Sie sind auf Seite 1von 26

Basic Concepts in Network

PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information.
PDF generated at: Thu, 01 Sep 2011 20:35:25 UTC

Contents
Articles
Network Architecture

Network architecture

Peer-to-peer

Clientserver model

Network Topologies
Network topology

11
14
14

References
Article Sources and Contributors

22

Image Sources, Licenses and Contributors

23

Article Licenses
License

24

Network Architecture
Network architecture
Network architecture is the design of a communications network. It is a framework for the specification of a
network's physical components and their functional organization and configuration, its operational principles and
procedures, as well as data formats used in its operation.
In telecommunication, the specification of a network architecture may also include a detailed description of products
and services delivered via a communications network, as well as detailed rate and billing structures under which
services are compensated.
The network architecture of the Internet is predominantly expressed by its use of the Internet Protocol Suite, rather
than a specific model for interconnecting networks or nodes in the network, or the usage of specific types of
hardware links.

OSI Network Model


The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at
the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller
parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives
services from the layer below it. On each layer, an instance provides services to the instances at the layer above and
requests service from the layer below.

Physical Layer
The Physical Layer defines the electrical and physical specifications for devices. In particular, it defines the
relationship between a device and a transmission medium, such as a copper or optical cable. This includes the layout
of pins, voltages, cable specifications, hubs, repeaters, network adapters, host bus adapters (HBA used in storage
area networks) and more. Its main task is the transmission of a stream of bits over a communication channel.

Data Linking Layer


The Data Link Layer provides the functional and procedural means to transfer data between network entities and to
detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for
point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area
network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO
work in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use.
In modern practice, only error detection, not flow control using sliding window, is present in data link protocols such
as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most
protocols on the Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms are
rarely used. Sliding-window flow control and acknowledgment is used at the Transport Layer by protocols such as
TCP, but is still used in niches where X.25 offers performance advantages. Simply, its main job is to create and
recognize the frame boundary. This can be done by attaching special bit patterns to the beginning and the end of the
frame. The input data is broken up into frames.

Network architecture

Network Layer
The Network Layer provides the functional and procedural means of transferring variable length data sequences
from a source host on one network to a destination host on a different network, while maintaining the quality of
service requested by the Transport Layer (in contrast to the data link layer which connects hosts within the same
network). The Network Layer performs network routing functions, and might also perform fragmentation and
reassembly, and report delivery errors. Routers operate at this layersending data throughout the extended network
and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer.
The addressing scheme is not hierarchical. It controls the operation of the subnet and determine the routing strategies
between IMP and insures that all the packs are correctly received at the destination in the proper order.

Transport Layer
The Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services
to the upper layers. The Transport Layer controls the reliability of a given link through flow control,
segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that
the Transport Layer can keep track of the segments and retransmit those that fail. The Transport layer also provides
the acknowledgement of the successful data transmission and sends the next data if no errors occurred. Some
Transport Layer protocols, for example TCP, but not UDP, support virtual circuits provide connection oriented
communication over an underlying packet oriented datagram network .Where it assures the delivery of packets in the
order in which they were sent and assure that they are free of errors .The datagram transportation deliver the packets
randomly and broadcast it to multiple nodes. Notes: The transport layer multiplexes several streams on to 1 physical
channel.The transport headers tells which message belongs to which connnection.

The Session Layer


This Layer provide a user interface to the network where the user negotiate to establish a connection ,the user must
provide the remote address in with he want to contact. The operation of setting up a session between 2 process is
called "Binding" in some protocols it is merged with the transport layer.

Presentation Layer
The Presentation Layer establishes context between Application Layer entities, in which the higher-layer entities
may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is
available, presentation service data units are encapsulated into session protocol data units, and passed down the
stack.This layer provides independence from data representation (e.g., encryption) by translating between application
and network formats. The presentation layer transforms data into the form that the application accepts. This layer
formats and encrypts data to be sent across a network. It is sometimes called the syntax layer.[citation needed]The
original presentation structure used the basic encoding rules of Abstract Syntax Notation One (ASN.1), with
capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and
other data structures from and to XML.

Application Layer
The Application Layer is the OSI layer closest to the end user, which means that both the OSI application layer and
the user interact directly with the software application. This layer interacts with software applications that implement
a communicating component. Such application programs fall outside the scope of the OSI model. Application layer
functions typically include identifying communication partners, determining resource availability, and synchronizing
communication. When identifying communication partners, the application layer determines the identity and
availability of communication partners for an application with data to transmit.

Network architecture

Distributed computing
In distinct usage in distributed computing, the term network architecture often describes the structure and
classification of a distributed application architecture, as the participating nodes in a distributed application are often
referred to as a network. For example, the applications architecture of the public switched telephone network (PSTN)
has been termed the Advanced Intelligent Network. There are any number of specific classifications but all lie on a
continuum between the dumb network (e.g., Internet) and the intelligent computer network (e.g., the telephone
network). Other networks contain various elements of these two classical types to make them suitable for various
types of applications. Recently the context aware network, which is a synthesis of two, has gained much interest with
its ability to combine the best elements of both.
A popular example of such usage of the term in distributed applications, as well as PVCs (permanent virtual
circuits), is the organization of nodes in peer-to-peer (P2P) services and networks. P2P networks usually implement
overlay networks running over an underlying physical or logical network. These overlay network may implement
certain organizational structures of the nodes according to several distinct models, the network architecture of the
system.
Network architecture is a broad plan that specifies everything necessary for two application programs on different
networks on an Internet to be able to work together effectively.

References

This article incorporates public domain material from the General Services Administration document
"Federal Standard 1037C" [1] (in support of MIL-STD-188).

References
[1] http:/ / www. its. bldrdoc. gov/ fs-1037/ fs-1037c. htm

Peer-to-peer

Peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed
application architecture that partitions tasks or workloads between
peers. Peers are equally privileged, equipotent participants in the
application. They are said to form a peer-to-peer network of nodes.
Peers make a portion of their resources, such as processing power,
disk storage or network bandwidth, directly available to other
network participants, without the need for central coordination by
servers or stable hosts.[1] Peers are both suppliers and consumers
of resources, in contrast to the traditional clientserver model
where only servers supply (send), and clients consume (receive).
The peer-to-peer application structure was popularized by file
sharing systems like Napster. The concept has inspired new
structures and philosophies in many areas of human interaction.
Peer-to-peer networking is not restricted to technology, but covers
also social processes with a peer-to-peer dynamic. In such context,
social peer-to-peer processes are currently emerging throughout
society.

A peer-to-peer system of nodes without central


infrastructure.

Architecture of P2P systems


Peer-to-peer systems often implement an abstract overlay network,
built at Application Layer, on top of the native or physical network
topology. Such overlays are used for indexing and peer discovery
and make the P2P system independent from the physical network
topology. Content is typically exchanged directly over the
underlying Internet Protocol (IP) network. Anonymous
peer-to-peer systems are an exception, and implement extra
routing layers to obscure the identity of the source or destination
of queries.

Centralized server-based service model.

In structured peer-to-peer networks, peers (and, sometimes,


resources) are organized following specific criteria and algorithms, which lead to overlays with specific topologies
and properties. They typically use distributed hash table-based (DHT) indexing, such as in the Chord system
(MIT).[2]
Unstructured peer-to-peer networks do not provide any algorithm for organization or optimization of network
connections.. In particular, three models of unstructured architecture can be distinguished:
In pure peer-to-peer systems the entire network consists solely of equipotent peers. There is only one routing
layer, as there are no preferred nodes with any special infrastructure function.
Hybrid peer-to-peer systems allow such infrastructure nodes to exist, often called supernodes.[3]
In centralized peer-to-peer systems, a central server is used for indexing functions and to bootstrap the entire
system. Although this has similarities with a structured architecture, the connections between peers are not
determined by any algorithm.
The first prominent and popular peer-to-peer file sharing system, Napster, was an example of the centralized
model.[4] Freenet and early implementations of the gnutella protocol, on the other hand, are examples of the

Peer-to-peer
decentralized model. Modern gnutella implementations, Gnutella2, as well as the now deprecated Kazaa network are
examples of the hybrid model.
P2P networks are typically used for connecting nodes via largely ad hoc connections. Data, including digital formats
such as audio files, and real time data such as telephony traffic, is passed using P2P technology.
A pure P2P network does not have the notion of clients or servers but only equal peer nodes that simultaneously
function as both "clients" and "servers" to the other nodes on the network. This model of network arrangement
differs from the clientserver model where communication is usually to and from a central server. A typical example
of a file transfer that does not use the P2P model is the File Transfer Protocol (FTP) service in which the client and
server programs are distinct: the clients initiate the transfer, and the servers satisfy these requests.
The P2P overlay network consists of all the participating peers as network nodes. There are links between any two
nodes that know each other: i.e. if a participating peer knows the location of another peer in the P2P network, then
there is a directed edge from the former node to the latter in the overlay network. Based on how the nodes in the
overlay network are linked to each other, we can classify the P2P networks as unstructured or structured.

Structured systems
Structured P2P networks employ a globally consistent protocol to ensure that any node can efficiently route a search
to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more
structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash
table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in
a way analogous to a traditional hash table's assignment of each key to a particular array slot.
Distributed hash tables
Distributed hash tables (DHTs) are a class
of decentralized distributed systems that
provide a lookup service similar to a hash
table: (key, value) pairs are stored in the
DHT, and any participating node can
efficiently retrieve the value associated with
a given key. Responsibility for maintaining
the mapping from keys to values is
distributed among the nodes, in such a way
Distributed hash tables
that a change in the set of participants
causes a minimal amount of disruption. This allows DHTs to scale to extremely large numbers of nodes and to
handle continual node arrivals, departures, and failures.
DHTs form an infrastructure that can be used to build peer-to-peer networks. Notable distributed networks that use
DHTs include BitTorrent's distributed tracker, the Kad network, the Storm botnet, YaCy, and the Coral Content
Distribution Network.
Some prominent research projects include the Chord project, the PAST storage utility, the P-Grid, a self-organized
and emerging overlay network and the CoopNet content distribution system (see below for external links related to
these projects).
DHT-based networks have been widely utilized for accomplishing efficient resource discovery[5] [6] for grid
computing systems, as it aids in resource management and scheduling of applications. Resource discovery activity
involves searching for the appropriate resource types that match the users application requirements. Recent advances
in the domain of decentralized resource discovery have been based on extending the existing DHTs with the
capability of multi-dimensional data organization and query routing. Majority of the efforts have looked at

Peer-to-peer
embedding spatial database indices such as the Space Filling Curves (SFCs) including the Hilbert curves, Z-curves,
k-d tree, MX-CIF Quad tree and R*-tree for managing, routing, and indexing of complex Grid resource query
objects over DHT networks. Spatial indices are well suited for handling the complexity of Grid resource queries.
Although some spatial indices can have issues as regards to routing load-balance in case of a skewed data set, all the
spatial indices are more scalable in terms of the number of hops traversed and messages generated while searching
and routing Grid resource queries.

Unstructured systems
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be
easily constructed as a new peer that wants to join the network can copy existing links of another node and then form
its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the
network, the query has to be flooded through the network to find as many peers as possible that share the data. The
main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be
available at several peers and any peer searching for it is likely to find the same thing. But if a peer is looking for
rare data shared by only a few other peers, then it is highly unlikely that search will be successful. Since there is no
correlation between a peer and the content managed by it, there is no guarantee that flooding will find a peer that has
the desired data. Flooding also causes a high amount of signaling traffic in the network and hence such networks
typically have very poor search efficiency. Many of the popular P2P networks are unstructured.
In pure P2P networks: Peers act as equals, merging the roles of clients and server. In such networks, there is no
central server managing the network, neither is there a central router. Some examples of pure P2P Application Layer
networks designed for peer-to-peer file sharing are gnutella (pre v0.4) and Freenet.
There also exist hybrid P2P systems, which distribute their clients into two groups: client nodes and overlay nodes.
Typically, each client is able to act according to the momentary need of the network and can become part of the
respective overlay network used to coordinate the P2P structure. This division between normal and 'better' nodes is
done in order to address the scaling problems on early pure P2P networks. As examples for such networks can be
named modern implementations of gnutella (after v0.4) and Gnutella2.
Another type of hybrid P2P network are networks using on the one hand central server(s) or bootstrapping
mechanisms, on the other hand P2P for their data transfers. These networks are in general called 'centralized
networks' because of their lack of ability to work without their central server(s). An example for such a network is
the eDonkey network (often also called eD2k).

Indexing and resource discovery


Older peer-to-peer networks duplicate resources across each node in the network configured to carry that type of
information. This allows local searching, but requires much traffic.
Modern networks use central coordinating servers and directed search requests. Central servers are typically used for
listing potential peers (Tor), coordinating their activities (Folding@home), and searching (Napster, eMule).
Decentralized searching was first done by flooding search requests out across peers. More efficient directed search
strategies, including supernodes and distributed hash tables, are now used.
Many P2P systems use stronger peers (super-peers, super-nodes) as servers and client-peers are connected in a
star-like fashion to a single super-peer.

Peer-to-peer

Peer-to-peer-like systems
In modern definitions of peer-to-peer technology, the term implies the general architectural concepts outlined in this
article. However, the basic concept of peer-to-peer computing was envisioned in earlier software systems and
networking discussions, reaching back to principles stated in the first Request for Comments, RFC 1.[7]
A distributed messaging system that is often likened as an early peer-to-peer architecture is the USENET network
news system that is in principle a clientserver model from the user or client perspective, when they read or post
news articles. However, news servers communicate with one another as peers to propagate Usenet news articles over
the entire group of network servers. The same consideration applies to SMTP email in the sense that the core email
relaying network of Mail transfer agents has a peer-to-peer character, while the periphery of e-mail clients and their
direct connections is strictly a clientserver relationship. Tim Berners-Lee's vision for the World Wide Web, as
evidenced by his WorldWideWeb editor/browser, was close to a peer-to-peer design in that it assumed each user of
the web would be an active editor and contributor creating and linking content to form an interlinked web of links.
This contrasts to the broadcasting-like structure of the web as it has developed over the years.

Advantages and weaknesses


In P2P networks, clients provide resources, which may include bandwidth, storage space, and computing power. As
nodes arrive and demand on the system increases, the total capacity of the system also increases. In contrast, in a
typical clientserver architecture, clients share only their demands with the system, but not their resources. In this
case, as more clients join the system, fewer resources are available to serve each client.
The decentralized nature of P2P networks also increases robustness because it removes the single point of failure that
can be inherent in a client-server based system.[8]
As with most network systems, unsecure and unsigned codes may allow remote access to files on a victim's
computer or even compromise the entire network. In the past this has happened for example to the FastTrack
network when anti P2P companies managed to introduce faked chunks into downloads and downloaded files (mostly
MP3 files) were unusable afterwards or even contained malicious code. Consequently, the P2P networks of today
have seen an enormous increase of their security and file verification mechanisms. Modern hashing, chunk
verification and different encryption methods have made most networks resistant to almost any type of attack, even
when major parts of the respective network have been replaced by faked or nonfunctional hosts.
Internet service providers (ISPs) have been known to throttle P2P file-sharing traffic due to the high-bandwidth
usage.[9] Compared to Web browsing, e-mail or many other uses of the internet, where data is only transferred in
short intervals and relative small quantities, P2P file-sharing often consists of relatively heavy bandwidth usage due
to ongoing file transfers and swarm/network coordination packets. As a reaction to this bandwidth throttling several
P2P applications started implementing protocol obfuscation, such as the BitTorrent protocol encryption. Techniques
for achieving "protocol obfuscation" involves removing otherwise easily identifiable properties of protocols, such as
deterministic byte sequences and packet sizes, by making the data look as if it were random.[10]
A possible solution to this is called P2P caching, where a ISP stores the part of files most accessed by P2P clients in
order to save access to the Internet.

Peer-to-peer

Social and economic impact


The concept of P2P is increasingly evolving to an expanded usage as the relational dynamic active in distributed
networks, i.e., not just computer to computer, but human to human. Yochai Benkler has coined the term
commons-based peer production to denote collaborative projects such as free and open source software and
Wikipedia. Associated with peer production are the concepts of:
peer governance (referring to the manner in which peer production projects are managed)
peer property (referring to the new type of licenses which recognize individual authorship but not exclusive
property rights, such as the GNU General Public License and the Creative Commons licenses)
peer distribution (or the manner in which products, particularly peer-produced products, are distributed)
Some researchers have explored the benefits of enabling virtual communities to self-organize and introduce
incentives for resource sharing and cooperation, arguing that the social aspect missing from today's peer-to-peer
systems should be seen both as a goal and a means for self-organized virtual communities to be built and fostered.[11]
Ongoing research efforts for designing effective incentive mechanisms in P2P systems, based on principles from
game theory are beginning to take on a more psychological and information-processing direction.

Applications
There are numerous applications of peer-to-peer networks. The most commonly known is for content distribution

Content delivery
Many file sharing networks, such as gnutella, G2 and the eDonkey network popularized peer-to-peer
technologies. From 2004 on, such networks form the largest contributor of network traffic on the Internet.
Peer-to-peer content delivery networks (P2P-CDN) (Giraffic, Kontiki, Ignite, RedSwoosh).
Peer-to-peer content services, e.g. caches for improved performance such as Correli Caches[12]
Software publication and distribution (Linux, several games); via file sharing networks.
Streaming media. P2PTV and PDTP. Applications include TVUPlayer, Joost, CoolStreaming, Cybersky-TV,
PPLive, LiveStation, Giraffic and Didiom.
Spotify uses a peer-to-peer network along with streaming servers to stream music to its desktop music player.
Peercasting for multicasting streams. See PeerCast, IceShare, FreeCast, Rawflow
Pennsylvania State University, MIT and Simon Fraser University are carrying on a project called LionShare
designed for facilitating file sharing among educational institutions globally.
Osiris (Serverless Portal System) allows its users to create anonymous and autonomous web portals distributed
via P2P network.

Exchange of physical goods, services,or space


Peer-to-peer renting web platforms enable people to find and reserve goods, services, or space on the virtual
platform, but carry out the actual P2P transaction in the physical world (for example: emailing a local footwear
vendor to reserve for you that comfy pair of slippers which you've always had your eyes on, or contacting a
neighbor who has listed their weedwacker for rent).

Networking
Domain Name System, for Internet information retrieval. See Comparison of DNS server software
cloud computing
Dalesa a peer-to-peer web cache for LANs (based on IP multicasting).

Peer-to-peer

Science
In bioinformatics, drug candidate identification. The first such program was begun in 2001 the Centre for
Computational Drug Discovery at the University of Oxford in cooperation with the National Foundation for
Cancer Research. There are now several similar programs running under the United Devices Cancer Research
Project.
The sciencenet P2P search engine.
BOINC

Search
YaCy, a free distributed search engine, built on principles of peer-to-peer networks.

Communications networks

Skype, one of the most widely used internet phone applications is using P2P technology.
VoIP (using application layer protocols such as SIP)
Instant messaging and online chat
Completely decentralized networks of peers: Usenet (1979) and WWIVnet (1987).

General
Research like the Chord project, the PAST storage utility, the P-Grid, and the CoopNet content distribution
system.
JXTA, for Peer applications. See Collanos Workplace (Teamwork software), Sixearch

Miscellaneous
The U.S. Department of Defense has started research on P2P networks as part of its modern network warfare
strategy.[13] In May, 2003 Dr. Tether. Director of Defense Advanced Research Project Agency testified that U.S.
Military is using P2P networks.
Kato et al.s studies indicate over 200 companies with approximately $400 million USD are investing in P2P
network. Besides File Sharing, companies are also interested in Distributing Computing, Content Distribution.
Wireless community network, Netsukuku
An earlier generation of peer-to-peer systems were called "metacomputing" or were classed as "middleware".
These include: Legion, Globus
Bitcoin is a peer-to-peer based digital currency.

Historical perspective
Tim Berners-Lee's vision for the World Wide Web was close to a P2P network in that it assumed each user of the
web would be an active editor and contributor, creating and linking content to form an interlinked "web" of links.
This contrasts to the current broadcasting-like structure of the web.
Some networks and channels such as Napster, OpenNAP and IRC serving channels use a clientserver structure for
some tasks (e.g., searching) and a P2P structure for others. Networks such as gnutella or Freenet use a P2P structure
for nearly all tasks, with the exception of finding peers to connect to when first setting up.
P2P architecture embodies one of the key technical concepts of the Internet, described in the first Internet Request
for Comments, RFC 1, "Host Software" dated April 7, 1969. More recently, the concept has achieved recognition in
the general public in the context of the absence of central indexing servers in architectures used for exchanging
multimedia files.

Peer-to-peer

Network neutrality controversy


Peer-to-peer applications present one of the core issues in the network neutrality controversy. In October 2007,
Comcast, one of the largest broadband Internet providers in the USA, started blocking P2P applications such as
BitTorrent. Their rationale was that P2P is mostly used to share illegal content, and their infrastructure is not
designed for continuous, high-bandwidth traffic. Critics point out that P2P networking has legitimate uses, and that
this is another way that large providers are trying to control use and content on the Internet, and direct people
towards a client-server-based application architecture. The client-server model provides financial barriers-to-entry to
small publishers and individuals, and is quite inefficient for sharing large files.

References
[1] Rdiger Schollmeier, A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications,
Proceedings of the First International Conference on Peer-to-Peer Computing, IEEE (2002).
[2] Kelaskar, M.; Matossian, V.; Mehra, P.; Paul, D.; Parashar, M. (2002), A Study of Discovery Mechanisms for Peer-to-Peer Application (http:/
/ portal. acm. org/ citation. cfm?id=873218),
[3] Beverly Yang and Hector Garcia-Molina, Designing a super-peer network, Proceedings of the 19th International Conference on Data
Engineering (2003).
[4] Napster - the first prominent example of a centralized P2P system (http:/ / www8. cs. umu. se/ ~bergner/ thesis/ html/ node30. html)
[5] Ranjan, Rajiv; Harwood, Aaron; Buyya, Rajkumar (1 December 2006), A Study on Peer-to-Peer Based Discovery of Grid Resource
Information (http:/ / www. cs. mu. oz. au/ ~rranjan/ pgrid. pdf),
[6] Ranjan, Rajiv; Chan, Lipo; Harwood, Aaron; Karunasekera, Shanika; Buyya, Rajkumar. "Decentralised Resource Discovery Service for
Large Scale Federated Grids" (http:/ / gridbus. org/ papers/ DecentralisedDiscoveryGridFed-eScience2007. pdf) (PDF). .
[7] RFC 1, Host Software, S. Crocker, IETF Working Group (April 7, 1969)
[8] Lua, Eng Keong; Crowcroft, Jon; Pias, Marcelo; Sharma, Ravi; Lim, Steven (2005). "A survey and comparison of peer-to-peer overlay
network schemes" (http:/ / academic. research. microsoft. com/ Publication/ 2633870/
a-survey-and-comparison-of-peer-to-peer-overlay-network-schemes). .
[9] Janko Roettgers, 5 Ways to Test Whether your ISP throttles P2P, http:/ / newteevee. com/ 2008/ 04/ 02/
5-ways-to-test-if-your-isp-throttles-p2p/
[10] Hjelmvik, Erik; John, Wolfgang (2010-07-27). "Breaking and Improving Protocol Obfuscation" (http:/ / www. iis. se/ docs/
hjelmvik_breaking. pdf). .
[11] Antoniadis, P. & Le Grand, B. (2007). Incentives for resource sharing in self-organized communities: From economics to social psychology.
Digital Information Management, 2007. ICDIM '07
[12] Gareth Tyson, Andreas Mauthe, Sebastian Kaune, Mu Mu and Thomas Plagemann. Corelli: A Dynamic Replication Service for Supporting
Latency-Dependent Content in Community Networks. In Proc. 16th ACM/SPIE Multimedia Computing and Networking Conference
(MMCN), San Jose, CA (2009). (http:/ / www. dcs. kcl. ac. uk/ staff/ tysong/ files/ MMCN09. pdf)
[13] "Walker, Leslie. Uncle Sam Wants Napster! The Washington Post, November 8, 2001" (http:/ / www. washingtonpost. com/ ac2/
wp-dyn?pagename=article& node=washtech/ techthursday/ columns/ dotcom& contentId=A59099-2001Nov7). 2001-11-08. . Retrieved
2010-05-22.

External links
Glossary (http://www.p2pna.com/glossary.html) of P2P terminology
Foundation of Peer-to-Peer Computing (http://www.sciencedirect.com/science/issue/
5624-2008-999689997-678759), Special Issue, Elsevier Journal of Computer Communication, (Ed) Javed I. Khan
and Adam Wierzbicki, Volume 31, Issue 2, February 2008
Ross J. Anderson. The eternity service (http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html). In
Pragocrypt 1996, 1996.
Marling Engle & J. I. Khan. Vulnerabilities of P2P systems and a critical look at their solutions (http://www.
medianet.kent.edu/techreports/TR2006-11-01-p2pvuln-EK.pdf), May 2006
Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution
technologies (http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html). ACM Computing
Surveys, 36(4):335371, December 2004.

10

Peer-to-peer
Biddle, Peter, Paul England, Marcus Peinado, and Bryan Willman, The Darknet and the Future of Content
Distribution (http://crypto.stanford.edu/DRM2002/darknet5.doc). In 2002 ACM Workshop on Digital Rights
Management, November 2002.
John F. Buford, Heather Yu, Eng Keong Lua P2P Networking and Applications (http://www.p2pna.com).
ISBN 30-12374-214-5, Morgan Kaufmann, December 2008
Djamal-Eddine Meddour, Mubashar Mushtaq, and Toufik Ahmed, Open Issues in P2P Multimedia Streaming
(http://multicomm.polito.it/proc_multicomm06_8.pdf), in the proceedings of the 1st Multimedia
Communications Workshop MULTICOMM 2006 held in conjunction with IEEE ICC 2006 pp 4348, June 2006,
Istanbul, Turkey.
Detlef Schoder and Kai Fischbach, Core Concepts in Peer-to-Peer (P2P) Networking (http://www.econbiz.de/
archiv1/2008/42151_concepts_peer-to-peer_networking.pdf). In: Subramanian, R.; Goodman, B. (eds.): P2P
Computing: The Evolution of a Disruptive Technology, Idea Group Inc, Hershey. 2005
Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer Systems and Applications (http://www.peer-to-peer.info/).
ISBN 3-540-29192-X, Lecture Notes in Computer Science, Volume 3485, September 2005.
Ramesh Subramanian and Brian Goodman (eds), Peer-to-Peer Computing: Evolution of a Disruptive Technology
(http://www.igi-pub.com/books/details.asp?ID=4635), ISBN 1-59140-429-0, Idea Group Inc., Hershey, PA,
USA, 2005.
Shuman Ghosemajumder. Advanced Peer-Based Technology Business Models (http://shumans.com/
p2p-business-models.pdf). MIT Sloan School of Management, 2002.
Silverthorne, Sean. Music Downloads: Pirates- or Customers? (http://hbswk.hbs.edu/item.jhtml?id=4206&
t=innovation). Harvard Business School Working Knowledge, 2004.

Clientserver model
The clientserver model of computing is a distributed application that partitions tasks or workloads between the
providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers
communicate over a computer network on separate hardware, but both client and server may reside in the same
system. A server machine is a host that is running one or more server programs which share their resources with
clients. A client does not share any of its resources, but requests a server's content or service function. Clients
therefore initiate communication sessions with servers which await incoming requests.

Description
The clientserver characteristic describes the relationship of
cooperating programs in an application. The server component
provides a function or service to one or many clients, which initiate
requests for such services.
Functions such as email exchange, web access and database access, are
Schematic clients-server interaction.
built on the clientserver model. Users accessing banking services
from their computer use a web browser client to send a request to a
web server at a bank. That program may in turn forward the request to its own database client program that sends a
request to a database server at another bank computer to retrieve the account information. The balance is returned to
the bank database client, which in turn serves it back to the web browser client displaying the results to the user. The
clientserver model has become one of the central ideas of network computing. Many business applications being
written today use the clientserver model. So do the Internet's main application protocols, such as HTTP, SMTP,
Telnet, and DNS.

11

Clientserver model
The interaction between client and server is often described using sequence diagrams. Sequence diagrams are
standardized in the Unified Modeling Language.
Specific types of clients include web browsers, email clients, and online chat clients.
Specific types of servers include web servers, ftp servers, application servers, database servers, name servers, mail
servers, file servers, print servers, and terminal servers. Most web services are also types of servers.

Comparison to peer-to-peer architecture


A client-server network involves multiple clients connecting to a single, central server. The file server on a
client-server network is a high capacity, high speed computer with a large hard disk capacity.
By contrast, peer-to-peer networks involve two or more computers pooling individual resources such as disk drives,
CD-ROMs and printers[2] . These shared resources are available to every computer in the network, while each two of
them communicate in a session. Each computer acts as both the client and the server which means all the computers
on the network are equals, that is where the term peer-to-peer comes from. The advantage of peer-to-peer networking
is the easier control concept not requiring any additional coordination entity and not delaying transfers by routing via
server entities. However, the collision of session may be larger than with routing via server nodes.
In the peer to peer network, software applications can be installed on the single computer and shared by every
computer in the network. They are also cheaper to set up because most desktop operating systems have the software
required for the network installed by default. On the other hand, the client-server model works with any size or
physical layout of LAN and doesn't tend to slow down with a heavy use. [3] .
Peer-to-peer networks are typically less secure than a client-server networks because security is handled by the
individual computers, not controlled and supervised on the network as a whole. The resources of the computers in
the network can become congested as they have to support not only the workstation user, but also the requests from
network users. It may be difficult to provide systemwide services when the client operating system typically used in
this type of network is incapable of hosting the service.
Client-server networks with their additional capacities have a higher initial setup cost for networking than peer to
peer networks. The long-term aspect of administering a client-server network with applications largely server-hosted
surely saves administering effort compared to administering the application settings per each client. In addition the
concentration of functions in performant servers allows for lower grade performance qualification of the clients.
It is possible to set up a server on a modern desktop computer, but it is recommended to consider investment in
enterprise-wide server facilities with standardised choice of hardware and software and with a systematic and
remotely operable administering strategy. It is easier to configure and manage the server hardware and software
compared to the distributed administering requirements with a flock of computers[4] [5] .

Challenges
Generally a server may be challenged beyond its capabilities. Then a single server may cause a bottleneck or
constraints problem. However, servers may be cloned and networked to fulfill all known capacity and performance
requirements. Limitations include network load, network address volume, and transaction recovery time.
Aspects of comparison for other architectural concepts today include cloud computing as well. Possible design
decision considerations might be:
As soon as the total number of simultaneous client requests to a given server increases, the server can become
overloaded. Contrast that to a P2P network, where its aggregated bandwidth actually increases as nodes are
added, since the P2P network's overall bandwidth can be roughly computed as the sum of the bandwidths of every
node in that network. However, this simple model ends with the bandwidth of the network: Then congestion
comes on the network and not with the peers.

12

Clientserver model
Any single entity paradigm lacks the robustness of a redundant configuration. Under clientserver, should a
critical server fail, clients requests cannot be fulfilled by this very entity, but may be taken by another server, as
long as required data is accessible. In P2P networks, resources are usually distributed among many nodes which
generate as many locations to fail. If dynamic re-routing is established, even if one or more nodes depart and
abandon a downloading file, for example, the remaining nodes should still have the data needed to complete the
download.
Mainframe networks use dumb terminals. All processing is completed on few central computers. This is a method
of running a network with different limitations compared to fully fashioned clients.
Using intelligent client terminals increases the maintenance and repair effort. Lesser complete netbook clients
allow for reduction of hardware entities that have limited life cycles.

References
[1]
[2]
[3]
[4]
[5]

"Distributed Application Architecture" (http:/ / java. sun. com/ developer/ Books/ jdbc/ ch07. pdf). Sun Microsystem. . Retrieved 2009-06-16.
Understanding peer-to-peer networking (http:/ / www. isafe. org/ imgs/ pdf/ education/ P2PNetworking. pdf)
[Peer-to-Peer Networking and Applications]
Book: Computers are your future
Peer to Peer vs. Client/Server Networks

13

14

Network Topologies
Network topology
Network topology is the layout pattern of
interconnections of the various elements
(links, nodes, etc.) of a computer[1] [2] or
biological network.[3] Network topologies
may be physical or logical. Physical
topology refers to the physical design of a
network including the devices, location and
cable installation. Logical topology refers to
how data is actually transferred in a network
as opposed to its physical design. In general
physical topology relates to a core network
whereas logical topology relates to basic
network.

Diagram of different network topologies.

Topology can be understood as the shape or structure of a network. This shape does not necessarily correspond to the
actual physical design of the devices on the computer network. The computers on a home network can be arranged in
a circle but it does not necessarily mean that it represents a ring topology.
Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or
logical connections between nodes. The study of network topology uses graph theory. Distances between nodes,
physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies
may be identical.
A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical
topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of
these links and nodes in a graph results in a geometric shape that may be used to describe the physical topology of
the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical
topology of the network. The physical and logical topologies may or may not be identical in any particular network.

Topology classification
There are two basic categories of network topologies:[4]
Physical topologies
Logical topologies
The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the
layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling.[1] The physical
topology of a network is determined by the capabilities of the network access devices and media, the level of control
or fault tolerance desired, and the cost associated with cabling or telecommunications circuits.
The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes
through the network from one device to the next without regard to the physical interconnection of the devices. A
network's logical topology is not necessarily the same as its physical topology. For example, the original twisted pair
Ethernet using repeater hubs was a logical bus topology with a physical star topology layout. Token Ring is a logical

Network topology
ring topology, but is wired a physical star from the Media Access Unit.
The logical classification of network topologies generally follows the same classifications as those in the physical
classifications of network topologies but describes the path that the data takes between nodes being used as opposed
to the actual physical connections between nodes. The logical topologies are generally determined by network
protocols as opposed to being determined by the physical layout of cables, wires, and network devices or by the flow
of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely
match the logical flow of data, hence the convention of using the terms logical topology and signal topology
interchangeably.
Logical topologies are often closely associated with Media Access Control methods and protocols. Logical
topologies are able to be dynamically reconfigured by special types of equipment such as routers and switches.
The study of network topology recognizes seven basic topologies:[5]

Point-to-point
Bus
Star
Ring
Mesh
Tree

Hybrid
Daisy chain

Point-to-point
The simplest topology is a permanent link between two endpoints. Switched point-to-point topologies are the basic
model of conventional telephony. The value of a permanent point-to-point network is unimpeded communications
between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of
potential pairs of subscribers, and has been expressed as Metcalfe's Law.
Permanent (dedicated)
Easiest to understand, of the variations of point-to-point topology, is a point-to-point communications
channel that appears, to the user, to be permanently associated with the two endpoints. A children's tin
can telephone is one example of a physical dedicated channel.
Within many switched telecommunications systems, it is possible to establish a permanent circuit. One
example might be a telephone in the lobby of a public building, which is programmed to ring only the
number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a
physical circuit between the two points. The resources in such a connection can be released when no
longer needed, for example, a television circuit from a parade route back to the studio.
Switched:
Using circuit-switching or packet-switching technologies, a point-to-point circuit can be set up
dynamically, and dropped when no longer needed. This is the basic mode of conventional telephony.

15

Network topology

Bus
In local area networks where bus topology is used, each node is
connected to a single cable. Each computer or server is
connected to the single bus cable. A signal from the source
travels in both directions to all machines connected on the bus
cable until it finds the intended recipient. If the machine address
does not match the intended address for the data, the machine
ignores the data. Alternatively, if the data matches the machine
Bus network topology
address, the data is accepted. Since the bus topology consists of
only one wire, it is rather inexpensive to implement when
compared to other topologies. However, the low cost of implementing the technology is offset by the high cost
of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If
the network cable breaks, the entire network will be down.
Linear bus
The type of network topology in which all of the nodes of the network are connected to a common
transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred
to as the backbone, or trunk) all data that is transmitted between nodes in the network is transmitted
over this common transmission medium and is able to be received by all nodes in the network
simultaneously.[1]
Note: The two endpoints of the common transmission medium are normally terminated with a device
called a terminator that exhibits the characteristic impedance of the transmission medium and which
dissipates or absorbs the energy that remains in the signal to prevent the signal from being reflected or
propagated back onto the transmission medium in the opposite direction, which would cause
interference with and degradation of the signals on the transmission medium.
Distributed bus
The type of network topology in which all of the nodes of the network are connected to a common
transmission medium which has more than two endpoints that are created by adding branches to the
main section of the transmission medium the physical distributed bus topology functions in exactly the
same fashion as the physical linear bus topology (i.e., all nodes share a common transmission medium).
Notes:
1. All of the endpoints of the common transmission medium are normally terminated.
2. The linear bus topology is sometimes considered to be a special case of the distributed bus topology i.e.,
a distributed bus with no branching segments.
3. The physical distributed bus topology is sometimes incorrectly referred to as a physical tree topology
however, although the physical distributed bus topology resembles the physical tree topology, it differs
from the physical tree topology in that there is no central node to which any other nodes are connected,
since this hierarchical functionality is replaced by the common bus.

16

Network topology

Star
In local area networks with a star topology, each network host is
connected to a central hub with a point-to-point connection. All
traffic that traverses the network passes through the central hub.
The hub acts as a signal repeater. The star topology is considered
the easiest topology to design and implement. An advantage of
the star topology is the simplicity of adding additional nodes.
The primary disadvantage of the star topology is that the hub
represents a single point of failure.
Notes
1. A point-to-point link (described above) is sometimes
categorized as a special instance of the physical star
Star network topology
topology therefore, the simplest type of network that is
based upon the physical star topology would consist of one
node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which
node is the 'spoke' being arbitrary.[1]
2. After the special case of the point-to-point link, as in note (1) above, the next simplest type of network that
is based upon the physical star topology would consist of one central node the 'hub' with two separate
point-to-point links to two peripheral nodes the 'spokes'.
3. Although most networks that are based upon the physical star topology are commonly implemented using a
special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to
implement a network that is based upon the physical star topology using a computer or even a simple
common connection point as the 'hub' or central node.
4. Star networks may also be described as either broadcast multi-access or nonbroadcast multi-access
(NBMA), depending on whether the technology of the network either automatically propagates a signal at
the hub to all spokes, or only addresses individual spokes with each communication.
Extended star
A type of network topology in which a network that is based upon the physical star topology has one or
more repeaters between the central node (the 'hub' of the star) and the peripheral or 'spoke' nodes, the
repeaters being used to extend the maximum transmission distance of the point-to-point links between
the central node and the peripheral nodes beyond that which is supported by the transmitter power of the
central node or beyond that which is supported by the standard upon which the physical layer of the
physical star network is based.
If the repeaters in a network that is based upon the physical extended star topology are replaced with
hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical
star topology, although some texts make no distinction between the two topologies.
Distributed Star
A type of network topology that is composed of individual networks that are based upon the physical
star topology connected together in a linear fashion i.e., 'daisy-chained' with no central or top level
connection point (e.g., two or more 'stacked' hubs, along with their associated star connected nodes or
'spokes').

17

Network topology

18

Ring
A network topology that is set up in a circular fashion in which
data travels around the ring in one direction and each device on
the right acts as a repeater to keep the signal strong as it travels.
Each device incorporates a receiver for the incoming signal and
a transmitter to send the data on to the next device in the ring.
The network is dependent on the ability of the signal to travel
around the ring.[4]

Mesh
The value of fully meshed networks is proportional to the exponent of
the number of subscribers, assuming that communicating groups of any
two endpoints, up to and including all the endpoints, is approximated
by Reed's Law.

Ring network topology

Fully connected
The number of connections in a full mesh = n(n - 1) / 2.
Note: The physical fully connected mesh topology is
generally too costly and complex for practical networks,
although the topology is used when there are only a small
number of nodes to be interconnected.
Partially connected

Fully connected mesh topology

The type of network topology in which some of the nodes


of the network are connected to more than one other node
in the network with a point-to-point link this makes it
possible to take advantage of some of the redundancy that
is provided by a physical fully connected mesh topology
without the expense and complexity required for a
connection between every node in the network.
Note: In most practical networks that are based upon the
partially connected mesh topology, all of the data that is
Partially connected mesh topology
transmitted between nodes in the network takes the
shortest path between nodes, except in the case of a failure
or break in one of the links, in which case the data takes an alternative path to the destination. This
requires that the nodes of the network possess some type of logical 'routing' algorithm to determine the
correct path to use at any particular time.

Network topology

Tree
The type of network topology in which a central 'root' node (the top
level of the hierarchy) is connected to one or more other nodes that are
one level lower in the hierarchy (i.e., the second level) with a
point-to-point link between each of the second level nodes and the top
level central 'root' node, while each of the second level nodes that are
connected to the top level central 'root' node will also have one or more
other nodes that are one level lower in the hierarchy (i.e., the third
level) connected to it, also with a point-to-point link, the top level
Tree network topology
central 'root' node being the only node that has no other node above it
in the hierarchy (The hierarchy of the tree is symmetrical.) Each node
in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the
number, being referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral nodes.
1. A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy
of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the
physical topology of a star.
2. A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be
classified as a physical linear topology.
3. The branching factor, f, is independent of the total number of nodes in the network and, therefore, if the nodes
in the network require ports for connection to other nodes the total number of ports per node may be kept low
even though the total number of nodes is large this makes the effect of the cost of adding ports to each node
totally dependent upon the branching factor and may therefore be kept as low as required without any effect
upon the total number of nodes that are possible.
4. The total number of point-to-point links in a network that is based upon the physical hierarchical topology will
be one less than the total number of nodes in the network.
5. If the nodes in a network that is based upon the physical hierarchical topology are required to perform any
processing upon the data that is transmitted between nodes in the network, the nodes that are at higher levels in
the hierarchy will be required to perform more processing operations on behalf of other nodes than the nodes
that are lower in the hierarchy. Such a type of network topology is very useful and highly recommended.
definition : A tree topology connects multiple star topologies together onto a common single cable.

Hybrid
Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not
exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network connected to a tree
network is still a tree network topology. A hybrid topology is always produced when two different basic network
topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network
A Star ring network consists of two or more star topologies connected using a multistation access unit (MAU) as
a centralized hub.
A Star Bus network consists of two or more star topologies connected using a bus trunk (the bus trunk serves as
the network's backbone).
While grid networks have found popularity in high-performance computing applications, some systems have used
genetic algorithms to design custom networks that have the fewest possible hops in between different nodes. Some
of the resulting layouts are nearly incomprehensible, although they function quite well.
A Snowflake topology is really a "Star of Stars" network, so it exhibits characteristics of a hybrid network topology
but is not composed of two different basic network topologies being connected together.

19

Network topology

Daisy chain
Except for star-based networks, the easiest way to add more computers into a network is by daisy-chaining, or
connecting each computer in series to the next. If a message is intended for a computer partway down the line, each
system bounces it along in sequence until it reaches the destination. A daisy-chained network can take two basic
forms: linear and ring.
A linear topology puts a two-way link between one computer and the next. However, this was expensive in the
early days of computing, since each computer (except for the ones at each end) required two receivers and two
transmitters.
By connecting the computers at each end, a ring topology can be formed. An advantage of the ring is that the
number of transmitters and receivers can be cut in half, since a message will eventually loop all of the way
around. When a node sends a message, the message is processed by each computer in the ring. If a computer is
not the destination node, it will pass the message to the next node, until the message arrives at its destination. If
the message is not accepted by any node on the network, it will travel around the entire ring and return to the
sender. This potentially results in a doubling of travel time for data.

Centralization
The star topology reduces the probability of a network failure by connecting all of the peripheral nodes (computers,
etc.) to a central node. When the physical star topology is applied to a logical bus network such as Ethernet, this
central node (traditionally a hub) rebroadcasts all transmissions received from any peripheral node to all peripheral
nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with
all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any
peripheral node to the central node will result in the isolation of that peripheral node from all others, but the
remaining peripheral nodes will be unaffected. However, the disadvantage is that the failure of the central node will
cause the failure of all of the peripheral nodes also,
If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own
transmission, delayed by the two-way round trip transmission time (i.e. to and from the central node) plus any delay
generated in the central node. An active star network has an active central node that usually has the means to prevent
echo-related problems.
A tree topology (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in a
hierarchy. This tree has individual peripheral nodes (e.g. leaves) which are required to transmit to and receive from
one other node only and are not required to act as repeaters or regenerators. Unlike the star network, the functionality
of the central node may be distributed.
As in the conventional star network, individual nodes may thus still be isolated from the network by a single-point
failure of a transmission path to the node. If a link connecting a leaf fails, that leaf is isolated; if a connection to a
non-leaf node fails, an entire section of the network becomes isolated from the rest.
In order to alleviate the amount of network traffic that comes from broadcasting all signals to all nodes, more
advanced central nodes were developed that are able to keep track of the identities of the nodes that are connected to
the network. These network switches will "learn" the layout of the network by "listening" on each port during normal
data transmission, examining the data packets and recording the address/identifier of each connected node and which
port it's connected to in a lookup table held in memory. This lookup table then allows future transmissions to be
forwarded to the intended destination only.

20

Network topology

Decentralization
In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths
between them to provide redundant paths to be used in case the link providing one of the paths fails. This
decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present
when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the
number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them
more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in
some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A
multi-dimensional ring has a toroidal topology, for instance.
A fully connected network, complete topology or full mesh topology is a network topology in which there is a
direct link between all pairs of nodes. In a fully connected network with n nodes, there are n(n-1)/2 direct links.
Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability
due to the multiple paths for data that are provided by the large number of redundant links between nodes. This
topology is mostly seen in military applications.

References
[1] Groth, David; Toby Skandier (2005). Network+ Study Guide, Fourth Edition'. Sybex, Inc.. ISBN0-7821-4406-3.
[2] ATIS committee PRQC. "network topology" (http:/ / www. atis. org/ glossary/ definition. aspx?id=3516). ATIS Telecom Glossary 2007.
Alliance for Telecommunications Industry Solutions. . Retrieved 2008-10-10.
[3] Proulx, S. R.; Promislow, D. E. L.; Phillips, P. C. (2005). "Network thinking in ecology and evolution" (http:/ / eeb19. biosci. arizona. edu/
Faculty/ Dornhaus/ courses/ materials/ papers/ Proulx Promislow Phillips networks ecol evol. pdf). Trends in Ecology and Evolution 20 (6):
345-353. doi:10.1016/j.tree.2005.04.004. PMID16701391. .
[4] Inc, S., (2002). Networking Complete. Third Edition. San Francisco: Sybex
[5] Bicsi, B., (2002). Network Design Basics for Cabling Professionals. City: McGraw-Hill Professional

External links
A Guide to Network Topology (http://learn-networking.com/network-design/a-guide-to-network-topology)
Research network topology (http://www.optical-network.com/topology.php)

21

Article Sources and Contributors

Article Sources and Contributors


Network architecture Source: http://en.wikipedia.org/w/index.php?oldid=444688434 Contributors: !Silent, Ahmed Fouad(the lord of programming), Amitch, Crystallina, Eastlaw, Elsendero,
Jim.henderson, Johnh, JonHarder, Joy, Jyuujin, Kbrose, Keilana, Kvdveer, Lperez2029, Michael Hardy, Mild Bill Hiccup, Mobamoga21, Nethgirb, Old Death, Pjvpjv, SamTheButcher, Shanes,
ShaunMacPherson, Smack, Snori, Surv1v4l1st, THEN WHO WAS PHONE?, Wayiran, 46 anonymous edits
Peer-to-peer Source: http://en.wikipedia.org/w/index.php?oldid=447706443 Contributors: -Majestic-, -lulu-, 2bar, 4nT0, 4pq1injbok, A8UDI, ABF, ACNS, Aarghdvaark, Aaronchall, Abab99,
Abrech, Absalom23, Abune, Adammw, Adrian.benko, Aervanath, Ahoerstemeier, Ahtih, Aimini, Akamad, Akkinenirajesh, Alainr345, Alcuin, Aldie, AlexMyltsev, Alexkon, Aliendude5300,
AlistairMcMillan, Allyant, Amwebb, Andre Engels, Andrewpmk, Anishsane, Antelan, Anthony, Antoniad, Apoc2400, Arangana, Arm-1234, ArneBab, Arny, Atbk, Atif.t2, Audriusa, Augest,
Augman85, Authalic, AxelBoldt, Az1568, Bagatelle, Bahahs, Bane004, Bayerischermann, Ben-Zin, Benad, Bernino, Bhadani, Bhuston, Bigjimr, Binksternet, Bkonrad, Bloodshedder, Bluezy,
Bmicomp, Boivie, Bomac, Bondolo, Bongwarrior, Borgx, Bovineone, BrainMagMo, Bramp, Branko, BrokenSegue, BrotherE, Brunelstudy, Bslede, Btrest, Buryfc, Bwishon, Caiaffa, Caltas,
Cambrasa, CambridgeBayWeather, Canderson7, CanisRufus, Carlconrad, Carlosguitar, Cctoide, Celique, CesarB, Ceyockey, CharlesC, Charleswiles, Chuq, Chuunen Baka, Cjdkoh, Ck
lostsword, ClanCC, Classicrockfan42, Cldnails, Closedmouth, CoMePrAdZ, CobaltBlue, Coelacan, Coinchon, Coldfire82, Collabi, Cometstyles, Computerjoe, Connelly, Conti, Conversion script,
Coolblaze03, Copsewood, CortlandKlein, CosineKitty, CountZer0, Courcelles, Cpl Syx, Creative1980, Cshear, Cuahl, Cuaxdon, Cutter, Cwilso, Cwolfsheep, CyberSkull, Cyko 01, Cynical,
Cyrius, DMG413, DRTllbrg, Damian Yerrick, Daniel Olsen, DanielCD, Dattebayo321, Davewho2, David Levy, DavidCary, DeadEyeArrow, Deathmolor, Deeahbz, Deelkar, Dekimasu,
Delirium, Desmarie17, Dfe6543, Diegocr, Dinesh smita, Diomidis Spinellis, Dk, DocWatson42, Dougofborg, Drew R. Smith, Dustin gayler, Dysfunktion, E. Sn0 =31337=, ECELonghorn,
Echoghost, Ed g2s, Edggar, Editerjhon, Eekoo, Elbperle, Elchupachipmunk, Eliezerb, Ellmist, Eltomzo, Emufarmers, Endlessnameless, Epbr123, Eric119, Evansp, Evil Monkey, Evildeathmath,
Ewlyahoocom, Exile.mind, F15 sanitizing eagle, FF2010, Falsifian, Fan-1967, Farshad83, FatalError, Feedloadr, Feierbach, Felix.rivas, Fennec, FenrirTheWolf, Flamingblur, Folajimi, FrYGuY,
Fram, Fred Gandt, Frieda, Funandtrvl, Funky Monkey, Furrykef, G8yingri, Gabbe, Gabriel Kielland, Gail, Gaius Cornelius, Garas, GargoyleMT, Gaurav1146, Gbeeker, Gen0cide, Gene Nygaard,
Generic69, Gerbrant, Ghacks, Giftlite, Gilliam, Gillyweed, Gimmetrow, Glenn, Gobonobo, Gogo Dodo, Gounis, Gracefool, GraemeL, Greg Lindahl, Grick, Ground Zero, Gwendal (usurped),
H0riz0n, Haakon, Haham hanuka, HalfShadow, Hansix, Hardistyar, Harjk, Harryboyles, Haseo9999, Heron, Hgfernan, Hobartimus, Hopper96, Hpfreak26, I'mDown, Iainscott, Ice77cool,
IceKarma, Icedog, Icseaturtles, Idleguy, Ifny, Ihsuss, Ilario, InfinityB, Ingjerdj, Inkypaws, Iridescent, Itai, Ivo, JForget, JHunterJ, Jackfork, Jackiechen01, Jakester23jj, JamesBWatson, Jamesday,
Jareha, Jeff G., Jennavecia, Jeremyb, Jersyko, Jiddisch, Jim McKeeth, Jimmytharpe, Jludwig, Jmundo, Johann Wolfgang, Johnleemk, Johnteslade, Jon Backenstose, JonHarder, Jonik, Joshua
Andersen, Joyous!, Jrash, Jrdioko, Jreconomy, Jsnow, Julesd, Just zis Guy, you know?, Juststreamit, K.lee, Karam.Anthony.K, Karrade, Kbdank71, Kbrose, KelleyCook, Kelly Martin,
Kennyluck, Kevinzhouyan, Kevyn, Kgfleischmann, Kingturtle, Kku, Knownot, Knutux, Koenige, Koman90, Konstable, Korath, Korou, Kos1337tt, Kozuch, Kpjas, Kristen Eriksen, Kry, Kukini,
Kumarbhatia, Kwertii, Kwirky88, Kzm, LBarsov, Laboriousme, Lairdp, Lajena, Larrybowler, Laudaka, Lawman3516, LeaveSleaves, LedgendGamer, Lee1026, Lemonsawdust, LeoNomis,
Leuko, Lewu, Lexor, Liao, Lifefeed, Liftarn, Lightmouse, LilHelpa, LinuxPickle, Little Mountain 5, LittleDan, LjL, Lo2u, Loadmaster, Lockeownzj00, Lord JoNil, Lord dut, Loren36, LotharZ,
Lousyd, Lradrama, Ludditesoft, M, M 3bdelqader, MC707, MONGO, Mac, MadEwokHerd, Mahanga, Mangojuice, ManiaQ, Manja Neuhaus, Manu3d, Materialscientist, MatrixFrog,
Matthewedwards, Matthewleslie, Mattsag, Mattycl, Mauro Bieg, Mavol, Maxamegalon2000, Maximaximax, Maximus Rex, Mbauwens, Meembo, Melaen, Merope, Miami33139, Miatatroll,
Michael Hardy, Michaelbusch, MiguelTremblay, Mike Van Emmerik, Mikeblas, Mindmatrix, Minesweeper, Minghong, Mintleaf, Mirshafie, Miym, Mjohnson, Mkweise, Mlspeten, Mmv-ru,
Mo0, Mobilon, Moehre, Moose mangle, Mormegil, Morten Blaabjerg, Morton.lin, MrJones, MrOllie, Mrdoomino, Msoos, Mthibault, Mupet0000, Mushroom, Musicat, Mydogategodshat,
Neilapalmer, Neilc, Neiltheffernaniii, Nethgirb, Netkinetic, Netoholic, Nick, Niteowlneils, Nixeagle, Nlu, NoIdeaNick, Noodles-sb, Nuwewsco, Nyhet, OWV, Ocexyz, Od Mishehu,
Ohnoitsjamie, Old Death, Oldiowl, Olivier, Omegatron, Ooskapenaar, Owen, P2pauthor, Palica, Paranoid, Patrickzuili, Pausch, Petchboo, Peter Tribe, PeterC, Peyre, Pgr94, Phatom87, Phelfe,
PhilHibbs, Philip Trueman, Phoenix-forgotten, Pilotguy, PinchasC, Pinethicket, Ping, Pip2andahalf, Pjbflynn, Pmerson, Postdlf, Prab, Pratyeka, Preada, Preeeemo, Preston.lee, Prodoc,
Qnext-Support, Quale, Qwm, RL0919, Radagast83, Radio Dan, Raraoul, RayBeckerman, Rchamberlain, Rearden9, RedMurcury1, Reedy, Reinderien, Remember the dot, RentalicKim,
Requestion, Retired username, Rettetast, RexNL, Rexguo, ReyBrujo, Rhobite, Rich Farmbrough, Richard Allen, Ricky@36, Rjdainty1, Rjstott, Rl, RogersMD, Ronz, RoseParks, Rosejn,
Rossami, Rossgk, Royboycrashfan, Ruud Koot, Rvalles, RyanKoppelman, Ryulong, S.K., SEWilco, Sachdevj, Sae1962, Salsb, Sander123, SasiSasi, Schneelocke, Scoutersig, Scyth3, Seb26,
Secfan, Sendai2ci, Shadowjams, Sharepro, ShaunMacPherson, Shellreef, Shielazhang, Sietse Snel, Sigma 7, Silvarbullet1, SimonP, Sir Paul, SirJibby, Sirius Wallace, Sjakkalle, Sky Attacker,
SkyWalker, Sl, Slon02, SmileToday, Smywee, Snied, Soali, Softssa, Solitude, Someguy1221, Sonia, SpeedyGonsales, Splintax, Sschluter, Stanleyuroy, Stedjamulia, Steel, Stephan Leeds,
Stephenchou0722, SteveSims, Stjones86, Strait, Sunil Mohan, Sweety Rose, TBloemink, TCL, TUF-KAT, Tad Lincoln, Tawker, Tazmaniacs, Teemuk, Teilolondon, Terribim, Teryx, Texture,
Tgeairn, The Anome, The Belgain, The Thing That Should Not Be, The Wordsmith, The stuart, Thommi, Thumperward, Tide rolls, Tiger Brown, Tigrisnaga, Tim Ivorson, Timwi, TittoAssini,
Tknew, Tohd8BohaithuGh1, Tom X. Tobin, Tom235, Tomchiukc, Tomdobb, Tony Sidaway, Tothwolf, Totof, Touisiau, TouristPhilosopher, Toussaint, Toytoy, Trek00, Tuxa, Tverbeek,
Tyofcore, Ultra-Loser, Una Smith, Unyoyega, VBGFscJUn3, VCHunter, Vald, Valermos, VampWillow, Vbs, Veinor, Velociped, Versageek, Viajero, Victorgrigas, Vincent stehle, Vironex,
Vorash, Waldir, Wangi, Warlordwolf, Wavelength, Wayne Slam, Wayward, Webpageone.co.uk, Wellreadone, Wesley, Wik, Wikidenizen, Will Beback Auto, Wiml, Wolfkeeper, Wrs1864,
Wtfunkymonkey, Wuyanhuiyishi, Wvithanage, XDnonameXD, Xkoalax, Xpclient, Yacht, Yamakiri, Yandman, Yaronf, Yoelzanger, Youssefsan, Zak123321, Zephyrxero, Zicko1, ZimZalaBim,
Zso, Zzuuzz, , 1511 anonymous edits
Clientserver model Source: http://en.wikipedia.org/w/index.php?oldid=447257745 Contributors: "alyosha", 28bytes, A.bit, Addaintstopnme, Addshore, Agupte, Ah2190, Akamad,
Akshayagupta, Alansohn, Aldie, Allan McInnes, AllenDowney, Altenmann, Amberroom, Anonymous Dissident, Anshu.kar, Anwar saadat, Apapadop, Attilios, AutumnSnow, Az1568, Azior,
BBCWatcher, Bazzargh, Beano, Beland, Bertung, Betacommand, Bilbo1507, Blues-harp, Bluezy, Bogey97, Borgx, Bovineone, Brick Thrower, Bruce1ee, Brucefulton, Bryan Derksen, C. lorenz,
Calimo, Can't sleep, clown will eat me, Captian Mar-Vell, Chandlermbing, Cholmes75, Chris 73, Closedmouth, Cntras, Conversion script, Cprompt, Creativename, DVD R W, Da monster under
your bed, Debresser, Delirium, Discospinster, Dyl, EdgeOfEpsilon, Elsendero, Eric-Wester, Esap, EvanProdromou, Ewlyahoocom, FatalError, Favonian, Fenna, Flubeca, Freerick, Furrykef,
Gadfium, Gail, Gardar Rurak, Gdo01, Giftlite, Gimmetrow, Gjbloom, GlennZ, Grundle, Guesty-Persony-Thingy, Haham hanuka, Happyrabbit, Henriyugi, Horv.petya, Howard the Duck, Hsr1,
Idearat, Innv, Isnow, J.delanoy, JDowning, JSpung, Jackiechen01, Jh51681, Jni, Johnuniq, JonHarder, Kbdank71, Kbrose, Kenyon, Khalid hassani, Khukri, Kingturtle, Kku, KnowledgeOfSelf,
Kuru, Kwsn, LOL, LeaveSleaves, Leckley, Liftarn, Lilwik, Llort, M, M4gnum0n, Mac, Malerin, Mange01, MarkPDF, MartinSpamer, Mashoodp, Mathiastck, Midgrid, Miym, Moralis, Mtking,
Mubaidr, Murt, Nanami Kamimura, Nunquam Dormio, Nurg, Nurlan926, OnePt618, Orange Suede Sofa, Oxymoron83, Palfrey, Panoramix, Patrick, Pbb, PedroPVZ, Peu, Phatom87, Piano non
troppo, Pitel, Pottsdl, R.D.H. (Ghost In The Machine), Radugramescu, Raghutech, Rajithgune, ReallyNiceGuy, Reeveorama, RexNL, Richard Allen, RichardVeryard, Rick Sidwell, RickScott,
Robofish, Rodrigoq, Roger D T, Rouenpucelle, Rror, Rst, Salvar, Shadowjams, Shell Kinney, Shiftworker, SimonP, Skittleys, Snoyes, Someguy1221, Stephan Leeds, Stephenb, Superm401,
T@nn, Tellyaddict, Tetriphile, TexasAndroid, Thatguyflint, The Thing That Should Not Be, Thumperward, Tide rolls, TitusEapen, Tmpnz, Tom Edwards, Tomek.poznan, Tremilux, Triwbe,
TutterMouse, Tweegirl, Una Smith, Ut Libet, VampWillow, Vegaswikian, Versus22, Vrenator, Wasubire, Wayiran, Whadar, Wireless friend, Wolfkeeper, Wolfling, Woohookitty, Wuzzeb,
Xdxfp, Yaronf, Zen-master, Zian, Zomno, , 509 anonymous edits
Network topology Source: http://en.wikipedia.org/w/index.php?oldid=447816309 Contributors: 4twenty42o, AK Auto, Ahoerstemeier, Aitias, Alan.ca, Alansohn, Alras Sappho, Andre Engels,
Andrewcrawford, Angela, Antandrus, Arthena, Atlant, Aulohk02, Autopilots, Average Earthman, Avicennasis, Avoided, Baba802, Baiji, BigDunc, Binksternet, Bluerasberry, Bobo192,
Boradjignesh, Breakpoint, Brianski, Bth, Butros, C933103, CBM, Can't sleep, clown will eat me, Capricorn42, Catgut, Cenarium, Ceoil, Charles Matthews, Cheechthecheechy, Chris zar2x,
Christian75, Cometstyles, Comsign, Crimsondestroyer, Curps, D99figge, DARTH SIDIOUS 2, DFerno, Da monster under your bed, Daniarmo, Darkwind, Darnir redhat, Darth Panda, David
Biddulph, David Eppstein, David Morn, Dead3y3, Deathdealer2222, DerHexer, Deville, Dlohcierekim's sock, Dougofborg, Dto, Edward, ElinorD, Enanski, Epbr123, Epok, Eric-Wester,
EurekaLott, Ewlyahoocom, Excirial, Fallschirmjger, Favonian, Flowanda, Foobaz, Funandtrvl, GPHemsley, GTBacchus, Gavindow, Gcorbaz, Gershwinrb, Giftlite, Gilliam, Golfandme,
Gonzonoir, Gritzko, Gurch, Gwalla, Hajatvrc, Harryboyles, Hcberkowitz, Heron, Hersfold tool account, Hmrox, Hon4ron, Hu12, Husond, Ilmari Karonen, Iluvcapra, Intgr, Inwind, Iridescent,
J.delanoy, JFreeman, Jahiegel, Jake Nelson, Jalal0, JamesBWatson, Jasper Deng, Jeffozvold, Jeffrey O. Gustafson, Jerroleth, JesseW, Jilesh desai, Jncraton, JoanneB, JohnDoe0007, Johnduffell,
Johntinker, Jorunn, Joseph Solis in Australia, Josh the Nerd, Jovianeye, Jthill, Karelklic, Kbrose, Kevin Rector, KingWade, Kingpin13, Kl4m, KnowledgeOfSelf, Kralizec!, Kvng, Lee Carre,
Leyo, LiDaobing, Libcub, Limideen, Llarq, Lord Voldemort, Lowellian, Lupin, M h 100, MER-C, MONGO, Maddie!, Magister Mathematicae, Maglev2, Mailer diablo, Mani1, Marek69,
Materialscientist, Math Champion, Matt73, Meaghan, Mentifisto, Michael Hardy, Michlo, Mike-banos-NJITWILL, Mikeo, Mindmatrix, MinorContributor, Mlewis000, Moink, Mpumelelo,
Mschel, Mulad, Multipundit, N-Man, Narada000, Nekote, Nelson50, Nethgirb, Nikola Smolenski, Noosentaal, Nuno Tavares, Ocaasi, Odie5533, Oleg Alexandrov, Oliver Gehrke,
Omicronpersei8, Onepairofpants, Optichan, Osfer, PCock, PS2pcGAMER, Pan1987, Paul5121, PaulHanson, Pegasus1138, Peter McGinley, Petrb, Pharaoh of the Wizards, Philip Trueman,
Phoenix1177, Physic1, Picus viridis, Pip2andahalf, Princemackenzie, Quinsareth, QuiteUnusual, Rcassidy, Requestion, Rettetast, Rhtc, Rick Sidwell, Rjwilmsi, Robofish, Rory096, Rwxrwxrwx,
Ryan-McCulloch, Ryoutou, Sadasdas, Salsal99, Saltvik, Salty65, Sbisolo, ScottJ, Seaphoto, Shadowjams, Shanes, ShaunMacPherson, Sheepeep, Shelbymoore3, Sidlingo, SilverStar, SirGrant,
Siroxo, Sjakkalle, Skarebo, Skittleys, SlomTrain, SlubGlub, Slysplace, Smack, Snowolf, Sobreira, Souljesusgod12, Sparkzy, Spliffy, SpuriousQ, Srleffler, Stochata, Supreme geek overlord,
Suruena, Swordsman04, THEN WHO WAS PHONE?, Tabletop, Tbhotch, Technobadger, Technopat, Terpdx, Terrible Tim, The Anome, The Rambling Man, The Thing That Should Not Be, The
Utahraptor, Thecheesykid, Thompsma, Thrawn562, Tide rolls, Titoxd, Tobias Bergemann, Tomaxer, Triwbe, Trusilver, Turgan, Twri, UU, Uncle Dick, Uncle Milty, Vanished 6551232,
VegaDark, Versus22, Violetriga, Vrenator, WaldoJ, Wasell, Welsh, Why Not A Duck, Wilde Jagd, Wizardist, Woohookitty, Yandman, Yyy, Z4ns4tsu, Zac439, Zomno, 1064 anonymous edits

22

Image Sources, Licenses and Contributors

Image Sources, Licenses and Contributors


Image:PD-icon.svg Source: http://en.wikipedia.org/w/index.php?title=File:PD-icon.svg License: Public Domain Contributors: Various. See log. (Original SVG was based on File:PD-icon.png
by Duesentrieb, which was based on Image:Red copyright.png by Rfl.)
Image:P2P-network.svg Source: http://en.wikipedia.org/w/index.php?title=File:P2P-network.svg License: Public Domain Contributors: User:Mauro Bieg
Image:Server-based-network.svg Source: http://en.wikipedia.org/w/index.php?title=File:Server-based-network.svg License: GNU Lesser General Public License Contributors: User:Mauro
Bieg
File:DHT en.svg Source: http://en.wikipedia.org/w/index.php?title=File:DHT_en.svg License: Public Domain Contributors: Jnlin
File:Client-server-model.svg Source: http://en.wikipedia.org/w/index.php?title=File:Client-server-model.svg License: GNU Lesser General Public License Contributors: Gnome-fs-client.svg:
David Vignoni Gnome-fs-server.svg: David Vignoni derivative work: Calimo (talk)
Image:NetworkTopologies.svg Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopologies.svg License: Public Domain Contributors: NetworkTopologies.png: Maksim
derivative work: Malyszkz (talk)
File:NetworkTopology-Bus.png Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopology-Bus.png License: Public Domain Contributors: Foobaz, MisterSanderson
File:NetworkTopology-Star.png Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopology-Star.png License: Public Domain Contributors: Foobaz, Herbythyme, Kilom691,
MisterSanderson, 7 anonymous edits
File:NetworkTopology-Ring.png Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopology-Ring.png License: Public Domain Contributors: Foobaz, MisterSanderson
File:NetworkTopology-FullyConnected.png Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopology-FullyConnected.png License: Public Domain Contributors: Foobaz,
Kilom691
File:NetworkTopology-Mesh.png Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopology-Mesh.png License: Public Domain Contributors: Foobaz, Kozuch, 3 anonymous
edits
File:NetworkTopology-Tree.png Source: http://en.wikipedia.org/w/index.php?title=File:NetworkTopology-Tree.png License: Public Domain Contributors: Foobaz, JohnDoe0007,
MisterSanderson

23

License

License
Creative Commons Attribution-Share Alike 3.0 Unported
http:/ / creativecommons. org/ licenses/ by-sa/ 3. 0/

24

Das könnte Ihnen auch gefallen