Documente Academic
Documente Profesional
Documente Cultură
School of Computing
Building LANs
Topologies
Contents
1. NETWORKS...............................................................................................................................2
2. PHYSICAL STRUCTURES........................................................................................................2
3. CATEGORIES OF NETWORKS................................................................................................7
4. THE INTERNET..........................................................................................................................9
EXERCISE....................................................................................................................................11
5. NETWORK DEVICES...............................................................................................................12
EXERCISE....................................................................................................................................15
1. Networks
Most networks use distributed processing, in which a task is divided amongst multiple
computers.
A network must be able to meet certain criteria such as performance, reliability, and
security.
2. Physical Structures
Type of Connection
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-
to-point connections use an actual wire or cable to connect the two ends, but
alternatives such as satellite are possible.
Multipoint
A multipoint connection is one in which more than two specific devices share a single
link. The capacity of the channel is shared, either spatially or temporally. If several
Topologies page 2
Building LANs Bell College
devices can use the link simultaneously it is a spatially shared connection, whereas if
users take turns it is a timeshare connection.
Physical Topology
The term physical topology refers to the way a network is laid out physically. Two or
more devices connect to a link, and two or more links form a topology. The topology of a
network is the geometric relationship of all the links and linking devices (nodes) to one
another. There are four basic topologies: mesh, star, bus, and ring.
Mesh
In a mesh topology, every device has a dedicated point-to-point link to every other
device. The term dedicated means that the link carries traffic only between the two
devices it connects.
Topologies page 3
Building LANs Bell College
• Dedicated lines means that each connection carries its own data load. This
eliminates the traffic problems that occur when links must be shared by multiple
devices.
• A mesh topology is robust. If one link goes down, it does not result in the entire
network becoming unusable.
• Point-to-point lines make fault identification and fault isolation easier. Traffic can
be routed to avoid links with suspected problems.
The main disadvantage of a mesh is the amount of cabling and I/O ports required. A
mesh can therefore be prohibitively expensive and is usually implemented in a limited
fashion.
Star
In a star topology, each device has a dedicated point-to-point link only to a central
controller called a hub. The devices are not directly linked to one another. Unlike a mesh
topology, a star topology does not allow direct traffic between devices. The controller
acts as an exchange. If one device wants to send data to another, it sends the data to
the controller, which then relays the data to the other connected device.
Topologies page 4
Building LANs Bell College
A star topology is less expensive than a mesh. In a star, each device needs only one link
and one I/O port to connect it to any number of others. This makes it easier to install and
reconfigure.
Another advantage is robustness. If one link fails, only that link is affected and all other
links remain active. This also leads to easy fault identification and fault isolation. As long
as the hub is working, it can be used to monitor link problems and bypass defective links.
However, although a star requires less cable than a mesh, each node must be connected to
a central hub. More cabling is therefore required in a star than for other topologies such
as ring or bus.
Bus
The mesh and star topologies described point-to-point connections. A bus topology is
multipoint. One long cable acts as a backbone to link all the devices in a network.
Nodes are connected to the bus cable by drop lines and taps. A drop line is a
connection between the device and the main cable and a tap is a connector that either
splices into the main cable or punctures the sheathing of the main cable to create a
contact with the metallic core.
Topologies page 5
Building LANs Bell College
As a signal is transmitted along the backbone, some of its energy is transformed into
heat. It therefore becomes weaker and weaker as it has to travel further. For this reason
there is a limit to the number of taps a bus can support and on the distance between
those taps.
Advantages of a bus topology include ease of installation. Backbone cable can be laid
along the most efficient path, and then connected to the nodes by drop lines of various
lengths. A bus uses less cabling than a mesh or star topology.
• Signal reflection at the taps can cause degradation in quality. This degradation
can be controlled by limiting the number and spacing of devices connected to a
given length of cable. Adding new devices may require modification or
replacement of the backbone.
• A fault or break in the bus cable stops all transmission, even between devices on
the same side of the problem. The damaged area reflects signals back in the
direction of origin, creating noise in both directions.
Ring
In a ring topology, each device has a dedicated point-to-point connection only with the
two devices on either side. A signal is passed along the ring in one direction, from device
to device, until it reaches its destination. Each device on the ring incorporates a
repeater. When a device receives a signal intended for another device, its repeater
regenerates the bits and passes them along.
A ring is relatively easy to install and reconfigure. Each device is linked only to its
immediate neighbours and so to add or delete a device requires changing only two
connections. The only constraints are media and traffic considerations such as
maximum ring length and number of devices.
Topologies page 6
Building LANs Bell College
Additionally, fault isolation is simplified. Generally, traffic is circulating at all times and if
one device does not receive a signal within a specific time period, it can issue an alarm.
This alarm alerts the administrator of the network to the problem and its location.
3. Categories of Networks
There are generally three categories of networks: local area networks, metropolitan area
networks, and wide area networks. Into which area a network falls is determined by its
size, its ownership, the distance it covers, and its physical architecture.
A LAN is usually privately owned and links the devices in a single office, building, or
campus. LANs are designed to allow resources to be shared between personal
computers or workstations. Resources include hardware (PC’s, Printers etc), software
(an application program), and data.
In addition to size, LANs are distinguished from other types of networks by their
transmission media and topology. Generally, a given LAN will only use one type of
transmission medium. The most common LAN topologies are bus, ring, and star.
LAN size is currently limited to a few kilometres. Typical speeds of LANs can reach
100Mbps.
Topologies page 7
Building LANs Bell College
A MAN is designed to extend over an entire city. It may be a single network, such as a
cable television network, or it may be a means of connecting a number of LANs into a
larger network so that resources can be shared LAN-to-LAN as well as device-to-device.
A company might use a MAN to connect the LANs in all its offices throughout a city.
Topologies page 8
Building LANs Bell College
A WAN provides long-distance transmission of data, voice, image, and video information
over large geographic areas that may comprise a country, a continent, or even the entire
world.
In contrast to LANs, which depend on their own hardware for transmission, WANs may
utilise public, leased, or private communication equipment.
4. The Internet
Topologies page 9
Building LANs Bell College
Topologies page 10
Building LANs Bell College
Exercise
1. Name the four basic network topologies and give an advantage for each type.
2. For n devices, what number of cable links are required for a mesh, bus, star, and
ring topology.
7 In a network with 25 computers, which topology would require the most extensive
cabling?
11. For each of the following networks, discuss the consequences if a connection
fails:
a. Five devices arranged in a mesh topology.
b. Five devices arranged in a star topology (not including the hub).
c. Five devices in a bus topology.
d. Five devices in a ring topology.
12. Sketch a hybrid topology with a bus backbone connecting two ring backbones.
Each ring backbone connects three star backbones.
13. When a party makes a local telephone call to another party, is this a point-to-
point or multipoint connection? Explain your answer.
Topologies page 11
Building LANs Bell College
5. Network Devices
Networking devices include: repeaters, hubs, bridges, two- and three-layer switches, and
routers. Repeaters and hubs operate at layer1 of the OSI model and bridges and two-
layer switches operate in the first two layers. Routers and three-layer switches
operate in the first three layers of the OSI model. The following diagram shows the
layers in which each device operates:
Repeaters
Signals within a network can only travel a fixed distance before attenuation endangers
the integrity of the data. A repeater receives a signal and, before it becomes too weak or
corrupted, regenerates the original bit pattern. The repeater then sends the refreshed
signal and, in effect, can extend the physical length of a LAN:
A repeater does not actually connect two LANs but rather it connects two segments of
the same LAN. A repeater forwards every frame and has no filtering capability.
Topologies page 12
Building LANs Bell College
Hubs
A hub is actually a multi-port repeater and is usually used to create connections between
stations in a physical star topology. A hub therefore regenerates and passes all packets
to all ports. Hubs can be used to create multiple levels of hierarchy, and this hierarchical
use can overcome the 100m length limitation of 10Base-T:
Bridge
A bridge operates in both the physical and the data link layers. As a physical layer
device it regenerates the signal it receives. As a data link layer device, a bridge can
check the physical (MAC) address (source and destination) contained in a frame.
The difference between a bridge and a repeater is that a bridge has filtering capability. A
bridge can check the destination address of a frame and decide if the frame should be
forwarded or dropped. If the frame is to be forwarded, the decision must specify the port.
A bridge has a table that maps addresses to ports.
Topologies page 13
Building LANs Bell College
If a frame destined for station 712B1345642 arrives at port 1, the bridge consults its
table to find the departing port. According to its table, frames for 712B1345642 leave
through port 1 and so there is no need for forwarding. The frame is therefore dropped.
On the other hand, if a frame for 712B1345641 arrives at port 2, the departing port is
port 1 and the frame is forwarded. In the first scenario, LAN 2 remains free of traffic
whereas in the second scenario, both LANs have traffic.
It should also be noted that the bridge does not change the physical addresses
contained within the frame.
Switch
A (two-layer) switch is a bridge with many ports and performs at the physical and data-
link layers.
A switch improves network performance when used in place of a hub since it forwards
packets directly to destinations and cuts out contentions (collisions). Neither bridges nor
switches will stop broadcasts (broadcast storms).
For this course, we will consider switches as operating at the data-link layer, although
there are types of switches that operate at the network layer also.
Topologies page 14
Building LANs Bell College
Router
The router learns network addresses by sharing network knowledge with other routers. It
builds a routing table dynamically. Routers can pass data between networks but not
pass unwanted data. They can be used as firewalls for security.
A router has four components: input ports, output ports, the routing processor, and
the switching fabric.
Input Ports
An input port performs the physical and data link layer functions of the router. The bits
are constructed from the received signal. The packet is decapsulated from the frame.
Errors are detected and corrected. The packet is ready to be routed by the network
layer. In addition to a physical layer processor and a data link layer processor, the input
port has buffers (queues) to hold the packet before being directed to the switching fabric.
Output Ports
An output port performs the same functions as the input port, but in the reverse order.
First, the outgoing packets are queued, then the packet is encapsulated in a frame, and
the physical layer functions are applied to the frame to create the signal to be sent on
the line.
Routing Processor
The routing processor performs the functions of the network layer. The destination IP
address is used to find the address of the next hop and, at the same time, the output
port number from which the packet is sent out. For this activity, the routing processor
searches the routing table.
Switching Fabrics
These will not be discussed in detail here, but include such as crossbar switch,
banyan switch, and banyan-banyan switch.
Exercise
1. Describe the purpose of repeaters, hubs, bridges, switches and routers within a
network. State the network layer(s) at which each of these devices operate.
Topologies page 15
Building LANs Bell College
The bus cable carries the transmitted message along the cable. As the message arrives
at each workstation, the workstation computer checks the destination address contained
in the message to see if it matches it's own. If the address does not match, the
workstation does nothing more.
If the workstation address matches that contained in the message, the workstation
processes the message. The message is transmitted along the cable and is visible to all
computers connected to that cable.
Topologies page 16
Building LANs Bell College
The above diagram shows a number of computers connected to a Bus cable, in this
case, implemented as Thin Ethernet. Each computer has a network card installed, which
directly attaches to the network bus cable via a T-Connector.
It is becoming common to use 10BaseT (UTP) for implementing Ethernet LANS. Each
workstation is wired in star fashion back to a concentrator wiring centre (hub). The hub is
a multi-port device supporting up to about 32 ports. One of these ports is connected to a
server, or the output of the hub can be connected to other hubs.
Multiple access refers to the fact that in bus systems, each station has access to the
common cable.
Carrier sense refers to the fact that each station listens to see if no other station is
transmitting before sending data.
Collision detection refers to the principle of listening to see if other stations are
transmitting whilst we are transmitting.
In bus systems, all stations have access to the same cable medium. It is therefore possible
that a station may already be transmitting when another station wants to transmit. Rule 1
is that a station must listen to determine if another station is transmitting before initiating
a transmission. If the network is busy, then the station must back off and wait a random
interval before trying again.
Rule 2 is that a station which is transmitting must monitor the network to see if another
station has begun transmission. This is a collision, and if this occurs, both stations must
back off and retry after a random time interval. As it takes a finite time for signals to
travel down the cable, it is possible for more than one station to think that the network is
free and both grab it at the same time.
CSMA/CD models what happens in the real world. People involved in group
conversation tend to obey much the same behaviour.
Topologies page 17
Building LANs Bell College
Limitations
Rules
Cabling
Topologies page 18
Building LANs Bell College
Limitations
Rules
Cabling
• Transceivers 802.3
• 50-ohm cable RG-11
• Male DIX connector
Topologies page 19
Building LANs Bell College
Limitations
Rules
• star topology
• 4 repeater/5 segment rule of 10Base5 is retained
• only two nodes per segment are allowed
Cabling
• RJ-45 Connectors
• Category 3 UTP minimum, preferably Category 5
Topologies page 20
Building LANs Bell College
Advantages Disadvantages
Easy to
Limits on cable length and Workstation numbers
implement
Low Cost Difficult to isolate network faults
A cable fault affects all workstations
As the number of workstations increase, the speed of the network
slows down
Each workstation is connected back to a Multiple Access Unit (MAU), which supports up
to eight workstations. Additional MAU are cascaded to provide greater workstation
numbers.
Topologies page 21
Building LANs Bell College
Wiring is performed in a physical star fashion, with cables wired directly from each
workstation back to the MAU.
This protocol is widely used in ring networks for controlling station access to the ring. A
short message (called a token) is circulated around the ring, being passed from station
to station (it originates from a controller or master station which inserts it onto the ring).
A station which wants to transmit waits for the token to arrive. When the token arrives,
the station changes it from a token to a connector message, and appends its message.
This new message is then placed on the outgoing side of the ring.
Each station passes on received tokens if they have nothing to transmit. They monitor
connector messages to see if the message is addressed to them. If connector messages
are addressed to them, they copy the message, modify it to signify its receipt, then send
it on around the ring. Connector messages which are not addressed to them are passed
directly on to the next station in the ring.
When the connector message travels full circle and arrives at the original sending
station, it checks the message to see if it's been received. It then discards the message
and replaces it with a token.
Topologies page 22
Building LANs Bell College
Topologies page 23
Building LANs Bell College
Either
Or
Topologies page 24
Building LANs Bell College
Limitations
Rules
Cable
Advantages Disadvantages
Cable failures affect limited users Costly Wiring
Equal access for all users Difficult Connections
Each workstation has full access
Expensive Adaptor Cards
speed to the ring
As workstation numbers increase
performance diminishes slightly
Topologies page 25
Building LANs Bell College
Advantages Disadvantages
Hub failure cripples all workstations
Easy to add new workstations
connected to that hub
Centralized control Hubs are slightly more expensive than thin-Ethernet
Centralized network/hub monitoring
Topologies page 26