Top Banner

of 61

unit2-2-090714220525-phpapp02

Apr 07, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/4/2019 unit2-2-090714220525-phpapp02

    1/61

    Computer Networks

  • 8/4/2019 unit2-2-090714220525-phpapp02

    2/61

    A computer network is defined as theinterconnection of 2 or more independent computersor/and peripherals.

    Computer Network

  • 8/4/2019 unit2-2-090714220525-phpapp02

    3/61

    Network

    Source Destination

  • 8/4/2019 unit2-2-090714220525-phpapp02

    4/61

    Need of Networks

    Communicate and collaborate Share information

    Share resources

    Sharing computer files and disk space

    Sharing high-quality printers

    Access to common fax machines

    Access to common modems

    Multiple access to the Internet

  • 8/4/2019 unit2-2-090714220525-phpapp02

    5/61

    1. Local Area Networks (LANs) - a computernetwork covering a small geographic area, likea home, office, or group of buildings. Typicallywithin 5-mile radius.

    2. Metropolitan Area Networks (MANs)- arelarge computer networks usually spanning acity. (within 30 miles)

    3. Wide-Area Networks (WANs) - any network

    whose communications links crossmetropolitan, regional, or national boundaries.

    Classification of Networks

  • 8/4/2019 unit2-2-090714220525-phpapp02

    6/61

    The way in which the computers areinterconnected together is known asTOPOLOGY.

    Network Topology

  • 8/4/2019 unit2-2-090714220525-phpapp02

    7/61

    Types of topologies

    Physical topology

    Logical topology

  • 8/4/2019 unit2-2-090714220525-phpapp02

    8/61

    Types of physical topologies

    Bus/Linear

    Star

    Ring Tree

    Mesh

  • 8/4/2019 unit2-2-090714220525-phpapp02

    9/61

    Linear or bus topology

    Consists of a main cable, known asbackbone cable, with a terminator ateach end .

    All nodes (file server, workstations,and peripherals) are connected to thecable.

    Ethernetand LocalTalknetworks usebus topology.

  • 8/4/2019 unit2-2-090714220525-phpapp02

    10/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    11/61

    Advantages of Bus Topology

    Easy to connect a computer or peripheralto a linear bus.

    Requires less cable length.

    Easy to extend.

    If one node of the N/W is faulty, the N/W

    can still remain working.

  • 8/4/2019 unit2-2-090714220525-phpapp02

    12/61

    Entire network shuts down if there is abreak in the main cable.

    Terminators are required at both ends ofthe backbone cable.

    Difficult to identify the problem if the entirenetwork shuts down.

    Not meant to be used as a stand-alonesolution in a large building.

    Disadvantages of BusTopology

  • 8/4/2019 unit2-2-090714220525-phpapp02

    13/61

    Star topology

    A star topology is designed with each node (fileserver, workstations, and peripherals) connecteddirectly to a central network hub.

    Data on a star network passes through the hubbefore continuing to its destination.

    The hub manages and controls all functions ofthe network.

    It also acts as a repeater for the data flow.

  • 8/4/2019 unit2-2-090714220525-phpapp02

    14/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    15/61

    Easy to install.

    No disruptions to the network other thanconnecting or removing devices.

    Easy to detect faults and to remove parts.

    Advantages of StarTopology

  • 8/4/2019 unit2-2-090714220525-phpapp02

    16/61

    Requires more cable length than a bustopology.

    If the hub fails, nodes attached aredisabled.

    More expensive than bus topologybecause of the cost of the hub.

    Disadvantages of StarTopology

  • 8/4/2019 unit2-2-090714220525-phpapp02

    17/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    18/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    19/61

    Di d t f T

  • 8/4/2019 unit2-2-090714220525-phpapp02

    20/61

    Disadvantages of TreeTopology

    Overall length of each segment is limitedby the type of cabling used.

    If the backbone line breaks, the entiresegment goes down.

    More difficult to configure than othertopologies.

  • 8/4/2019 unit2-2-090714220525-phpapp02

    21/61

    Ring topology

    Is a type of computer network configurationwhere each network computer and device areconnect to each other forming A large circle.

    Data is divided into packets when transmitted. Packet is sent around the ring until it reaches

    its final destination.

  • 8/4/2019 unit2-2-090714220525-phpapp02

    22/61

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    23/61

    Advantages of ringtopology

    Requires lesser amount of cable and there arenot much of installation problems

    All stations have equal access

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    24/61

    Disadvantages of ringtopology

    Failure of one computer may impact others

    Data transfer is slow

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    25/61

    Mesh topology

    It requires that every terminal should beattached to each other.

    All the computers must have adequate

    number of interfaces for the connections tobe made.

    Because of this requirement the

    installations is somewhat difficult. The length of cable required is quite higher

    as compared to other topologies.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    26/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    27/61

    Advantages of meshtopology

    Ease of troubleshooting.

    Data transfer is faster.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    28/61

    Disadvantages of meshtopology

    uses a lot of cabling.

    Complex

    Most expensive topology

    Considerations When

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    29/61

    Considerations When

    Choosing a Topology

    Money. A linear bus network may be the leastexpensive way to install a network; you do nothave to purchase concentrators.

    Length of cable needed. The linear bus

    network uses shorter lengths of cable. Future growth. With a star topology, expanding

    a network is easily done by adding anotherconcentrator.

    Cable type. The most common cable in schoolsis unshielded twisted pair, which is most oftenused with star topologies.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    30/61

    Two types of transmission technologies arethere:

    1. Broadcast Network

    Single communication channel is shared by allthe machines in the network.

    Transmission Technology

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    31/61

    2. Point to Point Network

    Data is routed directly from source machine todestination machine directly.

    Transmission Technology

    Dedicated link

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    32/61

    Routing

    When data is to be transmitted between tworemote machines using intermediate machines,certain routing techniques have to be applied.

    The intermediate machines may be:1. Gateway

    2. Hub

    3. Router4. Repeater

    5. Bridge

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    33/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    34/61

    Hub

    A common connection point for devices in anetwork.

    Hubs are commonly used to connectsegments of a LAN.

    A hub contains multiple ports.

    When a packet arrives at one port, it is

    copied to the other ports so that allsegments of the LAN can see all packets

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    35/61

    Router

    A router is a device that forwards data packetsalong networks.

    A router is connected to at least two networks.

    Routers are located at gateways.

    Routers use headers and forwarding tables todetermine the best path for forwarding thepackets.

    They use protocols to communicate with eachother and configure the best route between anytwo hosts.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    36/61

    Switch

    In networks, a device that filters andforwards packets between LAN segments.

    LANs that use switches to join segments arecalled switched LANs.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    37/61

    Repeater

    Repeaters are used in transmission systemsto regenerate signals distorted bytransmission loss.

    Analog repeaters frequently can only amplifythe signal while digital repeaters canreconstruct a signal to near its originalquality.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    38/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    39/61

  • 8/4/2019 unit2-2-090714220525-phpapp02

    40/61

    Network Protocols

    Acommunication protocol is a set of rulesthat specify the format and meaning ofmessages exchanged between computersacross a network.

    A set of related protocols that are designedfor compatibility are called protocol suite.

    H d C t

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    41/61

    Human and ComputerProtocols

    Hi

    Hi

    Got thetime?

    2:00

    time

    Human Protocol Computer Protocol

    Web client

    Web server

    open

    connection

    OK

    send me data

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    42/61

    Protocol Architecture

    Task of communication broken up into modules For example file transfer could use three

    modules

    File transfer application Communication service module

    Network access module

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    43/61

    Layers

    Layers are the different components thatneed to be designed/implemented whendesigning/implementing networks.

    Each layer responsible for a set offunctions.

    Top layer relies on services provided by

    bottom layer.

    Layer makes it service available to higherlayer through an interface.

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    44/61

    Layering

    Building complex systems is hard!

    Approach: Divide and conquer.

    Split job into smaller jobs, or layers.

    Analogy to other fields. Building a house: digging, foundation, framing, etc.

    Car assembly line

    Basic idea: each step dependent on the previousstep but does not need to be aware of how theprevious step was done.

    A l Ai T l

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    45/61

    Analogy: Air Travel

    The problem: air travel. Decomposed into series of steps:

    Arrival at airport

    Check-in

    Boarding

    Takeoff

    Departure from airport

    Baggage claim

    Deplane

    Landing

    Traveling

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3D
  • 8/4/2019 unit2-2-090714220525-phpapp02

    46/61

    More on the air travel analogy

    Arrival

    Check-in

    Boarding

    Takeoff

    D

    epartinga

    irport

    Departure

    Baggage claim

    Deplane

    Landing

    Arrivinga

    irport

    Traveling

    intermediate air traffic sites

    Airplane routing Airplane routing

    http://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NLSHtg0j_KMJ:&tbnh=101&tbnw=111&hl=en&start=5&prev=/images%3Fq%3Dring%2Btopology%26svnum%3D10%26hl%3Den%26lr%3Dhttp://images.google.co.in/imgres?imgurl=http://www.cyber.ust.hk/handbook3/Image4.gif&imgrefurl=http://www.cyber.ust.hk/handbook3/0A_hb3.html&h=275&w=300&sz=16&tbnid=NL