Types of Networks
Types of Networks
LAN SETUP
IEEE has produced several standards for LANs. These standards collectively known
as IEEE 802 .IEEE802.3 (Ethernet), IEEE802.4 (Token Bus), IEEE802.5 (Token
Ring)
WAN SETUP
For most WANs, the long distance bandwidth is relatively slow: on the order of
kilobits per second (kbps) as opposed to megabits per second (Mbps) for local-area
networks (LANs). For example, an Ethernet LAN has a 10 Mbps bandwidth; a WAN
using part or all of a T1 carrier has a bandwidth of 1.544 Mbps.
Three types of approaches are used to connect WANs:
1) Circuit switching, which provides a fixed connection (at least for the duration of a
call or session), so that each packet takes the same path. Examples of this
approach include ISDN, Switched 56, and Switched T1.
2) Packet switching, which establishes connections during the transmission process
so that different packets from the same transmission may take different routes and
may arrive out of sequence at the destination. Examples of this approach are
X.25, frame relay, and ATM.
3) Leased lines, which can provide a dedicated connection for private use.
NETWORK MODELS
Layering Concepts and Benefits
Many benefits can be gained from the process of breaking up the functions or tasks
of networking into smaller chunks, called layers, and defining standard interfaces
between these layers. The layers break a large, complex set of concepts and
protocols into smaller pieces, making it easier to talk about, to implement with
hardware and software, and to troubleshoot.
The following list summarizes the benefits of layered protocol Specifications:
Humans can more easily discuss and learn about the many details of a protocol
specification.
Standardized interfaces among layers facilitate modular engineering.
A better environment for interoperability is created. One vendor can write software
that implements higher layersfor example, a Web browserand another can write
software that implements the lower layersfor example, Microsofts built-in TCP/IP
software in its operating systems.
Reduced complexity allows easier program changes and faster product evolution.
One layer uses the services of the layer immediately below it. Therefore,
remembering what each layer does is easier. (For example, the network layer needs
to deliver data from end to end. To do this, it uses data links to forward data to the
next successive device along that end-to-end path.)
PRESENTATION LAYER
All different formats from all sources are made into a common uniform format
that the rest of the OSI model can understand
Responsible for protocol conversion, character conversion, data encryption /
decryption, expanding graphics commands, data compression
Sets standards for different systems to provide seamless communication from
multiple protocol stacks
Not always implemented in a network protocol
SESSION LAYER
TRANSPORT LAYER
NETWORK LAYER
Turns packets into raw bits 100101 and at the receiving end turns bits into
packets.
Handles data frames between the Network and Physical layers
The receiving end packages raw data from the Physical layer into data frames
for delivery to the Network layer
Responsible for error-free transfer of frames to other computer via the
Physical Layer
This layer defines the methods used to transmit and receive data on the
network. It consists of the wiring, the devices use to connect the NIC to the
wiring, the signalling involved to transmit / receive data and the ability to
detect signalling errors on the network media
Error correction and flow control.
Manages link control and defines SAPs.
PHYSICAL LAYER
(1)
Point-to-Point
Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.
Hosts in Mesh topology also work as relay for other hosts which do not
have direct point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in
the network. Thus for every new host n(n-1)/2 connections are required. It
provides the most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
layer, and is central point of the network, i.e. root of the tree from which
all nodes fork.
Each link in daisy chain topology represents single point of failure. Every
link failure splits the network into two segments.Every intermediate host
works as relay for its immediate hosts.