NowtAdminCase Studiesmodule1Module2Module3Module4Module5Module6Glossary

 
nowtCapturing DataVerification and ValidationOrganisation of DataCapabilities of SoftwareProcessing DataDisemination and distributionHardwareSecurity of dataNetwork enviromentsnowt
endCommunicationsNW EnviromentsNW ProtocolsNW TopologiesNW ComponentsQuestionsend
 

Network Topologies

The network cable links nodes. A node is any element connected to the network that plays some part in making the system work. A file server, a printer server, the interface on a user PC are all network nodes. The standard network topologies are:-

Star Network

Star Network

This was once a common configurations when a central computer was used to link dumb or semi-dumb terminals. It is now often used for LAN or WAN networks. It has the advantage that if one cable or node (other than the central node) is faulty then the rest of the network can continue to function. The best modern examples of this network style are ATMs and the Loto Machine network.

The central file server has been replaced by a device known as a hub or switch and the file server now commonly resides at the end of a link just like any other device. The network can be extended by adding additional hubs or switches at the end of a link and branching off these. There is, however, a limitation on how deep you can go which is usually 4 steps. As hubs and switches can deal with 32 or more connections the theoretical maximum number of stations is very large.

Ring Network

Here nodes are linked in a ring. Data is passed from one node to the next. This topology is used for LAN networks. The most important ring network implementation is the IBM token ring. A token is passed from node to node. A station wanting to transmit data to another station must wait until its interface node receives the token. The data is attached to the token together with the destination and transmitting stations addresses. The token is then passed onto the next node.

Note that the interface is shorted out if the network station is powered down (a shorting relay is held open by station's power supply so that removing power closes the relay shorting out the node). When the packet of information is received at the correct destination then the data is extracted and flags are set within the packet to indicate that the data has been correctly received.

Ring Network

The token then continues round the ring until it returns to the originating station. The token is then freed to carry other data. Monitor node responsible for soaking up token that is set to circulate endlessly because initiating or receiving station is no longer present. This system's performance levels can be determined for different traffic levels - it is deterministic - which is an advantage. A disadvantage is cabling cost to complete the ring and difficulty in extending an existing ring.

Bus Network

Here nodes are attached to a central bus. in an arrangement that is used for LAN networks. There is the definite possibility that two nodes will attempt to transmit at the same time - this is called a collision. In an Ethernet network this is handled as follows. A node needing to transmit examines traffic on the bus and waits until there is none. It then pauses - so that there is a minimum space between frames. It then puts its data on the bus. If a collision occurs because another node starts to transmit at the same time then both nodes cease transmitting, wait for a random time interval and then start the process again. This is known as CSMA/CD - Carrier Sense Multiple Access / Collision Detection

Bus Network

Note that there are terminators at either end of the cable to soak up the signal - preventing reflection back down the cable. Advantages are that less cable is needed than token ring, network can be easily extended and that if one section of cable is faulty the network can be shortened and the remaining section used while the fault is repaired. Disadvantage is that behaviour of network under heavy traffic is unpredictable and long delays may occur. A frame will consist of identification of source and destination, data length (variable) and data plus error detection data.

Mesh Network

Mesh network nodes are connected one to another as required. This topology is used for WAN networks and data is usually transmitted in packets in what is known as a packet switching network.

Mesh Network

The complete message to be sent will be broken up into a sequence of packets each containing source and destination addresses and a sequence number. These packets will be transmitted from node to node by whatever routes are free. They will probably arrive at their destination out of sequence because of the different routes taken. The receiving node will reassemble the packets into order before extracting the data. Note that in a message switching network a complete message is transmitted in one go. This requires a sender to destination link to be established before the transmission can begin. Packet switching offers a more flexible approach and allows the traffic to be more evenly spread over the network.

Note the difference in transmission rates. LAN's use baseband transmission (pulses) and have typical transmission rates of up to 100 Mbits/second. WANs using leased line, ISDN, modems and telephone cable transmit at about 2 Mbits/second.

   

© LEV