Sie sind auf Seite 1von 3

C1.

Objectives
Identify the key components of any data network. Explain the advantages of using a layered model to describe network functionality. Describe the role of each layer in two recognized network models: The TCP/IP model and the OSI model.

Network topologies
Bus topology
The original Ethernet networks were implemented with a coaxial bus structure, as shown in figure 1. Segment lengths were limited to 500 meters, and up to 100 stations could be connected to a single segment. Individual segments could be interconnected with repeaters, as long as multiple paths did not exist between any two stations on the network and the number of DTEs did not exceed 1024. The total path distance between the most distant pair of stations was also not allowed to exceed a maximum prescribed value.

Fig. 1. Bus topology on coaxial cable


1 2

Star topology
Since the early 1990s, the network configuration of choice has been the star-connected topology, shown in figure 2. The central network unit is either a multiport repeater (also known as a hub) or a network switch. All connections in a star network are point-to-point links implemented with either twisted-pair or optical fiber cable. Less collisions and most efficient.

Tree topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs

Fig. 2. Principles of star topology


3

Fig. 3. Principles of tree topology


4

Ring topology
Ring topology uses a token to pass information from one computer to the other. A token is attached to the message by the sender to identify which computer should receive the message. As the message moves around the ring, each computer examines the token. If the computer identifies the token as its own, then it will process the information. A disadvantage of a token ring is if one computer is broken or down, the message cannot be passed to the other computers.

Network Structure
End devices form interface with human network & communications network Role of end devices: client server both client and server Data is sent across a network in small chunks called segments Network components hardware software

Network representations

Function of Protocol in Network Communication


A successful communication can only be achieved with the use of a number of protocols in a protocol suite. The different protocol work together to ensure that the message are received and understood by both parties. Different protocols takes care of different communication tasks. Example: Interaction between a Web server and Web browser.

Function of Protocol in Network Communication


Application protocol HTTP - Governs communication between a Web server and Web client. Defines the content and format of the request and response messages between client and server. Transport protocol TCP - Manages the individual conversation between servers and clients (not just between Web servers and Web clients). Divide HTTP message (or any application message) into smaller messages called segments. Internet protocol IP - Responsible for making sure data can travel the network to the correct receiver. Takes TCP segments and encapsulate them into a packet. Network access protocol - controls physical transmission of data on the media. Takes packet from IP and format them to be transmitted over the media.

Layers with TCP/IP and OSI Model


Compare OSI and TCP/IP model

10

Layers with TCP/IP and OSI Model


Describe TCP/IP Model

Layers with TCP/IP and OSI Model


Communication Process : Encapsulation - Process of adding control information as it passes down through the layered model. Decapsulation Process of removing control information as it passes upwards through the layered model.

11

12

Layering: The OSI Model


layer-to-layer communication
7

Layers with TCP/IP and OSI Model


Describe the process of sending and receiving messages
7 6 5 4 3 2 1

Application

Application

Presentation 6
5 4 3 2 1

Presentation Session

Session Transport Network Link Physical

Peer-layer communication

Router
Network Link Physical

Router
Network Link Physical

Transport Network Link Physical

13

14

Addressing and Naming Schemes


To ensure successful data delivery, various types of addresses are used when sending data.
Address to identify physical device / network interface Address to identify host Address to identify application

Addressing and Naming Schemes


The information in the encapsulation header is used to identify the source and destination processes for data communication

15

16

Das könnte Ihnen auch gefallen