Unit-4 network
Unit-4 network
NETWORKS
A network is the interconnection of a set of devices capable of communication. In this definition, a device can
be a host (or an end system as it is sometimes called) such as a large computer, desktop, laptop, workstation,
cellular phone, or security system. A device in this definition can also be a connecting device such as a router,
which connects the network to other networks, a switch, which connects devices together, a modem (modulator-
demodulator), which changes the form of data, and so on. These devices in a network are connected using wired
or wireless transmission media such as cable or air. When we connect two computers at home using a plug-and-
play router, we have created a network, although very small.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.
Performance
Performance can be measured in many ways, including transit time and response time. Transit time is the
amount of time required for a message to travel from one device to another. Response time is the elapsed time
between an inquiry and a response. The performance of a network depends on a number of factors, including the
number of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency
of the software.
Performance is often evaluated by two networking metrics: throughput and delay. We often need
more throughput and less delay. However, these two criteria are often contradictory. If we try to send more data
to the network, we may increase throughput but we increase the delay because of traffic congestion in the
network.
Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it takes
a link to recover from a failure, and the network’s robustness in a catastrophe.
Security
Network security issues include protecting data from unauthorized access, protecting data from damage and
development, and implementing policies and procedures for recovery from breaches and data losses.
Physical Structures
Before discussing networks, we need to define some network attributes.
Type of Connection
A network is two or more devices connected through links. A link is a communications pathway that transfers
data from one device to another. For visualization purposes, it is simplest to imagine any link as a line drawn
between two points. For communication to occur, two devices must be connected in some way to the same link
at the same time. There are two possible types of connections: point-to-point and multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is
reserved for transmission between those two devices. Most point-to-point connections use an actual length of
wire or cable to connect the two ends, but other options, such as microwave or satellite links, are also possible
(see Figure 1.3a). When we change television channels by infrared remote control, we are establishing a point-
to-point connection between the remote control and the television’s control system.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific devices share a single
link (see Figure 1.3b).
In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If several
devices can use the link simultaneously, it is a spatially shared connection. If users must take turns, it is a
timeshared connection.
Definition:
A network topology is the physical and logical arrangement of connections and nodes in a network.
Nodes are usually devices like routers, switches, and software with router and switch features.
Selection criteria:
Selection Criteria for topologies Different network topologies have its own advantages and
disadvantages. So, following factors are considered while selecting a topology:
1.Cost
2.Number of users
3.Security
4. Reliability
5.Scalability
6. Bandwidth capacity
7. Ease of installation
8. Ease of troubleshooting
Bus
A topology where all nodes are connected to a single cable, called the bus or backbone. This topology is
inexpensive, resource-efficient, and can be extended by adding more cable. However, the cable is a single point
of failure, and the cable’s bandwidth is limited.
Ring
A topology where devices are connected in a circle, with each device connected to its two neighbors. Data flows
in one direction around the ring. This topology is easy to set up, can handle large traffic volumes, and is often
used in fiber optic networks. However, it is highly sensitive to potential disruptions.
Star
A topology where every peripheral node is connected to a central node, called a hub or switch. This topology is
considered the easiest to design and implement. However, the hub is a single point of failure, and the central hub
can form a network bottleneck for large clusters. .
Tree
A hierarchical topology where nodes link and arrange like a tree. This topology is desired for its scalability and
ability to isolate issues efficiently. However, it is dependent on the root node, so if the node fails, the entire
network is at risk.
Mesh
Mesh topology is a network configuration where devices are interconnected in a decentralized manner. Instead
of relying on a central hub or switch, each device connects directly to multiple other devices, forming a mesh-
like structure. It allows for multiple paths between devices, enhancing redundancy and fault tolerance.
Hybrid
Hybrid topology, or hybrid network, is commonly used in large enterprise networks as it offers a scalable and
flexible network infrastructure. However, when deciding on a hybrid topology, network performance and the
number and location of computers are essential factors to consider.
Repeater
A repeater operates at the physical layer. Its job is to amplify (i.e., regenerate) the signal over the same network
before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over
the same network. When the signal becomes weak, they copy it bit by bit and regenerate it at its star topology
connectors connecting following the original strength. It is a 2-port device.
Understanding network devices is key to mastering networking concepts, which are heavily tested in exams like
GATE. To ensure you’re fully prepared, consider the GATE CS Self-Paced Course . This course offers in-depth
coverage of networking topics, including detailed tutorials on the various network devices, helping you build the
expertise needed to excel in your exams.
Hub
A hub is a multi-port repeater. A hub connects multiple wires coming from different branches, for example, the
connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to
all connected devices. In other words, the collision domain of all hosts connected through Hub remains one.
Also, they do not have the intelligence to find out the best path for data packets which leads to inefficiencies and
wastage.
Access Point
An access point in networking is a device that allows wireless devices, like smartphones and laptops, to connect
to a wired network. It creates a Wi-Fi network that lets wireless devices communicate with the internet or other
devices on the network. Access points are used to extend the range of a network or provide Wi-Fi in areas that
do not have it. They are commonly found in homes, offices, and public places to provide wireless internet
access.
Modems
Modems is also known as modulator/demodulator is a network device that is used to convert digital signal into
analog signal of different frequencies and transmits these signal to a modem at the receiving location. These
converted signals can be transmitted over the cable systems, telephone lines, and other communication
mediums. A modem is also used to convert analog signal back into digital signal. Modems are generally used to
access internet by customers of an Internet Service Provider (ISP).
Types of Modems
There are four main types of modems:
DSL Modem: Uses regular phone lines to connect to the internet but it is slower compared to other
types.
Cable Modem: Sends data through TV cables, providing faster internet than DSL.
Wireless Modem: Connects devices to the internet usingWi-Fi
Relying on nearby Wi-Fi signals.
Cellular Modem: Connects to the internet using mobile data from a cellular network not Wi-Fi or fixed
cables.
Bridge
A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of filtering content
by reading the MAC addresses of the source and destination. It is also used for interconnecting two LANs
working on the same protocol. It has a single input and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges: These are the bridge in which the stations are completely unaware of the bridge’s
existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of the
stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge
learning.
Source Routing Bridges: In these bridges, routing operation is performed by the source station and the
frame specifies which route to follow. The host can discover the frame by sending a special frame
called the discovery frame, which spreads through the entire network using all possible paths to the
destination.
Switch
A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports
imply less traffic) and performance. A switch is a data link layer device. The switch can perform error checking
before forwarding data, which makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to the correct port only. In other words, the switch divides the collision domain of
hosts, but the broadcast domain remains the same.
Types of Switches
Unmanaged Switches: These switches have a simple plug-and-play design and do not offer advanced
configuration options. They are suitable for small networks or for use as an expansion to a larger network.
Managed Switches: These switches offer advanced configuration options such as VLANs , QoS , and link
aggregation. They are suitable for larger, more complex networks and allow for centralized management.
Smart Switches: These switches have features similar to managed switches but are typically easier to set up and
manage. They are suitable for small- to medium-sized networks.
Layer 2 Switches: These switches operate at the Data Link layer of the OSI model And are responsible for
forwarding data between devices on the same network segment.
Layer 3 switches: These switches operate at the Network layer of the OSI model and can route data between
different network segments. They are more advanced than Layer 2 switches And are often used in larger, more
complex networks.
PoE Switches: These switches have Power over Ethernet Capabilities, which allows them to supply power to
network devices over the same cable that carries data.
Gigabit switches: These switches support Gigabit Ethernet speeds, which are faster than traditional Ethernet
speeds.
Rack-Mounted Switches: These switches are designed to be mounted in a server rack and are suitable for use in
data centers or other large networks.
Desktop Switches: These switches are designed for use on a desktop or in a small office environment and are
typically smaller in size than rack-mounted switches.
Modular Switches: These switches have modular design, which allows for easy expansion or customization.
They are suitable for large networks and data centers.
Router
A router is a device like a switch that routes data packets based on their IP addresses. The router is mainly a
Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating routing
table based on which they make decisions on routing the data packets. The router divides the broadcast domains
of hosts connected through it.
Gateway
A gateway, as the name suggests, is a passage to connect two networks that may work upon different
networking models. They work as messenger agents that take data from one system, interpret it, and transfer it
to another system. Gateways are also called protocol converters and can operate at any network layer. Gateways
are generally more complex than switches or routers.
NIC
NIC or network interface card is a network adapter that is used to connect the computer to the network. It is
installed in the computer to establish a LAN. It has a unique id that is written on the chip, and it has a connector
to connect the cable to it. The cable acts as an interface between the computer and the router or modem. NIC
card is a layer 2 device which means that it works on both the physical and data link layers of the network
model.
Wireless Networks
Wireless networks can provide client mobility, the ability to connect from any location and at any time, and the
ability to roam while staying connected. A Wireless LAN (WLAN) is a classification of wireless network that is
commonly used in homes, offices, and campus environments. Although it uses radio frequencies instead of
cables, it is commonly implemented in a switched network environment and its frame format is similar to
Ethernet.
This chapter covers WLAN technology, components, security, planning, implementation, and troubleshooting.
The types of network attacks to which wireless networks are particularly susceptible are discussed.
Supporting Mobility
Productivity is no longer restricted to a fixed work location or a defined time period.
People now expect to be connected at any time and place, from the office to the airport or the home.
Users now expect to be able to roam wirelessly. Roaming enables a wireless device to maintain Internet
access without losing a connection.
Benefits of Wireless
Increased flexibility Increased productivity Reduced costs
Ability to grow and adapt to changing requirements
Wireless Technologies
Wireless networks can be classified broadly as:
Wireless personal-area network (WPAN) – Operates in the range of a few feet (Bluetooth).
Wireless LAN (WLAN) – Operates in the range of a few hundred feet.
Wireless wide-area network (WWAN) – Operates in the range of miles.
Bluetooth – An IEEE 802.15 WPAN standard; uses a device-pairing process to communicate over
distances up to .05 mile (100m).
Wi-Fi (wireless fidelity) – An IEEE 802.11 WLAN standard; provides network access to home and
corporate users, to include data, voice and video traffic, to distances up to 0.18 mile (300m).
Worldwide Interoperability for Microwave Access (WiMAX) – An IEEE 802.16 WWAN standard
that provides wireless broadband access of up to 30 mi (50 km).
Cellular broadband – Consists of various corporate, national, and international organizations using
service provider cellular access to provide mobile broadband network connectivity.
Satellite Broadband – Provides network access to remote sites through the use of a directional satellite
dish.
Wireless NICs
Wireless deployment requires:
End devices with wireless NICs
Infrastructure device, such as a wireless router or wireless AP
Figure 1 Figure 2
For larger organizations with many APs, Cisco provides controller-based managed solutions, including
the Cisco Meraki Cloud Managed Architecture and the Cisco Unified Wireless Network Architecture.
Cisco Meraki cloud architecture is a management solution used to simplify the wireless deployment.
Using this architecture, APs are centrally managed from a controller in the cloud.
Wireless Antennas
Cisco Aironet APs can use:
Omnidirectional Wi-Fi Antennas – Factory Wi-Fi gear often uses basic dipole antennas, also referred to
as “rubber duck” design, similar to those used on walkie-talkie radios. Omnidirectional antennas
provide 360-degree coverage.
Directional Wi-Fi Antennas – Directional antennas focus the radio signal in a given direction, which
enhances the signal to and from the AP in the direction the antenna is pointing.
Yagi antennas – Type of directional radio antenna that can be used for long- distance Wi-Fi networking.
802.11 Wireless Topologies
802.11 Wireless Topology Modes
Ad Hoc Mode
Tethering (personal hotspot) – Variation of the Ad Hoc topology when a smart phone or tablet with cellular data
access is enabled to create a personal hotspot.
Infrastructure Mode