DOC PREVIEW
WUSTL CSE 567M - A Survey of Computer Network Topology and Analysis Examples

This preview shows page 1-2-3-4 out of 11 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

A Survey of Computer Network Topology andAnalysis ExamplesBrett Meador, [email protected] (A project report written underthe guidance of Prof. Raj Jain)DownloadAbstractThis paper presents an introduction to Computer Network Topology. Definitions of Physical and LogicalTopologies are provided. Additionally common Computer Network realizations of Physical Topologies arereviewed. This is followed by a discussion of Graph Theory and its relation to topological analysis. Adiscussion of analysis examples follows with an emphasis on message routing issues, network sizing, and virusanalysis. These examples are discussed to underscore the impotance of topological design when constructinga new computer network, or adding to an existing one.Keywords:Physical Network Topology, Logical Network Topology, Minimum Spanning Tree, Graph Theory, BusNetwork Topology, Ring Network Topology, Star Network Topology, Tree Network Topology, MeshNetwork Topology, Hybrid Topology. Directed Graph, Undirected Graph, Queueing Theory, CombinatorialTrials, Tree-Bus TopologyTable of Contents1. Introduction2. Physical Network Topologies2.1 Bus Network Topology2.2 Ring Network Topology2.3 Star Network Topology2.4 Tree Network Topology2.5 Mesh Network Topology3. Graph Theory4. Network Analysis Topics4.1 Routing Analysis4.2 Network Sizing4.3 Network Corruption5. Conclusion6. Acronyms7. References1. IntroductionA Survey of Computer Network Topology and Analysis Examples1 of 11The mathematical subject of Topology investigates objects whose characteristics are constant throughdistortion. Objects can be topologically equivalent while appearing physically different. As an example, anytwo objects formed with a simple rubber band are topologically equivalent so long as the band is not parted. Anoteworthy practical analysis technique based on Topology is Kirchoff circuit analysis. Computer NetworkTopology is an extension of basic Topology. This discipline examines the configuration of computer systemelements and their associated interconnections. Physical Network Topology emphasizes the hardwareassociated with the system including workstations, remote terminals, servers, and the associated wiringbetween assets. Logical Network Topology (also known as Signal Topology) emphasizes the representation ofdata flow between nodes, not dissimilar from Graph Theory analysis. The logical topography of a network canbe dynamically reconfigured when select network equipment, such as routers, is available. An examplecomparing Physical and Logical Topologies is provided in Figure 1Operations Research (OR) performance analysis topics associated with Computer Network Topology tend tobe concerned with logical topology instead of the purely physical. This paper will review several performanceanalysis study examples with the intent of demonstrating the importance of topological considerations innetwork design. Although the problem set in this survey is limited several of the analysis techniques discussedare applicable to other network analysis problems. Since Logical Network Topology builds upon theunderlying Network Physical Topology the set of standard computer physical topologies will reviewed first asbackground to the performance analysis discussion. This will be followed by a brief description of GraphTheory, and then the network analysis examples.2. Physical Network TopologiesA review of common Physical Network Topologies provides a basis for the analysis discussion presented insection 4. In this section the attributes and problems associated with Bus, Ring, Star, Tree and Mesh NetworkTopologies are presented.2.1 Bus Network TopologyIn Bus Network Topology a single cable is used to connect all devices on the net. This cable is often referredto as the network Backbone. When communication occurs between nodes the device sending the messagebroadcasts to all nodes on the network, but only the desired recipient digests the message. Advantages of thisA Survey of Computer Network Topology and Analysis Examples2 of 11type of Physical Topology include ease of installation and minimization of the required cabling. Further,failure of a node attached to the network has no effect on other nodes attached to the network. Also messagesfrom one node can be seen near simultaneously by all other nodes on the network. Disadvantages of thisconfiguration include performance limits on the number of network nodes, and complete networkcommunication stoppage if the cable fails. Figure 2 shows an example of Bus Network Topology.2.2 Ring Network TopologyRing Network Topology has each node in a network connected to two other nodes in the network inconjunction with the first and last nodes being connected. Messages from one node to another then travelfrom originator to destination via the set of intermediate nodes. The intermediate nodes serve as activerepeaters for messages intended for other nodes. Some forms of Ring Network Topology have messagestraveling in a common direction about the ring (either clockwise or counterclockwise) while other forms ofthis type of configuration (called Bi-directional Rings) have messages flowing in either direction with the helpof two cables between each connected node. In some cases blocking devices are required in a Ring TopologyNetwork in order to prevent packet storming, the condition where packets not consumed by a network nodefall into an unlimited loop about the ring. Ring Network Topology is typically employed in networks whereinter node traffic volume is small. A disadvantage of the basic Ring Network Topology is the relatively longtransmission time between nodes in the ring as compared with Bus Network Topology. Further, like BusNetwork Topology, failure of the cabling between any two nodes has a broader impact on networkcommunication as a whole, possibly leaving no path from message originator to recipient. Relative inter nodecommunication delays are still a disadvantage of the Bi-directional Ring network, however the dual nature ofthe cabling between nodes allows traffic to be shunted to an alternate path, thereby rectifying connectiondisruption between any two nodes in the network. This is a considerable reliability advantage over the basicRing Network Topology or the Bus Network Topology. Ring Network Topologies do have uniquedisadvantages relative to other topologies concerning expansion or reconfiguration. If a node is added newcabling is required to connect the node to its two neighbors. Networks are not


View Full Document

WUSTL CSE 567M - A Survey of Computer Network Topology and Analysis Examples

Documents in this Course
Load more
Download A Survey of Computer Network Topology and Analysis Examples
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view A Survey of Computer Network Topology and Analysis Examples and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A Survey of Computer Network Topology and Analysis Examples 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?