Introduction to Network and Topology

Computer Network is a group of IT devices connected with each other through wires, optical fibres or optical links so that various devices can interact with each other through a network. The aim of the computer network is the sharing of resources among various devices.

Computer network

The purpose of having computer network is to send and receive data stored in other devices over the network. These devices are often referred as nodes.

Purpose of computer network

Message: It is the data or information which needs to be transferred from one device to another device over a computer network.

Sender: Sender is the device that has the data and needs to send the data to other device connected to the network.

Receiver: A receiver is the device which is expecting the data from other device on the network.

Transmission Media: In order to transfer data from one device to another device we need a transmission media such as wires, cables, radio waves etc.

Rules: Rules are an important component of data quality. When used in conjunction, network rules and attribute rules help maintain data integrity. Network rules dictate which features can connect or associate in the utility network.

Protocol: A protocol is a set of rules that are agreed by both sender and receiver, without a protocol two devices can be connected to each other but they cannot communicate. In order to establish a reliable communication or data sharing between two different devices we need set of rules that are called protocol. For example, http and https are the two protocols used by web browsers to get and post the data to internet, similarly smtp protocol is used by email services connected to the internet.

Network Features

Features of Network

Performance: Performance of a computer network is measured in terms of response time. The response time of sending and receiving data from one node (computer in a computer network are often referred as node) to another should be minimal.

Data Sharing: One of the reason why we use a computer network is to share the data between different systems connected with each other through a transmission media.

Backup: A computer network must have a central server that keeps the backup of all the data that is to be shared over a network so that in case of a failure it should be able to recover the data faster.

Software and hardware compatibility: A computer network must not limit all the computers in a computer network to use same software and hardware, instead it should allow the better compatibility between the different software and hardware configuration.

Reliability: There should not be any failure in the network or if it occurs the recovery from a failure should be fast.

Security: A computer network should be secure so that the data transmitting over a network should be safe from unauthorised access. Also, the sent data should be received as it is at the receiving node, which means there should not be any loss of data during transmission.

Scalability: A computer network should be scalable which means it should always allow to add new computers (or nodes) to the already existing computer network. For example, a company runs 500 computers over a computer network for their 500 employees, lets say they hire another 200 employees and want to add new 200 computers to the already existing LAN then in that case the local area computer network should allow this.

Network components

Network component

Network Categorization

Networks are usually classified using three properties: Topology, Protocol and Architecture.

Topology

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks. Think of your network as a city, and the topology as the road map. Just as there are many ways to arrange and maintain a city—such as making sure the avenues and boulevards can facilitate passage between the parts of town getting the most traffic—there are several ways to arrange a network. Each has advantages and disadvantages and depending on the needs of your company, certain arrangements can give you a greater degree of connectivity and security.

There are two approaches to network topology: physical and logical.

Physical Topology

Physical network topology, as the name suggests, refers to the physical connections and interconnections between nodes and the network—the wires, cables, and so forth. Setup, maintenance, and provisioning tasks require insight into the physical network.

Logical Topology

The logical network topology is a higher-level idea of how the network is set up, including which nodes connect to each other and in which ways, as well as how data is transmitted through the network. Logical network topology includes any virtual and cloud resources.

Network Topology Types

There are different network topology found in today’s networks. Following describes the Star Topology, Bus Topology, Mesh Topology, Ring Topology, Hybrid Topology..

Network Topology

Star Topology

Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer. The central computer is known as a server, and the peripheral devices attached to the server are known as clients. Coaxial cable or RJ-45 cables are used to connect the computers. Hubs or Switches are mainly used as connection devices in a physical star topology. Star topology is the most popular topology in network implementation.

Star Topology

Advantages of Star topology

  • Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star topology, all the stations are connected to the centralized network. Therefore, the network administrator has to go to the single station to troubleshoot the problem.
  • Network control: Complex network control features can be easily implemented in the star topology. Any changes made in the star topology are automatically accommodated.
  • Limited failure: As each station is connected to the central hub with its own cable, therefore failure in one cable will not affect the entire network.
  • Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
  • Easily expandable: It is easily expandable as new stations can be added to the open ports on the hub.
  • Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
  • High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the most popular Star topology networks.

Disadvantages of Star topology

  • A Central point of failure: If the central hub or switch goes down, then all the connected nodes will not be able to communicate with each other.
  • Cable: Sometimes cable routing becomes difficult when a significant amount of routing is required.

Bus Topology

The bus topology is designed in such a way that all the stations are connected through a single cable known as a backbone cable. Each node is either connected to the backbone cable by drop cable or directly connected to the backbone cable. When a node wants to send a message over the network, it puts a message over the network. All the stations available in the network will receive the message whether it has been addressed or not. The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks. The configuration of a bus topology is quite simpler as compared to other topologies. The backbone cable is considered as a “single lane” through which the message is broadcast to all the stations. The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).

CSMA: It is a media access control used to control the data flow so that data integrity is maintained, i.e., the packets do not get lost. There are two alternative ways of handling the problems that occur when two nodes send the messages simultaneously.

CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once the collision is detected, the sender will stop transmitting the data. Therefore, it works on “recovery after the collision“.

CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by checking whether the transmission media is busy or not. If busy, then the sender waits until the media becomes idle. This technique effectively reduces the possibility of the collision. It does not work on “recovery after the collision”.

Bus Topology

Advantages of bus topology

  • Low-cost cable: In bus topology, nodes are directly connected to the cable without passing through a hub. Therefore, the initial cost of installation is low.
  • Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks that support upto 10 Mbps.
  • Familiar technology: Bus topology is a familiar technology as the installation and troubleshooting techniques are well known, and hardware components are easily available.
  • Limited failure: A failure in one node will not have any effect on other nodes.

Disadvantages of bus topology

  • Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
  • Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
  • Signal interference: If two nodes send the messages simultaneously, then the signals of both the nodes collide with each other.
  • Reconfiguration difficult: Adding new devices to the network would slow down the network.
  • Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are used to regenerate the signal.

Mesh Topology

Mesh technology is an arrangement of the network in which computers are interconnected with each other through various redundant connections. There are multiple paths from one computer to another computer. It does not contain the switch, hub or any central computer which acts as a central point of communication. The Internet is an example of the mesh topology. Mesh topology is mainly used for WAN implementations where communication failures are a critical concern. Mesh topology is mainly used for wireless networks. Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2 – Where n is the number of nodes that represents the network.

Mesh Topology

Two Categories of Mesh Topology:

  • Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available in the network.
  • Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to those computers with which they communicate frequently.

Advantages of Mesh topology:

  • Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the communication between connected computers.
  • Fast Communication: Communication is very fast between the nodes.
  • Easier Reconfiguration: Adding new devices would not disrupt the communication between other devices.

Disadvantages of Mesh topology:

  • Cost: A mesh topology contains a large number of connected devices such as a router and more transmission media than other topologies.
  • Management: Mesh topology networks are very large and very difficult to maintain and manage. If the network is not monitored carefully, then the communication link failure goes undetected.
  • Efficiency: In this topology, redundant connections are high that reduces the efficiency of the network.

Ring Topology

Ring topology is like a bus topology, but with connected ends. The node that receives the message from the previous computer will retransmit to the next node. The data flows in one direction, i.e., it is unidirectional. The data flows in a single loop continuously known as an endless loop. It has no terminated ends, i.e., each node is connected to other node and having no termination point. The data in a ring topology flow in a clockwise direction. The most common access method of the ring topology is token passing. Token passing: It is a network access method in which token is passed from one node to another node. Token: It is a frame that circulates around the network.

Ring Topology

Advantages of Ring topology:

  • Network Management: Faulty devices can be removed from the network without bringing the network down.
  • Product availability: Many hardware and software tools for network operation and monitoring are available.
  • Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is very low.
  • Reliable: It is a more reliable network because the communication system is not dependent on the single host computer.

Disadvantages of Ring topology:

  • Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
  • Failure: The breakdown in one station leads to the failure of the overall network.
  • Reconfiguration difficult: Adding new devices to the network would slow down the network.
  • Delay: Communication delay is directly proportional to the number of nodes. Adding new devices increases the communication delay.

Hybrid Topology

The combination of various different topologies is known as Hybrid topology. A Hybrid topology is a connection between different links and nodes to transfer the data. When two or more different topologies are combined together is termed as Hybrid topology and if similar topologies are connected with each other will not result in Hybrid topology. For example, if there exist a ring topology in one office branch @ Mumbai and bus topology in another branch @ Chennai, connecting these two topologies will result in Hybrid topology.

Hybrid Topology

Advantages of Hybrid Topology

  • Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the network.
  • Scalable: Size of the network can be easily expanded by adding new devices without affecting the functionality of the existing network.
  • Flexible: This topology is very flexible as it can be designed according to the requirements of the organization.
  • Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of the network is maximized and weakness of the network is minimized.

Disadvantages of Hybrid topology

  • Complex design: The major drawback of the Hybrid topology is the design of the Hybrid network. It is very difficult to design the architecture of the Hybrid network.
  • Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are different from usual Hubs used in other topologies.
  • Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of cabling, network devices, etc.

Tree Topology

Tree topology (a.k.a. hierarchical topology) combines the characteristics of bus topology and star topology. A tree topology is a type of structure in which all the computers are connected with each other in hierarchical fashion. The top-most node in tree topology is known as a root node, and all other nodes are the descendants of the root node. There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy.

Tree Topology

Advantages of Tree topology

  • Support for broadband transmission: Tree topology is mainly used to provide broadband transmission, i.e., signals are sent over long distances without being attenuated.
  • Easily expandable: We can add the new device to the existing network. Therefore, we can say that tree topology is easily expandable.
  • Easily manageable: In tree topology, the whole network is divided into segments known as star networks which can be easily managed and maintained.
  • Error detection: Error detection and error correction are very easy in a tree topology.
  • Limited failure: The breakdown in one station does not affect the entire network.
  • Point-to-point wiring: It has point-to-point wiring for individual segments.

Disadvantages of Tree topology

  • Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the problem.
  • High cost: Devices required for broadband transmission are very costly.
  • Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall network.
  • Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.

Published by Abdul Samad

Having 17+ years of extensive experience in IT industry, enabled to enhance the team performance and maximize customer satisfaction by strategically managing calls and implementing process improvements. Demonstrated ability to solve problems, meets challenging goals, and expedites delivery. Skilled MSSQL administrator guide team during the crisis situation. Apply Creative thoughts process in re-designing the workflow system to eliminate duplication of effort and increase productivity.

Leave a Reply