CIR 209 (Lecture 6) Classification - of - Computer - Networks
CIR 209 (Lecture 6) Classification - of - Computer - Networks
Page 1 of 14
c) Class Three: Setup and Device Composition
i. Client Server
ii. Peer to Peer
d) Class Four: Data Forwarding-based classification
• Switched Networks
– Circuit-Switched Networks
– Packet-Switched Networks
e) Class Five: Ownership-based classification
i. Public Networks
ii. Private Networks
iii. Virtual Private Networks
iv. Leased Networks
f) Class Six: Type of Access and Reach
i. Intranet
ii. Extranet
iii. Internet
g) Class Seven: Standard of the Technology in Use
i. Ethernet
ii. Token Ring
iii. Wireless
Page 2 of 14
DESCRIPTION OF THE DIFFERENT TYPES
CLASS ONE: FUNCTION-BASED CLASSIFICATION
i. Dedicated Networks
These types of networks are dedicated to a specific function. Examples include;
a) Data Networks
A network designed and dedicated for transmission of ordinary messages - text
Page 3 of 14
ii. Converged Networks (Combines diverse functions)
A network infrastructure designed to transmit diverse sets of data e.g. Mobile
Telecommunication networks (Audio, Text, Video etc.)
Page 4 of 14
LANs are distinguished from other kinds of networks by their size and their topology.
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use certain
kinds of designs that would not otherwise be possible. It also simplifies network
management.
LANs may use a transmission technology consisting of a cable to which all the
machines are attached. Traditional LANs run at speeds of 10 Mbps to 100 Mbps, have
low delay (microseconds or nanoseconds), and make very few errors. Newer LANs
operate from 1Gbps to 10 Gbps.
Page 5 of 14
v. Wide Area Networks (WANs)
An interconnection of LANs spread over a wide area; Local regions (more than
metropolitan area), country, extended region (several countries), continent or several
continents.
Sometime WAN consists of an infrastructure that link LANs that belong to the same
or different organizations, to achieve a certain goal (Coca Cola Network or Regional
Bank Network).
Page 6 of 14
CLASS THREE: SETUP AND DEVICE COMPOSITION
i. Client Server
A network that contains end devices that include at least one server.
The server has high capability hardware and runs a Network Operating Systems
The computer with Network Operating Systems must have at least one server service
enabled
Advantages
Robust and scalable
Higher levels of security (centralized approach to security)
Automation of services possible – e.g. data backup
Easy to manage
In this network, computers run client operating systems (Single user, multitasking operating
systems). No centralized dedicated computers; each computer acts as both server and client.
Page 7 of 14
CLASS FOUR: FORWARDING-BASED CLASSIFICATION
i. Circuit-Switched Network
A circuit-switched network consists of a set of switches/routers connected by physical
links.
A connection between two stations is a dedicated path made of one or more links.
However, each connection uses only one dedicated channel on each link.
Before starting communication, the stations must make a reservation for the resources
to be used during the communication; resources, such as bandwidth.
Data transferred between the two stations are not packetized (physical layer transfer
of the signal). The data are a continuous flow sent by the source station and received
by the destination station, although there may be periods of silence.
Page 8 of 14
Setup Phase
Before the two parties (or multiple parties in a conference call) can communicate, a
dedicated circuit (combination of channels in links) needs to be established.
The end systems are normally connected through dedicated lines to the switches, so
connection setup means creating dedicated channels between the switches.
Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to release
the resources.
Note: Switching at the physical layer in the traditional telephone network uses the
circuit-switching approach
Page 9 of 14
In packet switching, there is no resource allocation for a packet. This means that there
is no reserved bandwidth on the links, and there is no scheduled processing time for
each packet. Resources are allocated on demand. The allocation is done on a first
come, first-served basis.
When a switch receives a packet, no matter what is the source or destination, the
packet must wait if there are other packets being processed.
Each packet contains address information that identifies the sending computer and
intended recipient. Using these addresses, network switches and routers determine
how best to transfer the packet between hops on the path to its destination.
Packets belonging to the same data block may follow different routes to the same
destination
Page 10 of 14
CLASS FIVE: OWNERSHIP-BASED CLASSIFICATION
i. Public Networks
This is equivalent to the internet; a global network that interconnects various
organization, allowing the public to access the resources that the organizations have
exposed to the internet.
Devices in public networks are configured with public IP addressed (IPv4) or Global
Unicast (IPv6) addresses.
ii. Private Networks
An organizational network that is isolated from the internet. Traditionally configured
to be accessed by uses that belong to the organization and have permission to
authenticate and access the network.
Devices are traditionally configured using Private IP addresses (IPv4) or Site Local
Addresses (IPv6).
Page 11 of 14
CLASS SIX: TYPE OF ACCESS AND REACH
Intranet, Extranet and Internet
i. Intranet
A network infrastructure that is only accessible by employees of an organization from
within the organization’s network infrastructure. It may be designed to include resources
and services that may only be accessible to employees within the enterprise.
ii. Extranet
A network infrastructure that is accessible to employees within the organization and a
few external organizations or persons.
Example; infrastructure utilized mainly by manufacturing organizations that allow
their bilk-buying customers to view available goods/products and make orders.
iii. Internet
A global internetwork; inter-links various organizations and allows for access by anyone
who can access the internet.
Page 12 of 14
CLASS SEVEN: STANDARD IN THE TECHNOLOGY
i. Ethernet Networks (IEEE 802.3)
The Ethernet networks conform to the IEEE 802.3 standards
The Network Interface Card is designed to work with this standard – it is traditionally
referred to as Ethernet Network Interface Card (NIC).
The Ethernet IEEE 802.3 Standard defines three key attributes:
Devices can handle of maximum size 1,518 bytes
Transmission id contention based, especially when configured to operate at half-
duplex.
Because of contention, Devices use Carrier Sense Multiple Access/Collision
Detection (CSMA/CD) as the network access methods
99% of all global cabled networks today are Ethernet. The network interface cards
can only release or pick from the network data that does not exceed 1,518 bytes and,
before release of data onto the network, the NIC “listens” to detect carrier signal or
presence of data collision jam signal. In the event that a carrier signal or jam signal is
detected, the device withholds its data for a random period before attempting to listen
again.
Networks that use Ethernet NIC, Hub or Switches are referred to as Ethernet
networks.
ii. Token Ring Network (IEEE 802.5)
The Token Ring has been gradually faced out - enterprises no longer implement
Token Ring Standards in their LANs.
Traditionally, the devices that work in a Token Ring network were design with a
Token Ring Network Interface Card.
The Token Ring Network standard defines three key attributes:
Devices can handle of maximum size 5,000 bytes
Devices use Token Passing as the network access methods
The first device to boot on the network generates a token. The token moves round
the ring, a process that allows each device attached to the ring to stamp its
priority and time.
Page 13 of 14
Only one device (the one that possesses the token) is allowed to transmit – the
data flow is in one direction.
Devices that use Token Ring NIC and Multi-Station Access Units (MSAU) are
referred to as Token Ring networks.
Page 14 of 14