Sunteți pe pagina 1din 8

Communication Networks

EXPERIMENT NO. 2

Study Of Network Topologies & Control Flow techniques

Date of Performance: Signature of Teacher:

Atharva College Of Engineering

Department Of Electronics

Aim: To study network topologies & control flow techniques. Theory: The meaning of physical topology indicates the way in which the network is physically laid out. Two or more devices connect to a link, two or more links form a topology. The topology of a network is the geometric representation of the relationship of the links connecting the devices (or nodes). Different types of topologies: (1) Bus Topology (2) Ring Topology (3) Star Topology (4) Mesh Topology (5) Tree Topology (6) Logical Topology (7) Hybrid Topology (1) Bus Topology: The bus topology is usually used when a network installation is small, simple or temporary. On a typical bus network the cable is just one or more wires. With no active electronics to amplify the signal or pass it along from computer to computer. This makes the bus a passive topology. When a computer sends a signal up the cable; all the computers on the network receive the information, but the one with the address that matches the one encoded in the message accepts the information while all the others reject the message.

Bus Topology

Atharva College Of Engineering

Department Of Electronics

(2) Ring Topology: In a ring topology, each computer is connected to the next computer, with the last one connected to the first. Rings are used in high performance networks where large Bandwidth is necessary e.g. time sensitive feature such as video & audio. Every computer is connected to the next computer in the ring & each retransmits what it receives from the previous computer hence the ring is an active network.

Ring Topology

(3) Star Topology: In the star topology all the cables run from the computers to the central location where they are connected by a device called a hub. Stars are used in concentrated networks, where the endpoints are directly reachable from a central location; when network expansion is expected & when the greater reliability of a star topology is needed. Each computer in the star topology is communicates with the central hub that resends the message either to all the computers in the broadcast star network or only to the destination computer in the switched star network.

Atharva College Of Engineering

Department Of Electronics

Hub

Star Topology

(4) Mesh topology: In the mesh topology every device has a dedicated point-to-point link to every other device. The term bidirectional means that the link carries traffic only between two devices it connects. A fully connected mesh network therefore has n(n-1)/2 physical channels to link n devices. To accommodate that many links every device on the network must have n-1 input/output ports.

Mesh Topology

Atharva College Of Engineering

Department Of Electronics

(5) Tree Topology: A tree topology is a variation of a star. As in a star, nodes in a tree are linked to a central hub that controls the traffic to the network. Secondary hub is used here.

Tree Topology

(6) Logical Topology: Logical topology means the way the stations are logically connected to each other for the purpose of data unit exchange. Physical topology discussed earlier can be different from the logical topology, of the network.

Atharva College Of Engineering

Department Of Electronics

(7) Hybrid Topology: This is the one which makes use of two or more basic topologies mentioned above, together. There are different ways in which a hybrid network is created. The practical network generally posses a hybrid topology. The hybrid topology which is to be used for the particular application depends on the requirements of that application.

Hybrid Topology

Atharva College Of Engineering

Department Of Electronics

Quality of Service (QoS): QoS is an internetworking issue that has been discussed more than defined. We can informally define quality of service as something flow seeks to attain. Techniques for achieving good QoS are: (1) Leaky bucket algorithm (2) Token bucket algorithm

(1) Leaky bucket algorithm It is the algorithm used to control congestion in network traffic. Its working is similar to a leaky bucket & hence the name. Leaky bucket is a bucket with a hole at the bottom. Flow of the water from the bucket is at a constant rate which is independent of water entering the bucket. If the bucket is full, any additional water entering the bucket is thrown out. Applying the same technique, every host in the network is having a buffer with finite queue length. Packets which are put in the buffer when buffer is full are thrown away. The buffer may drain onto the subnet either by some number of packets per unit time, or by some total number of bytes per unit time.

Atharva College Of Engineering

Department Of Electronics

(2) Token bucket algorithm It is similar to the leaky bucket but it allows for varying output rates. This is useful when larger burst of traffic arrive. It enforces a long-term average transmission rate while permitting bounded bursts. Here a token bucket is used to manage the queue regulator that controls the rate of packet flow in to the network. A token generator constantly produces tokens at a rate of R tokens per second & places them into a token bucket with a depth of D tokens.

Conclusion: Hence different network topologies & control flow techniques are studied.

Atharva College Of Engineering

Department Of Electronics

S-ar putea să vă placă și