8/4/2019 unit2-2-090714220525-phpapp02
1/61
Computer Networks
8/4/2019 unit2-2-090714220525-phpapp02
2/61
A computer network is defined as theinterconnection of 2 or more independent computersor/and peripherals.
Computer Network
8/4/2019 unit2-2-090714220525-phpapp02
3/61
Network
Source Destination
8/4/2019 unit2-2-090714220525-phpapp02
4/61
Need of Networks
Communicate and collaborate Share information
Share resources
Sharing computer files and disk space
Sharing high-quality printers
Access to common fax machines
Access to common modems
Multiple access to the Internet
8/4/2019 unit2-2-090714220525-phpapp02
5/61
1. Local Area Networks (LANs) - a computernetwork covering a small geographic area, likea home, office, or group of buildings. Typicallywithin 5-mile radius.
2. Metropolitan Area Networks (MANs)- arelarge computer networks usually spanning acity. (within 30 miles)
3. Wide-Area Networks (WANs) - any network
whose communications links crossmetropolitan, regional, or national boundaries.
Classification of Networks
8/4/2019 unit2-2-090714220525-phpapp02
6/61
The way in which the computers areinterconnected together is known asTOPOLOGY.
Network Topology
8/4/2019 unit2-2-090714220525-phpapp02
7/61
Types of topologies
Physical topology
Logical topology
8/4/2019 unit2-2-090714220525-phpapp02
8/61
Types of physical topologies
Bus/Linear
Star
Ring Tree
Mesh
8/4/2019 unit2-2-090714220525-phpapp02
9/61
Linear or bus topology
Consists of a main cable, known asbackbone cable, with a terminator ateach end .
All nodes (file server, workstations,and peripherals) are connected to thecable.
Ethernetand LocalTalknetworks usebus topology.
8/4/2019 unit2-2-090714220525-phpapp02
10/61
8/4/2019 unit2-2-090714220525-phpapp02
11/61
Advantages of Bus Topology
Easy to connect a computer or peripheralto a linear bus.
Requires less cable length.
Easy to extend.
If one node of the N/W is faulty, the N/W
can still remain working.
8/4/2019 unit2-2-090714220525-phpapp02
12/61
Entire network shuts down if there is abreak in the main cable.
Terminators are required at both ends ofthe backbone cable.
Difficult to identify the problem if the entirenetwork shuts down.
Not meant to be used as a stand-alonesolution in a large building.
Disadvantages of BusTopology
8/4/2019 unit2-2-090714220525-phpapp02
13/61
Star topology
A star topology is designed with each node (fileserver, workstations, and peripherals) connecteddirectly to a central network hub.
Data on a star network passes through the hubbefore continuing to its destination.
The hub manages and controls all functions ofthe network.
It also acts as a repeater for the data flow.
8/4/2019 unit2-2-090714220525-phpapp02
14/61
8/4/2019 unit2-2-090714220525-phpapp02
15/61
Easy to install.
No disruptions to the network other thanconnecting or removing devices.
Easy to detect faults and to remove parts.
Advantages of StarTopology
8/4/2019 unit2-2-090714220525-phpapp02
16/61
Requires more cable length than a bustopology.
If the hub fails, nodes attached aredisabled.
More expensive than bus topologybecause of the cost of the hub.
Disadvantages of StarTopology
8/4/2019 unit2-2-090714220525-phpapp02
17/61
8/4/2019 unit2-2-090714220525-phpapp02
18/61
8/4/2019 unit2-2-090714220525-phpapp02
19/61
Di d t f T
8/4/2019 unit2-2-090714220525-phpapp02
20/61
Disadvantages of TreeTopology
Overall length of each segment is limitedby the type of cabling used.
If the backbone line breaks, the entiresegment goes down.
More difficult to configure than othertopologies.
8/4/2019 unit2-2-090714220525-phpapp02
21/61
Ring topology
Is a type of computer network configurationwhere each network computer and device areconnect to each other forming A large circle.
Data is divided into packets when transmitted. Packet is sent around the ring until it reaches
its final destination.
8/4/2019 unit2-2-090714220525-phpapp02
22/61
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
23/61
Advantages of ringtopology
Requires lesser amount of cable and there arenot much of installation problems
All stations have equal access
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
24/61
Disadvantages of ringtopology
Failure of one computer may impact others
Data transfer is slow
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
25/61
Mesh topology
It requires that every terminal should beattached to each other.
All the computers must have adequate
number of interfaces for the connections tobe made.
Because of this requirement the
installations is somewhat difficult. The length of cable required is quite higher
as compared to other topologies.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
26/61
8/4/2019 unit2-2-090714220525-phpapp02
27/61
Advantages of meshtopology
Ease of troubleshooting.
Data transfer is faster.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
28/61
Disadvantages of meshtopology
uses a lot of cabling.
Complex
Most expensive topology
Considerations When
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
29/61
Considerations When
Choosing a Topology
Money. A linear bus network may be the leastexpensive way to install a network; you do nothave to purchase concentrators.
Length of cable needed. The linear bus
network uses shorter lengths of cable. Future growth. With a star topology, expanding
a network is easily done by adding anotherconcentrator.
Cable type. The most common cable in schoolsis unshielded twisted pair, which is most oftenused with star topologies.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
30/61
Two types of transmission technologies arethere:
1. Broadcast Network
Single communication channel is shared by allthe machines in the network.
Transmission Technology
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
31/61
2. Point to Point Network
Data is routed directly from source machine todestination machine directly.
Transmission Technology
Dedicated link
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
32/61
Routing
When data is to be transmitted between tworemote machines using intermediate machines,certain routing techniques have to be applied.
The intermediate machines may be:1. Gateway
2. Hub
3. Router4. Repeater
5. Bridge
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
33/61
8/4/2019 unit2-2-090714220525-phpapp02
34/61
Hub
A common connection point for devices in anetwork.
Hubs are commonly used to connectsegments of a LAN.
A hub contains multiple ports.
When a packet arrives at one port, it is
copied to the other ports so that allsegments of the LAN can see all packets
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
35/61
Router
A router is a device that forwards data packetsalong networks.
A router is connected to at least two networks.
Routers are located at gateways.
Routers use headers and forwarding tables todetermine the best path for forwarding thepackets.
They use protocols to communicate with eachother and configure the best route between anytwo hosts.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
36/61
Switch
In networks, a device that filters andforwards packets between LAN segments.
LANs that use switches to join segments arecalled switched LANs.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
37/61
Repeater
Repeaters are used in transmission systemsto regenerate signals distorted bytransmission loss.
Analog repeaters frequently can only amplifythe signal while digital repeaters canreconstruct a signal to near its originalquality.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
38/61
8/4/2019 unit2-2-090714220525-phpapp02
39/61
8/4/2019 unit2-2-090714220525-phpapp02
40/61
Network Protocols
Acommunication protocol is a set of rulesthat specify the format and meaning ofmessages exchanged between computersacross a network.
A set of related protocols that are designedfor compatibility are called protocol suite.
H d C t
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
41/61
Human and ComputerProtocols
Hi
Hi
Got thetime?
2:00
time
Human Protocol Computer Protocol
Web client
Web server
open
connection
OK
send me data
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
42/61
Protocol Architecture
Task of communication broken up into modules For example file transfer could use three
modules
File transfer application Communication service module
Network access module
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
43/61
Layers
Layers are the different components thatneed to be designed/implemented whendesigning/implementing networks.
Each layer responsible for a set offunctions.
Top layer relies on services provided by
bottom layer.
Layer makes it service available to higherlayer through an interface.
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
44/61
Layering
Building complex systems is hard!
Approach: Divide and conquer.
Split job into smaller jobs, or layers.
Analogy to other fields. Building a house: digging, foundation, framing, etc.
Car assembly line
Basic idea: each step dependent on the previousstep but does not need to be aware of how theprevious step was done.
A l Ai T l
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
45/61
Analogy: Air Travel
The problem: air travel. Decomposed into series of steps:
Arrival at airport
Check-in
Boarding
Takeoff
Departure from airport
Baggage claim
Deplane
Landing
Traveling
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D8/4/2019 unit2-2-090714220525-phpapp02
46/61
More on the air travel analogy
Arrival
Check-in
Boarding
Takeoff
D
epartinga
irport
Departure
Baggage claim
Deplane
Landing
Arrivinga
irport
Traveling
intermediate air traffic sites
Airplane routing Airplane routing
http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NL