NETWORK MODEL
PREPARED BY
ADEBAYO, Adedeji
FATOKE, Tunde Joshua
BOBADE, Omolola Margaret
OLUWASOLA, Olubunmi Omotola
EHINJU, Caleb Ayodeji
3rd September,
2015.
ABSTRACT
The world of computers experienced an explosive period of growth toward the end
of the 20th century with the widespread availability of the Internet and the
development of the World Wide Web. As people began using computer networks
for everything from research and communication to banking and commerce,
network failures became a greater concern because of the potential to interrupt
critical applications. Fault tolerance systems were developed to detect and correct
network failures within minutes and eventually within seconds of the failure, but
time-critical applications such as military communications, video conferencing,
and Web-based sales require better response time than any previous systems could
provide.
Classic fault tolerant systems use redundant interconnects to provide a measure of
fault tolerance. However, other systems often provide fault tolerance by using the
inherent redundancy within an interconnect rather than using completely redundant
interconnect components.
The goal of this research is to examine different fault tolerant models that could be
adopted in a ring topology based network system such as xxx.
INTRODUCTION
Fault tolerance is that characteristic that enables a system to continue in its proper
operation even in the event of the failure of (or one or more faults within) some of
its components. If the operating quality of such system decreases at all, that
decrease is proportional to the gravity of the failure, as compared to a navely
designed system in which even a small failure can cause total breakdown. Fault
tolerance is particularly sought after in high availability or mission-critical
systems. Fault tolerance is not just a property of individual machines; it may also
characterize the rules by which they interact. For example, the Transmission
Control Protocol (TCP) is designed to allow reliable two-way communication in a
packet-switched network, even in the presence of communications links which are
imperfect or overloaded. It does this by requiring the endpoints of the
communication to expect packet loss, duplication, reordering and corruption, so
that these conditions do not damage data integrity, and only reduce throughput by a
proportional amount. A fault-tolerant design enables a system to continue its
intended operation, possibly at a reduced level, rather than failing completely,
when some part of the system fails. The term is most commonly used to describe
computer systems designed to continue more or less fully operational with,
perhaps, a reduction in throughput or an increase in response time in the event of
some partial failure. That is, the system as a whole is not stopped due to problems
either in the hardware or the software. An example in another field is a motor
vehicle designed so that it will continue to be drivable if one of the tires is
punctured. A structure is able to retain its integrity in the presence of damage due
to causes such as fatigue, corrosion, manufacturing flaws, or impact. Fault
tolerance and dependable systems research covers a wide spectrum of applications
ranging across embedded real-time systems, commercial transaction systems,
transportation systems, and military/space systems - to name a few. The
Logical Topology
A logical topology describes how components communicate across the physical
topology. The physical and logical topologies are independent of each other. For
example, any variety of Ethernet uses a logical bus topology when components
communicate, regardless of the physical layout of the cabling. This means that in
Ethernet, you might be using 10BaseT with a physical star topology to connect
components together; however, these components are using a logical bus topology
to communicate.
Media Type
Physical Topology
Logical Topology
Ethernet
Bus
FDDI
Ring
Ring
Token Ring
Star
Ring
Network Topology
The first thing to consider about a network is its physical shape, or the design
layout, which will be extremely important when you select a wiring scheme and
design the wiring for a new installation. Network really has two shapes, or two
types of topology; one is physical and the other is logical. The physical topology is
the shape you can see, and the logical topology is the shape that the data travels in.
Network topology is the arrangement of the various elements (links, nodes, etc.) of
a computer network. Basically, it is the topological structure of a network, and may
be depicted physically or logically. The physical topology of a network refers to
the configuration of cables, computers, and other peripherals. Physical topology
should not be confused with logical topology which is the method used to pass
information between workstations. Logical topology shows how data flows within
a network. The physical and geometrical arrangement, including the physical
placement of the various components of the network determines the physical
topology, while the mapping of the data flow between these components
determines the logical topology.
The ring topology can be a true physical ring or a logical ring. A true ring network
is similar to a linear bus, in that each computer is connected to the next in a line
-but with one important difference. In this case, the last computer is connected
back to the first, eliminating the "beginning" and "end" of the network and forming
a complete circle around which the data can travel. This also eliminates any signal
bounce problem as well as the need for termination.
The ring topology can also be a logical one, in which the signal path is a ring but
the external physical appearance is that of a star, as in Token Ring networks. This
is sometimes called a star-wired ring.
In a ring topology network computers are connected by a single loop of cable, the
data signals travel around the loop in one direction, passing through each
computer. Ring topology is an active topology because each computer repeats
(boosts) the signal before passing it on to the next computer. One method of
transmitting data around a ring is called token passing. The token is passed from
computer to computer until it gets to a computer that has data to send.
Advantages
Data is quickly transferred without a 'bottle neck'