations in the network, so we require some way of indicating for whom the transmission is intended, i.e. who is the intended recipient. To solve this problem, station transmits in small blocks, called as frames, and each frame contains the date and frame header. Each station has a physical address, and this physical address is included in the frame header. The transmission happens as shown below. There is another problem associated with the bus topology, and it is controlling the access of the medium i.e. Medium Access Control. If two stations wish to transmit at the same moment of time, then their frames will collide and hence garbled up. So some mechanism is needed for controlling the access of medium among the stations. This we will discuss later in MAC.
  • 3. Tree Topology Actually bus is a special case of tree, with only one trunk and no branches. The transmission medium is a branching cable with no closed loops as shown in the figure below. The tree layout begins at a point known as headend. One or more cables start at the headend, and each of these may have branches. As with the bus, transmission from any station will propagate throughout the medium, received by all the stations and finally at each end there are terminators, which absorb the signals. In bus topology, any transmission made, will propagate through the medium and will be received by all stations in the network, so we require some way of indicating for whom the transmission is intended, i.e. who is the intended recipient. To solve this problem, station transmits in small blocks, called as frames, and each frame contains the date and frame header. Each station has a physical address, and this physical address is included in the frame header. Transmission Media for Bus LANs There are four possible alternatives that can be used for Bus LANs 1. Twisted Pair: 2. Baseband Coaxial Cable 3. Broadband Coaxial Cable 4. Optical Fiber Ring Topology In ring topology, the network consists of stations joined together in a ring like fashion through point-to-point links. These links are unidirectional i.e. data circulate around the ring in one direction. In ring topology token passing technique is used. a special control frame called as token. Generally this token propagates around the logical ring, with only the token holder being permitted to transmit frame. Since only one station can hold the token at a time, and there is only one token in the ring, no collisions can occur. This access method is called as token passing. After a station get hold of the token, he starts transmitting the data. A token with the data is known as frame, so a frame is placed on the transmission medium, which also contains the address of intended recipient. All the station in the network can receive the packet, but only intended receipt will copy the contents of the frame, and finally when the frame reaches again to the source, he removes the data from the frame.
  • 4. The above diagram shows, how frame transmission happens in the case of ring LAN. Star Topology In the star LAN topology, each station is directly connected to a common central node. Each station attaches to a central node via two point-to-point links, one for transmission and one for reception. The central node act as frame switching device. An incoming frame is buffered in the central node and then retransmitted on an outgoing link to the destination station.
  • 5. Mesh Topology There is another topology, in which each computer is directly connected to every other computer in the network; such a topology is called as mesh topology. The only disadvantage with Mesh topology is that lots of wires are required whereas there are lots of advantages. 1. No central dependency. 2. Data can be transmitted directly from one computer to another computer or indirectly if any link is broken. So this means Mesh topology is reliable and robust also compared to other topologies. For more discussion on LAN topology refer to Brendan Tangney. You should be able to answer the following question. What is the difference between various topologies, and also you should be able to write short notes on each topology, covering every point. Classification of Network on the basis of Distance There are three classification of LAN on the basis of distance 1. LAN 2. MAN 3. WAN LAN: LAN is an acronym for Local Area Network. A LAN is a kind of network, where the network spans within a range of certain Km, in other words network is local. For Example: Computers communicated to each other in a lab forms a LAN. Infact multiple departmental labs in a campus or university connected to each other form a network of LANs i.e. A campus, where computers in mechanical lab are connected with each other, that may in turn be connected to computers civil engineering through a networking device like bridge or switch or hub. 1. So LAN means, connecting computers in local area. 2. In LAN networking devices like hubs, repeaters or bridges are used. 3. LAN topology generally consists of Bus and Ring. 4. LAN forms a multipoint network. 5. LAN topology has a major overhead of medium allocation, as LAN form a multipoint network which means, multiple devise share the network so who should gain access to the network (It’s obvious that all of them cannot access the network simultaneously). We will discuss this problem in detail later, and this problem is known as Medium Allocation Problem. Example of LAN MAN: MAN is an acronym for Metropolitan Area Network. A MAN is a network, where the network spans across the cities i.e. interconnecting cities. For example, an organization has an office in Muscat and another office in salalah, so connecting the computers of office in Muscat with the office in salalah forms a MAN.
  • 6. 1. So MAN means, connecting computers or network across cities. 2. Routers are used for interconnecting networks present in two different cities. 3. We are concerned about routing efficient strategies. WAN: WAN is an acronym for Wide Area Network. A WAN is a network, where the network spans across continents i.e. connecting countries. For example an organization has one office in Oman, office in INDIA and another office in USA, so connecting the computer of all the three offices together through a network is called as WAN. 1. In WAN networking devices like routers and satellites are used. 2. So WAN means, connecting computers or network across continents. 3. WAN topology may consist of star, tree, mesh, satellite. Example of WAN Subnet is the above diagram can be defined as a network which consist of routers, a network that consist of network devices and helps in connecting two distant networks is called as subnet.