Network structure
Network topology is the layout or
organizational hierarchy of interconnected nodes of a computer network.
Different network topologies can affect throughput, but reliability is often
more critical. With many technologies, such as bus networks, a single failure
can cause the network to fail entirely. In general the more interconnections
there are, the more robust the network is; but the more expensive it is to
install.
Common layouts
Common
network topologies
Common layouts are:
- A bus network: all
nodes are connected to a common medium along this medium. This was the
layout used in the original Ethernet, called 10BASE5 and 10BASE2.
- A star network: all
nodes are connected to a special central node. This is the typical layout
found in a Wireless LAN, where
each wireless client connects to the central Wireless access point.
- A ring network: each
node is connected to its left and right neighbour node, such that all
nodes are connected and that each node can reach each other node by
traversing nodes left- or rightwards. The Fiber
Distributed Data Interface (FDDI) made use of such a topology.
- A mesh network: each
node is connected to an arbitrary number of neighbours in such a way that
there is at least one traversal from any node to any other.
- A fully connected network:
each node is connected to every other node in the network.
- A tree network: nodes
are arranged hierarchically.
Note that the physical layout of the nodes in
a network may not necessarily reflect the network topology. As an example, with FDDI,
the network topology is a ring (actually two counter-rotating rings), but the
physical topology is often a star, because all neighboring connections can be
routed via a central physical location.
Overlay network
An overlay network is a virtual computer
network that is built on top of another network. Nodes in the overlay network
are connected by virtual or logical links. Each link corresponds to a path,
perhaps through many physical links, in the underlying network. The topology of
the overlay network may (and often does) differ from that of the underlying
one. For example, many peer-to-peer networks are overlay networks. They are
organized as nodes of a virtual system of links that run on top of the
Internet.
Overlay networks have been around since the
invention of networking when computer systems were connected over telephone
lines using modems, before any data network existed.
The most striking example of an overlay
network is the Internet itself. The Internet itself was initially built as an
overlay on the telephone network. Even today, at the network layer, each node
can reach any other by a direct connection to the desired IP address, thereby
creating a fully connected network. The underlying network, however, is
composed of a mesh-like interconnect of sub-networks of varying topologies (and
technologies).Address resolution and routing are the means that allow mapping of a fully
connected IP overlay network to its underlying network.
Another example of an overlay network is a distributed hash table,
which maps keys to nodes in the network. In this case, the underlying network
is an IP network, and the overlay network is a table (actually a map) indexed by keys.
Overlay networks have also been proposed as a
way to improve Internet routing, such as through quality of service guarantees to achieve
higher-quality streaming media. Previous proposals such as IntServ, DiffServ, andIP Multicast have not seen wide acceptance largely because
they require modification of all routers in the network.[citation needed] On the other hand, an
overlay network can be incrementally deployed on end-hosts running the overlay
protocol software, without cooperation from Internet service providers.
The overlay network has no control over how packets are routed in the
underlying network between two overlay nodes, but it can control, for example,
the sequence of overlay nodes that a message traverses before it reaches its
destination.
For example, Akamai Technologies manages an overlay network
that provides reliable, efficient content delivery (a kind of multicast). Academic research includes end system multicast,[11] resilient routing and quality of service
studies, among others.
Communications protocols
The
TCP/IP model or Internet layering scheme and its relation to common protocols
often layered on top of it.
A communications protocol is a set of rules for
exchanging information over network links. In a protocol stack (also see the OSI model), each protocol leverages the services of the
protocol below it. An important example of a protocol stack is HTTP running over TCP over IP over IEEE 802.11. (TCP and IP are members of the Internet Protocol Suite.
IEEE 802.11 is a member of the Ethernet protocol suite.) This stack is used between
thewireless router and the home user's
personal computer when the user is surfing the web.
Whilst the use of protocol layering is today
ubiquitous across the field of computer networking, it has been historically
criticized by many researchers for two principle reasons. Firstly,
abstracting the protocol stack in this way may cause a higher layer to
duplicate functionality of a lower layer, a prime example being error recovery
on both a per-link basis and an end-to-end basis. Secondly, it is common that a protocol
implementation at one layer may require data, state or addressing information
that is only present at another layer, thus defeating the point of separating
the layers in the first place. For example, TCP uses the ECN field in the IPv4 header as an indication of congestion; IP is a network layer protocol whereas TCP is a transport layer protocol.
Communication protocols have various
characteristics. They may be connection-oriented or connectionless, they
may use circuit mode or packet switching, and they may use hierarchical addressing or
flat addressing.
There are many communication protocols, a few
of which are described below.
Ethernet
Ethernet is a family of protocols used in LANs,
described by a set of standards together called IEEE 802 published by the Institute of Electrical and Electronics Engineers. It has a
flat addressing scheme. It operates mostly at levels 1 and 2 of the OSI model. For home users today, the most well-known member of
this protocol family is IEEE 802.11, otherwise known as Wireless LAN (WLAN). The complete IEEE 802 protocol suite provides a diverse set of
networking capabilities. For example, MAC bridging (IEEE 802.1D) deals with the routing of Ethernet packets using
a Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and IEEE 802.1Xdefines a port-based Network Access Control protocol, which forms the
basis for the authentication mechanisms used in VLANs (but it is also found in
WLANs) – it is what the home user sees when the user has to enter a
"wireless access key".
Internet Protocol Suite
The Internet Protocol Suite,
also called TCP/IP, is the foundation of all modern networking. It offers
connection-less as well as connection-oriented services over an inherently
unreliable network traversed by data-gram transmission at the Internet protocol (IP) level. At its core,
the protocol suite defines the addressing, identification, and routing
specifications for Internet Protocol Version 4 (IPv4) and for IPv6, the
next generation of the protocol with a much enlarged addressing capability.
SONET/SDH
Synchronous optical networking (SONET) and Synchronous
Digital Hierarchy (SDH) are standardized multiplexing protocols that transfer multiple digital bit
streams over optical fiber using lasers. They were originally designed to
transport circuit mode communications from a variety of different sources,
primarily to support real-time, uncompressed, circuit-switched voice encoded in PCM (Pulse-Code Modulation)
format. However, due to its protocol neutrality and transport-oriented
features, SONET/SDH also was the obvious choice for transporting Asynchronous Transfer Mode (ATM) frames.
Asynchronous Transfer Mode
Asynchronous Transfer Mode (ATM) is a switching
technique for telecommunication networks. It uses asynchronous time-division multiplexing and encodes data into
small, fixed-sized cells. This differs from other protocols such as the Internet Protocol Suite or Ethernet that use variable sized packets or frames. ATM has similarity with both circuit and packet switched networking. This makes it a good
choice for a network that must handle both traditional high-throughput data
traffic, and real-time, low-latency content such as voice and
video. ATM uses a connection-oriented model in which a virtual circuit must be established between
two endpoints before the actual data exchange begins.
While the role of ATM is diminishing in favor
of next-generation networks,
it still plays a role in the last mile, which is the connection between an Internet service provider and the home user. For an
interesting write-up of the technologies involved, including the deep stacking
of communications protocols used, see.
No comments:
Post a Comment