0% found this document useful (0 votes)
3 views

Chapter 3

The document discusses different types of computer networks, primarily focusing on Local Area Networks (LANs) and Wide Area Networks (WANs), highlighting their characteristics, performance differences, and typical use cases. It also covers network configurations, distinguishing between peer-to-peer and server-based networks, and explains the concepts of circuit switching and packet switching. Additionally, it describes various network topologies including bus, star, ring, mesh, and hybrid topologies, emphasizing their advantages and disadvantages.

Uploaded by

abrish2005
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Chapter 3

The document discusses different types of computer networks, primarily focusing on Local Area Networks (LANs) and Wide Area Networks (WANs), highlighting their characteristics, performance differences, and typical use cases. It also covers network configurations, distinguishing between peer-to-peer and server-based networks, and explains the concepts of circuit switching and packet switching. Additionally, it describes various network topologies including bus, star, ring, mesh, and hybrid topologies, emphasizing their advantages and disadvantages.

Uploaded by

abrish2005
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

CHAPTER THREE

NETWORK TYPES

3. LANs and WANs

Computer networks can be classified into one of two groups, depending on their size and function. A local
area network (LAN) is the basic building block of any computer network. A LAN can range from simple
(two computers connected by a cable) to complex (hundreds of connected computers and peripherals
throughout a major corporation). (See Figure 1.) The distinguishing feature of a LAN is that it isconfined to
a limited geographic area.

Figure 1– A Local Area Network (LAN)

A wide area network (WAN), on the other hand, has no geographical limit (see Figure2). It can connect
computers and other devices on opposite sides of the world. A WAN is made up of a number of
interconnected LANs. Perhaps the ultimate WAN is the Internet.

Figure 2 - A Wide Area Network (WAN)


LANs typically have much higher transmission rates than WANS. Most LANs are able to transmit data at
around 100Mbps (million bits per second), whereas WANs generally transmit at less than 10Mbps. Another
difference is the error rates in transmission: the likely number of errors in data transmission is higher for a
WAN than for a LAN.
This distinction between LANs and WANs is made because of the locality principle. The locality principle
in computer networking states that computers are much more likely to want to communicate with other
computers that are geographically close, than with those that are distant. For example, if you want to request
a printout from your PC, it makes much more sense to use the printer in the next room rather than onethat is
hundreds of kilometers away. Because of the locality principle network designers tend to use higher
performance hardware within a LAN compared to the connections between different LANs that form a WAN.

You may sometimes hear about other classifications of networks, apart from LANs and WANs. Although
these terms are less commonly used that LAN and WAN, it is still useful to know them. A CAN is a Campus
Area Network: this is a collection of LANs linked together with high performance hardware within a
university or college campus. Similarly a MAN, or Metropolitan Area Network, is a collection of LANs
linked together within a town or city.

Network configuration
All networks have certain components, functions and features in common, shown in Figure 3. These
include:
 Servers - computers that provide shared resources for network users
 Clients - computers that access shared resources provided by servers

1|Page
 Media - the wires that make the physical connections
 Shared data - files provided to clients by servers across the network
 Shared peripherals - additional hardware resources provided by servers

Figure 3– A typical network configuration


3.1 Type of Computer Network
Even with these similarities, networks are divided into two broad categories:
 Peer-to-peer networks
 Server-based networks

3.1.1 Peer-to-peer networks


In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers. All
the computers are equal and therefore are known as peers. Each computer functions as both a client and a
server, and there is no administrator responsible for the entire network. The user at each computer determines
what data on that computer is shared on the network. Peer-to-peer networks are also sometimes called
workgroups.

Peer-to-peer networks are relatively simple. Because each computer functions as a client and a server,
there is no need for a powerful central server or for the other components required for a high-capacity
network. Peer-to-peer networks can be less expensive than server-based networks. Also, the networking
software does not require the same standard of performance and level of security as the networking
softwaredesigned for dedicated servers.
In typical networking environments, a peer-to-peer implementation offers thefollowing advantages:
 Computers are located at users' desks
 Users act as their own administrators and plan their own security
 They are cheap and easy to set up and administer for small groups of users

Peer-to-peer networks are good choices for environments where:


 Network is not scalable; it is good only for a few numbers of computers (≤10).
 Users share resources, such as printers, but no specialized servers exist
 Security is not an issue
 The organization and the network will experience only limited growth withinthe foreseeable
future
 Each user is responsible for local backup.
 Also called work groups
 No specialized operating system is required.
Where these factors apply, a peer-to-peer network will probably be a better choicethan a server-based
network.

3.1.2 Server-based networks

In an environment with more than 10 users, a peer-to-peer network - with computers acting as both servers
and clients - will probably not be adequate. Therefore, most networks have dedicated servers. A dedicated
server is one that functions only as a server and is not used as a client or workstation. Servers are described
as "dedicated" because they are not themselves clients, and because they are optimized to service requests
2|Page
from network clients quickly and to ensure the security of files and directories. Server-based networks have
become the standard models for networking.
As networks increase in size (as the number of connected computers, and the physicaldistance and traffic
between them, grows), more than one server is usually needed. Spreading the networking tasks among several
servers ensures that each task will be performed as efficiently as possible. Servers must perform varied and
complex tasks. Servers for large networks have become specialized to accommodate the expanding needs of
users. For example, a network may have separate servers for file storage, printing, email and for storing and
running application software.
Although it is more complex to install, configure, and manage, a server-basednetwork has many
advantages over a simple peer-to-peer network.
 Server-based data sharing can be centrally administered and controlled. Because these shared
resources are centrally located, they are easier to findand support than resources on individual
computers.
 Security is often the primary reason for choosing a server-based approach tonetworking. In a
server-based environment, one administrator who sets the policy and applies it to every user on
the network can manage security.
 Backups can be scheduled several times a day or once a week depending onthe importance and
value of the data. Server backups can be scheduled to occur automatically, according to a
predetermined schedule, even if the servers are located on different parts of the network.
 A server-based network can support thousands of users. This type of network would be
impossible to manage as a peer-to-peer network.
 Requires at least one professional administrator
 Specialized networking operating systems are required, such as Windows NT 4.0 server, Windows
2000 server, Novell NetWare, etc.
 The network is highly scalable; you can have tens of thousands ofworkstations in
the network.

3.2 Circuit Switching vs. Packet Switching


42.3M
Computer and communication networks typically have more than one path from source to destination.
Switching refers to choosing the route the data will go through. Circuit and packet switching are the leading
technologies we use in switched networks.
In this subtopics, we’ll discuss the differences between circuit and packet switching. We’ll start with the
fundamentals of switching and then focus on the differences between the two techniques.

3.2.1 Circuit Switching

In circuit switching, the communication mechanism establishes a path between the source and destination.
Intermediate switches set aside enough resources to serve each dedicated path going through them. Physical
links connect the intermediate switches once the circuit has been established.
The data transfer from source to destination takes place over a dedicated path. The circuit terminates the
connection once the data transfer has been successfully completed.
Although it was initially designed to handle voice traffic, circuit switching is now widely used for data traffic.
The public telephone network is the most well-known example of a circuit-switching network. The following
diagram illustrates how a circuit-switched network operates:

3|Page
The red and yellow lines represent two dedicated paths.
Advantages of Circuit Switching
Circuit switching dedicates paths. So, there is no need to wait at each switch to decide where to send data.
Therefore, transfers happen immediately.
Also, the data we send always reach their destination in order.
Disadvantages of Circuit Switching
Circuit switching can be inefficient because it reserves system resources but doesn’t use them
completely. The communication channel may be idle during most of the time the connection is live. For
instance, utilization is high for voice connections but still doesn’t approach 100%.
There’s a delay prior to signal transfer for circuit establishment. Establishing the connection from the source to
the destination can take too long.
Circuit switching requires more bandwidth and is more expensive.

3.2.2 Packet Switching

In packet switching, users divide their data into smaller packets before sending them. Each packet has a packet
header that contains the following: the packet type, source address, destination address, and sequence number
of the packet within the message. The Internet is an example of a packet-switched network.

In this type of network, nodes need to exchange information between terminals and hosts. The overall function
of such packet-switching is the transparent exchange of data in small packets between terminals and hosts. The
terminals and hosts don’t route the packets. Instead, they merely specify the destination.
Packets carry the destination address, allowing them to be individually routed through the network. In adaptive
routing, they follow the route that will minimize the delay. As each packet contains the destination address, the
packets from the same message can travel by completely different routes and still reach the same destination
address. For example:

In the above figure, user-A sends the red packets to user-D, and user-B sends the yellow packets to user-C. We
see that packets from the same user and message can follow different paths. The intermediate nodes (routers)
forward the packets until they reach the destination.
Advantages of Packet Switching
Packet switching is cost-effective and easier to implement.
In packet-switching networks, users communicate with each other indirectly. This means there is no end-to-end
communication. Thus, this switching type uses less bandwidth as packets quickly route toward the destination.
Packet switching doesn’t take up a large amount of space. In the case of a packet loss, we can request a copy to
complete the message.
Disadvantages of Packet Switching
Packet switching is unsuitable for applications that can’t afford delays in communication. That is the case with
voice calls. There’s a higher installation cost. Finally, packet switching requires a complex protocol for delivery.

4|Page
3.3 Network Topologies
The term topology, or more specifically, network topology, refers to the arrangement or physical layout of
computers, cables, and other components on the network. "Topology" is the standard term that most network
professionals use when they refer to the network's basic design. In addition to the term "topology," you will
find several other terms that are used to define a network's design:
 Physical layout
 Design
 Diagram
 Map
A network's topology affects its capabilities. The choice of one topology over anotherwill have an impact on
the:
 Size of the organization
 Level of security required
 Level of administrative support available
 Amount of network traffic
 Needs of the networks us
 Network budget
 Ease of installation
 Ease of maintenance
 Cable fault tolerance
Developing a sense of how to use the different topologies is a key to understandingthe capabilities of the
different types of networks.
Before computers can share resources or perform other communication tasks they must be connected. Most
networks use cable to connect one computer to another. However, it is not as simple as just plugging a
computer into a cable connecting to other computers. Different types of cable—combined with different
network cards, network operating systems, and other components—require different types of arrangements.
To work well, a network topology takes planning. For example, a particular topology can determine not only
the type of cable used but also how the cabling runs through floors, ceilings, and walls. Topology can also
determine how computers communicate on the network. Different topologies require different
communication methods, and these methods have a great influence on the network.
There are four basic types of computer topology: bus, star, ring and mesh.

3.3.1 Bus Topology

The bus topology is often referred to as a "linear bus" because the computers are connected in a
straight line. This is the simplest and most common method of networking computers. Figure 4 shows a
typical bus topology. It consists of a single cable called a trunk (also called a backbone or segment) that
connects all of the computers in the network in a single line.

Figure 4– The bus topology


Computers on a bus topology network communicate by addressing data to a particularcomputer and sending
out that data on the cable as electronic signals. To understand how computers communicate on a bus, you
need to be familiar with three concepts:
 Sending the signal
 Signal bounce
 Terminator
5|Page
Sending the signal
When sending a signal from one computer on the network to another, network data in the form of electronic
signals is in fact sent to all the computers on the network. However, only the computer whose address matches
the address encoded in the original signal accepts the information. All other computers reject the data.
Because only one computer at a time can send data on a bus network, the number of computersattached to
the bus will affect network performance. The more computers there are on a bus, the more computers will
be waiting to put data on the bus and, consequently,the slower the network will be. Computers on a bus
either transmit data to other computers on the network or listen for data from other computers on the network.
They are not responsible for moving data from one computer to the next. Consequently, if one computer
fails, it does not affect the rest of the network.
Because the data, or electronic signal, is sent to the entire network, it travels from one end of the cable to the
other. If the signal is allowed to continue uninterrupted, it will keep bouncing back and forth along the cable
and prevent other computers from sending signals. Therefore, the signal must be stopped after it has had a
chance to reach the proper destination address.
To stop the signal from bouncing, a component called a terminator is placed at each end of the cable to absorb
free signals. Absorbing the signal clears the cable so that other computers can send data.

In a bus topology, if a break in the cable occurs the two ends of the cable at the break will not have
terminators, so the signal will bounce, and all network activity will stop.This is one of several possible
reasons why a network will go "down." The computers on the network will still be able to function as
stand-alone computers; however, as long as the segment is broken, they will not be able to communicate
with each otheror otherwise access shared resources.

3.3.2 Star topology


In the star topology, cable segments from each computer are connected to a centralized component called a
hub. Figure 6 shows four computers and a hub connected in a star topology. Signals are transmitted from the
sending computer through the hub to all computers on the network.

Figure 5– The star topology


Because each computer is connected to a central point, this topology requires a great deal of cable in a large
network installation. Also, if the central point fails, the entire network goes down. If one computer - or the
cable that connects it to the hub - fails ona star network, only the failed computer will not be able to send or
receive network data. The rest of the network continues to function normally.

3.3.3 Ring topology

The ring topology connects computers on a single circle of cable. Unlike the bus topology, there are no
terminated ends. The signals travel around the loop in one direction and pass through each computer, which
can act as a repeater to boost the signal and send it on to the next computer. Figure 7 shows a typical ring
topology with one server and four workstations. The failure of one computer can have an impact on the
entire network.

6|Page
Figure 6– The ring topology
3.3.4 Mesh topology
A mesh topology network offers superior redundancy and reliability. In a meshtopology, each computer is
connected to every other computer by separate cabling. (See Figure 1.8.) This configuration provides
redundant paths throughout the network so that if one cable fails, another will take over the traffic. While
ease of troubleshooting and increased reliability is definite benefits, these networks are expensive to install
because they use a lot of cabling. Often, a mesh topology will be used in conjunction with other topologies
to form a hybrid topology.

Figure 7– The mesh topology


3.3.5 Hybrid topologies
Many working topologies are hybrid combinations of the bus, star, ring, and meshtopologies. Two of the
more common are described below.

Star bus topology

The star bus is a combination of the bus and star topologies. In a star-bus topology, several star topology
networks are linked together with linear bus trunks. Figure 9 shows a typical star-bus topology.

If one computer goes down, it will not affect the rest of the network. The other computers can continue to
communicate. If a hub goes down, all computers on that hub are unable to communicate. If a hub is
linked to other hubs, those connectionswill be broken as well.

Figure 8– The star bus hybrid topology


7|Page
Star ring topology
The star ring (sometimes called a star-wired ring) appears similar to the star bus. Boththe star ring and the
star bus are centered in a hub that contains the actual ring or bus. Figure 10 shows a star-ring network. Linear-
bus trunks connect the hubs in a star bus, while the hubs in a star ring are connected in a star pattern by the
main hub.

Figure 9– The star ring hybrid topology

3.4 Physical vs. logical topologies

Until now we have assumed that the word topology is used to refer only to the physical layout of the network.
In fact, we can talk about two kinds of topology: physical and logical. A network's physical topology is the
wire itself. A network's logical topology is the way it carries signals on the wire. This is an important
distinction that will become clearer in the following discussion of the token ring topology.
Example: Token ring LANs
One method of transmitting data around a ring is called token passing. (A token is a special series of bits that
travels around a token-ring network. Each network has only one token.) The token is passed from computer
to computer until it gets to a computer that has data to send. Figure 11 shows a token ring topology with the
token. The sending computer modifies the token, puts an electronic address on the data, and sends it around
the ring.
The data passes by each computer until it finds the one with an address that matches the address on the data.
The receiving computer returns a message to the sending computer indicating that the data has been received.
After verification, the sending computer creates a new token and releases it on the network. The token
circulates within the ring until a workstationneeds it to send data.
Therefore the token ring network uses a logical ring topology – the token travels around in a circle from
computer to computer. However, the physical topology of a token ring network is a star – the wires
connecting the computers to each other are connected via a central hub. This is sometimes referred to as a
―star-shaped ring‖ network.

Figure 10 – The token ring topology

The token ring avoids a common problem with bus topologies. If there are many computers on the network
a bus will often be busy, seriously affecting network performance. However, with a token ring the network
is never busy – each computer must simply wait for the token to arrive and add its message.

8|Page
3.5 Cabling in Computer network
The vast majority of networks today are connected by some sort of wiring or cabling that acts as a network
transmission medium that carries signals between computers. Although many cable types are available
to meet the varying needs and sizes of networks, from small to large, there are 3 primary cable types:
 Coaxial
 Twisted pair
 Fiber-optic
3.5.1 Coaxial cable
At one time, coaxial cable was the most widely used network cabling. There werea couple of reasons
for coaxial cable's wide usage: it was relatively inexpensive, and itwas light, flexible, and easy to work with.
In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulation, a braided metal
shielding, and an outer cover. Figure 1 shows the various components that make up a coaxial cable.

The shielding protects transmitted data by absorbing stray electronic signals, called noise, so that they do not
get onto the cable and distort the data. The core of a coaxial cable carries the electronic signals that make up
the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper. Surrounding
the core is an insulating layer that separates it from the wire mesh. The braided wire mesh acts as a ground
and protects the core from electrical noise. Coaxial cable uses the BNCconnector to connect to computers
and other devices.
Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling. The stranded,
protective sleeve absorbs stray electronic signals so that they do not affect data being sent over the inner
copper cable. For this reason, coaxial cabling is a good choice for longer distances.

Figure 11 – The components of coaxial cable and the BNC connector

There are two types of coaxial cable: thinnet and thicknet. Thicknet cabling is thicker,and a better choice for
longer distances, but is more expensive and more difficult to work with. Thinnet coaxial cable can carry a
signal for a distance of up to approximately 185 meters before the signal starts to suffer from attenuation.
Thicknet cable can carry a signal for 500 meters. Therefore, because of thicknet's ability to support data
transfer over longer distances, it is sometimes used as a backbone to connect several smaller thinnet-based
networks.

3.5.2 Twisted pair


In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted around each
other. Figure 2 shows the two types of twisted-pair cable: unshielded twisted-pair (UTP) and shielded
twisted-pair (STP) cable.

Figure 12– Unshielded and shielded twisted pair cabling


UTP is the most popular type of twisted-pair cable and is fast becoming the most popular LAN cabling. It is
cheap and easy to use. However, its performance over longdistances is not as good as coaxial cable. The

9|Page
maximum cable length segment of UTP is 100 meters. There are a number of different types (or categories)
of UTP cable, which differ in their specification and in the number of pairs of wire contained within the
cable. Most telephone systems use UTP cable (with the RJ11 connector), and many LANs nowadays also
use UTP (with the RJ45 connector). STP is higher quality than UTP, but more expensive and less popular.

3.5.3 Fiber-optic
In fiber-optic cable, optical fibres carry digital data signals in the form of modulated pulses of light. This is
a relatively safe way to send data because, unlike copper-based cables that carry data in the form of electronic
signals, no electrical impulses are carried over the fibre-optic cable. This means that fibre-optic cable cannot
be tapped, and its data cannot be stolen.

Fibre-optic cable is good for very high-speed, high-capacity data transmissionbecause of the purity of
the signal and lack of signal attenuation.

An optical fibre consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric
layer of glass, known as the cladding. The fibres are sometimes made of plastic. Plastic is easier to install,
but cannot carry the light pulsesfor as long a distance as glass.

Because each glass strand passes signals in only one direction, a cable includes two strands in separate
jackets. One strand transmits and one receives. A reinforcing layer of plastic surrounds each glass strand,
and Kevlar fibres provide strength. See Figure 3 for an illustration of fibre-optic cable. The Kevlar fibres in
the fibre-optic connector are placed between the two cables. Just as their counterparts (twisted-pair and
coaxial)are, fibre-optic cables are encased in a plastic coating for protection.

Figure 13– The composition of a fiber-optic cable

3.6 Internetworking devices

3.6.1 Network interface card


The Network Interface Card (NIC), also known as a network adaptor, acts as the interface between the
computer and the physical network connection. In most networks, every computer must have a network
interface card to be able to connect to the network. NICs are usually specific to a particular type of cabling
– for example, a NIC may have either an RJ45 connector or a BNC connector – although it is possible to get
combo cards, which include more than one type of connector.

3.6.2 Transceivers
A transceiver is a networking device that converts from one cabling technology to another. For example, a
transceiver may act as an interface between a network based on coaxial cable and one using fibre-optic cable.

3.6.3 Repeater
In a bus topology, signal loss can occur if the segments are too long. A repeater is a device that connects two
network segments and broadcasts data between them. It amplifies the signal, thereby extending the usable
length of the bus.

3.6.4 Hub
One network component that has become standard equipment in networks is the hub. A hub acts as the central
component in a star topology, and typically contains 4, 8, 16 or even more different ports for connecting to

10 | P a g e
computers or other hubs. It is similar in operation to a repeater, except that it broadcasts data received by
any of the ports toall other ports on the hub. Hubs can be active, passive or hybrid.
Most hubs are active; that is, they regenerate and retransmit signals in the same wayas a repeater does.
Because hubs usually have eight to twelve ports for network computers to connect to, they are sometimes
called multiport repeaters. Active hubs require electrical power to run. Some types of hubs are passive. They
act as connection points and do not amplify or regenerate the signal; the signal passes through the hub.
Passive hubs do not require electrical power to run. Advanced hubs that will accommodate several different
types of cables are called hybrid hubs.

3.6.5 Bridges, switches and routers


For large networks it is often necessary to partition it into smaller groups of nodes to help isolate traffic and
improve performance. A bridge is a device that acts as an interface between two sets of nodes. For example,
if a company’s network has been partitioned into two subnets, for the sales department and administration
department respectively, a bridge will be placed between the two networks. If a computer on the sales subnet
sends data to another computer on the sales subnet, the bridge will not pass on the data to the administration
subnet. However, if the same computer sends data to a computer on the administration subnet, it will be
forwarded by the bridge. Because not all data is passed onto the other subnet, network traffic is reduced.
A switch is similar to a bridge, except that it has multiple ports. A switch can also be seen as a more intelligent
hub – whereas a hub passes on all data to every port, a switch will only pass data on to the port that it is
intended for.
A router is also used for connecting networks together. However, unlike a bridge, a router can be used to
connect networks that use different network technologies.Routers are very commonly found in the hardware
infrastructure that forms the basis of the Internet.

3.7 The Internet, Intranets, and Extranets

Most individuals need to communicate with a resource on another network, outside of the local network within
the home, campus, or organization. This is done using the Internet.

The Internet

The Internet is a worldwide collection of interconnected networks (internetworks or internet for short). Figure
14 one way to view the Internet as a collection of interconnected LANs and WANs.

Figure 14: Collection of Interconnected LANs and WANs

Some of the LAN examples are connected to each other through a WAN connection. WANs are then connected
to each other. The WAN connection lines represent all the varieties of ways we connect networks. WANs can
connect through copper wires, fiber optic cables, and wireless transmissions (not shown).

The Internet is not owned by any individual or group. Ensuring effective communication across this diverse
infrastructure requires the application of consistent and commonly recognized technologies and standards as
well as the cooperation of many network administration agencies. There are organizations that have been
11 | P a g e
developed for the purpose of helping to maintain structure and standardization of Internet protocols and
processes. These organizations include the Internet Engineering Task Force (IETF), Internet Corporation for
Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others.

Intranets and Extranets

There are two other terms that are similar to the term Internet:

 Intranet
 Extranet

Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization
and is designed to be accessible only by the organization’s members, employees, or others with authorization.

An organization may use an extranet to provide secure and safe access to individuals who work for a different
organization but require access to the organization’s data. Examples of extranets include

 A company that is providing access to outside suppliers and contractors.


 A hospital that is providing a booking system to doctors so they can make appointments for their patients.
 A local office of education that is providing budget and personnel information to the schools in its district.

3.7.1 Internet Connections

The type of connection to the Internet will depend on the type of network being connected. A business network
will usually require a connection with more bandwidth than a home network.

Internet Access Technologies

There are many different ways to connect users and organizations to the Internet. Home users, teleworkers
(remote workers), and small offices typically require a connection to an Internet Service Provider (ISP) to
access the Internet. Connection options vary greatly between ISP and geographical location. However, popular
choices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

Organizations typically require access to other corporate sites and the Internet. Fast connections are required to
support business services including IP phones, video conferencing, and data center storage. Business-class
interconnections are usually provided by service providers (SP). Popular business-class services include
business DSL, leased lines, and Metro Ethernet.

Home and Small Office Internet Connections

Figure 15, illustrates common connection options for small office and home office users.

Figure 15: Connection Options

12 | P a g e
 Cable – Typically offered by cable television service providers, the Internet data signal is carried on the
same cable that delivers cable television. It provides a high bandwidth, always on, connection to the
Internet.
 DSL – Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL
runs over a telephone line. In general, small office and home office users connect using Asymmetrical
DSL (ADSL), which means that the download speed is faster than the upload speed.
 Cellular – Cellular Internet access uses a cell phone network to connect. Wherever you can get a cellular
signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone
and the cell tower to which it is connected.
 Satellite – The availability of satellite Internet access is a real benefit in those areas that would otherwise
have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
 Dial-up Telephone – An inexpensive option that uses any phone line and a modem. The low bandwidth
provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is
useful for mobile access while traveling.

Many homes and small offices are more commonly being connected directly with fiber optic cables. This
enables an ISP to provide higher bandwidth speeds and support more services such as Internet, phone, and TV.
The choice of connection varies depending on geographical location and service provider availability.

Businesses Internet Connections

Corporate connection options differ from home user options. Businesses may require higher bandwidth,
dedicated bandwidth, and managed services. Connection options available differ depending on the type of
service providers located nearby.

Figure 16, illustrates common connection options for businesses.

Figure 16: Typical Business Connection Options

 Dedicated Leased Line – Leased lines are actually reserved circuits within the service provider’s
network that connect geographically separated offices for private voice and/or data networking. The
circuits are typically rented at a monthly or yearly rate. They can be expensive.
 Ethernet WAN – Ethernet WANs extend LAN access technology into the WAN. Ethernet is a LAN
technology you will learn about in a later chapter. The benefits of Ethernet are now being extended into
the WAN.
 DSL – Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber
Lines (SDSL), which is similar to the consumer version of DSL but provides uploads and downloads
at the same speeds.
 Satellite – Similar to small office and home office users, satellite service can provide a connection
when a wired solution is not available.

The choice of connection varies depending on geographical location and service provider availability.

13 | P a g e

You might also like