Академический Документы
Профессиональный Документы
Культура Документы
There are many types of computer networks, the common types of area networks including those
five: LAN - Local Area Network, WAN - Wide Area Network, WLAN - Wireless Local Area Network,
MAN - Metropolitan Area Network and CAN - Campus Area Network.
LAN (Local Area Network) - Can go up to 1 KM radius. A local area network (LAN) is a group of
computers and associated devices that share a common communications line or wireless link to a
server. Typically, a LAN encompasses computers and peripherals connected to a server within a
distinct geographic area such as an office or a commercial establishment.
WAN (Wide Area Network) - No Limit. A wide area network (WAN) is a network that exists
over a large-scale geographical area. A WAN connects different smaller networks, including local
area networks (LANs) and metro area networks (MANs). This ensures that computers and users in
one location can communicate with computers and users in other locations. WAN implementation
can be done either with the help of the public transmission system or a private network.
WLAN(Wireless Local Area Network) - A wireless local area network (WLAN) is a wireless
computer network that links two or more devices using wireless communication within a limited
area such as a home, school, computer laboratory, or office building. This gives users the ability to
move around within a local coverage area and yet still be connected to the network. Through a
gateway, a WLAN can also provide a connection to the wider Internet.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.
1. It is cost effective.
4. It is easy to understand.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
3. Cable has a limited length.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for each device.
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent
data loss repeaters are used in the network.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node.
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those node etc. We can even have routing logic, to
re-configure the failed nodes.
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required.
The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over
the network.
Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
3. Not flexible.
2. It is robust.
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
1. Heavily cabled.
2. Costly.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in
an office in one department ring topology is used and in another star topology is used, connecting
these topologies will result in Hybrid Topology (ring topology and star topology).
2. Effective.
4. Flexible.
1. Complex in design.
2. Costly.
Selecting the correct type of network cabling can effect various business functions because
enterprise network admins employ new technologies. The type of network cable used in any
network infrastructure is one of the most vital aspect of networking in various industries.
Coaxial Cable
It has a single copper conductor in the middle. A plastic layer provides insulation between the
braided metal shield and center conductor. The metal shield blocks outer interference from motors,
fluorescent lights, and other computers.
Coaxial cabling is extremely resistant to signal obstruction though it is complex to install. It can
handle great cable lengths between network devices than the twisted pair cable. The two types of
coaxial cables are thin coaxial and thick coaxial.
It is a special kind of copper telephone wiring used in business installations. An external shield which
functions as a ground is added to the normal twisted pair telephone wires. Shielded twisted pair may
be the answer if you want to place the cable in an area with potential interference and risk to the
electrical current in the UTP. Shielded cables can also help in expanding the distance between the
cables.
Ensure your system establishment is 100% consistent and converse with Dimtech today.
It is the most admired type of network cable in the world. UTP cable is used for both conventional
telephone and computer networking.
CAT1 which is used for telephone wire. CAT2 supports speeds up to 4 Mbps and used
frequently for token ring networks.
CAT3 and CAT4 are both used for Token Ring networks for higher network speeds.
CAT5 wire is now replaced by the CAT5e designs providing an enhanced crosstalk
specification allowing it to support speeds up to 1 Gbps. It is the most used network cabling
specification in the world.
CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to 55 meters.
Organizations using CAT6 cabling should use a specialized cable analyzer to request a
complete test report, to ensure that the the CAT6 guidelines and standards have been
followed during the installation.
The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps and length up
to 100 meters.
For the development of a successful network in an organization, understanding the different types
of cable and how they affect other aspects of a network is vital.
Our network cabling work consents to all statutes, directions, and models. This is vital on the
grounds that numerous suppliers will utilise shabby, substandard cabling which does not follow
national norms. Ensure your system establishment is 100% consistent and converse with Dimtech
today.
Network Hub is a networking device which is used to connect multiple network hosts. A network hub
is also used to do data transfer. The data is transferred in terms of packets on a computer network.
So when a host sends a data packet to a network hub, the hub copies the data packet to all of its
ports connected to. Like this, all the ports know about the data and the port for whom the packet is
intended, claims the packet.
However, because of its working mechanism, a hub is not so secure and safe. Moreover, copying the
data packets on all the interfaces or ports makes it slower and more congested which led to the use
of network switch.
Network Switch:
Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say that a switch
is more intelligent than a hub. While hub just does the work of data forwarding, a switch does 'filter
and forwarding' which is a more intelligent way of dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet and sends
only to the interface of the intended receiver. For this purpose, a switch also maintains a CAM
(Content Addressable Memory) table and has its own system configuration and memory. CAM table
is also called as forwarding table or forwarding information base (FIB).
Also Read: Difference Between Tethering & Hotspot: Which One Is More Secure?
Modem:
A Modem is somewhat a more interesting network device in our daily life. So if you have noticed
around, you get an internet connection through a wire (there are different types of wires) to your
house. This wire is used to carry our internet data outside to the internet world.
However, our computer generates binary data or digital data in forms of 1s and 0s and on the other
hand, a wire carries an analog signal and that's where a modem comes in.
A modem stands for (Modulator+Demodulator). That means it modulates and demodulates the
signal between the digital data of a computer and the analog signal of a telephone line.
Network Router:
A router is a network device which is responsible for routing traffic from one to another network.
These two networks could be a private company network to a public network. You can think of a
router as a traffic police who directs different network traffic to different directions.
Bridge:
If a router connects two different types of networks, then a bridge connects two subnetworks as a
part of the same network. You can think of two different labs or two different floors connected by a
bridge.
Repeater:
A repeater is an electronic device that amplifies the signal it receives. In other terms, you can think
of repeater as a device which receives a signal and retransmits it at a higher level or higher power so
that the signal can cover longer distances.
For example, inside a college campus, the hostels might be far away from the main college where
the ISP line comes in. If the college authority wants to pull a wire in between the hostels and main
campus, they will have to use repeaters if the distance is much because different types of cables
have limitations in terms of the distances they can carry the data for.
When these network devices take a particular configurational shape on a network, their
configuration gets a particular name and the whole formation is called Network topology. In certain
circumstances when we add some more network devices to a network topology, its called Daisy
chaining.