Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Computer security wikipedia , lookup
Wireless security wikipedia , lookup
Distributed firewall wikipedia , lookup
Low Pin Count wikipedia , lookup
Bus (computing) wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Networking BASICS Network Design Unit 2 Lesson 3 Lesson 3—Networking BASICS 1 Objectives • List and describe the characteristics of the mesh, bus, ring, star, and hybrid topologies. • Tell what items should be considered when selecting a network topology. Lesson 3—Networking BASICS 2 Objectives (continued) • Define channel access method. • Give the advantages and disadvantages of contention, polling, token passing, and demand priority channel access methods. Lesson 3—Networking BASICS 3 Topologies • Physical layout of network devices • Four types: mesh, bus, ring, and star Lesson 3—Networking BASICS 4 Mesh Topology • It is also called a point-to-point topology. • Each device is connected directly to all other network devices. • It provides fault tolerance. • It is only found in wide area networks. Lesson 3—Networking BASICS 5 Mesh Topology Lesson 3—Networking BASICS 6 Bus Topology • It is a multipoint topology. • Each device shares the connection. • The bus has one starting and one ending point. • Packets stop at each device on the network. • Only one device at a time can send. Lesson 3—Networking BASICS 7 Bus Topology Lesson 3—Networking BASICS 8 Ring Topology • It is a circle with no ends. • Packets are sent from one device to the next. • It does not slow down as more devices are added. Lesson 3—Networking BASICS 9 Ring Topology Lesson 3—Networking BASICS 10 Star Topology • All devices are connected to a central device (hub). • The hub receives and forwards packets. • It is the easiest topology to troubleshoot and manage. • It has a single point of failure. Lesson 3—Networking BASICS 11 Star Topology Lesson 3—Networking BASICS 12 Hybrid Topologies • They are variations of two or more topologies. • Star bus – used to connect multiple hubs in a star topology with a bus. • Star ring – wired like star, but functions like a ring. Lesson 3—Networking BASICS 13 Design Considerations • The best topology involves matching with the environment it is to be used in. • The physical arrangement of computers do not dictate the necessary topology. Lesson 3—Networking BASICS 14 Channel Access Methods • These are rules of cooperation to eliminate collisions. • There are four types of channel access methods. Lesson 3—Networking BASICS 15 Contention • Each device contends or fights for the ability to send a packet. • Carrier Sense Multiple Access/Collision Detection (CSMA/CD) – devices must listen before transmitting. • A collision causes two devices to wait for random intervals. • Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) – all devices wait for random intervals. Lesson 3—Networking BASICS 16 Polling • Each computer is asked in sequence whether it needs to transmit. • Polling provides equal access to all devices. Lesson 3—Networking BASICS 17 Token Passing • A special token packet is passed around the network. • A station must secure a token before sending a packet. • It eliminates collisions. Lesson 3—Networking BASICS 18 Demand Priority • The central device sends the demand signal and waits for an acknowledgment signal. • It allows for certain devices to be given higher priority. • It reduces network traffic. Lesson 3—Networking BASICS 19 Demand Priority Lesson 3—Networking BASICS 20 Summary • Topology refers to the physical layout of the network devices and cabling and how all the components communicate with each other. Computer network topology refers to how the computer network is arranged. There are four basic types of computer network topologies: mesh, bus, ring, and star. • A mesh topology is also called a point-to-point topology. Each device is connected directly to all other devices on the network. A mesh topology is sometimes used in a wide area network (WAN) setting to ensure that all the sites continue to transmit in the event of a cable failure or another similar problem. Mesh topologies are rarely used in a LAN. Lesson 3—Networking BASICS 21 Summary (continued) • LANs typically use a multipoint topology in which each computer on the network has just one connection. This connection is attached to a single cable that is shared by all other devices on the network. The most common type of multipoint topology is a bus topology. A computer network bus topology is characterized by one starting point and one ending point. A bus network topology works well for smaller networks and is inexpensive to install. However, it can become slow when more devices are added to the network. • A star topology describes a network in which all the devices are connected to a central device known as a hub, which is responsible for receiving and forwarding packets to other devices on the network. Because everything is centralized in a star topology, it is the easiest topology to manage and troubleshoot. Lesson 3—Networking BASICS 22 Summary (continued) • A multipoint ring topology is the opposite of a bus. A bus has two end points, but a ring is a circle with no ends. All the devices on the network are connected to the ring. Unlike a bus topology, in which the network devices do not play an active role in the network, each device has additional network functions in a ring topology. A ring topology works well for a computer network with many devices attached to it. • Not all topologies are strictly mesh, bus, star, or ring. Some variations of these topologies, known as hybrid topologies, are also used. These variations are actually combinations of two or more topologies. Lesson 3—Networking BASICS 23 Summary (continued) • A star bus topology is typically used to connect multiple hubs in star topologies with a bus topology and provides additional fault tolerance. A star ring topology is wired like a star, but functions like a ring. The packets in a star ring do not go directly to the next device on the ring, but instead go to a central hub. • For multipoint topologies to function properly, there must be rules of cooperation to ensure that transmissions arrive intact. These rules are called channel access methods. • One type of channel access method is polling. Each computer on the network is asked, or polled, in sequence whether it wants to transmit. If it does, it sends its packet while everyone else waits; if it has nothing to send, the next computer is polled. Lesson 3—Networking BASICS 24 Summary (continued) • Another type of channel access method is contention, which means that each device contends, or fights, for the ability to send a message. There are two types of contention methods. The first type of contention is called Carrier Sense Multiple Access/Collision Detection (CSMA/CD). CSMA/CD says that, before one computer starts to send a message, it should listen to determine whether another device is currently sending a packet. If a collision happens, all computers on the network are told to hold their transmissions. The two computers that caused the collision each wait a different amount of time before listening again to the medium and restarting the process. Lesson 3—Networking BASICS 25 Summary (continued) • Another contention variation attempts to avoid collisions altogether. This is known as Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). CSMA/CA handles the situation differently. Instead of making just the two stations responsible for the collision wait a random amount of time before attempting to resend, CMSA/CA has all stations wait a random amount of time after the medium is clear. • The channel access method of token passing involves a special packet called a token that is passed from one computer to the next on the network. A computer can send a message only if it has the token. If a computer does not need to send a packet, it passes the token on to the next computer. If a computer needs to send a packet, it waits for the token and then attaches the packet to it. Lesson 3—Networking BASICS 26 Summary (continued) • The channel access method of demand priority is similar to raising a hand and waiting to be called on. If a computer wants to send a message, it first transmits a demand signal to a central device. Once the central device receives the demand signal, it sends an acknowledgment signal back to the computer; the computer can then begin sending its message. Lesson 3—Networking BASICS 27