--> Sayadasite: LAN ARCHITECTURE

Multiple Ads

Search

Menu Bar

LAN ARCHITECTURE

Module 4: LAN: LAN architecture, advantages and services, characteristics of LAN, LAN topologies, LAN access topologies, CSMA/CD- based LAN, token ring protocol.

A Local Area Network (LAN) is a private network that connects computers and devices within a limited area like a residence, an office, a building or a campus. On a small scale, LANs are used to connect personal computers to printers. However, LANs can also extend to a few kilometers when used by companies, where a large number of computers share a variety of resources like hardware (e.g. printers, scanners, audiovisual devices etc), software (e.g. application programs) and data.

LAN Definition

The personal computers and workstations in the offices are interconnected via LAN to share resources. The resources to be shared can be hardware like a printer or softwares or data. A LAN is a form of local (limited-distance), shared packet network for computer communications. In LAN all the machines are connected to a single cable.  The data rates for LAN range from 4 to 16 Mbps with the maximum of 100 Mbps.

The term LAN can also refer just to the hardware and software that allows you to connect all the devices together. In this sense, Local Talk is one kind of LAN, Ethernet is another. (AppleTalk is the protocol for Local Talk.) 

The components used by LANs can be divided into cabling standards, hardware, and protocols. Various LAN protocols are Ethernet, Token Ring: TCP/IP, 5MB, NetBIOS and NetBeui, IPX/SPX, Fiber Distributed Data Interchange (FDDI) and Asynchronous Transfer Mode (ATM).

LANs can be distinguished from different types of networks by their size, their transmission technology, and their topology.

A local-area network (LAN) restricted in size, which means that it can span in a relatively small area.

LANs use a transmission technology consisting of a cable. Traditional LANs technology transmits at speeds of 10 Mbps to 100 Mbps and makes very few errors. However, current LANs technology transmits at up to 10 Gbps.

Various network topologies are possible for broadcast LANs. In a linear cable network (Bus), at any given time, one client machine is the master machine, and that is only allowed to transmit. All other machines refrain from sending data. The second type of broadcast LANs is the ring. In it,  LAN operating at 4 and 16 Mbps. FDDI is another example of a ring network.

The distinguishing features of LAN are

Network size is limited to a small geographical area, presently to a few kilometers.

Data transfer rate is generally high. They range from 100 Mbps to 1000 Mbps.

In general, a LAN uses only one type of transmission medium, commonly category 5 coaxial cables.

A LAN is distinguished from other networks by their topologies. The common topologies are bus, ring, mesh, and star.

The number of computers connected to a LAN is usually restricted. In other words, LANs are limitedly scalable.

IEEE 802.3 or Ethernet is the most common LAN. They use a wired medium in conjuncture with a switch or a hub. Originally, coaxial cables were used for communications. But now twisted pair cables and fiber optic cables are also used. Ethernet’s speed has increased from 2.9 Mbps to 400 Gbps.

Wireless LANs (WLAN)

Wireless LANs use high-frequency radio waves instead of cables for communications. They provide clutter free homes, offices and other networked places. They have an Access Point or a wireless router or a base station for transferring packets to and from the wireless computers and the internet. Most WLANs are based on the standard IEEE 802.11 or WiFi.

Virtual LANs (VLAN)

Virtual LANs are a logical group of computers that appear to be on the same LAN irrespective of the configuration of the underlying physical network. Network administrators partition the networks to match the functional requirements of the VLANs so that each VLAN comprise a subset of ports on a single or multiple switches. This allows computers and devices on a VLAN to communicate in the simulated environment as if it is a separate LAN.

What is LAN (Local Area Network)

It is a privately-owned network and stands for local area network. A network is a group of computers and other devices connected so they can pass information back and forth. The local area network (LAN) is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings up to a few kilometers in size. LANs very widely used in a variety of computers to share resources (e.g., printers) and exchange information.

The Evolution of LAN

As there is a tremendous use of PC or desktop computers in the office environment, it became apparent that attaching a printer or FAX machine to each and every computer is highly expensive. Further, copying files to a disk and moving from one computer to another to print the file is also time consuming. Connecting computers so that they could share a printer and share files translated into big savings.

In 1982, 10 Mbps Ethernet cards came into existence and they were very expensive. By 1988, 10 Mbps Ethernet had acceptable performance for large LANs and was still good for small installations. By 1990, large installations were beginning to see congestion. Hence, alternatives to 10 Mbps cards were becoming popular. One of these alternatives was to install a switched architecture, rather than constructing architecture with hubs.

In 1996, 10Mbps switched LANs were providing acceptable service for smaller installations. The awesome technology at this point was 100Mbps shared Ethernet. By 1998 switched 10Mbps Ethernet was common in small LANs and switched 100 Mbps Ethernet was common in large LANs. Large LANs are beginning to see limitations of 100 Mbps when everyone on the LAN starts doing video conferencing.

Now, Gigabyte Ethernet cards are available for sale. The 10 Mbps cards are not used anymore. Now-i-days 10/100, 10/100/1000 auto-sensing cards are available in the market. Everything is moving to dual mode auto-sensing technology. Even though Gigabyte Ethernet is getting more popular now-a-days, Gigabyte LANs are 10 times faster than a 100Mbps LAN. Ethernet was evolved from a protocol called ALOHA. ALOHA was mainly used in packet radio network which communicate using satellites. In brief, an earth station sends some data, as soon as the data is ready it waits for an acknowledgement (ACK). If it fails to get an ACK, it would time out and sends the same thing again. The sender keeps trying until the transmission is successful. The lesson to be learned here is that it is important to limit the number of users on a shared network medium. Traffic analysis can help determine the maximum number of users to ensure a reasonable Quality of Service (QOS).

LAN Architecture

The architecture of a LAN can be considered as a set of layered protocol, each layer describes a set of functions. The protocols defined for a LAN primarily deals with transmission of a block of data within the LAN. In OSI terms, the higher layer protocols are totally independent of the LAN architectures. Hence, only lower order layers are considered for the design of the LAN architecture. The physical layer of the LAN architecture is equivalent to the physical layer of the OSI. The data link layer of the LAN is split into two layers. One is the Medium Access Control layer (MAC) and the other is the Logical Link Control layer (LLC).The IEEE 802 committee had formulated the standards for the LAN.

The OSI Model and LAN Access

Because there are different types of LANs, both physical topology and logical topology, different methods have been devised to access these networks. Layer 2 of the OSI model has to handle datagram from layer 3 and prepare them to enable Layer 1 to convert the bits of the frame to signals and send them out.

The job of layer 2, the data link layer, can be subdivided into two sub layers.

Logical link Control (LLC)

The top half of the data link layer is the LLC sub layer. This sub layer provides flow and error control functions and manages the flow of data to and from layer 3. LLC layer is concerned with the transmission of data between the source and destination stations without involving the intermediate nodes.

LLC provides the following services to the higher order layers.

• Connection-oriented services.

• Unacknowledged connectionless services.

• Acknowledged connectionless services.

Media Access Control (MAC)

This sub layer resides in the lower half of layer-2. It has the responsibility of knowing the rules of access to the medium and follows the rules. It has to assemble the frame by creating and attaching the header and trailer of each frame. It also has to disassemble incoming frames, check the address information and perform the error check.

MAC frame format MAC layer gets a block of data from the Logical Link Layer (LLC), which is above this layer. The MAC layer then forms frames, which are often called Protocol Data Units (POU). The most generic format of the MAC frame is shown below.

The control header contains the control information needed for the MAC protocol. The next two fields are used to indicate the source and the destination address. The next field called the LLC data contains the actual data obtained from the LLC layer. Finally, the CRC field contains the error check sequence.

LAN standards often specify both layer one and layer two characteristics. For example, Ethernet is explained in detail in the IEEE 802.3 standard. Token Ring access rules are explained in the Token Ring standards document, published by the IEEE a5 standard 802.5. FDDI is another layer 2 LAN protocol, which provides another set of access rules.

The meaning of these standards is different for the user. When a new computer is purchased for the construction of an Ethernet LAN, the computer must have a Network Interface Card (NIC) that will permit it to connect to an Ethernet LAN. The NIC has a physical connection port on it, where it is connected to an Ethernet LAN cable. The card is responsible for following the Ethernet access rules. If it is required to connect the computer to a Token Ring network, a Token Ring NIC is to be installed in place of the Ethernet NIC. It also requires installing new driver software to enable the system to recognize the Token Ring card and use it for network access. The Token Ring card would follow Token Ring network access rules and give you access to the Token Ring LAN. Hence, completely different sets of rules are followed for different LAN access methods.

Hence, in a LAN standard, the physical layer performs data encoding and decoding, preamble generation and removal for synchronization, and bits transmission and reception. The physical layer also includes the specification of transmission medium and the topology. The MAC layer performs similar functions of the data link layer of the OSI. It forms frames by assembling the data bits, governs the access to the media. The LLC layer provides interface to higher layers and performs error and flow control.

LAN TOPOLOGIES

What are topologies?

A network topology is the physical and logical arrangement of nodes and connections in a network. Nodes usually include devices such as switches, routers and software with switch and router features. Network topologies are often represented as a graph.

The pattern of interconnection between the nodes of the network.

There are three common topologies found in LANs: star, ring, and bus. In a star topology, all devices on the LAN are interconnected through some central device. In a ring topology, the nodes are connected by a set of point-to-point links that are organized in a circle.

Star Topology

In this network, all the nodes are connected to Central Node. The devices are not connected to each other and transmits the messages to the Central Node. The central node is responsible for transmitting the message to the required destination. It is the most widely used topology for LAN’s.

In a star topology, the central hub acts like a server and the connecting nodes act like clients. When the central node receives a packet from a connecting node, it can pass the packet on to other nodes in the network. A star topology is also known as a star network.

Star topologies are often used in home networks.

The benefits of a star network topology include the following:

Limits the impact of a single point of failure. In star networks, each connecting node is isolated from other connecting nodes. If one connecting node goes down, it will not impact the performance of other connecting nodes in the network.

Facilitates adding or removing individual components to and from a network. Star networks are usually kept small because network performance can suffer when too many devices compete for access to the central node.

Bus Topology

Alternatively called line topology, bus topology is a network setup where each computer and network device is connected to a single cable or backbone. Depending on the type of computer network card, a coaxial cable or an RJ-45 network cable is used to connect them together.

• Bus topology is shown in Fig. In this topology at any instant only one computer acts as master and it is allowed to transmit (broadcast). The others are supposed to listen.

• If two or more machines want to transmit simultaneously then an arbitration mechanism has to be used for resolving the conflict.

• It is possible to have a centralized or distributed type arbitration mechanism.

• The most popular example of bus topology is Ethernet (IEEE 802.3). It has a decentralized control and it operates at 10 or 100 Mbps.

• Computers on Ethernet can transmit whenever they want. If collision of their packets takes place, then they wait for a random time and retransmit their packets.

Bus network topologies are used when a small, cheap and often temporary network is needed that does not rely on very high data-transfer speeds. They may be used in locations such as a laboratory or office

Advantages of bus topology

It works well when you have a small network.

It's the easiest network topology for connecting computers or peripherals in a linear fashion.

It requires less cable length than a star topology.

Ring Topology

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

A ring topology is a network configuration where device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are called a ring network.

In a ring network, packets of data travel from one device to the next until they reach their destination. Most ring topologies allow packets to travel only in one direction, called a unidirectional ring network. Others permit data to move in either direction, called bidirectional.

• This is another broadcast topology.

• In a ring each bit propagates around on its own without waiting for the rest of the packet to which it belongs.

• Since it is a broadcast system, some rules are essential for arbitrating the simultaneous access to the ring.

• An example of ring based LAN is IEEE 802.5 (IBM token ring) operating at 4 and 16 Mbps.

Static and dynamic broadcast networks:

The broadcast networks are further classified into two types namely,

1. Static networks and

2. Dynamic networks.

• This classification is based on how the channel is allocated.

• In static allocation, each machine is allowed to broadcast only in its allotted time slot.

• But static allocation wastes the channel capacity when a machine does not want to transmit in its allotted time slot.

• Hence most of the systems try to allocate the channel dynamically i.e. on demand.

Ring topologies may be used in either LANs (local area networks) or WANs (wide area networks). Depending on the network card used in each computer of the ring topology, a coaxial cable or an RJ-45 network cable is used to connect computers together.

LAN Applications and Benefits

LANs are used almost exclusively for data communications over relatively short distances such as within an office, office building or campus environment. LANs allow multiple workstations to share access to multiple host computers, other workstations, printers and other peripherals, and connections to other networks. LANs are also being utilized for imaging applications, as well. They are also being used for video and voice communications, although currently on a very limited basis.

LAN applications include communications between the workstation and host computers, other workstations, and servers.

The servers may allow sharing of resources. Resources could be information, data files, e-mail, voice mail, software, hardware (hard disk, printer, fax, etc.) and other networks.

LAN benefits include the fact that a high-speed transmission system can be shared among multiple devices in support of large number of active terminals and a large number of active applications in the form of a multi-user, multi-tasking computer network. LAN-connected workstations realize the benefit of decentralized access to very substantial centralized processors, perhaps in the form of mainframe host computer and storage capabilities (information repositories). Additionally, current technology allows multiple LANs to be inter-networked through the use of LAN switches, routers and the like.

Disadvantages of LANs include concern for security of files and accounts.

LAN Advantages and Services

Advantages and benefits of Local Area Network (LAN)

Resource sharing. ...

The relationship between the client and the server. ...

Internet sharing. ...

Sharing applications and software. ...

Data security. ...

Easy and fast communication. ...

Computer ID.

They work on higher operating speed than WAN and MAN.

They suit the requirements of a specific organization.

They are easy to install and maintain.

They exist as connected (wired) and wireless configurations.

LAN can provide the following services.

File-based services Transfer of files from one node to another within the LAN area. For example, in a typical LAN used for local banking, the file containing the detailed transactions of a specific customer is transferred from sever to the client, whenever new transactions are made on behalf of the customer. It also provides efficient ways of storing and retrieving the data. When multiple copies of the same file exist, it provides necessary synchronization in updating the files. LAN also provides backup for the critical data so that safe recovery is possible when a failure occurs. It also provides data encryption facility to control the access to certain data to only selected persons.

Print services there can be one or more printers, modems, and fax machines attached to a LAN and used by applications. A number of clients can share these devices. Print services allow many clients to safely share printers and other such devices.

All modem LANs provide these services.

Application-based services Applications run on a client may require higher computational capabilities. Servers are more powerful than the clients. In a LAN, more than one client can share the computational power of a server. Application servers are good examples for this.

Mail and message-based services Electronic-mail is an important service used for exchanging information between people on a network. Mails can be stored or forwarded to another user. Many free mail servers are available on the Internet to provide free mail services to its clients.

Database services Storing and retrieving of data in databases is another requirement of a client to control and manipulate the data. Database servers are the most popular ones that service the need of clients.

Distributed data services When data is distributed, it is possible for more than one client system to share the data. Though the databases appear physically distributed, there is a single logical view given by the database server. There are so many issues involved in sharing a single file by more than one client. Consistency issue is very seriously tackled when updating shared files.

Remote services Linking a LAN with a remote computer or a mainframe is another service required.

This feature is used to access remote databases available in large mainframes.

Characteristics of a lan

LAN Characteristics

LANs are grouped according to four key characteristics:

The types of transmission media over which they can operate

The transport technique they use to transmit data over the network (that is, broadband or baseband)

The access method, which is involved in determining who gets to use the network and when they get to use it

The topology, or mapping, of the network (that is, the physical and logical connections between the nodes on the network)

The following sections describe each of these four characteristics in detail.

LAN Transmission Media

 “Transmission Media: Characteristics and Applications,” describes the advantages and disadvantages of the media types, and this section talks specifically about the considerations ...

A LAN can be characterized by means of hardware and software components and a set of protocols.

Hardware components of a LAN are:

The Server

Server is a computer that provides services to other computers (workstations or clients) on the network. The primary goal of a LAN server is data management. It stores, retrieves, and protects the data. A server also sends data to the requesters on the network and also to authorized remote users. The type and configurations needed for the server, depends mainly on the purpose for which the LAN is being constructed. Servers may be classified, based on the type of service they provide. A single server may provide a number of services also. The following are the list of servers categorized, based on the type of service.

File server and disk server A file server makes the disk storage space (in the order of several Gigabytes), to various client PCs. The file server satisfies the request for data from application programs running in client workstations. It also keeps the consistency of data when more than one client makes simultaneous data requests. In a LAN, working with a file server, all application running in a workstation may request for a file with involving the local operating system. The workstation sends its file request to the server and the server processes the request and sends the required file directly to the workstation.

Disk servers are similar to file servers. The difference is that, in a file server when an application running in a workstation requests for a specific file, the local operating system, running on the workstation interacts with the file server and gets the information required. In a disk server, the application can directly access the required file without the intervention of the local operating system.

Database server These servers are a subset of the file server category. They provide access to huge databases for clients. Database information is stored in hard disk storage or CD ROM or optical disk drives. It contains the DBMS, which is more sophisticated than the basic file I/O access method. DBMS eliminates data redundancy and allows the user, transparent data distribution. The database server extracts only the relevant data and passes it to the requesting client, rather than passing the entire file like a file server.

Print server Every LAN has one or more printers shared by all the nodes or workstations. The role of a print server is to collect the information from several workstations, store them on the disk and send it to the printer. This processing is known as print spooling. Print services become a part of the file server nowadays. In many LAN architectures, any PC on the LAN can act as a print server.

Backup server Such servers provide backup in case the main server fails. Every network must have a back up server to keep all the information safe. Periodically, these servers must be updated so that reliability can be improved.

Gateway server A gateway server is used to provide connectivity to other networks. The GIAS (Gateway server of VSNL, India) is a gateway server, which provides connectivity to all other networks on the Internet for the Indian segment of the Internet. A gateway server also provides connectivity to dissimilar networks.

Communication server Communication servers are more diverse than the other servers. The main functions of a communication server are linking client workstations on the LAN with mainframe computers, sharing a pool of modems among the client stations, and communicating with other LANs as well.

Examples of the most popular LAN servers are Novell Netware LAN Server, Microsoft Windows NT Server or Windows 2000, IBMOS2 Server, etc.

Workstations

Workstations or nodes are the clients that use the services provided by the network server. Workstations are loaded with special software to interact with the server to access the services. Examples of workstations include the Microsoft Windows NT workstation, Windows 2000 workstation, IBM workstation, Sun workstation, etc.

The Transmission Media for LAN

Various transmission media are used for constructing a LANs. The most popular among them are twisted pair, coaxial cable, or optical fibers. LANs operated with any such transmission media is known as wired LAN. LANs can also be constructed without a transmission media or cable. Such LANs are known as wireless LANs.

Communication Equipments

Repeater A repeater operates at layer-I. It has just enough intelligence to find out the layer-l incoming signals are and then send out a clean stream of signals built from scratch. Noise is eliminated from the signals in this manner. A repeater has one incoming and one outgoing line. It extends the distance that a signal may be sent over a transmission media.

Hub A hub is a multi-port repeater. Any incoming signal is repeated on all other outgoing lines. A hub functions at layer-I.

Bridge A bridge has more intelligence than a hub or repeater. This device separates two segments of a single LAN. A bridge operates at layer-2 by looking at the destination address in the frame header. Consulting a table, the bridge will determine if the frame needs to pass on to the other segment. Only certain frames may pass those with the correct MAC address.

Switch A switch is a multi-port bridge. It performs its functions at layer two. It looks at MAC layer addresses just like a bridge, consults a table, and determines if a frame needs to be sent on one of the attached lines. Multiple connections can occur through a switch simultaneously as long as they don’t compete for the same line. A switch, just like a bridge, does not divide a LAN into two LANs. It merely reduces unnecessary traffic on LAN segments.

Router A router is more intelligent than bridges and switches. It functions at layer-3. At layer-2 all incoming frames are checked for errors and then they are delivered to layer-3. A layer-3 datagram has an address that permits it to be sent across internet works (interconnected networks). This requires a single global addressing scheme. The router finds the layer-3 address and consults a table that it keeps. There the router will learn which attached line to send the datagram on. A router provides facilities to the stations on the LAN, to access other networks.

Advantages and benefits of Local Area Network (LAN)

Resource sharing. ...

The relationship between the client and the server. ...

Internet sharing. ...

Sharing applications and software. ...

Data security. ...

Easy and fast communication. ...

Computer ID.

Advantages and benefits of Local Area Network (LAN)

In the following, we will get acquainted with some of the benefits and advantages of LAN network

Resource sharing

All resources are connected to one network, and if a computer needs a resource, it can be shared with another computer. These resources include DVD drives, printers, scanners, modems, and hardware drives. Therefore, there is no need to buy separate resources for each computer, and you can save costs.

The relationship between the client and the server

All data of connected computers can be stored on one server. If each computer (client) needs specific data, the user can easily log in and access the data from the server. For example, movies and songs can be stored on a server and accessed by any authorized user (user computer).

Internet sharing

In offices and Internet cafes, it can be seen that an Internet connection is shared between all computers. This technology is another type of LAN in which the main Internet cable is connected to a server and distributed through the operating system among the connected computers.

Sharing applications and software

Applications and software can be easily shared over a LAN. You can use licensed software so that any user can use it on the network. Purchasing a license for each user can cost the organization a lot of money, so subscribing to the software program is easy and at the lowest cost.

Data security

Data storage on the server is highly secure. If you want to modify or delete data, you can easily do so on a server computer, and other computers can access the updated data. On the other hand, you can allow access to specific users to access the data in the network.

Easy and fast communication

In local area networks, computers can exchange data and messages easily and quickly. This saves time and gets things done faster. LAN allows any user to share messages and data with any other user on the network. Users can access the network from any computer and access the data stored on the server.

Computer ID

In a LAN, each computer has its own MAC Address, which is temporarily stored on a switch or router when communicating. All computers on the LAN can be identified by a MAC address, which can send and receive messages and data. Of course, the MAC address is stored on the network adapter and the motherboard of each computer. On older computers, network adapters are not built into the motherboard, but they are made with motherboards on newer computers.

What are the services of LAN?

Applications running on the Local Area Network server provide services such as database access, document sharing, email, and printing. Devices on a peer-to-peer local area network share data directly to a switch or router without the use of a central server.

Benefits of Using Managed LAN Services?

Security: A managed LAN services provider can secure your network by installing firewalls, intrusion detection/prevention systems, and other security products.

Network Monitoring: A managed LAN services company can monitor your network 24 hours a day, seven days a week. It can alert you when there are problems with your network.

Improved Network Performance: managed LAN service providers usually offer faster speeds than you could get from a public Internet access point. You won’t have to wait as long to download large files.

Cost Savings: Managed LAN service providers offer lower rates than you would pay for similar services.

Reliability: Most managed LAN service providers guarantee 99% uptime. If they fail to deliver this level of reliability, they will reimburse you for the downtime.

24-Hour Availability: Most managed LAN service providers offer 24-hour availability. If an issue arises, they will resolve it immediately.

In conclusion, managed LAN services are beneficial because they help improve your business’s productivity and save you money by reducing the cost of maintaining your network infrastructure.

Characteristics of LAN

It is a network owned by a private owner.

Personal computers, printers, etc., are connected through LAN.

LANs are very easy to design and troubleshoot.

A central database is used to connect the LAN networks.

The data transfer rate of LAN is 10 Gbits/s.

LANs are limited to local areas.

What are the 7 characteristics of a network?

Image result

Basic characteristics of a Computer Network

Security. Security is one of the most essential characteristics of a computer network. ...

Reliability. ...

Scalability. ...

Flow of Data. ...

High performance. ...

Fault tolerance. ...

Quality of Service (QoS) ...

Compatible With Hardware and Software Components.

Types of Network Topology

The arrangement of a network that comprises nodes and connecting lines via sender and receiver is referred to as network topology. The various network topologies are:

Mesh Topology:

In a mesh topology, every device is connected to another device via a particular channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.

https://media.geeksforgeeks.org/wp-content/uploads/1-75.png
Figure 1: Every device is connected to another via dedicated channels. These channels are known as links. 
Suppose, the N number of devices are connected with each other in a mesh topology, the total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices connected to each other, hence the total number of ports required by each device is 4. The total number of ports required=N*(N-1).

Suppose, N number of devices are connected with each other in a mesh topology, then the total number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In Figure 1, there are 5 devices connected to each other, hence the total number of links required is 5*4/2 = 10.

Advantages of this topology: 

Communication is very fast between the nodes.

It is robust.

The fault is diagnosed easily. Data is reliable because data is transferred among the devices through dedicated channels or links.

Provides security and privacy.

Problems with this topology: 

Installation and configuration are difficult.

The cost of cables is high as bulk wiring is required, hence suitable for less number of devices.

The cost of maintenance is high.

Star Topology:

In star topology, all the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.

https://media.geeksforgeeks.org/wp-content/uploads/2-49.png
Figure 2: A star topology having four systems connected to a single point of connection i.e. hub. 

Advantages of this topology: 

If N devices are connected to each other in a star topology, then the number of cables required to connect them is N. So, it is easy to set up.

Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports required is N.

It is Robust. If one link fails only that link will affect and not other than that.

Easy to fault identification and fault isolation.

Star topology is cost-effective as it uses inexpensive coaxial cable.

Problems with this topology: 

If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down.

The cost of installation is high.

Performance is based on the single concentrator i.e. hub.

Bus Topology:

Bus topology is a network type in which every computer and network device is connected to a single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.

https://media.geeksforgeeks.org/wp-content/uploads/3-55.png
Figure 3: A bus topology with shared backbone cable. The nodes are connected to the channel via drop lines. 

Advantages of this topology: 

If N devices are connected to each other in a bus topology, then the number of cables required to connect them is 1, known as backbone cable, and N drop lines are required.

Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps.

The cost of the cable is less compared to other topologies, but it is used to build small networks.

Bus topology is familiar technology as installation and troubleshooting techniques are well known.

Problems with this topology: 

A bus topology is quite simpler, but still, it requires a lot of cabling.

If the common cable fails, then the whole system will crash down.

If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.

Adding new devices to the network would slow down networks.

Security is very low.

Ring Topology:

In this topology, it forms a ring connecting devices with exactly two neighboring devices.

A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.

The data flows in one direction, i.e.., it is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.

https://media.geeksforgeeks.org/wp-content/uploads/4-32.png
Figure 4: A ring topology comprises 4 stations connected with each forming a ring. 

The most common access method of ring topology is token passing.

Token passing: It is a network access method in which a token is passed from one node to another node.

Token: It is a frame that circulates around the network.

The following operations take place in ring topology are : 

One station is known as a monitor station which takes all the responsibility for performing the operations.

To transmit the data, the station has to hold the token. After the transmission is done, the token is to be released for other stations to use.

When no station is transmitting the data, then the token will circulate in the ring.

There are two types of token release techniques: Early token release releases the token just after transmitting the data and Delayed token release releases the token after the acknowledgment is received from the receiver.

Advantages of this topology: 

The data transmission is high-speed.

The possibility of collision is minimum in this type of topology.

Cheap to install and expand.

It is less costly than a star topology.

Problems with this topology: 

The failure of a single node in the network can cause the entire network to fail.

Troubleshooting is difficult in this topology.

The addition of stations in between or the removal of stations can disturb the whole topology.

Less secure. 

Tree Topology :

This topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are used.

https://media.geeksforgeeks.org/wp-content/uploads/20200614134830/tree-topology2.png
Figure 5: In this, the various secondary hubs are connected to the central hub which contains the repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes.

Advantages of this topology : 

It allows more devices to be attached to a single central hub thus it decreases the distance that is traveled by the signal to come to the devices.

It allows the network to get isolated and also prioritize from different computers.

We can add new devices to the existing network.

Error detection and error correction are very easy in a tree topology.

Problems with this topology :  

If the central hub gets fails the entire system fails.

The cost is high because of the cabling.

If new devices are added, it becomes difficult to reconfigure.

Hybrid Topology :

This topological technology is the combination of all the various types of topologies we have studied above. It is used when the nodes are free to take any form. It means these can be individuals such as Ring or Star topology or can be a combination of various types of topologies seen above. Each individual topology uses the protocol that has been discussed earlier.

https://media.geeksforgeeks.org/wp-content/uploads/20220610155821/Untitleddesign.png

Hybrid Topology

Figure 6: The above figure shows the structure of the Hybrid topology. As seen it contains a combination of all different types of networks.

Advantages of this topology : 

This topology is very flexible.

The size of the network can be easily expanded by adding new devices.

Problems with this topology :

It is challenging to design the architecture of the Hybrid Network.

Hubs used in this topology are very expensive.

The infrastructure cost is very high as a hybrid network requires a lot of cabling and network devices.

LAN access topologies

There are three common topologies found in LANs: star, ring, and bus. In a star topology, all devices on the LAN are interconnected through some central device. In a ring topology, the nodes are connected by a set of point-to-point links that are organized in a circle.

This chapter provides an overview of local area network (LAN) concepts, topologies, technologies, and design. Historically, LANs have been broadcast networks, meaning that every LAN station hears every transmission on the medium. LAN topologies have to support the broadcast nature of the network and provide full connectivity between all stations. The physical topology describes how the LAN stations are physically connected so that they can communicate with each other. The logical topology describes how the broadcast nature of the LAN is actually affected, and, therefore, how stations participate in the process of obtaining permission to transmit on the medium. There are three common topologies found in LANs: star, ring, and bus. In a star topology, all devices on the LAN are interconnected through some central device. In a ring topology, the nodes are connected by a set of point-to-point links that are organized in a circle. In a bus topology, all devices are connected to a single electrically continuous medium. The chapter also discusses concepts related to media access control, interconnection devices, and network operating systems.

 

CSMA/CD- based LAN

Carrier-sense multiple access with collision detection (CSMA/CD) is a medium access control (MAC) method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.

CSMA/CD is a modification of pure carrier-sense multiple access (CSMA). CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a collision is detected, thus shortening the time required before a retry can be attempted.

With the growing popularity of Ethernet switches in the 1990s, IEEE 802.3 deprecated Ethernet repeaters in 2011, making CSMA/CD and half-duplex operation less common and less important.

CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a media access control method that was widely used in Early Ethernet technology/LANs When there used to be shared 
Bus Topology and each node ( Computers) were connected By Coaxial Cables. Now a Days Ethernet is Full Duplex and CSMA/CD is not used as Topology is either Star (connected via Switch or Router) 
or Point to Point ( Direct Connection) but they are still supported though. 

Consider a scenario where there are ‘n’ stations on a link and all are waiting to transfer data through that channel. In this case, all ‘n’ stations would want to access the link/channel to transfer their own data. Problem arises when more than one station transmits the data at the moment. In this case, there will be collisions in the data from different stations. 

CSMA/CD is one such technique where different stations that follow this protocol agree on some terms and collision detection measures for effective transmission. This protocol decides which station will transmit when so that data reaches the destination without corruption. 

How CSMA/CD works? 

Step 1: Check if the sender is ready for transmitting data packets.

Step 2: Check if the transmission link is idle? 
Sender has to keep on checking if the transmission link/medium is idle. For this, it continuously senses transmissions from other nodes. Sender sends dummy data on the link. If it does not receive any collision signal, this means the link is idle at the moment. If it senses that the carrier is free and there are no collisions, it sends the data. Otherwise, it refrains from sending data.

Step 3: Transmit the data & check for collisions. 
Sender transmits its data on the link. CSMA/CD does not use an ‘acknowledgment’ system. It checks for successful and unsuccessful transmissions through collision signals. During transmission, if a collision signal is received by the node, transmission is stopped. The station then transmits a jam signal onto the link and waits for random time intervals before it resends the frame. After some random time, it again attempts to transfer the data and repeats the above process.

Step 4: If no collision was detected in propagation, the sender completes its frame transmission and resets the counters.

How does a station know if its data collide? 

https://www.blogger.com/img/img-grey-rectangle.png

Consider the above situation. Two stations, A & B. 
Propagation Time: Tp = 1 hr ( Signal takes 1 hr to go from A to B) 

At time t=0, A transmits its data.

        t= 30 mins : Collision occurs.

After the collision occurs, a collision signal is generated and sent to both A & B to inform the stations about a collision. Since the collision happened midway, the collision signal also takes 30 minutes to reach A & B. 

Therefore, t=1 hr: A & B receive collision signals.

This collision signal is received by all the stations on that link. Then, 

A token-ring network is a local area network (LAN) topology that sends data in one direction throughout a specified number of locations by using a token. The token is the symbol of authority for control of the transmission line.

What is a token ring?

A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host. A token is a frame of data transmitted between network points. Only a host that holds a token can send data, and tokens are released when receipt of the data is confirmed. IBM developed token ring technology in the 1980s as an alternative to Ethernet.

What is a token ring network?

Also known as IEEE (Institute of Electrical and Electronics Engineers) 802.5, a token ring network connects all devices, including computers, in a circular or closed-loop manner. In this scenario, the word token describes a segment of data sent through the network.

Token ring networks prevent data packets from colliding on a network segment because only a token holder can send data, and the number of tokens available is also controlled. When a device on the network successfully decodes that token, it receives the encoded data.

Token ring history

Attached Resource Computer Network, Fiber Distributed Data Interface (FDDI) and the token bus used the token ring. But the most broadly deployed token ring protocols were those of IBM, released in the mid-1980s, and the standardized version of it known as IEEE 802.5, which appeared in the late 1980s.

The use of token rings and 802.5 started declining in the 1990s. Today, they are considered inactive and obsolete. Enterprise organizations gradually phased out the token ring and adopted Ethernet technology, which dominates LAN designs today. The IEEE 802.5 working group is now listed as disbanded.

Token rings were popular because they worked well with large amounts of traffic, but they were not well suited to large networks, particularly if those networks were spread widely or had physically remote nodes. To overcome some of these limitations, multistation access units (MSAUs), which are like hubs on Ethernet, were added. MSAUs are centralized wiring hubs and are also known as concentrators.

What is token ring star topology?

In a star topology, token ring access could connect up to 225 nodes at 4 million, 16 million or 100 million bits per second, conforming to the IEEE 802.5 standard. An MSAU connects all stations using a twisted pair cable. For example, users could connect six nodes to an MSAU in one office and connect that MSAU to an MSAU in another office that served eight other nodes. In turn, that MSAU could connect to another MSAU that connected to the first MSAU.

Such a physical configuration is called a star topology. However, the actual configuration is a ring topology because every message passes through every computer, one at a time, until it forms a ring.

An advantage of an MSAU is that, if one computer fails in the ring, the MSAU can bypass it, and the ring will remain intact. Typically, each node connection cannot exceed 382 feet, depending on the cable type. However, you can increase this distance by up to a mile and a half using token ring repeaters.

network topologies

What are Type 1 and Type 3 token ring networks?

Token ring networks are generally considered either Type 1 or Type 3 configurations. Type 1 networks can support up to 255 stations per network ring and use shielded twisted pair wires with IBM-style Type 1 connectors.

Type 3 networks can support up to 72 stations per network and use unshielded twisted pair wires with Cat3, Cat4 or Cat5 with RJ-45 connectors. Like Ethernet, the token ring functions at Layers 1 and 2 of the Open Systems Interconnection (OSI) model.

What is a full-duplex token ring?

In a dedicated token ring, also called full-duplex token ring, switching hubs enable stations to send and receive data simultaneously on the network. In this case, a token ring switching hub divides the network into smaller segments. When a data packet is transmitted, the token ring switch reads the packet's destination address and forwards the information directly to the receiving station.

The switch establishes a dedicated connection between the two stations. This enables data to be transmitted and received simultaneously. But, in a full-duplex token ring, the token-passing protocol is suspended, making the network a "tokenless" token ring. Full-duplex token rings are designed to improve network performance by increasing the sending and receiving bandwidth for connected stations.

 

 


No comments: