Components of Network
Components of Network
Components of Network
Collection of two or more computers People can share Files modems printers Backup drive CD ROM drive Can be used for sending e-mails
File sharing Easy for accessing same file Prevent creating different versions Printer sharing Communication and collaboration eg.Lotus Notes
Organization meetings and schedules Remote login Video conferencing Newsgroup and bulletin boards Cost savings
Routers Transfers data from one n/w to another n/w. Finding most efficient route. Has routing table Other tasks Exchange protocol info across n/w Filter traffic Prevent hacker attack
1. 2. 3. 4.
A router has a microcomputer Has a table of n/w s it is connected to Steps of routing of data packets Read destination address See available paths Check if path is busy Sends to least congested
Device that avoids data collision Larger network- more collisions- slow network
Devices are used for signal strengthening Network segments connected by repeaters After certain cable length a repeater is placed
Allow computers t o share data packets Star and tree topologies use hub Bus and ring topology dont use hub
OSI model 7. Application Layer NNTP SIP SSI DNS FTP Gopher HTTP NFS NTP SMPP SMTP SNMP Telnet DHCP Netconf RTP SPDY (more) 6. Presentation Layer MIME XDR TLS SL 5. Session Layer Named Pipes NetBIOS SAP L2TP PPTP SOCKS 4. Transport Layer TCP UDP SCTP DCCP SPX 3. Network Layer IP (IPv4, IPv6) ICMP IPsec IGMP IPX AppleTalk 2. Data Link Layer ATM SDLC HDLC ARP CSLIP SLIP GFP PLIP IEEE 802.3 Frame Relay ITU-T G.hn DLL PPP X.25 Network Switch 1. Physical Layer EIA/TIA-232 EIA/TIA-449 ITU-T V-Series I.430 I.431 POTS PDH SONET/SDH PON OTN DSL IEEE 802.3 IEEE 802.11 IEEE 802.15 IEEE 802.16 IEEE 1394 ITU-T G.hn PHY USB Bluetooth Hubs
1. 2. 3. 4. 5. 6.
Any machine that provides a service for other users on the network. Printer server File server Database server Email server Internet proxy server Intranet server
Internet proxy server: Store a copy of frequently used web sites, speed up access. supply authorized users with web pages supply external users with authorized info and services
Converts data passing between dissimilar n/w. Converts data into correct network protocol
Device used for screening or filtering. It screens the data coming to the network and going out of the network Part of the firewall
Device for Modulation and Demodulation Converts digital data to Analog and vice versa Internal and External
Local Area Network Interconnects computers in a limited area Buildings Group of buildings Home School Comp Lab Office
Topology : Geometric arrangement of devices Protocols: Rules for sending data Media: Devices connected by Twisted pair or Coaxial cable or Fiber optic cable
Multiplayer gaming event Participants bring their own computers or given by organizers. Build temporary LAN No can range from 2 to thousands LAN divided into logical groups - Subnets
As of 2010, the world record for the size of a LAN party is 12,754 connected systems, set at Sweden. Gaming clans play to improve Cyber athlete Professional League (CPL) Professional sports tournament organization specializing in computer and console video game competitions.
There are seven basic topologies Point to point Bus Star Ring Mesh Tree Hybrid Daisy chain
Each node connected to single cable A signal travels in both directions If address doesn't match, data is ignored Inexpensive Types : Linear and Distributed
Each host is connected to central hub Easiest topology Can add extra nodes Scalable Types Extended and distributed
Circular arrangement of nodes Data travels in one direction Each device is repeater Each device is transmitter and receiver
Physical location of nodes like a tree Combination of bus and star One root node divided into no of nodes
Combination of two or more topologies Can be : Star ring Star Bus Snowflake
Centralization:
Star topology Tree topology Decentralization: Mesh Fully connected network or full mesh topology
Sharing resources Domain controller Authentication, logging, Security Centralization Dedicated file server, Redundancy, disaster recovery, virus scanning
Security is needed to stop users Difficult to set up Needs to be maintained If file server develops a fault, all are affected
Advantages: Easier to add or move workstation Provide connectivity to remote terminals Installation is fast and easy No need of cables through walls and ceilings
Access to n/w within range For portable n/w(war etc) Installation expenses are lower In historic building, no need to dig holes Can be established without wiring planning
As no of computers increase, transfer rate will decrease Bandwidth is lower Security is difficult and requires configuration Distance is limited
WLAN can not be the complete solution. It is additional to the wired LAN It can interact with the other wireless networks.