0% found this document useful (0 votes)
8 views

Dcn -Unit-V PDF Notes

The document discusses various network topologies, including Peer-to-Peer, Client-Server, Bus, Ring, Star, Mesh, and Tree topologies, detailing their structures, advantages, and disadvantages. It also defines key networking concepts such as clients, servers, and network devices, while providing criteria for selecting network topologies. Additionally, it compares different topologies and outlines the roles of various networking devices.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Dcn -Unit-V PDF Notes

The document discusses various network topologies, including Peer-to-Peer, Client-Server, Bus, Ring, Star, Mesh, and Tree topologies, detailing their structures, advantages, and disadvantages. It also defines key networking concepts such as clients, servers, and network devices, while providing criteria for selecting network topologies. Additionally, it compares different topologies and outlines the roles of various networking devices.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

UNIT-5

NETWOR TOPOLOGY AND NETWORK DEVICE


Q-1- draw and explain peer to peer network
Ans→ In a Peer-to-Peer (P2P) computing model, all devices/nodes (peers) have equal status and
can act both as clients and as servers, meaning they can initiate requests and respond to requests.
• In a P2P network, peers can share resources, such as files or processing power, directly
with one another without the need for a central server
• Figer shows the structure of peer-to-peer network/peer-to-peer computing model.

Figar: Peer-to-Peer (P2P)Computing Mode

• The structure of P2P computing model is decentralized, with each peer directly connected
to other peers and each peer can provide and consume resources, data and services as
shown in the Figer.
• Peer-to-peer network is useful for a small network containing less than 8-10 computers
on a single LAN and each computer maintains its own accounts and their security settings

Q-2 Advantage of and Disadvantages peer to peer network


Ans→ Advantages of P2P Networks/Computing Model:
1. No dedicated server required.
2. Less expensive.
3. Easy to install and maintain.
4. Cheaper in cost (no extra investment in server software or hardware is required).
5. Easy to setup.
6. Users can control their resource sharing.
Disadvantages of P2P Computing Model:
1. Slow in speed.
2. Not good for database applications.
3. Less reliable (server is workstation).
4. Limited expandability.
5. Hard to backup.
6. Lack of centralized control can lead to security vulnerabilities
Q-3 Characteristics/Features of Peer-to-Peer Computing Model
Ans→ 1. Decentralized Control: There is no central server; each peer independently manages its
resources.
2. Resource Sharing: Resources like files, processing power, and storage are shared across all
peers.
3. Scalability: Easy to expand by adding more peers, as each new peer contributes additional
resources.
4. Fault Tolerance: The failure of one or more peers does not disrupt the entire network, making
it resilient.

Q-4 Define client and server


Ans→ Definition of client:
A client is a computer running a program that requests services from a server. The individual
workstations in a network are clients.
Definition of server:
A server is simply a computer that makes the network resources available and provides service
to other computers when they request for it.

Q. 5 Explain with diagram with process of client-server computing model.


Ans→
• Client-server computing model also known
as server-based network or called as client-
server networks.
• In computing model, a centralized powerful
host computer known as server and a user's
individual workstation known as client.
• In a server-based network, the server is the
central location where users share and
access network resources, (See the finger).
Figer. Client-Server Computing Model
• This dedicated computer controls the level of access that users have to share resources.
Each computer that connects to the network is called a client computer.
• The client requests for services (file sharing, resource sharing etc.) from the server and
the server responds by providing that service.
➢ Characteristics of Client-Server Networks
1. Centralized Control: Servers manage access to resources and enforce security and policies.

2. Resource Availability: Servers are dedicated to providing resources, ensuring consistent


availability.

3. Scalability: Servers can be scaled (e.g., adding more resources or servers) to accommodate
more clients

Q. 5 Deference between Peer-to-Peer Computing Model and Client-Server


Computing Model
Ans→

Peer-to-Peer Computing Model Client-Server Computing Model


1. In a P2P network, each participant (or 1.In client-server architecture all
"peer") acts as both a client and a server. communications are via a central server to
which all clients connect.
2. Low cost in set-up and installation. 2.The cost to setup a client-server model is
high.
3.Decentralized computing model. 3.Centralized computing model.
4.In peer-to-peer network, peers act as both 4.In a client-server network, the designated
service providers and service consumers at clients request for services, and the servers
the same time(data flows within peers) . provide them (data flows from server to clint)
5. Peer-to-peer model are best suited to home 5. Client-server architectures work best for
or very small office set-ups. larger set-ups, such as a full-scale office or
school network.
6. Peers can access share resources directly, 6. Clients request services or resources from a
with one another without the need for a centralized server that manages data and
central server. provides services to multiple clients.
7.Less security than client-server computing 7. Highly secured
model
Q. 6 Define term topology .list type of topology
Ans→ Network topology refers to the physical or logical arrangement of devices (like computers,
switches, routers, etc.) in a network and how they are connected and communicate with each
other.

ypes of Network Topologies:

1. Bus Topology

2. Star Topology

3. Ring Topology

4. Mesh Topology

5. Tree Topology

6. Hybrid Topology
Q.7 Give any four selection criteria for selecting network topology.
Ans→

• the selection of a topology depends on the needs of the particular application.


• Following are some of the selection criteria for selecting a topology for an application:

1. Size of the network and number of devices (nodes) being connected.

2. Ease of configuration and installing.

3. The ease of adding a new device (user) in an existing network.

4. The ease of fault indication and rectification.

5. Number of physical links required to be used for connecting the devices.

6. Whether connecting devices such as repeaters, switches, hubs etc are required or not.

7. Costs involved.

8. Need of data security.

9. Need of network administration.

Q.8 Draw the sketch of bus topology and explain


Ans→

• The bus topology is a network topology in which nodes are directly


connected to the common linear or branched half duplex link called as bus.
• In bus topology all devices are connected to a single central cable, called the
"bus" or "backbone."
• The data in bus topology is sent from one device travels through the bus and
is received by all other devices, but only the intended recipient processes it

Figer: Bus Topology


➢ Advantages of Bus Topology:

1. Easy to install and set-up.

2. Cheaper in cost because requires less cabling.

3. Any one computer or device being down does not affects the others.

4. Faster in speed as compare to ring topology.

➢ Disadvantages of Bus Topology:

1. A failure in the main cable disrupts the entire network.

2. A fault or break in the bus cable stops all data transmission.

3. If network traffic is heavy or nodes are more the performance of the network decreases.

4. Used for only a small network and only supports a small number of network devices.

➢ Explain working bus topology


• When one computer sends a signal on the cable; all the computers on the network receive
the information.
• However, only the one with the address that matches with the destination address stored
in the message accepts the information while all the others reject the message.
• The speed of the bus topology is slow because only one computer can send a message at
a time.
• A computer must wait until the bus is free before it can transmit.
• The bus topology requires a proper termination at both the ends of the cable in order to
avoid reflections.
• Since the bus is a passive topology, the electrical signal from a transmitting computer is
free to travel over the entire length of the cable.
• Without termination when the signal reaches the end of the cable, it returns back and
travels back on the cable.
• The transmitted waves and reflected waves, if they are in phase add and if they are out of
phase cancel.
• Thus addition and cancellation of wave results in a standing wave.
• The standing waves can distort the normal signals which are travelling along the cable.
Q. 9 With suitable diagram describe: RING topology.
Ans→
• A ring topology is a network topology in which each node connects exactly to two other
nodes, to form a single closed pathway for signal through each node.
➢ Data travels from node to node with each node having an access to every packet.
➢ In a ring topology, each computer is connected to the next computer, with the last one
connected to the first as shown in Figer.
➢ Rings are used in high-performance
networks where large bandwidth is
necessary e.g. time sensitive features such
as video and audio.
➢ Every computer is connected to the next
computer in the ring and each retransmits
what it receives from the previous
computer hence the ring is an active
network.

Figer: Ring topology


➢ Advantages RING topology.

1. Require less cabling. Less expensive and Easy to install.

2. Adding or deleting a device is easy (easy to scale).

3. Reduces chances of collision and Fault isolation is simplified.

4. Each computer has equal access to resources

5. Its performance is better than that of Bus topology.

➢ Disadvantages RING topology


1. If one node goes down, it takes down the whole network.

2. Slow in speed.

3. Reconfiguration is needed to add nodes and the whole network must be down first.

4. In ring topology the traffic is unidirectional


Q. 10 With suitable diagram describe: STAR topology.
• Star topology is a network topology, in which each individual piece of a network is connected
to a central node called as a hub or switch.
• In a star topology all the computers (nodes) are connected via cables to a central location
where they are all connected by a device called a hub as shown in Figer.
• There is no direct connections among the
computers. All the connections are made
via the central hub.
• Stars are used in concentrated networks,
where the endpoints are directly
reachable from a central location; when
network expansion is expected and when
the greater reliability of a star topology is
needed.
• The telephone system also uses the star
topology.

Figer: Star topology


➢ Advantages STAR topology
1. Easy to install, reconfigure and wire.

2. Centralized management which helps in monitoring the network.

3. Fast in speed as compared to ring topology.

4. Multiple devices can transfer data without collision.

5. Easy to detect the failure and troubleshoot it.

➢ Disadvantages STAR topology


1. If the central node (hub or switch) goes down then the entire network goes down.

2. More cabling is required than bus or ring topology, so more expensive and high cost.

3. Performance is dependent on capacity of the central device.


Q. 11 Explain mesh topology with suitable diagram.
• In a mesh topology, each of the network node, computer and other devices, are
interconnected with one another. In mesh topology each node may send message to
destination through multiple paths.

• While the data is travelling on the mesh Network it is automatically configured to reach
the destination by taking the shortest route which means the least number of hops.
• Figer shows a mesh topology. Mesh topology is
used in WAN. A mesh topology employs one of
two connection arrangements, full mesh
topology or partial mesh topology.

1. In a full mesh topology, each network node is


connected to every other node in the network. Due to
this arrangement of nodes, it becomes possible for a
simultaneous transmission of signals from one node to
several other nodes.

Figer: Mesh Topology

2. In a partially connected mesh topology, only some of the network nodes are connected to more
than one node. This is beneficial over a fully connected mesh in terms of redundancy caused by
the point-to-point links between all the nodes.

➢ Advantages of Mesh Topology:

1. Mesh topology is robust. If one link becomes unusable, it does not affect other systems.

2. Eliminates traffic problem.

3. Each connection can carry its own data load due to dedicated link.

4. Privacy or security because of dedicated line.

5. Point-to-point link make fault identification and troubleshooting easy and simple.

➢ Disadvantages of Mesh Topology:


1. More cables are required so cost is higher than other topologies.

2. Installation and reconfiguration are very difficult because each device must be connected to
every other device.

3. Set-up and maintenance of this topology is very hard and difficult.

4. Expensive due to hardware requirements such as cables and input/output ports.


Q. 12 Explain tree topology with neat diagram.
• Tree topology is a special type of structure in which many connected elements are
arranged like the branches of a tree.

• A tree topology is a variation of a star. As in a star, nodes in a tree are connected to a


central hub head end that controls the entire
network.
• However, every computer is not plugged into the
central hub.
• Most of them are connected to a secondary hub
which in turn is connected to the central hub as
shown in Figer.
• The central hub in the tree is an active hub which
contains repeater.
• The repeater amplify the signal and increase the
distance a signal can travel.
• The secondary hubs may be active or passive. A
passive hub provides a simple physical
connection between the attached devices.

Figer: Tree topology


➢ Advantages: Tree topology

1. Easy to install and wire.


2. Fast as compared to other topologies.
3. Multiple devices can transfer data without collision.
4. It eliminates traffic problems.
5. No disruptions to the network then connecting or removing devices.
6. Easy to detect faults and to remove parts.
➢ Disadvantages: Tree topology
1. It relies heavily on the main bus cable, if it breaks the whole network is crippled.
2. More expensive than other topologies.
3. The cabling cost is more.
4. As more and more nodes and segments are added; the maintenance becomes difficult.
5. Failure in the central hub brings the entire network to a halt.
Q. 13 Comparison of bus and star Topologies:
bus star
1.Uses a cable as bus or backbone to connect 1. Uses a central hub to connect the nodes to
all nodes. each other.
2. Baseband or broadband coaxial cable is 2. Twisted pair, coaxial cables or optical fiber
used. cables are used.
3. If a part of bus fails, the whole network fails. 4. Failure of the central hub will make the
entire network collapse.
4.Adding an new node is difficult. 4. Adding and removing a node is relatively
easy
5. Fault diagnosis is relatively difficult. 5. fault diagnosis is easy
Q. 14 Comparison of Tree and Mesh Topologies:
Mesh topology Tree topology

In this topology, each node is connected to more than It is in the shape of an inverted tree with the
one node to provide an alternative route in the case the central root branching and sub-branching to the
host is either down or too busy. extremities of the network.

It is excellent for long distance networking because it It is suitable for small-sized Local Area
provides extensive back-up, rerouting and pass- Networks.
through capabilities.

Mesh topology is very expensive as the cable used is The cost of a tree topology is less compared to
more. mesh topology.

Installation is difficult. Installation is easy as compared to mesh


topology.

Difficult to maintain. Easy to maintain.

Fault diagnosis is easy. Fault diagnosis is difficult.

Network connecting device


Q-1 list network connecting device:
1. Hub
2. Switch
3. Router
4. Modem
5. Router
6. Network Interface Card (NIC)
7. Gateway
8. Bridge

9. Repeater
Q-2 Role of networking devices
1.Repeater -Regenerates the original signal. Operates in the physical layer.

2. Bridge--Bridges utilize the address protocol. They can carry out the traffic management. They
are most active in the data link layer.

3.Routers--Routers provide connections between two separate but compatible networks. It


works in the network layer.

4.Bridge ----Bridges utilize the address protocol. They can carry out the traffic management. They
are most active in the data link layer.

5.Routers---Routers provide connections between two separate but compatible networks. It


works in the network layer.

6. Switch---Provides bridging functionality with great efficiency.

Q—3 describe repeater. state function of repeater


• A repeater is a connecting device which can operate only in the physical layer of the OSI
model.
• All transmission media weaken the electromagnetic waves that travel through them.
• Attenuation of signals limits the distance any medium can carry data. Devices that
amplifies signals to ensure data transmission are called repeaters.
➢ Function of a repeater:
• A repeater receives a signal and before it gets attenuated or corrupted, regenerates the
original signal.
• Repeater is not an amplifier because amplifiers simply amplify the entire incoming signal
along with noise.
• A repeater does not connect two LANs. It connects only two devices connected in the
same LAN.
• It cannot connect two LANs of a different protocols.
• A repeater forwards every frame, it cannot filter out some frames and let the others pass
through.
• A repeater should be placed at a
precise point on the link. Such
that the signal reaches it before
the noise has induced an error in
any of the transmitted bits.
• Figer illustrates the
function of a repeater.

Figer: function of a repeater


Q. 4 State the advantages of repeater.
1. Repeaters can regenerate the desired information.

2. They can reduce the effect of noise.

3. They can extend the network.

4. It reduces the number of errors introduced due to noise.

Q. 5 State the disadvantages of repeater.


1. A repeater cannot connect two LANs. It can only connect two devices connected in the same
LAN.

2.It has no filtering capability.

3. Repeaters can operate only in the physical layer.

4. Repeaters must be placed at the precise point on the link so as to be effective.

Q. 6 What is hub ? Give the different types of hubs


The general meaning of the word hub is any connecting device. But its specific meaning is
multiport repeater.

➢ Function:
• It is normally used for connecting stations in a physical star topology.
• All networks require a central location to connect various segments of media coming from
various nodes.
• Such a central location is called as a hub. A hub organizes the cables and relays signals to
the other media segments as shown in Figer.

Figer: Hub
There are three main types of hubs:

1. Passive hubs
2. Active hubs
3. Intelligent hubs
1. Passive hubs:

• A passive hub simply combines the signals of a network segments. There is no signal
processing or regeneration. It merely acts as a connector.
• A passive hub reduces the cabling distance by half because it does not boost the signals
and in fact absorbs some of the signal.
• With a passive hub, each computer receives the signals sent from all the other computers
connected to the

2. Active hubs:
• They are like passive hubs but have electronic components for regeneration and
amplification of signals.
• By using active hubs the distance between devices can be increased. An active hub is
equivalent to a multipoint repeater.
• The main drawback of active hubs is that they amplify noise as well along with the signals.
They are more expensive than passive hubs as well.

3. Intelligent hubs:
• In addition to signal regeneration, intelligent hubs perform some other intelligent
functions such as network management and intelligent path selection.
• A switching hub chooses only the port of the device where the signal needs to go, rather
than sending th signal along all paths.

Q. 6 Draw and explain the working of bridge


• A network bridge is a computer networking device that creates a single aggregate network
from multiple communication networks or network segments. This function is called
network bridging.
• Bridging connects two separate networks as if they were a single network. It works at the
Data Link layer (layer 2) of the OSI Model and connects the different networks together
and develops communication between them.
• The bridge acts as an interconnection
between two networks, where
communication happens between
networks through the bridge only.

Figer: Function of a Bridge


Q.7 Describe the working of router with suitable diagram.
• Routers are networking devices operating at layer 3 (network layer) of the OSI model.
Routers are responsible for receiving, analyzing and forwarding data packets among the
connected computer networks.
• When a data packet arrives, the router
inspects the destination address, consults
its routing tables to decide the optimal
route and then transfers the packet along
this route.
• The functioning of a router depends
largely upon the routing table stored in it.
The routing table stores the available
routes for all destinations. The router
consults the routing table to determine
the optimal route through which the data
packets can be sent.
• Routing tables are of following two types:
1. In Static Routing Table, the routes are fed manually and are not refreshed
automatically. It is suitable for small networks containing 2-3 routers.
2.In Dynamic Routing Table, the router communicates with other routers using
routing protocols to determine the available routes. It is suited for larger networks having
large number of routers.

➢ Features of Routers:

1. A router connects different networks together and sends data packets from one
network to another.
2. A router is a layer 3 or network layer device of the OSI network model.
3. A router can be used both in LANs (Local Area Networks) and WANS (Wide Area
Networks).
4. It transfers data in the form of IP packets.
5. Routers have a routing table in it that is refreshed periodically according to the changes
in the network. In order to transmit data packets, it consults the table and uses a routing
protocol.
6. Routers are more expensive than other networking devices like hubs,
bridges, and switches.
Q. 8 With neat diagram explain gateways
• Gateway works on all seven (7) layers of the OSI model. Gateway is a network device used
to connect two or more dissimilar networks.
• A gateway in networking is a hardware device that serves as a bridge between two
different networks, allowing data to flow from one to the other.
• It acts as a "gate" between
networks, and it may be used
to connect a local network to
the internet or to link a local
network to another local
network
• Figer shows working of a
gateway which connect a
LAN and Internet dissimilar
networks. A gateway is a
node or a device in a network
that serves as an entry or exit
point to another network.

Q.9 Explain with the neat sketch the working switch.


• A switch is a networking device which connects devices together on a computer network
by using packet switching to receive, process and forward data to the destination.
• Network switch is a small hardware device that joins multiple computers together within
one Local Area Network (LAN).
• It is used in to send data point to point, meaning directly from one computer to another.
Network switches operate at layer two (Data Link Layer) of the OSI model.
• A network switch can be defined as the device that connects the network devices or
network segments. Switches available with 4, 8, 12, 24, 48, 64 ports.
• Figer shows working of switch connecting device.
• Switch connect devices in a network and use packet switching to send, receive or forward
data packets or data frames over the network.

figure (a) Unicasting by a Switch figure (b) Multicasting by a Switch


➢ Features of Switche:

1. A switch is an intelligent network device that can be conceived as a multiport network bridge.

2. Switches are active devices, equipped with network software and network management
capabilities

3. Switches uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.

4. It uses packet switching technique to receive and forward data packets from the source to the
destination device.

5. It is supports unicast (one-to-one), multicast (one-to-many), and broadcast (one-to-all)


communications.

6. Switches can perform some error checking before forwarding data to the destined port.

7. A switch operates in the layer two (2), i.e. data link layer of the OSI model.

8. Transmission mode is full duplex, i.e. communication in the channel occurs in both the
directions at the same time.

Q 10 different between router and repeater

Feature Router Repeater

Purpose Connects multiple devices to the Extends the range of an existing


internet & manages traffic wireless network

Function Routes data between networks (e.g., Receives and retransmits Wi-Fi signal
local network ↔ internet)

Connectivity Wired (Ethernet) & wireless connections Only wireless (mostly)

Network Creation Creates a new local network Extends an existing network

Placement Usually near the modem (center of the Midway between router and weak
network) signal area
Q 10 different between hub and switch

Feature Hub Switch

Broadcasts data to all devices in the


Function Sends data only to the intended device
network

Efficiency Less efficient (more collisions) More efficient (fewer/no collisions)

Speed Usually slower (10/100 Mbps) Faster (10/100/1000 Mbps and beyond)

Dumb device – no data filtering or Smart device – learns MAC addresses and
Intelligence
learning routes data

Low (data visible to all connected


Security Higher (data only to target device)
devices)

You might also like