Download - New New Basic of Networking
-
8/13/2019 New New Basic of Networking
1/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
CONTENTS
Unit I
Chapter 1 Introduction to Networks
1.1 Overview of Networking
1.2 Need for Networking
1.3 Network Communication Standards
1.4 Open Systems Interconnect OSI! "eference #ode$
1.% &C'(I' "eference #ode$
1.) *ssignment 1
Chapter 2 Network Topologies
2.1 Overview of Network &opo$ogies
2.2 +asic &opo$ogies
2.3 +us &opo$ogy
2.4 "ing &opo$ogy
2.% Star &opo$ogy
2.) Comp$e, &opo$ogies
2.- #esh &opo$ogy
2. /y0rid &opo$ogy
2. *ssignment 2
C/*'&" 3 *N Components
3.1 *N Ca0$es and Connectors
3.2 Ca0$es
3.3 Coa,ia$ Ca0$es
3.4 &wisted'air Ca0$es
3.% Optica$ 5i0er Ca0$es
3.) Connectors
3.- *N 6evices
3. "epeaters
3. /u0s
3.17 Switches
3.11 Network Interface Cards NICs!
-
8/13/2019 New New Basic of Networking
2/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
3.12 8ire$ess *Ns 8*Ns!
3.13 *ssignment 3
UNIT IIChapter 4 *N 'rotoco$s
4.1 owerayer 'rotoco$s
4.2 *"Cnet
4.3 thernet
4.4 &oken "ing
4.% 5i0er 6istri0uted 6ata Interface 566I!
4.) #idd$eayer 'rotoco$s
4.- &ransmission Contro$ 'rotoco$(Internet 'rotoco$ &C'(I'!
4. Internetwork 'acket ,change(Se9uenced 'acket ,change I':(S':!
4. Net+ios nhanced ;ser Interface N&+;I!
4.17 /igherayer 'rotoco$s
4.11 /yper &e,t &ransfer 'rotoco$ /&&'!
4.12 5i$e &ransfer 'rotoco$ 5&'!
4.13 Simp$e #ai$ &ransfer 'rotoco$ S#&'!
4.14 *ssignment 4
Chapter % Networking *ddressing
%.1 Introduction to Network *ddressing
%.2 &C'II' *ddressing Scheme
%.3 Components of I' *ddress
%.4 I' *ddress C$asses
%.% I' Su0netting
%.)
-
8/13/2019 New New Basic of Networking
3/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
UNIT III
Chapter ) Introduction to 8*N
).1 8*N Connectivity Options).2 'O&S
).3 eased ines
).4 Integrated Services 6igita$ Network IS6N!
).% ateways
-.% 8*N 'rotoco$s
-.) 'ointto'oint 'rotoco$ '''!
-.- :.2%
-. 5rame "e$ay
-. *synchronous &ransfer #ode *!
-.17 *ssignment -
UNIT IV
Chapter 8 Networking Operating System
.1 Overview of Network Operating Systems
.2 8indows 2777 Server
.3 5eatures of 8indows 2777 Server
Basic of networking 3
-
8/13/2019 New New Basic of Networking
4/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
.4 ;ser *ccounts
.% >roup ;ser *ccounts ?
.) 5i$e and 6evice Sharing.- Nove$$ Netware
. 5eatures of Nove$$ Netware
. 8indows 2777 Server and Nove$$ Netware
.17 *ssignment
Chapter 9 cti!e "irectory
.1 *ctive 6irectory Services
.2 Internet &oo$s and Services
.3 6omain Name System 6NS!
.4 8indows Internet Naming Service 8INS!
.% 6ynamic /ost Configuration 'rotoco$ 6/C'!
.) *ssignment
UNIT#IChapter#$
Introduction to Networks
$%$O!er!iew o& Networking
/uman communication is a process that invo$ves peop$e communicating with each other. &his
process invo$ves four components@ the sender of the informationA the receiver of the
informationA the $anguageA and the medium through which communication is esta0$ished.
Networking is a concept of connecting mu$tip$e computers so that resourcesA such as printersA
hard disksA and fi$es can 0e shared. * typica$ network is depicted in 5igure 1.1.
Basic of networking 4
-
8/13/2019 New New Basic of Networking
5/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure @Computer Network
5igure@ 1.1 +asic Networking
&he users of these networked computers can share data and other information. OrganiBationsmay use networks for many reasons 0esides the speed and re$ia0i$ity of data transfer.
&he most o0vious reason is that a network provides an improved communication $ink0etween usersA ensuring that information is avai$a0$e to users at the right time and the
right p$ace. 5o$$owing are some areas where networking p$ays a maor ro$e@
$%' Need &or Networking
Speed( Dou can 9uick$y access fi$es and other resources avai$a0$e on the network.
If the network is not avai$a0$eA accessing the fi$es wi$$ take time 0ecause you wi$$
re9uire physica$ media such as f$oppy or e,terna$ device to transfer the data.
5or e,amp$eA the head office of an organiBation needs to retrieve some important
data from one of its 0ranches. It wi$$ 0e $ess time consuming to access the dataif the offices are connected through a network.
)esource sharing( #ost organiBations have a $arge num0er of computersA and insta$$ing
software on each computer is e,pensive. &o reduce this costA you can insta$$ thesoftware on a one of the computers in the networkA and a$$ow the users to insta$$
the software from this computer. In additionA networking he$ps in reducing the cost
spent on purchasing new hardware. "esources such as printersA fa, machinesA emai$serversA 8e0 serversA fi$e serversA and scanners are e,pensiveA usua$$y too e,pensive for
sma$$ organiBations. 'roviding a$$ the a0ove e9uipments to each user in the organiBation
is not feasi0$e. &hereforeA the 0est option is to shareA and make these resources
accessi0$e to every user on the network.
Communication &acilities@ Networking he$ps in sending and receiving emai$
messages anywhere in the wor$d. *n emai$ message can contain voiceA videoA andpictures. &he service is more costeffective and faster than posta$ services. 8ith
networkingA you can a$so communicate with peop$e on$ine using the chat service.
-
8/13/2019 New New Basic of Networking
6/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
In a networkA the communication 0etween two computers occurs in the form of signa$s. &he
data from a source computer is converted into signa$s and transmitted to the destinationcomputer. On the destination computerA these signa$s are converted 0ack to data. &o connect two
computers in a networkA you .need certain hardware and software components. &he hardware
components used for networking inc$ude@
Ca0$es@ Ca0$es are common$y used as a medium for transmitting data across networks.
&he most common$y used ca0$es are coa,ia$A twistedpairA and optica$ fi0er ca0$es.
Figure 1.2: types of cables
$%- Network Communication Standards(
5or the two computers to communicate with each otherA they need to fo$$ow certain
communication standards. &he fo$$owing topics in this section descri0e two such standards
that ena0$e two computers to communicate with each other on a network.
$%. Open Systems Interconnect /OSI0 )e&erence 1odel
&he Internationa$ Standards OrganiBation ISO! deve$oped the OSI mode$ in 13. &his mode$
connects systems that are open to communicate with each other regard$ess of the protoco$s thateach system uses. &his mode$ a$$ows computers from different manufacturers to communicatewith each other without re9uiring any $ogica$ changes to the hardware and software. &he OSI
mode$ is
represented in seven
Basic of networking 6
-
8/13/2019 New New Basic of Networking
7/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
$ayers that define the entire process of communication 0etween two computers on a
network.
5igure@ 1.3 OSI "eference #ode$
5igure 1.4@ 'rocess of 6ata &ransfer in the OSI #ode$
Basic of networking
-
8/13/2019 New New Basic of Networking
8/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5or
e,amp$eA you want to transfer some data from computer * to computer +. In this caseA theapp$ication $ayer first receives the data and sends it to the presentation $ayer. &he
presentation $ayer attaches the presentation header to the data. &he data is then sent to the
session $ayer. &his process of sending data continues unti$ it reaches the physica$ $ayer ofcomputer *. &he data is then transferred to the physica$ $ayer of computer + through a
transmission medium. &he physica$ $ayer on computer + converts the signa$s to data
and sends the data to the data $ink $ayer. &he data $ink $ayer removes the data $inkheader and sends the data to the network $ayer. &his process of receiving data on
computer + continues unti$ it reaches the app$ication $ayer. 8hen the data reaches the
app$ication $ayerA it is interpreted 0y the app$ication $ayer and is avai$a0$e on computer
+.5igure shows the process of data transfer 0etween two computers using the OSImode$.
2hysical 3ayer
&he physica$ $ayer is the first $ayer in the OSI mode$. &his $ayer transmits data in the form of
raw 0its using physica$ media such as coa,ia$ ca0$esA twistedpair ca0$esA or fi0er optic
ca0$es. 6uring transmissionA the data is converted into an e$ectrica$(optica$ signa$ 0efore it issent to the receiving device. &he receiving device converts the signa$ into data. &he physica$
$ayer views the type of connection@ thernetA &oken "ingA or 5i0er 6istri0uted 6ata
Basic of networking !
-
8/13/2019 New New Basic of Networking
9/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
Interface 566I! esta0$ished 0etween the devices on a network. &he network components
such as repeatersA hu0sA and amp$ifiers are part of this $ayer.
&he physica$ $ayer@
Identifies the medium used to esta0$ish a connection 0etween two computers on a
network.
&ransfers 0its 0etween devices in the form of e$ectrica$(optica$ signa$s.
"ata 3ink 3ayer
&he data $ink $ayer receives the data from the network $ayerA packages it into framesAand then sends it 0it0y0it on to the physica$ $ayer. &he data $ink $ayer ensures that the data
transmitted a$ong the physica$ medium is error free. In other wordsA the data $ink $ayer does
error detection and data framing.
&o make the data error freeA the data $ink $ayer 0reaks the data into frames. &he frames
are then transmitted se9uentia$$y from the sender system. &he data $ink $ayer on the receiver
system acknow$edges the frame that has successfu$$y arrived. Since the frame receivedfrom the physica$ $ayer on the destination computer is not structuredA the data $ink
$ayer creates the frame 0oundaries 0y adding 0itpattern information at the 0eginning
and end of every frame.
The data link layer(
F *dds a header to the frame if the frame is to 0e sent to another computer on
the same network. If the frame is sent to some other networkA the address of the
device that connects the two networks is considered as the receiver address. 5ore,amp$eA if a router connects two networksA then the address of the router on the
network is used as the receivers address. &he router then forwards the data to the
destination computer.
F Contro$s the f$ow of data received from the sender. &his is referred to as f$ow
contro$. 5igure 1.3@ 'rocess of 6ata &ransfer in the OSI #ode$
F Checks for errors that occur during the transmission of data. It checks for the damaged
and $ost frames and retransmits those frames. &he data $ink $ayer maintains the device address
that determines the particu$ar device on the network. &his is known as the physica$ addressor the #edia *ccess Contro$ #*C! addressA which is uni9ue to a NIC card. *
computer may have severa$ NIC cards. 8hen the data is transmitted from the physica$
$ayerA the destination $ogica$network addresses are trans$ated into the corresponding
#*C addresses. It is not possi0$e for the source computer to transmit packets over anetwork without the destination #*C address.
Network 3ayer
&he network $ayer resides a0ove the data $ink $ayer. &his $ayer is responsi0$e for the de$ivery of
data from the source to the destination computer. &his can 0e achieved 0y arranging the datainto data packets and adding a header to it. &his data packet is a$so referred to as datagram.
Basic of networking "
-
8/13/2019 New New Basic of Networking
10/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
&he header contains the source and destination addresses of the data packet. &his $ayer is a$so
responsi0$e for finding the path through with the data packets can 0e routed to the destinationcomputer. &o de$iver the data packetA this $ayer fo$$ows two processes routing and forwarding.
"outing is the process of finding the path through which the data packet can 0e de$ivered.
5orwarding is the process of using the path provided 0y routing and forwarding it to the
destination computer. &his $ayer in no way is concerned with the re$ia0$e and orderedde$ivery of packets from the source to the destination.
Transport 3ayer
&he transport $ayer in the OSI mode$ is a0ove the network $ayers. &his $ayer is responsi0$e forensuring errorfree endtoend data transfer to the destination computer.
&he transport $ayer@
*cknow$edges the successfu$ transmission of data packets.
"etransmits the data packets if they are not error free. #anages the f$ow of data packets 0etween computers across mu$tip$e networks.
&he data packet is transmitted from the sender computer on$y when it receives an
acknow$edgement from the destination computer. 8hen the connection is esta0$ished
0etween the two computers it uses the connectionoriented or connection$ess protoco$s.In case of connectionoriented protoco$A the data packet carries the path of destination
a$ong with it. It guarantees the de$ivery of data packet at the destination computer. &he
connection is terminated after a$$ the data packets are de$ivered. &hereforeA the connectionoriented protoco$s are considered more re$ia0$e as compared to connection$ess protoco$s. In
case of connection$ess protoco$A the de$ivery of data packets to the destination computer
is not guaranteed.
8hen data is transferred from the source computer to the destination computerA the transport
$ayer adds rror Correction Code CC! to each packet and forms a package. &he CC
is typica$$y a Cyc$ic "edundancy Checksum C"C!A which is an errordetecting scheme. On thereceiver systemA the error in transmission is identified when the C"C at the destination
computer does not match with the C"C p$aced in the data packet. *s a resu$tA data is transmitted
area.
&he network component gateway is part of this $ayer. &he protoco$s used at this $ayer
are Net+;IA &C'A S':A and N8 $ink.
Session 3ayer
&he session $ayer he$ps in esta0$ishing interaction 0etween two computers on a network. &hisinteraction 0etween two computers is referred to as a session. &he session $ayer a$$ows
app$ications to organiBe and to manage data e,change. In additionA the session $ayer a$$ows
users to $ogon to remote computers on a network for transferring fi$es.
&he session $ayer provides the fo$$owing services@
Basic of networking #$
-
8/13/2019 New New Basic of Networking
11/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
6ia$ogue contro$@ &he session $ayer manages data traffic on a network. ;sua$$yA
the data traffic f$ows in 0oth directions on a networkA 0ut with a sessionA thef$ow of data is on$y in one direction at a timeA ensuring an order$y e,change
of data.
&here are two dia$ogue contro$ methods@
/a$fdup$e,@ In this methodA each device can either send or receive data.
6up$e,@ In this methodA each device can receive and transmit data simu$taneous$y.
&oken management@ If tokens are usedA here is where they are hand$ed. * session
connection consists of tokens. * token is an attri0ute assigned to a session. &here
are protoco$s on the network that do not permit an operation to 0e carried outsimu$taneous$y 0y two interacting computers. In other wordsA the session $ayer
a$$ows traffic in on$y one direction. &o reso$ve this pro0$emA the session $ayer
provides tokens that can 0e e,changed 0etween two computers on a network. &hecomputer that ho$ds the token can perform the operation at that time.
SynchroniBation and recovery@ SometimesA the data that you want to transfermay not 0e transferred in one attempt. 5or e,amp$eA you want to transfersome fi$es that take an hour to comp$ete. 6uring this processA if the source
machine crashesA the comp$ete data needs to 0e transferred again. &his pro0$em
wi$$ continue if the source computer crashes again. &o so$ve this pro0$emA the
session $ayer inserts checkpoints into the data stream. * data stream is thecontinuous f$ow of data from the source to the destination. &hese checkpoints
ensure that after a crash on$y the data after the $ast checkpoint needs to 0e
transmitted.
&he network component gateway is a part of this $ayer. * protoco$ that works at this $ayeris Net+IOS.
2resentation 3ayer
&he presentation $ayer specifies how the information is presented to the app$ication $ayer
and is concerned with the synta, of the transferred data. Not every computer uses the same
data encoding scheme. &he presentation $ayer encodes the data in a standard format to so$ve
this pro0$em. &he data can 0e encoded 0y the fo$$owing two methods@
"irect translation( In this methodA the *merican Standard Code for Information
Interchange *SCII! code from the source computer is trans$ated into ,tended
+inary Coded 6ecima$ Interchange Code +C6IC! on the destinationcomputer.
Indirect translation@ In this methodA the *SCII code is trans$ated into standard
format at the source computer and then trans$ated to +C6IC on the destination
computer. &his method is recommended 0y OSI and is ca$$ed the *0stract Synta,
Notation I *SN.I! mode$.
Basic of networking ##
-
8/13/2019 New New Basic of Networking
12/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
The presentation layer per&orms the &ollowing &unctions(
Encryption and decryption( &he pro0a0i$ity of the data 0eing intercepted 0y
unauthoriBed users is high when the data is transferred through various wire$ess
media such as microwave or sate$$ite. &he data needs to 0e encrypted at the sender=s
end and decrypted at the receiver?s end. &he encryption and decryption ofdata is imp$emented at the presentation $ayer.
"ata compression(6ata compression is essentia$ on a network when the amount
of data 0eing transferred is very $arge. +efore transmissionA the data is compressedA
and on 0eing receivedA the data is decompressed. nsuring speedy de$ivery of dataA
this techni9ue is used most$y for transmitting audio and video fi$es.
pplication 3ayer
&he app$ication $ayer is c$osest to the end user. &he protoco$s at this $ayer he$p the app$icationsto access network resources. &he app$ication $ayer does not inc$ude any user app$icationsA
0ut it provides network services such as fi$e transfer and emai$ to the end users or to thecomputer app$ication.
&he computer app$ications can 0e divided as fo$$ows@
Network applications@ &hese app$ications are programs designed to work on a
network. 5or e,amp$eA you can access a remote computer using the &e$net program.
Standalone applications(&hese app$ications are programs designed for individua$
accessA for e,amp$eA the So$itaire game avai$a0$e with 8indows.
Em4edded applications(&hese app$ications consist of other network app$ications
that are 0ui$t in with the app$ication. 5or e,amp$eA #S8ord a$$ows you to activateemai$ or a 8e0 site reference from the #S8ord document itse$f.
$%5 ssignment 6uestion $
1. 8hat is networkingG
2. 8hat is the need of networkingG
3. 8hat network standard communicationG
Basic of networking #2
-
8/13/2019 New New Basic of Networking
13/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
4. /ow physica$ $ayer he$ps in OSI #ode$G
%. /ow data$ink ayer sends the dataG
). 8hat is Network ayerG
-. 8hat are the two processes that fo$$ow Network ayerG
. /ow &ransport ayer worksG
17. 8hat are the two things that transport ayer haveG
11. &wo things a0out session ayerG
12. 8hat are the services of Session ayerG
13. 8hat is 'resentation ayerG
14. 8hat are two methods of 6ata ncodingG
1%. 8hat is the 5unction of presentation of presentation ayerG
1). 8hat is *pp$ication ayerG
1-. Component of *pp$ication ayerG
1.,p$ain differences 0etween ISO and &C'(I' $ayeringG 2713
1 6ifferentiate ha$f dup$e, and fu$$ dup$e, communication. 2713
27 8hat do you mean 0y 0roadcastingG /ow it happens in thernet communicationG 2713
21. ,p$ain the services provided 0y 'hysica$ and 6ata ink $ayers. 2713
Chapter#'
NET7O) TO2O3OIES
'%$ O!er!iew o& Network Topologies
To set up a network: you need to concentrate on the &ollowing points(
Basic of networking #3
-
8/13/2019 New New Basic of Networking
14/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
&he hardware and software components to 0e used in the network.
&he datacommunication standards such as OSI and &C'(I' reference mode$s.
&he different types of network topo$ogies to 0e used in designing the $ayout of the
network.
In this chapterA you wi$$ $earn a0out the different types of network topo$ogies that can 0e usedin a network. &he topo$ogy of a network is concerned with the structure of connection
0etween two computers on the network and the $ayout in which the network devices
are connected to each other. &he network topo$ogy is a$so concerned with the type ofwiring used in a network and various factors that affects the network ca0$ing such as
whether the ca0$e wi$$ run through f$oorA wa$$sA or cei$ing. On comp$etion of this chapterA you
wi$$ 0e a0$e to create computer networks using different topo$ogies.
'%' *asic Topologies
&he 0us topo$ogy is the simp$est of a$$ the topo$ogies. In this topo$ogyA a$$ the devices on
the network are connected to each other through a centra$ ca0$e ca$$ed the 0us. ;singshared 0andwidth and una0$e to support speeds 0eyond 17 m0psA the 0us topo$ogy is
good for a sma$$ group of 1%27 computers. If the num0er goes a0ove 27 computersA thenetwork s$ows down to a craw$ since on$y one machine can send data.
'%+ *us Topologies
&he 0us topo$ogy is economica$ 0ecause it uses a sing$e coa,ia$ ca0$eA instead of severa$
ca0$es for connecting a$$ the computers. &he 0us topo$ogy uses a sing$e $ength of ca0$eand does not use a concentrator hu0 or switch!H thereforeA the cost is further reduced.
&he tradeoff is $ow speeds and any fai$ure in the ca0$e at any point can ha$t the entire
network. &rou0$eshooting of the network is a$so very trou0$esome since the point offai$ure cannot 0e direct$y pointed out.
Signa$s on coa,ia$ ca0$es can trave$ up to %77 m without amp$ification. &hereforeA
computers in a 0us topo$ogy can 0e used for connecting computers far apart from eachother. +ecause coa,ia$ ca0$es are used for the 0us topo$ogyA the advantages of these
ca0$es are avai$a0$e to networks that fo$$ow the 0us topo$ogy. /oweverA the same
advantages wi$$ 0e avai$a0$e to a$$ network topo$ogies that use these ca0$es. Coa,ia$ ca0$es areresistive to e,terna$ e$ectromagnetic interferences and therefore can 0e used in hosti$e
environments. &he connection 0etween the ca0$e and the NIC of the computer is accomp$ished
with the & connector.
In the 0us topo$ogyA the data signa$s are avai$a0$e to a$$ the computers a$ong the 0us. &hisdata signa$ carries the address of the destination computer. ach computer on the network
checks the destination address as the data signa$ that passes a$ong the 0us. &hecomputer in the networkA whose address matches the destination address of the data
signa$A makes a copy of the signa$ and converts it into data. &he origina$ signa$ sti$$
transmits a$ong the 0us. If the signa$ is not a0sor0ed or destroyedA it is ref$ected 0ack ontothe network. &his ref$ected signa$ interferes with the ne,t data signa$A and therefore
Basic of networking #4
-
8/13/2019 New New Basic of Networking
15/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
the ref$ected signa$ must 0e prevented from trave$ing 0ack a$ong the ca0$e. &o
a0sor0 such signa$sA a device ca$$ed terminator is attached at the ends of the 0usnetwork.
thernet is the most common$y used protoco$ in networks with 0us topo$ogy. thernet
uses Carrier Sense #u$tip$e *ccess with Co$$ision 6etection CS#NC6! to provide mediaaccess.
5igure @ 2.1 +us &opo$ogy
&he advantages of the 0us topo$ogy are as fo$$ows@
*$$ the computers in the 0us topo$ogy network are connected to each other
through a ca0$e. &hereforeA this topo$ogy is easy to imp$ement.
&his topo$ogy is e,tenda0$e 0ecause new devices can 0e easi$y added to the
e,isting 0us network.
&his topo$ogy is not very e,pensive 0ecause on$y one centra$ ca0$e is re9uired
for setting up the networkA therefore e$iminating the cost of purchasing severa$
ca0$es.&he disadvantages of the 0us topo$ogy are as fo$$ows@
&he network co$$apses if the ca0$e is damaged.
&he $imited $ength of the ca0$e in a network may restrict the num0er of devices that
can 0e connected.
&he network s$ows down if additiona$ computers are connected to the network.
*s additiona$ computers and devices are addedA the amount of data transmitted
increases resu$ting in increase of the network traffic. /igh network traffic s$owsdown the network considera0$y.
'%- )ing Topology(
O4;ecti!e
&he ring topo$ogy makes use of two concentric rings to transmit the signa$ around the network.
Basic of networking #5
-
8/13/2019 New New Basic of Networking
16/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
"ing topo$ogy uses the token passing method to provide media access to the devices in the
network. * computer that needs to transmit data waits for the token. 8hen the tokenarrivesA it adds the data and the address of the destination computerA and sends the data
a$ong the ring.
On receiving the signa$A the destination computer sends an acknow$edgement signa$ to thesource computer. &henA the source computer re$eases the token so that it can 0e used 0y other
computers in the network. &he ring topo$ogy supports coa,ia$A twistedpair as we$$ as fi0eropticca0$es. NowadaysA howeverA twistedpair and optica$ fi0er ca0$es are common$y used. &he
common protoco$s used to imp$ement ring topo$ogy are &oken "ingA and 5i0er 6istri0uted 6ata
Interface 566I.
5igure@ 2.1 "ing &opo$ogy
&he main advantage of the ring topo$ogy is that a$$ the computers on the network have
e9ua$ access to the token. ach computer on ring network gets an opportunity to transmitdata signa$s 0ecause on$y the computer that has the token can transmit dataA un$ike the
thernet imp$ementation where any computer can transmit data if the network is not 0eing
uti$iBed. &he main disadvantage of the ring topo$ogy is that adding or moving devices affects
the entire network.
'%. Star Topology(
In the star topo$ogyA a$$ the network devices are connected to each other through a centra$concentrator forming a star$ike structure. &he common devices used as the centra$
concentrators are hu0s or switches. &he computers can 0e connected to the hu0 or switch using
;&'A S&'A or optica$ fi0er ca0$es.
Basic of networking #6
-
8/13/2019 New New Basic of Networking
17/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
&he cost incurred to set up a star network is high compared to a 0us network since each device
on the network wi$$ uti$iBe an individua$ $ength of ca0$e from the concentrator to its$ocation.
6ue to this $ayoutA fai$ure of a sing$e device e,cept the concentrator! does not ha$t the
entire networkA and trou0$eshooting is very easy. On the downsideA fai$ure of the concentratorcan ha$t the entire segment connected to it. &he concentrator at each $ocation itse$f adds to the
cost.
5igure@ 2.3 star &opo$ogy
&he advantages of the star topo$ogy are as fo$$ows@
In this topo$ogyA you can e,tend the network 0y attaching new devices to the centra$
concentrator.
6ue to the star structure of this topo$ogyA there is no distur0ance when devices
are added to or removed from the network.
It is easy to trou0$eshoot the defects in the network. &he defective device can 0e
removed without affecting the entire network.
&he fai$ure of one device usua$$y does not affect the network.
&he disadvantages of the star topo$ogy are as fo$$ows@
&he $ength of ca0$e re9uired for this topo$ogy is greater than that re9uired for the 0us
topo$ogy.
&he entire network goes down if the centra$ concentrator fai$s.
'%< Comple= Topologies
Basic of networking #
-
8/13/2019 New New Basic of Networking
18/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
In the previous sectionA you $earned a0out the 0asic network topo$ogies. In this sectionA you
wi$$ $earn a0out the comp$e, network topo$ogies used in networking. &he comp$e,topo$ogies are those topo$ogies that use one or more 0asic topo$ogies in a network.
'%5 1esh Topology(
In the mesh topo$ogyA separate ca0$es are used to connect individua$ devices on the
network. &his topo$ogy is e,pensive 0ecause of the num0er of ca0$es used in the network.&he mesh topo$ogy is of two typesA fu$$mesh and partia$mesh.
>ull#1esh
In this topo$ogyA each device is interconnected with a$$ the devices on the networkA 0y a
dedicated ca0$e. If one device fai$sA the data trave$ing a$ong the network can 0e routed
through another device attached to the active device. &he structure of the network iscomp$e, 0ecause the devices in the network are interconnected.
5igure@ 2.4 5u$$#esh topo$ogy
2artial#1esh
In this topo$ogyA each device on the network is not connected to other devices. On$y a few
devices on the network are connected using the fu$$mesh topo$ogyA and the others areconnected to one or more devices on the network.
'%8 ,y4rid Topology
Basic of networking #!
-
8/13/2019 New New Basic of Networking
19/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
O0ective
6escri0e the working and features of the hy0rid topo$ogy.
&his topo$ogy is a com0ination of 0usA starA and ring networks. In other wordsA this topo$ogy
com0ines mu$tip$e topo$ogies to form a $arge topo$ogy. &he hy0rid topo$ogy is wide$yimp$emented in 8ide *rea Networks 8*Ns!.
5igure@ 2.% /y0rid star+uses &opo$ogy
5igure 2.% shows two networksA * and +A on a star topo$ogy. /oweverA the connection 0etween
the two networks is esta0$ished using the 0us topo$ogy. In a star0us topo$ogyA the star topo$ogyof each network is $inked to the 0us topo$ogy. If any of the computers fai$s on the star
topo$ogyA it wi$$ not affect the entire network. /oweverA if the centra$ hu0 in the star topo$ogyfai$sA then the entire network goes down 0ecause the ca0$es are connected direct$y to the centra$
hu0 of the star network. *s a resu$tA computers on the network are not a0$e to communicate with
each other.
Basic of networking #"
-
8/13/2019 New New Basic of Networking
20/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure 2.)@ hy0rid star ring &opo$ogy
Basic of networking 2$
-
8/13/2019 New New Basic of Networking
21/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
2. ssignment 6uestion '
1. 8hat does u mean 0y network &opo$ogiesG
2. 8hat are the +asic &opo$ogiesG
3. *dvantages of +us &opo$ogiesG
4. 6isadvantages of +us &opo$ogiesG
%. /ow "ing &opo$ogies is formedG
). *dvantages of "ing &opo$ogiesG
-. /ow star &opo$ogies is madeG
. 8hat are the Comp$e, &opo$ogiesG
. 8hat is mesh &opo$ogiesG
17. 8hat is 5u$$ mesh &opo$ogiesG
11. 8hat is partia$ mesh &opo$ogiesG
12. 8hat is /y0rid &opo$ogiesG
13. /ow star and "ing &opo$ogies is madeG
14. 8rite any two disadvantages of star topo$ogy. 2713
1%. 8hat do you mean 0y /y0rid topo$ogyG >ive e,amp$e. 2713
1-. ,p$ain the structure and working of +us topo$ogy.
Chapter#+
Basic of networking 2#
-
8/13/2019 New New Basic of Networking
22/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
3N Components
3.1 LAN Cables and Connectors
In the previous chaptersA you $earned a0out the need for networkingA the communication
standards used in networksA and the topo$ogies imp$emented in a network. Dou o0served that atopo$ogy defines the manner in which computers and devices are connected in a network. &o
esta0$ish a connection 0etween two computers or devicesA you need hardware as we$$ assoftware components. &he hardware components are usua$$y ca0$esA hu0sA Network Interface
Cards NICs!A and switchesH the software components are protoco$s such as thernetA &oken
"ingA &C'(I' and I':(S':. In this chapterA you wi$$ $earn a0out the different hardwarecomponents used to connect computers and devices in networksA more specifica$$y in a
oca$ *rea Network *N!. &he ne,t chapter wi$$ detai$ the protoco$s used in *N.
&he hardware components of a *N are devices operating at the physica$ $ayer or the data$ink $ayer and are responsi0$e for transmission of e$ectric signa$s from one device to another.
&o transmit e$ectric signa$sA the fo$$owing devices are common$y used in *Ns@
Ca4les
)epeaters
,u4s
Switches
Network Inter&ace Cards
+%' Ca4les
&he common ca0$e types used to connect computers and devices in a *N are@
Coa=ial ca4les
Twisted#pair ca4les
Optical &i4er ca4les
3.3 Coaxial Cables
Identi&y the &eatures o& coa=ial ca4les%
3ist the ad!antages and disad!antages o& coa=ial ca4les%
* coa,ia$ ca0$e consists of two concentric conductors separated 0y insu$ation. &he innerconductor transmits e$ectric signa$sA and the outer conductor acts as a ground. &he entire
assem0$y is wrapped in a sheath of &ef$on or '
-
8/13/2019 New New Basic of Networking
23/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure 3.2@ coa,ia$ ca0$e
&he conductor used in coa,ia$ ca0$es is copper wire. It is used for 0oth the inner and outerconductors. +ecause the signa$ is transmitted over the surface of the inner copper wireA
increasing the crosssection of the inner copper wire and thereforeA the entire coa,ia$ ca0$e!
increases the amount of signa$ that can 0e transmitted 0y the ca0$e. &hereforeA a thicker coa,ia$
ca0$e can transmit more data than a thinner one.
&he advantage of coa,ia$ ca0$es is that they support high 0andwidths and can transmit signa$s
up to17 ki$ometers. In factA coa,ia$ ca0$es were the origina$ transmission medium specified 0yI for use with thernet
+%- twisted#pair ca4le
* typica$ twistedpair ca0$e consists of four pairs of thin copper wires coated with '
-
8/13/2019 New New Basic of Networking
24/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure 3.3@ Shie$ded &wisted pair Ca0$e
S&' is more e,pensive than ;&' and is genera$$y used in networks where ca0$es pass
c$oser to devices that cause high #I . In additionA the presence of shie$ding increases
the resistance to the signa$ andA thereforeA restricts the ca0$e $ength and thethroughput offered 0y S&'.
Unshielded !isted "air #U"$
;&' ca0$es are the most common$y used communication medium in *Ns. Of the four pairs
in a ;&' ca0$eA howeverA on$y two pairs are actua$$y used for communication in *Ns
and provide speeds of up to177 #0ps. *$$ the four pairs are used on$y for higher transmissionrates such as 1A777 #0ps. 5igure 3.4 shows a crosssection of the ;&' ca0$e.
5igure 3.4@ CrossSection of ;&' Ca0$e
-
8/13/2019 New New Basic of Networking
25/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
Category% Cat%!@ Cat% is used for networks that re9uire data transfer rates higher
than that supported 0y Cat3. Cat % supports data transfer rates up to 177 #0ps and isused with 5ast thernet. .
In addition to these category specificationsA Cat) and Cat-A which support higher
0andwidth and data transfer ratesA have a$so 0een deve$oped. ike Cat%A Cat) a$sosupports data transfer rates of up to 1A777 #0ps. /oweverA Cat ) works at a differentfre9uency range than
Cat%. In a networkA a ca0$e may sometimes pickup a signa$ intended for another ca0$e.
&his is ca$$ed crossta$k. Cat) is more resistant to crossta$k than Cat%.
*ny $ight from escaping the core. &he function of c$adding is to ref$ect the $ight 0ack into thecore.
3.% &ptical fiber cable:
5igure 3.%@ CrossSection of Optica$ ca0$e
F Sheath or outer jacket: &he core and c$adding are covered with a sheathA usua$$y made ofp$asticA to protect the fi0er from damage.
;n$ike coa,ia$ ca0$es and twistedpair ca0$esA which transmit data in the form of e$ectric signa$sA
optica$ fi0er ca0$es transmit data in the form of $ight. &hereforeA the data to 0etransmitted is converted into $ight 0y a codec coder and decoder! present at each end ofthe fi0er. &he codec converts the data from the computer into $ightA and the $ight is then
transmitted across the ca0$e with the he$p of either a ight mitting 6iode 6! or an
Inection aser 6iode I6!. *t the destination computerA a decode receives the $ight 0eamand converts it into data. If an 6 is used to transmit $ightA the transmission is ca$$ed mu$ti
Basic of networking 25
-
8/13/2019 New New Basic of Networking
26/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
mode transmissionA whereas and I6 is used or sing$emode transmission. &hese transmissions
are detai$ed in the fo$$owing su0topics.
#u$ti#ode &ransmission
* mode is defined as the? ang$e at which a ray of $ight enters the core of the optica$ fi0er ca0$e.
If the $ight enters the core at different ang$esA it is ca$$ed mu$timode transmission. #u$timodetransmission occurs when an 6 is used as the $ight source.
*n 6 is not a concentrated $ight sourceA andA thereforeA the rays of the $ight 0eam disperseafter trave$ing a certain distance through the fi0er. /oweverA not a$$ the rays of the $ight 0eam
disperse.
+%< CONNECTE)?s
&o connect a coa,ia$ ca0$e to an NICA the fo$$owing connectors are re9uired@
@ *NC Connector
5igure 3.)@ +NC Connector
the end of the coa,ia$ ca0$e that p$ugs into a computer is connected to a +NC connector.
* +NC connector connects the coa,ia$ ca0$e to the &connectorA which is p$ugged theend of the coa,ia$ ca0$e that p$ugs into a computer is connected to a +NC connector. *
+NC connector connects the coa,ia$ ca0$e to the &connectorA which is p$ugged
Twisted#2air Ca4le Connectors(
;&' and S&' use different connectors to connect with the NIC. * ;&' ca0$e connects to an
NIC with an "4% connectorA whereas an S&' ca0$e uses a 6she$$ or 6+! connector.
Shows the 6+ connectorA which is used with S&' and an "4% connector used with ;&'.
Basic of networking 26
-
8/13/2019 New New Basic of Networking
27/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure 3.-@ &wisted 'air Ca0$e Connectors
Optical >i4er Connectors(
Optica$ fi0er ca0$es use either screwmounted adapters S#*! or spring$oad twist S&!
connectors. S#* uses a screw to connect to the end of the ca0$eA and S& c$aps to connect to the
end of the ca0$e. S& connectors are more popu$ar than S#* connectors 0ecause connector $ossdue to S& connectors is $ess than S#* connectors. Connector $oss is defined as the $oss of
signa$ at the interface 0etween the connector and the NIC. Connector $oss occurs if the end of
the connector is not tight$y p$ugged to the port on the NIC. S& connectors are spring$oadedA andthereforeA p$ug tight$y into the NIC.
5igure 3.@ S& and S#* Connectors
In this sectionA you have $earned a0out the different types of ca0$es used to connect computers
and devices in a *N. Dou have a$so $earned a0out their advantages and disadvantages and the
different types of connectors used for these ca0$es.
+%5 3N "e!ices
* concentrator is a device with two or more ports through which computers and devices can 0e
connected. &he fo$$owing are the two main functions of a concentrator@
&o 0oost the signa$ to restore its origina$ strength.
&o provide an interface to connect mu$tip$e computers and 6evices in a network.
Basic of networking 2
-
8/13/2019 New New Basic of Networking
28/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
ImagineA for e,amp$eA an office spread across three f$oors in a 0ui$ding. &he $ength of the ca0$e
re9uired to connect computers on different f$oors may 0e more than the ma,imum supported$ength. In such casesA the signa$ needs to 0e amp$ified. &he simp$est concentrator that can 0e
used to 0oost signa$s over $ong distances is a repeater.
+%8 )epeaters
"epeaters amp$ify a weak signa$ so that the signa$ stays as strong as the origina$ one. 5ore,amp$eA imagine a network in which two computers a0out 377 m apart are connected with a
;&' ca0$e. If one computer sends a signa$ to the otherA the signa$ starts attenuatingA and after a
distance of 1% mA the signa$ strength fa$$s to such an e,tent that the second computer may not
receive any signa$ at a$$. In such casesA you can use a repeater every 1% m 0etween the
computers to 0oost the signa$.
5igure 3.@ "epeaters ;sed to *mp$ify signa$ strength
In additionA repeaters can a$so 0e used to connect two segments of the same network. Segments
refer to $ogica$ sections of the same networkA whereas different networks means that the
networks are $ocated in geographica$$y different areas. 5or e,amp$eA suppose an organiBationhas offices on the first and fifth f$oors of a 0ui$dingA and the computers on 0oth the f$oors
are connected in the same network. In this caseA the computers on the first f$oor form a
segmentA and the computers on the fifth f$oor form another segment. * repeater can
0e used on one of the intermediate f$oors to connect the segments.
+%9 ,u4s
* hu0 is $ike a repeater 0ut with mu$tip$e ports. /u0s operate at the physica$ $ayer of the OSI
reference mode$. /u0s can 0e used to connect mu$tip$e segments of the same network and
transfer data from one segment to another .*$soA hu0s are used to connect computers to aserver in networks that use the star topo$ogy.
Basic of networking 2!
-
8/13/2019 New New Basic of Networking
29/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure3.17@
/u0 with 5our ports
&hereforeA it is important to determine the type of ca0$es in the network 0efore you purchase a
hu0. you a$so need to determine the num0er of network segments or the num0er of computers
to 0e connected so that you can purchase a hu0 with the re9uired num0er of ports. &hetype of ca0$es used andA thereforeA the type of ports on the hu0! and the num0er of ports
usua$$y determine the cost of a hu0.
+ased on their functionsA hu0s can 0e c$assified as fo$$ows@
Passive hub@ * passive hu0 does not regenerate or amp$ify the signa$. It on$y actsas an interface 0etween two segments of a network or 0etween different computersin a network. * passive hu0 is used when the network is divided into mu$tip$e
segmentsA 0ut the segments are sufficient$y c$ose to prevent signa$ attenuation.
'assive hu0s genera$$y do not re9uire e$ectrica$ power.
Active hub@ *n active hu0 is a powered device that amp$ifies the signa$ to its
origina$ strength. *ctive hu0s are the most common type of hu0s used innetworks. &hey are usefu$ when the segments of the network are not c$ose to
one another and the signa$s may re9uire amp$ification.
Inte$$igent or #anagea0$e! hu0@ *n inte$$igent hu0 is an active hu0 with additiona$
features such as network monitoring capa0i$ities. 5or e,amp$eA an inte$$igent hu0supporting Simp$e Network #anagement 'rotoco$SN#'!can provide
information a0out such things as activity on each port or network error $ogs.
In additionA an inte$$igent hu0 can a$so 0e used to prevent unauthoriBedcomputers from connecting to the segments of the network.
/u0s are ine,pensive devices. /oweverA hu0s can considera0$y increase network traffic
0ecause they 0roadcast data to the devices connected on a$$ the ports.
Basic of networking 2"
-
8/13/2019 New New Basic of Networking
30/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure 3.11@ segments of Network Connected using /u0
In 5igure if Node * in Segment1! sends data to Node 6 in Segment 2!A the data reaches'ort 1 of the hu0. &he hu0 then transmits the signa$ to a$$ the portsA thereforeA to a$$ computers
in Segment 2. Node 6 in Segment 2 picks up the signa$A which is then converted into data.
In the preceding e,amp$eA you can see that a$though the signa$ was addressed to on$y onecomputer in a particu$ar segmentA it is transmitted to a$$ the computers in the segment. If thereare mu$tip$e segments connectedA the signa$ is transmitted to a$$ the segmentsA resu$ting in
increased network traffic. In thernet *NsA unnecessary network traffic increases the chances
of co$$isionsA and degrades network performance.
+%$A Switches (
ike hu0sA switches a$so connect computers in a network or different segments of thesame network. /oweverA un$ike hu0sA which work at the physica$ $ayerA switches work at the
data $ink $ayer of the OSI reference mode$. &hereforeA switches treat data in the form of
frames and not as signa$sA which is the case with physica$ $ayer devices $ike hu0s. * data
frame contains information a0out the #*C address of the destination computer "efer to&opicA Network Interface CardsA for information on #*C address.! Switches can read this
#*C address andA as a resu$tA forward the data on$y to the port that is associated with this
#*C address. 5or this purposeA switches maintain a $ist of #*C addresses and the portnum0er associated with each #*C address.
5igure
3.12@
computers connected using switch
5igure shows a network in which four computers are connected using a switch. *ssume that
Node * sends data to Node C. &he data from Node * reaches the switch from 'ort 1 in the
form of a data frame. &he switch then reads the destination #*C addressA and from the
Basic of networking 3$
-
8/13/2019 New New Basic of Networking
31/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
$ist of #*C addressesA the switch knows that the data is meant for Node C. *s
Node C is associated with 'ort 3A the switch forwards the data on$y to 'ort 3. &he data isconverted 0ack into a signa$ and transmitted to Node C.
Switches use any of the following two methods to transmit data:
Cut-through switching:In this methodA the switch reads the destination #*C addressof a data frame and immediate$y forwards the frame to the respective port.
Store-and-forward switching: In this methodA the switch receives a$$ the data
frames corresponding to a particu$ar transmission. &he frames are then checkedfor integrity and errors. If the frames are found to 0e errorfreeA the switch forwards
the frames to the respective port. If the frames are corruptA they are not
forwarded to the destinationA and the source device has to resend the frames.
6epending on the re9uirements of the networkA you can se$ect an appropriate method ofswitching. 5or e,amp$eA if the speed of the network is the primary concernA you can se$ect cut
through switching. #ost switchesA howeverA have the a0i$ity to se$ect an appropriate switching
method depending on the network conditions. Initia$$yA the switch uses cutthroughswitchingA 0ut if it finds that the num0er of corrupt data frames is highA it automatica$$y
se$ects storeand forward switching. *fter some timeA if the switch o0serves that the num0er of
corrupt data frames is $owerA the switch reverts 0ack to cutthrough switching. &his is ca$$ed as
auto switching.
+%$$ Network Inter&ace Card /NIC0( NIC is a hardware device that acts as an interface
through which a computer connects to a network. NIC is usua$$y an e,pansion card on thecomputer with a port to p$ug in the network ca0$e. NIC converts the data into e$ectrica$ optica$
signa$s and transfers them through ca0$es from one computer to another on the network. On
receiving the dataA the NIC on the destination computer converts the e$ectrica$ signa$s 0ack to
data.
*n NIC is a hardware device that acts as an interface through which a computer connects to anetwork. NICs work at 0oth the data $ink and the physica$ $ayers of the OSI reference mode$.
*t the data $ink $ayerA the NIC converts the data packets into data frames and adds the
#*C address to the data frameH at the physica$ $ayerA it is responsi0$e for convert in the
data into signa$sA and transmitting them across the communication medium. &he #*C addressis a uni9ue hardware num0er present on the NIC and is specified 0y the NIC manufacturer.
#*C addresses are g$o0a$$y uni9ue.
8hen a computer needs to send dataA the NIC receives data packets from the computerA
converts them into data framesA and passes them across the ca0$e as signa$s. &his ro$e
of the NIC in most 'C environments can 0e divided into the fo$$owing tasks@
,ost#to#card communication(&he NIC communicates with the computer using I"J
Interrupt "e9uest! and receives data present in the memory of the computer for
transmission.
Basic of networking 3#
-
8/13/2019 New New Basic of Networking
32/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
*u&&ering( &he data received from the computer is not immediate$y transmitted.
InsteadA a$$ the data is 0ufferedA or stored temporari$yA on the NIC 0eforetransmission. +uffering ensures that the NIC has the comp$ete data packet 0efore
converting it into framesA thus preventing incomp$ete data transmissions.
>rame creation(Once the NIC has a$$ the data that needs to 0e transmittedA it dividesthe data into frames. * frame has three parts@ headerA dataA and trai$er. &he header
contains the source and destination #*C addressesH the data part contains the
actua$ data 0eing transmitted across the networkH and the trai$er contains errorchecking information such as Cyc$ic "edundancy Check C"C!.
2arallel#to#serial con!ersion(&he NIC receives data from the computer in para$$e$
form. 5or e,amp$eA a 'CI card receives 32 or )4 0its simu$taneous$y. &he num0er of
0its depends on the mother0oard 0us architecture. /oweverA the data must 0e
converted into seria$ form 0ecause *Ns genera$$y transmit data 0it after 0itA
and not mu$tip$e 0its at a time.
Encoding( &he seria$ 0its are converted into e$ectrica$ signa$s for transmission
across the ca0$e.
In additionA the NIC a$so needs to have an appropriate connector to access the ca0$e. 5or
e,amp$eA coa,ia$ ca0$es use +NC and 6& connectorsA whereas ;&' ca0$es use " 4%
connectors.
#ost NICs provide on$y one type of connector. /oweverA NICs with mu$tip$e connectorsA
such as one &connector and one "4% connectorA are a$so avai$a0$e.
NICs are a$so responsi0$e for determining the speed of the data transfer. NICs may support
different data transfer speedsA for e,amp$eA 17 #0ps or 177 #0ps. &hereforeA when you se$ectan NICA the ca0$es used in a networkA the speed of the networkA and the $ayer 2 protoco$used in the network must 0e considered.
;n$ike other network devicesA such as hu0s or switchesA that perform independent$yA theperformance of an NIC depends on the configuration of the computer. &he fo$$owing factors
affect the performance of an NIC@
*us speed(&he type of e,pansion s$ot on the computer determines the 0us speed. 5or
e,amp$eA IS* s$ots work at a speed of or 1) K+psA whereas 'CI s$ots have a
speed of 32 or )4 K+ps. &hereforeA a 'CI network card offers 0etter performancethan an IS* network card.
1emory( #emory affects the overa$$ performance of a computer to an e,tent.
&hereforeA NICs on computers with more memory perform 0etter than those on
computers with $esser memory.
1emory#access methods(&he NIC can access the main memory using different
methods such as 6irect #emory *ccess 6#*! or Input(output $(O!. In (OA the
Basic of networking 32
-
8/13/2019 New New Basic of Networking
33/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
NIC re9uests information from the main memory. &his re9uest shou$d 0e accepted
0y the processorA and then the NIC can access the data. In 6#*A howeverA a6#* contro$$er present on the mother0oard a$$ows the NIC to access the
main memory direct$y. &hereforeA NICs on computers that use 6#* are faster
than NICs on computers that use $(O.
+%$'7ireless 3Ns /73Ns0
8*NsA as the name suggestsA does not use a physica$ medium to connect devices and
computers in the network. InsteadA wire$ess media such as radio and infrared are used.
&hereforeA in a 8*NA the computers or devices have an infrared portA or an NIC thatsupports wire$ess communication. &he popu$ar techno$ogies used for wire$ess communication
are radio wavesA infraredA and +$uetooth. &hese techno$ogies differ in their interna$ working.
/oweverA 8*N is a generic term used to signify the a0sence of ca0$esA and can use any of
these wire$ess techno$ogies. &hereforeA some 8*Ns may 0e using radio whi$e others mayuse +$uetooth techno$ogies.
+$uetooth is a radiofre9uency specification deve$oped 0y a group of organiBations across thewor$dA known as the +$uetooth Specia$ Interest >roup that manufactures e$ectronic components.
+$uetooth specifies standards for the physica$ and data $ink $ayer of the OSI reference mode$.
#u$tip$e computers in a 8*N are connected with the he$p of an *ccess 'oint *'!. *n *'performs the same function as the hu0A as shown in 5igure.
5igure 3.13@ Computer connected wire$ess$y in *N
*n *' typica$$y performs the fo$$owing three functions@
"eceives data frames from computers and devices connected to it.
Basic of networking 33
-
8/13/2019 New New Basic of Networking
34/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
+uffers the data frames and checks their integrity.
&ransmits the data frames to the destination device.
8*Ns were first deve$oped in the ear$y 17s. /owever the use of 8*Ns was $imited due
to the cost of devices invo$ved as we$$ as the $imited 0andwidth offered. NowadaysAhoweverA the cost of devicesA such as *'sA has decreased considera0$y and wire$ess
techno$ogies such as +$uetooth offer speeds of 1 #0ps. In additionA 8*N s offers the
fo$$owing 0enefits over conventiona$ *Ns that use physica$ connectivity@
)esistance to E1II)>I( 8*Ns uses radio or infrared waves to transmit
dataA and are thereforeA resistant to phenomena such as signa$ attenuation anddistortion due to #I and "5I.
Easy installation(&he a0sence of physica$ medium to connect computers great$y
reduces the time re9uired to insta$$ a *N. *$soA the time re9uired to configure
the devices and *'sA is near$y the same as that re9uired to configurecomputers in a conventiona$ *N.
1o4ility(&he a0sence of physica$ connectivity provides users the f$e,i0i$ity to
move computers and devices within the network. &his is he$pfu$ for emp$oyees
who may need to access uptodate data in meetings and conferences.
>le=i4ility(8*Ns can connect computers and devices in areas where ca0$ing is
not possi0$e. 5or e,amp$eA in factories that have heavy machineryA ;&' ca0$es
cannot 0e used 0ecause they are prone to #. * 8*N can 0e imp$emented in
such cases.
E=pansion( * conventiona$ *N can 0e e,panded with the he$p of an *'I #ost*'s support transfer of data 0etween a conventiona$ *N and a 8*N.
&hereforeA *Ns can 0e e,panded to accommodate more computers without incurring any
additiona$ ca0$ing cost. 6ue to these advantagesA 8*Ns are very popu$ar. &he common
use of 8*Ns is in the fo$$owing areas@
,ome users(#ost home users are not comforta0$e with insta$$ation of ca0$es. 8*Ns
provide an easy way to connect mu$tip$e devices and set up a home network.
eneral access(NowadaysA trave$ing emp$oyees of organiBations need to access their
corporate network from p$aces such as an airportA a hote$A or an auditorium ha$$. #ost of
these 0ui$dings are 0ui$t without a provision for connecting computers. It is not practica$to provide connectivity 0y insta$$ing ca0$es in such $ocations. *s a resu$tA 8*Ns are
preferred.
7N connecti!ity(8ire$ess techno$ogies such as radioA infraredA and microwave
are popu$ar options to connect *Ns in situations where connectivity options such
as $eased $inesA or IS6N are not avai$a0$e .
Basic of networking 34
-
8/13/2019 New New Basic of Networking
35/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
+%$+ SSIN1ENT +
1. 8hat are the different kinds of ca0$esG
2. /ow coa,ia$ ca0$e madeG
3. 8hat are advantages of coa,ia$ ca0$esG4. /ow are made twisted pair ca0$esG
%. 8hat are the different types of twisted pair areG
). 8hat is S&'A ;&'G-. 8hat is #I L "5IG
. /ow S&' is protected from #I L "5IG
. /ow is made 5i0er Optica$ Ca0$eG17. 8hat are the *dvantages of 5i0er Optica$ Ca0$esG
11. 8hat is NICG
12. /ow NIC is supported for NetworkingG
>i!e and Eight 1arks 6uestionB
1. 6escri0e the networkingG /ow networking is he$pfu$G
2. 8hat is the difference 0etween a hu0 and a switchG
3. ,p$ain a0out OSI #ode$G
4. /ow is a data packet routed to the destination computerG%. 8hy does the transport $ayer add rror Correction Code CC! to each packetG
). 8hat is the ro$e of NIC at the physica$ $ayerG-. 8hy is Carrier Sense #u$tip$e *ccess with Co$$ision 6etection CS#NC6! used in 0us
topo$ogyG
. 8hy is token passing used in the ring topo$ogyG
. 8hat is the advantage of ring topo$ogyG
Basic of networking 35
-
8/13/2019 New New Basic of Networking
36/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
17. In 5u$$ #esh topo$ogyA if one device fai$sA the data trave$ing a$ong the network can
0e routed through another device. ustify your answer.11. In Star+us &opo$ogyA if any of the computers fai$s on the star topo$ogyA it wi$$ not
affect the entire network. ustify your answer.
12. 8hy is 0andwidth and distance important considerations for transmitting signa$s over a
transmission mediumG13. ;sing switches prevents distortion of signa$s. &rue(5a$se. ustify your answer.
14. 8hat are the disadvantages of Optica$ fi0er ca0$esG1%. 8hat are the advantages of using inte$$igent hu0sG
1). 6ifferentiate 0etween cutthrough switching and storeandforward switching.
1-. * 'CI NIC is faster than an IS* NIC. &rue(5a$se. ustify your response.
1. Sketch and e,p$ain OSI reference mode$. 27131. ,p$ain two types of twisted pair ca0$es with diagram. 2713
27 ,p$ain the services provided 0y 'hysica$ and 6ata ink $ayers. 2713
21. ,p$ainA how the transmission of data occurs in optica$ fi0ers in detai$.
Chapter#-
NET7O) 2)OTOCO3S.
-%$3ower#3ayer 2rotocols
In the previous chapterA you $earned a0out the different hardware components used in *N sAsuch as ca0$esA hu0sA and switchesA to esta0$ish connectivity among computers. Dou o0servedthat these devices transmit signa$s 0etween computers and sometimes increase the signa$
strength. In a *NA there are mu$tip$e computers that need to communicate with one another.
5or e,amp$eA consider the network represented in 5igure in which five computers are connected0y using a switch.
Basic of networking 36
-
8/13/2019 New New Basic of Networking
37/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure4.1@ Computer connected using a switch
Suppose Node * sends data to Node +. In this caseA Node * is the source nodeA and Node + isthe destination node. &hereforeA when sending dataA the source node shou$d provide the address
of the destination node so that data reaches the destination correct$y. In additionA the destination
node shou$d 0e a0$e to inform the source node a0out the receipt of data. &his addressing and
transmission of data 0etween computers on a network is hand$ed 0y network protoco$s.
* network protoco$ is defined as the ru$esA or communication formatsA that have 0een agreed
upon 0y the devices that need to communicate. Network protoco$s main$y define the fo$$owingaspects of communication@
FAddressing method used by the devices:5or e,amp$eA in 5igure 4.1A the computers can addresseach other 0y their names or 0y the address assigned to each computer. Node * can 0e
addressed as 1A Node + as 2A and Node C as 3.
!ata format:Computers and devices shou$d send and receive data in a format that can 0eunderstood 0y one another.
F "eliability of data transfer:In some casesA network protoco$s ensure that data transfers on anetwork are re$ia0$e.
F Speed of communication:Network protoco$s p$ay an important ro$e in determining the speed
of data transfer on the network.
In additionA some network protoco$s define the manner in which users access network data. 5ore,amp$eA if a user visits a 8e0 site on the InternetA data is transmitted 0etween the 8e0 site and
the user?s computer. Network protoco$s such as /&&' /yper &e,t &ransfer 'rotoco$! define the
manner in which the data is presented to the user.
Basic of networking 3
-
8/13/2019 New New Basic of Networking
38/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
*s network protoco$s need to perform mu$tip$e tasksA it is practica$$y impossi0$e to deve$op a
sing$e protoco$ that can manage a$$ these tasks. &hereforeA different protoco$s have 0eendeve$oped to operate at various $ayers of the OSI reference mode$. 5or e,amp$eA protoco$s at the
transport $ayer ensure re$ia0$e transmission of data on the networkA whereas the network $ayer
protoco$s are responsi0$e for addressing data to computers on a network. 'rotoco$s at the
app$icationA sessionA and presentation $ayers determine the kind of data that is accessi0$e to usersand the manner of accessing the data. +ased on the $ayers at which the protoco$s operateA
network protoco$s are 0road$y c$assified as fo$$ows@
Lo!er'layer protocols@(iddle'layer protocols
)igher'layer protocolsower$ayer protoco$s operate at the physica$ and the data$ink $ayers of the OSI reference
mode$ and perform the fo$$owing functions@
F &ransmitting data 0etween two devices on a network on a pointtopoint 0asis.
F nsuring that the data transmission 0etween the devices on a network is error free.
8hen a device sends data to another device on a networkA the data is converted into data packets
at the network $ayer and then passed on to the data$ink $ayer. &he protoco$ operating at the data$ink $ayer converts these packets into frames and then reads the destination address on the data
packets. &he protoco$ then adds the #*C address of the destination device to the data frames
and passes the frames to the physica$ $ayer. *t the physica$ $ayerA the frames are converted into
signa$s and transmitted across the network. On reaching the destinationA signa$s are converted0ack into data frames. If the data frames are received correct$yA an acknow$edgement frame may
0e sent to the source. If the acknow$edgement frame is not receivedA the source resends the data
frames for a fi,ed num0er of retriesA after which the connection is timed out.
ower$ayer protoco$s a$so provide media access to the devices when they need to send data.
&he media used on a network can 0e physica$ mediaA such as ca0$es or wire$ess mediaA such asinfrared and radio waves. 5or a device to transmit dataA it needs to access the transmission
medium on the network. /oweverA there may 0e mu$tip$e devices that need to send dataA and a$$
these devices may access the ca0$e simu$taneous$y. #edia access on a network needs to 0eregu$ated 0ecause mu$tip$e devices may transmit signa$s simu$taneous$y over the ca0$eA resu$ting
in a co$$ision of signa$s. &his co$$ision resu$ts in corruption of signa$s and $oss of data.
5o$$owing are the common $ower$ayer protoco$s used in *Ns@
@ )C net
@ Ethernet@ Token )ing
@ >i4er "istri4uted "ata Inter&ace />""I!
&he fo$$owing topics detai$ the features of each of these protoco$s. &he functions and features ofthe common midd$e$ayer and higher$ayer protoco$s used in *Ns are detai$ed in the ne,t
sections.
Basic of networking 3!
-
8/13/2019 New New Basic of Networking
39/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
*.1 A+C net
*"C net or *ttached "esource Computer Network is one of the o$dest $ower$ayer protoco$s
used in *Ns. *"C net was deve$oped in the $ate 1-7s 0y an organiBation ca$$ed 6ata point.
Initia$$yA *"C net used to support data transmission rates from 1%) K0ps to 2.% #0ps. aterA
howeverA *"C net supported speeds of up to 17 #0ps. *"C net uses the tokenpassing schemeto provide media access to the devices on the network.
&he frame format used 0y *"C net to transmit data can 0e 0road$y divided into the fo$$owing
three parts@
F /eader@ Contains information a0out the source and destination nodes.
F 6ata@ Contains information a0out the siBe of data and the actua$ data.
F &rai$er@ Contains Cyc$ic "edundancy Checks C"Cs! for error detection.
SO/ SI6 6I6 Count 6ata C"C
5igure 4.2@ *"C net 6*&* 5rame
In 5igure you can o0serve that the header consists of three components@ SO/ Start of /eader!A
SI6 Source I6!A and 6I6 6estination I6!. &o a destination deviceA the SO/ indicates the
0eginning of the header. &he SI6 contains the address of the source deviceA whereas the 6I6contains the address of the destination device.
6ata part consists of two componentsA Count and 6ata. &he Count component contains
information a0out the siBe of data whi$e the 6ata component contains the actua$ information to0e transmitted. 5or e,amp$eA a va$ue of %) in the Count 5ie$d indicates that the frame contains
%) 0ytes of data. &he destination devices use the information in the Count 5ie$d to check
whether the entire data is received.
&he fo$$owing are the main features of *"C net@
F *"C net supports coa,ia$ and twistedpair ca0$es as we$$ as optica$fi0er ca0$es.
F *"C net supports the starA 0usA and ring topo$ogies. 6epending on the re9uirement of thenetworkA an appropriate topo$ogy can 0e se$ectedA there0y optimiBing ca0$e $engths.
F *"C net uses the token passing systemA which prevents co$$isions on the network. *s a resu$tA
there is no data $oss due to co$$isions.
/oweverA *"C net has the fo$$owing disadvantages@
F &he ma,imum frame siBe supported 0y *"C net is %7 0ytes. &hereforeA mu$tip$e data frames
need to 0e generated if the amount of data to 0e transferred is $arge. 5or e,amp$eA to transfer a
27 K+ fi$eA *"C net generates appro,imate$y 47 frames.
F *"C net re9uires an *CK frame in response to every 6ata frame. &hereforeA if the . *mount
of data transferred is $argeA the num0er of *CK frames is a$so highA resu$ting in increased
Basic of networking 3"
-
8/13/2019 New New Basic of Networking
40/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
network traffic. In additionA the time re9uired for a data transfer increases 0ecause the source
node re$eases the token on$y after it receives the *CK frames for a$$ the 6ata frames sent.&hereforeA other devices on the network need to wait $onger for the token.
F &he ma,imum num0er of nodes supported in a sing$e *"C net *N is 2%%.
F *"C net supports a ma,imum datatransfer speed of 17 #0ps.
&he disadvantages of *"C net severe$y affect the network performance if the amount of data
transferred is highA and the traffic generated in *"C net *Ns may s$ow down the network
considera0$y. &hereforeA newer protoco$s such as thernet and &oken "ing are preferred over*"C net.
*.2 ,thernet
thernet is the most popu$ar $ower$ayer protoco$ used in *Ns. thernet was first deve$oped in
1-2 at the :ero, 'a$o *$to "esearch Center '*"C!. &his version of thernet supported a data
transfer speed of 2.4 #0ps. &here have 0een severa$ enhancements to the origina$ version ofthernetA and the current versions support network transmission speeds ranging from 17 #0ps
to 1A777 #0ps.
thernet uses a techni9ue ca$$ed the Carrier Sense #u$tip$e *ccess(Co$$ision 6etection
CS#*(C6!A a$so known as I 72.3A to provide media access to devices on the network.
* carrier is a signa$ containing some specific data. CS#*(C6 works in the fo$$owing manner@
F &he device that needs to send data checks the ca0$e for any signa$s. &his is ca$$ed the Carrier
Sense.
F If no carrier is foundA the device accesses the medium and transmits data signa$sA 0ut it is
possi0$e that mu$tip$e devices start transmitting signa$s simu$taneous$y. &his is ca$$ed #u$tip$e*ccess.
F 8hen mu$tip$e devices transmit signa$s simu$taneous$yA a co$$ision occurs. &he device nearestto the point of co$$ision detects the co$$ision and informs a$$ the devices a0out the co$$isionA
which is ca$$ed Co$$ision 6etection. &he devices then wait for a random period of time 0efore
retransmitting the data.
Basic of networking 4$
-
8/13/2019 New New Basic of Networking
41/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure 4.3 @ #edia *ccess in thernet
In 5igure 4.3A Node * as we$$ as Node C needs to send data. In Step 1A 0oth these computers
check for any signa$s in the ca0$e. &he nodes do not detect any signa$ and 0egin data transfer
simu$taneous$yA as shown 0y Step 2. &his resu$ts in a co$$isionA as shown 0y Step 3. 8hen aco$$ision occursA the device nearest to the point of co$$isionA which is Node +A informs a$$ the
devices on the network a0out the co$$ision. *s a resu$tA Nodes * and C wait for a random periodof timeA 0efore retransmitting the data.
5rom the e,amp$e discussed in 5igure 4.3A it is c$ear that a device in an thernet *N cannotsend and receive data simu$taneous$y. 5or e,amp$eA when Node * transmits dataA the ca0$e
carries the signa$ and thereforeA the other devices cannot transmit simu$taneous$y. &his type of
communication is ca$$ed ha$fdup$e, communicationA which means that a device on a networkcan either send data or receive dataA 0ut cannot send and receive different data simu$taneous$y.
/a$fdup$e, communication can 0e e,treme$y s$ow if the network contains a $arge num0er ofnodes. 5or e,amp$eA imagine an thernet *N with 1%7 computers. ach computer needs tosend as we$$ as receive data from other computers or devices on the network. *s there are 1%7
computers on the networkA the pro0a0i$ity of the ca0$e carrying a signa$ at a given point oftime
is high. &hereforeA the nodes need to wait for an additiona$ time period 0efore they can accessthe ca0$e. In additionA the increase in the num0er of nodes a$so increases the pro0a0i$ity of
Basic of networking 4#
-
8/13/2019 New New Basic of Networking
42/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
co$$isions. &o overcome these $imitations of ha$fdup$e, communicationA fu$$dup$e,
communication was introduced.
In fu$$dup$e, communicationA the nodes on the network can send and receive data
simu$taneous$y. /oweverA fu$$dup$e, communication does not use the CS#*$C6 techno$ogy
for providing media access to devices. InsteadA fu$$dup$e, communication is accomp$ished withthe he$p of a device that can transmit data 0ased on the destination address. ;sua$$yA a switch is
used in fu$$dup$e, communication. &o understand fu$$dup$e, communication in thernet*NsA consider the network represented in 5igure 4.4.
5igure 4.4@ 5u$$6up$e, Communication in thernet
5igure represents a *N in which four computers are connected 0y using a switch. Consider the
segment of the network 0etween Nodes * and the switch. &he ca0$e in this segment is used
either 0y Node * or the switch 0ut not 0y other devices on the network. In fu$$dup$e,communicationA one pair of the ;&' ca0$es is used for transmitting data from Node * to the
switch whi$e the other pair transmits data from the switch to Node *. *s separate pairs are used
for sending and receiving dataA co$$isions can 0e comp$ete$y avoided. &he other nodes on the
network communicate with the switch in a simi$ar mannerA and thereforeA co$$isions areprevented in the entire network.
5rom 5igure you can o0serve that the switch p$ays an important ro$e in forwarding data framesto their destination. *$$ the computers on the network send data frames to the switch. &he switch
checks the destination #*C addresses of these data frames and forwards them to the
corresponding ports. 5or e,amp$eA the data for Node * is forwarded to 'ort 1 whi$e the data forNode + is forwarded to 'ort 2.
Basic of networking 42
-
8/13/2019 New New Basic of Networking
43/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
In additionA fu$$dup$e, communication dou0$es the effective throughput 0ecause sending and
receiving of data takes p$ace simu$taneous$y. 5or e,amp$eA a 17 #0ps ;&' ca0$e can producean effective throughput of 27 #0ps.
Ethernet Communication
In thernet *NsA the source node sends data to a$$ the nodes on the network and not on$y to the
destination node. &his process is known as 0roadcasting. *$$ the nodes check the destination#*C address on the data frame. &he device with the corresponding #*C address accepts the
data whi$e the other devices ignore it.
5igure 4.%@ 6ata 5rames +roadcast in thernet *N
In 5igure 4.%A Node * needs to send data to Node +. Node * creates a data frame and inc$udesthe destination #*C address of Node + in the frame and 0roadcasts the frame across the
network. *$$ the devices check the destination #*C address of the data frame. *s the
destinationA #*C address corresponds to Node +A on$y Node + accepts the data.
*$though the origina$ thernet standards provides speeds of up to 17#0psA newer deve$opments
to the thernet standard have resu$ted in speeds of 177 #0psA ca$$ed 5ast thernetA and 1777
#0psA ca$$ed >iga0it thernet. &hese newer standards are discussed in the fo$$owing su0topic.
Fast ,thernet and -igabit ,thernet
*$though 17#0ps was once sufficientA the demand for higher 0andwidth $ed to the deve$opment
of a newer standardA ca$$ed 5ast thernetA which provides datatransfer speeds of up to 177
#0ps. 5ast thernet a$so uses CS#*(C6 to provide media access to devices on the network.&he fo$$owing are the important features of 5ast thernet@
Basic of networking 43
-
8/13/2019 New New Basic of Networking
44/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
F ac/!ard co0patibility:5ast thernet is 0ackward compati0$e with the 17#0ps thernet
standard. &hereforeA the NICs and switches that are compati0$e with 5ast thernet can a$so 0eused with 17 #0ps thernet.
F nteroperability: 5ast thernet a$$ows interopera0i$ity with e,isting 17 #0ps thernet
networks. 5or e,amp$eA if a *N is divided into three segmentsA one segment can use 5astthernetA whi$e the other two segments can use the 17 #0ps thernet standard. &his is
e,treme$y he$pfu$ when computers in a particu$ar segment need to communicate at a faster ratethan the computers in the other segments. /oweverA for interconnecting the two standardsA a
C$ass I repeater is re9uired. 5ast thernet divides repeaters into the fo$$owing types@
Class repeater:*cts as an interface 0etween the 5ast thernet and thernet standards
0ut does not amp$ify the signa$.
Class repeater:*mp$ifies the signa$ 0ut cannot connect the two standards.
Full'duplex operation: 5ast thernet a$so supports fu$$dup$e, communication for
*Ns.
&hereforeA the effective throughput 0etween two devices can 0e up to 277 #0ps.
Star topology( 5ast thernet supports on$y the star topo$ogy for connecting
computers and devices on the network. >iga0it thernet was deve$oped to connect*N 0ack0one networks. NowadaysA >iga0it thernet is a$so used on *N
workstations. >iga0it thernet a$so uses the CS#*(C6 techno$ogy for providing
media access and is 0ackward compati0$e with the 5ast thernet and thernetstandards.
Dou have $earned a0out the features of thernet and many of the thernet standards used in*Ns. thernet is the most popu$ar protoco$ used in *N for the fo$$owing reasons@
Supports coa,ia$A twistedpairA and optica$fi0er ca0$es.
Supports the 0us and star network topo$ogies.
Costs $ess to set up than *"C netA &oken "ingA or 566I *Ns.
In most *NsA devices need to transmit data intermittent$y and not on a continuous
0asis.
&he CS#*(C6 method of providing media access is 0est suited for this situation.
Newer standards such as 5ast thernet and >iga0it thernet offer network administrators
the f$e,i0i$ity to se$ect these standards on network segments where speed is important.
&he fo$$owing are the disadvantages of thernet@
It is impossi0$e to predict the e,act period of time a node needs to wait 0efore it can starttransmitting data. &hereforeA thernet cannot 0e used in *Ns where the de$ays can 0e
predicted. &his is an inherent $imitation of thernet.
Nodes in an thernet *N 0roadcast data across the networkA resu$ting in an increase of
network traffic. In networks with a $arge num0er of computersA 0roadcasting
significant$y increases network traffic. &he network needs to 0e divided into mu$tip$e
Basic of networking 44
-
8/13/2019 New New Basic of Networking
45/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
0roadcast domains to overcome this issue. &his issue is usua$$y overcome with the he$p
of switches for interconnecting nodes and segments.In most *N sA speed is the primary considerationA and thereforeA the disadvantages of thernet
are not fe$t. *s a resu$tA thernet remains the most popu$ar protoco$ for *N s. 5or *N s that
re9uires 0etter performance in terms of data transferA protoco$s such as &oken "ing and 566I
are preferred.
-%- Token )ing
&oken "ing was deve$oped 0y I+# in the 1-7s as an a$ternative to thernet and to overcome
the disadvantages of thernet. Initia$$yA &oken "ing offered speeds of 4 #0psA which was $aterupdated to 1) #0ps.
ike *"C netA &oken "ing a$so uses the tokenpassing scheme to provide media access to the
network devices. /oweverA &oken "ing manages the token access to the network devices in adifferent manner. In &oken "ing *NsA an empty token circu$ates among the different devices
on the network. On receiving the tokenA a device appends data to the token and transmits it
across the network. &he other devices on the network check the destination addressA and thedevice with the corresponding destination address makes a copy of the data. &he origina$ data
frame continues circu$ating on the network and reaches the source device. &he source device
checks the data frame and recogniBes that the data had originated from it and then re$eases thetoken for other devices to use. &hereforeA in &oken "ing *NsA a device can ho$d the token on$y
unti$ the origina$ data frame comes 0ack to the source device. *s a resu$tA it is possi0$e that a
device may need to re$ease ? the token 0efore it is a0$e to transmit a$$ the data framesA &he device
then waits for its turn and the remaining framesA &his in contrast to *"C net where the token isre$eased on$y after the data transfer is comp$eteA In 5igure the media access and data
transmission occur as fo$$ows@
Basic of networking 45
-
8/13/2019 New New Basic of Networking
46/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
5igure@ #edia *ccess in token "ing
Basic of networking 46
-
8/13/2019 New New Basic of Networking
47/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
F Step 1@ Node * needs to transmit data frames 'A JA "A and S to Node 6. Node * receives the
empty token anti starts transmitting the frames one after the other.
Step 2@ 5rame ' is read 0y Node 6A which makes a copy of the frame. In the meantimeA Node *
has a$ready transmitted frames J and ".
Step 3@ 5rame ' reaches Node * 0efore it can transmit frame S. Node * re$eases the tokenA and
frame " needs to wait ti$$ Node * receives the empty token again.
&he &oken "ing *N represented in 5igure 4.) uses the ring topo$ogy. /oweverA &oken "ing
*Ns can support the star topo$ogy too. In factA most &oken "ing *Ns are imp$emented usingthe star topo$ogy with the he$p of devices ca$$ed #u$tistation *ccess ;nits #*;s!A which are
the &oken "ing e9uiva$ent of thernet hu0s.
5igure represents a &oken "ing *N in which computers are connected using #*;s
5igure 4.)@ &oken "ing *N with #*;s
Dou have $earned a0out the mediaaccess method used 0y &oken "ing. &he ne,t su0topic
detai$s the &oken "ing frame format. &oken "ing 5rame 5ormat &oken "ing uses two types of
frames to transmit data across the network@ token and data frame. &he token is the empty framethat circu$ates around the network to provide media access. 6evices that need to send data
convert the token into a data frame and send it across the network. 8hen the data transmission
is comp$eteA the source device destroys the data frame and re$eases a new token frame. &hetoken consists of the fo$$owing components@
tarting deli0iter:Indicates the 0eginning of the token.
FAccess control field:6efines the access of devices to the token. &his fie$dA in turnA consists of
the fo$$owing@
Basic of networking 4
-
8/13/2019 New New Basic of Networking
48/143
Srinivas Institute of Management Studies , Mangalore Second Semester BCA
"riority field:Contains a va$ue 0etween 777 and 111A which is set 0y the device that
re$eases the token into the network. 5or a network that is set up for the first timeA thisva$ue is set 0y the network server. On$y devices whose priority va$ue is greater than this
va$ue may use the token. 5or e,amp$eA if the token circu$ating on the network has a
priority va$ue of 771A on$y those devices with an e9ua$ or higher priority va$ue may use
this token. &he priority va$ues of devices are assigned 0y the network administrator.
Token &ield(On receiving an empty tokenA a device modifies this fie$d 0efore sending
the data to indicate that the token is not empty. &his fie$d can take a va$ue of either 7 or1. 7 indicates an empty frame whi$e 1 indicates that the token is in use.
1onitor &ield(&he network serverA or the *ctive #onitorA uses this fie$d to monitor the
token activity. &he *ctive #onitor sets this va$ue to 1 when generating a token. &he
va$ue is reset to 7 when a device uses the frame. &hereforeA an empty token can 0e
recogniBed 0y a token fie$d va$ue of 7 and a monitor fie$d va$ue of 1.
)euest 2riority &ield(On a networkA there may 0e devices that may need to send highpriority information. Such devices can use this fie$d to get faster access to the token. *
device can change the "e9uest 'riority fie$d to its priority va$ue and inform the device
that is re$easing the token to increase the va$ue of the 'riorit