Wednesday, May 16, 2018

Network Topologies


Introduction To Computer Networks

Modern world scenario is ever changing. Data Communication and network have changed the way business and other daily affair works. Now, they highly rely on computer networks and internetwork.
A set of devices often mentioned as nodes connected by media link is called a Network.
A node can be a device which is capable of sending or receiving data generated by other nodes on the network like a computer, printer etc. These links connecting the devices are called Communication channels.
Computer network is a telecommunication channel using which we can share data with other coomputers or devices, connected to the same network. It is also called Data Network. The best example of computer network is Internet.
Computer network does not mean a system with one Control Unit connected to multiple other systems as its slave. That is Distributed system, not Computer Network.
A network must be able to meet certain criterias, these are mentioned below:
  1. Performance
  2. Reliability
  3. Scalability

Computer Networks: Performance

It can be measured in the following ways:
  • Transit time : It is the time taken to travel a message from one device to another.
  • Response time : It is defined as the time elapsed between enquiry and response.
Other ways to measure performance are :
  1. Efficiency of software
  2. Number of users
  3. Capability of connected hardware

Computer Networks: Reliability

It decides the frequency at which network failure take place. More the failures are, less is the network's reliability.

Computer Networks: Security

It refers to the protection of data from any unauthorised user or access. While travelling through network, data passes many layers of network, and data can be traced if attempted. Hence security is also a very important characteristic for Networks.

Properties of a Good Network

  1. Interpersonal Communication: We can communicate with each other efficiently and easily. Example: emails, chat rooms, video conferencing etc, all of these are possible because of computer networks.
  2. Resources can be shared: We can share physical resources by making them available on a network such as printers, scanners etc.
  3. Sharing files, data: Authorised users are allowed to share the files on the network.

Basic Communication Model

A Communication model is used to exchange data between two parties. For example: communication between a computer, server and telephone (through modem).
Basic Communication Model

Communication Model: Source

Data to be transmitted is generated by this device, example: telephones, personal computers etc.

Communication Model: Transmitter

The data generated by the source system is not directly transmitted in the form its generated. The transmitter transforms and encodes the data in such a form to produce electromagnetic waves or signals.

Communication Model: Transmission System

A transmission system can be a single transmission line or a complex network connecting source and destination.

Communication Model: Receiver

Receiver accepts the signal from the transmission system and converts it into a form which is easily managed by the destination device.

Communication Model: Destination

Destination receives the incoming data from the receiver.

Data Communication

The exchange of data between two devices through a transmission medium is called Data Communication. The data is exchanged in the form of 0's and 1's. The transmission medium used is wire cable. For data communication to occur, the communication device must be a part of a communication system. Data Communication has two types - Local and Remote which are discussed below:

Data Communication: Local

Local communication takes place when the communicating devices are in the same geographical area, same building, or face-to-face etc.

Data Communication: Remote

Remote communication takes place over a distance i.e. the devices are farther. The effectiveness of a data communication can be measured through the following features :
  1. Delivery: Delivery should be done to the correct destination.
  2. Timeliness: Delivery should be on time.
  3. Accuracy: Data delivered should be accurate.

Components of Data Communication

  1. Message: It is the information to be delivered.
  2. Sender: Sender is the person who is sending the message.
  3. Receiver: Receiver is the person to whom the message is being sent to.
  4. Medium: It is the medium through which the message is sent. For example: A Modem.
  5. Protocol: These are some set of rules which govern data communication.

Types of Topologies

BUS Topology

Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Bus topology in computer networks

Features of Bus Topology

  1. It transmits data only in one direction.
  2. Every device is connected to a single cable

Advantages of Bus Topology

  1. It is cost effective.
  2. Cable required is least compared to other network topology.
  3. Used in small networks.

Disadvantages of Bus Topology

  1. Cables fails then whole network fails..
  2. Cable has a limited length.
  3. It is slower than the ring topology.

RING Topology

It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device.
Ring topology in computer networks

Features of Ring Topology

  1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.
  2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology.
  3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
  4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each node of the network, till the destination node.

Advantages of Ring Topology

  1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data.
  2. Cheap to install and expand

Disadvantages of Ring Topology

  1. Troubleshooting is difficult in ring topology.
  2. Adding or deleting the computers disturbs the network activity.
  3. Failure of one computer disturbs the whole network.

STAR Topology

In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node.
Star topology in computer networks

Features of Star Topology

  1. Every node has its own dedicated connection to the hub.
  2. Hub acts as a repeater for data flow.

Advantages of Star Topology

  1. Fast performance with few nodes and low network traffic.
  2. Hub can be upgraded easily.
  3. Easy to setup and modify..

Disadvantages of Star Topology

  1. Cost of installation is high.
  2. Expensive to use.
  3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.

MESH Topology

It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
  1. Routing
  2. Flooding

MESH Topology: Routing

In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct the data to reach the destination using the shortest distance. Or, routing logic which has information about the broken links, and it avoids those node etc.

MESH Topology: Flooding

In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the network.
Mesh topology in computer networks

Types of Mesh Topology

  1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices.
  2. Full Mesh Topology : Each and every nodes or devices are connected to each other.

Features of Mesh Topology

  1. Fully connected.
  2. Robust.
  3. Not flexible.

Advantages of Mesh Topology

  1. Each connection can carry its own data load.
  2. Fault is diagnosed easily.
  3. Provides security and privacy.

Disadvantages of Mesh Topology

  1. Installation and configuration is difficult.
  2. Cabling cost is more.
  3. Bulk wiring is required.

TREE Topology

It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three levels to the hierarchy.
Tree topology in computer networks

Features of Tree Topology

  1. Ideal if workstations are located in groups.
  2. Used in Wide Area Network.

Advantages of Tree Topology

  1. Extension of bus and star topologies.
  2. Easily managed and maintained.
  3. Error detection is easily done.

Disadvantages of Tree Topology

  1. Heavily cabled.
  2. Costly.
  3. If more nodes are added maintenance is difficult.
  4. Central hub fails, network fails.

HYBRID Topology

It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology (ring topology and star topology).
Hybrid topology in computer networks

Features of Hybrid Topology

  1. It is a combination of two or topologies
  2. Inherits the advantages and disadvantages of the topologies included

Advantages of Hybrid Topology

  1. Effective.
  2. Scalable as size can be increased easily.
  3. Flexible.

Disadvantages of Hybrid Topology

  1. Complex in design.
2.Costly.Computer Networks: Business Applications
Business Computer
Following are some business applications of computer networks:
  1. 1. Resource Sharing:

    The goal is to make all programs, equipments(like printers etc), and especially data, available to anyone on the network without regard to the physical location of the resource and the user.

    2. Server-Client model:

    One can imagine a company's information system as consisting of one or more databases and some employees who need to access it remotely. In this model, the data is stored on powerful computers called Servers. Often these are centrally housed and maintained by a system administrator. In contrast, the employees have simple machines, called Clients, on their desks, using which they access remote data.

    3. Communication Medium:

    A computer network can provide a powerful communication medium among employees. Virtually every company that has two or more computers now has e-mail (electronic mail), which employees generally use for a great deal of daily communication

    4. eCommerce:

    A goal that is starting to become more important in businesses is doing business with consumers over the Internet. Airlines, bookstores and music vendors have discovered that many customers like the convenience of shopping from home. This sector is expected to grow quickly in the future.
    The most popular forms are listed in the below figure:
    Uses of Computer Networks

    Computer Networks: Home Applications

    Some of the most important uses of the Internet for home users are as follows:
    • Access to remote information
    • Person-to-person communication
    • Interactive entertainment
    • Electronic commerce

    Computer Networks: Mobile Users

    Mobile computers, such as notebook computers and Mobile phones, is one of the fastest-growing segment of the entire computer industry. Although wireless networking and mobile computing are often related, they are not identical, as the below figure shows.
    Uses of Computer Networks

Computer Knowledge


Computer Knowledge

First Generation Of Computer(1940-1956)

  World War gave rise to numerous developments and started off the computer age.  Variable Automatic Computer (EDVAC) in 1945 with a memory to hold both a stored program as well as data." Von Neumann's computer allowed for all the computer functions to be controlled by a single source.
Then in 1951 came the Universal Automatic Computer (UNIVAC I), designed by Remington rand and collectively owned by US census bureau and General Electric. UNIVAC amazingly predicted the winner of 1952, presidential elections, Dwight D. Eisenhower.
In first generation computers, the operating instructions or programs were specifically built for the task for which computer was manufactured.  First Generation computers used Vacuum tubes and magnetic drums (for data storage).


The IBM 650 Magnetic Drum Calculator



                     Second Generation Computers (1956-1963)
The invention of Transistors marked the start of the second generation. These transistors took place of the vacuum tubes used in the first generation computers. First large scale machines were made using these technologies to meet the requirements of atomic energy laboratories.
Second generation computers also started showing the characteristics of modern day computers with utilities such as printers, disk storage and operating systems. Many financial information was processed using these computers.
In Second Generation computers, the instructions (program) could be stored inside the computer's memory. High-level languages such as COBOL (Common Business-Oriented Language) and FORTRAN (Formula Translator) were used, and they are still used for some applications nowadays.


The IBM 7090

The IBM 7090, announced in 1958, was a transistorized version of the vacuum-tube-logic 709 and the first commercial computer with transistor logic (the first such computing device, according to , was the IBM 608, but that was not a general-purpose stored-program computer).
Grayson Kirk, President of Columbia University (right) and Kenneth M. King, director of the University's new Computer Center, 1963, in the machine room at the IBM 7090 console, "one of the largest computers in existence" at the time.

The IBM 7090 Console in the Columbia Computer Center machine room, 1966. Pictured: A group of particle physicists who discovered the violation of charge-conjugation invariance in interactions of intermediate strength: Charles Baltay and Lawrence Kirsch of Nevis Lab (back row);


Third Generation Computers (1964-1971)
. The Integrated Circuit(IC) was invented in 1958 by Jack Kilby. It combined electronic components onto a small silicon disc, made from quartz. More advancement made possible the fittings of even more components on a small chip or a semi conductor. Also in third generation computers, the operating systems allowed the machines to run many different applications. These applications were monitored and coordinated by the computer's memory.


The IBM 360/91
Installation of the IBM 360/91 in the Columbia Computer Center machine room in February or March 1969. Photo: AIS archive. 


                                   Fourth Generation (1971-Present)
Fourth Generation computers are the modern day computers. The Size started to go down with the improvement in the integrated circuits. Very Large Scale (VLSI) and Ultra Large scale (ULSI) ensured that millions of components could be fit into a small chip. It reduced the size and price of the computers at the same time increasing power, efficiency and reliability. "The Intel 4004 chip, developed in 1971, took the integrated circuit one step further by locating all the components of a computer (central processing unit, memory, and input and output controls) on a minuscule chip."

In 1981, IBM introduced personal computers for home and office use. "The number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used." Computer size kept getting reduced during the years. It went down from Desktop to laptops to Palmtops. Mackintosh introduced Graphic User Interface in which the users don’t have to type instructions but could use Mouse for the purpose.
 Soon the internet and World Wide Web appeared on the computer scene and fomented the Hi-Tech revolution of 90's.



Desktop Computer. 
 














                                      Fifth generation computers

Fifth generation computers are mainly future computers. Voice recognition is a special feature in these computers. By using superconductors and parallel processing computer geeks are trying to make artificial intelligence a reality. Quantum computing, molecular and nanotechnology will change the face of computers in the coming years.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRi2D-Yu3CGPHeh8zMPbm-xk4gx05QS9qZ_yPg9ATmDCbht-4fCf9iJPDZ5u3O8CWGAsD2iCgtOWafxIKP_7cg_JQEU_QZBTJBMt9jIfpEwfefvsux46fOrR8Asc8eJyODOb2XVHP2CrIC/s1600/robot.jpg
Full form of Computer:
  • C – Commonly
  • O – Operated
  • M – Machine
  • P – Particularly
  • U – Used for
  • T – Technical
  • E-Education
  • R – Research
Characteristics of Computer
  • Speed
  • Accuracy
  • Storage
  • Diligence
  • Versatility
  • Automation
  • Computer – An Introduction
    • A computer is a device that can receive process and store data.
    • However, all computers have several parts in common:
    • Input devices allow data and commands to the computer (Mouse, Keyboard etc.)
    • Memory for storing commands and data.
    • Central Processing Unit which controls the processing.
    • Monitor Process the information in the form of output.
    • Laptops
      1. The Laptops are lightweight mobile PCs with a thin screen.
      2. Laptops can operate on batteries, so you can take them anywhere.
      3. Unlike desktops, laptops combine the CPU, screen, and keyboard in a single case.
      4. The screen folds down onto the keyboard when not in use.
      Handheld computers (PDA)
      1. Handheld computers, also known as personal digital assistants (PDAs), are battery-power computers small enough to carry almost anywhere.
      2. These are useful for scheduling appointments, storing addresses and phone numbers, and playing games.
      3. Some have advanced capabilities, such as making telephone calls or accessing the Internet.
      4. Instead of keyboards, handheld computers have touch screens that you use with your finger.
      Peripheral Devices
      1. The peripheral device connects to a computer system to add functionality. Examples are a mouse, keyboard, monitor, printer and scanner.
      2. A computer peripheral is a device that connects to a computer but is not part of the core computer architecture.
      3. The core elements of a computer are the central processing unit, power supply, motherboard and the computer case that contains those three components.

      Types of Peripheral Devices

      • There are many peripheral devices, but they fall into three general categories:
      • Input devices, such as a mouse and a keyboard
      • Output devices, such as a monitor and a printer
      • Storage devices, such as a hard drive or flash drive