0% found this document useful (0 votes)
46 views

Network Topology: Links Nodes Computer Network

Network topology refers to the layout of connections between components in a network. There are physical and logical topologies. Physical topology concerns physical design and connections, while logical topology concerns data flow. Common network topologies include chain, ring, and star. Chain connects all components in a line. Ring connects components in a circle with data traveling in one direction. Star connects all components to a central hub. Protection schemes provide redundancy to reroute traffic if failures occur. Types of protection include dedicated 1+1, which sends duplicate traffic on two paths, 1:1 which uses one path until a failure switches to the backup, and 1:N which shares a backup path between multiple working paths. Ring networks use un

Uploaded by

Ashish Shukla
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Network Topology: Links Nodes Computer Network

Network topology refers to the layout of connections between components in a network. There are physical and logical topologies. Physical topology concerns physical design and connections, while logical topology concerns data flow. Common network topologies include chain, ring, and star. Chain connects all components in a line. Ring connects components in a circle with data traveling in one direction. Star connects all components to a central hub. Protection schemes provide redundancy to reroute traffic if failures occur. Types of protection include dedicated 1+1, which sends duplicate traffic on two paths, 1:1 which uses one path until a failure switches to the backup, and 1:N which shares a backup path between multiple working paths. Ring networks use un

Uploaded by

Ashish Shukla
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Network topology

→ Topology can be considered as a virtual shape or structure of a


network. Network topology is the layout pattern of
interconnections of the various elements (links, nodes, etc.) of
a computer network.[1][2]

→ Network topologies may be physical or logical.


Physical topology means the physical design of a network
including the devices, location and cable installation. Logical
topology refers to how data is actually transferred in a network as
opposed to its physical design. In general physical topology
relates to a core network whereas logical topology relates to basic
network.
CHAIN TOPOLOGY
→ The simplest topology is a permanent link between two
endpoints . Switched point-to-point topologies are the basic model
of conventional telephony. The value of a permanent point-to-
point network is the value of guaranteed, or nearly so,
communications between the two endpoints. The value of an on-
demand point-to-point connection is proportional to the number of
potential pairs of subscribers.

Chain Topology
RING TOPOLOGY
→A network topology that is set up in a circular fashion in which
data travels around the ring in one direction and each device on
the right acts as a repeater to keep the signal strong as it travels.
Each device incorporates a receiver for the incoming signal and a
transmitter to send the data on to the next device in the ring. The
network is dependent on the ability of the signal to travel around
the ring.

Ring topology
STAR TOPOLOGY
→ In local area networks with a star topology, each network host
is connected to a central hub. In contrast to the bus topology, the
star topology connects each node to the hub with a point-to-point
connection. All traffic that traverses the network passes through
the central hub. The hub acts as a signal booster or repeater. The
star topology is considered the easiest topology to design and
implement.
→ An advantage of the star topology is the simplicity of adding
additional nodes. The primary disadvantage of the star topology is
that the hub represents a single point of failure.

STAR TOPOLOGY
SDH
→ Synchronous Digital Hierarchy (SDH) are
standardized multiplexing protocols that transfer multiple digital bit
streams over optical fiber using lasersor light-emitting
diodes (LEDs). Lower data rates can also be transferred via an
electrical interface. The method was developed to replace
the Plesiochronous Digital Hierarchy (PDH) system for
transporting larger amounts of telephone calls and data traffic
over the same fiber without synchronization problems.

→The SDH standard was originally defined by the European


Telecommunications Standards Institute (ETSI), and is formalized
as International Telecommunications Union (ITU) standards
G.707,[4] G.783,[5] G.784,[6] and G.803.[7][8] 

→The basic unit of framing in SDH is a STM-1 (Synchronous


Transport Module, level 1), which operates at 155.52 megabits
per second (Mbit/s).

→The STM-1 (Synchronous Transport Module, level 1) frame is


the basic transmission format for SDH—the first level of the
synchronous digital hierarchy. The STM-1 frame is transmitted in
exactly 125 µs, therefore, there are 8,000 frames per second on a
155.52 Mbit/s OC-3 fiber-optic circuit..
PDH
→The Plesiochronous Digital Hierarchy (PDH) is a technology
used in telecommunications networks to transport large quantities
of data over digital transport equipment such as fibre
optic andmicrowave radio systems.

→PDH allows transmission of data streams that are nominally


running at the same rate, but allowing some variation on the
speed around a nominal rate. By analogy, any two watches are
nominally running at the same rate, clocking up 60 seconds every
minute. However, there is no link between watches to guarantee
they run at exactly the same rate, and it is highly likely that one is
running slightly faster than the other.

→In  order to move multiple data streams from one place to


another, they are multiplexed in groups of four. This is done by
taking 1 bit from stream #1, followed by 1 bit from stream #2, then
#3, then #4. The transmitting multiplexer also adds additional bits
in order to allow the far end receiving multiplexer to decode which
bits belong to which data stream, and so correctly reconstitute the
original data streams. These additional bits are called
"justification" or "stuffing" bits.
Protection schemes for point to point links
→ Protection is to provide some redundant capacity with in a network
and automatically reroute the traffic around the failure using this
redundant capacity.

→ In a network basically we have two types of path:

a) Working path
b) Protection path

→ Working paths carry traffic under normal conditions. Protection


paths provide alternate paths in case of failure. Working and protection
paths are diversely routed so that both path are not lost in case of a
single failure.

→ Dedicated protection provides each working path its


own dedicated protection path;

Shared protection allows bandwidth sharing among the


protection paths of connections if the working paths of
these connections will not fail simultaneously (usually
linkdisjoint).
Unidirectional and Bidirectional Protection
Switching

→ Protection switching can be unidirectional or


bidirectional.

→Unidirectional protection switching: In the event of a


single fiber cut, only one direction of traffic is switched
over to the protection fiber and the other direction
remains on the original working fiber. (Suitable for
dedicated protection schemes)

→Bidirectional protection switching: In the event of a


single fiber cut, both directions are switched over to the
protection fibers(Suitable for shared protection schemes).
Protection for Point-to-Point Links(Automatic
Protection Switching)

a) 1+1 protection
b) 1:1 protection
c) 1:N protection
1+1 Protection
→In 1+1 protection, traffic is transmitted simultaneously
on two separate fibers (usually over disjoint routes) from
source to the destination, and the destination simply
selects one of the two fibers for reception. If that fiber is
cut, the destination simply switches over to the other
fiber and continues to receive data.

→ 1+1 protection is fast but requires high bandwidth


Redundancy.


1:1 Protection
→ In 1:1 protection, there are still two fibers from source
to the destination. However, traffic is transmitted over
only one fiber at a time (working fiber). If that fiber is
cut, the source and the destination both switch over to
the other protection fiber.

→ 1:1 protection is not as quick as 1+1 protection in


restoring traffic, but results in a better bandwidth
utilization.


1:N Protection

→ 1:N protection is a generalization of 1:1 protection, in


which N working fibers share s single protection fiber.
This scheme can handle the failure of any single working
fiber.

→1:N protection is very efficient in terms of bandwidth


Utilization.


Protection for Ring Networks

→ In a ring network basically there are 2 types of protection schemes:


a) Unidirectional path switched ring (UPSR)
b) Bi-directional line switched ring (BLSR)

Unidirectional path switched ring(UPSR):-

→In a UPSR, one fiber (a path) is used as working fiber


and the other as the protection fiber. Traffic is
transmitted simultaneously on the working fiber in the
clockwise direction and on the protection fiber in the
counterclockwise direction.

UP
SR
Bidirectional line switched rings (BLSR):

→In a four-fiber BLSR, two fibers (a line) are used as


working fibers and, two are used for protection. Unlike a
UPSR,working traffic in a BLSR can be carried on both
directions along the ring (usually along shortest path
between two nodes). A BLSR is essentially 1:1 protection.
The BLSR employs two protection mechanisms: span
switching and ring Switching.

BLSR

You might also like