Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 64

Networking

Network A collection of computing devices that are connected in various


ways in order to communicate and share resources
Usually, the connections between computers in a network are made using
physical wires or cables
However, some connections are wireless, using radio waves or infrared signals
Networking
• The generic term node or host refers to any device on a network
• Data transfer rate The speed with which data is moved from one place on
a network to another
• Data transfer rate is a key issue in computer networks
Seven-node network
Networking
• Computer networks have opened up an entire frontier in the
world of computing called the client/server model

Client/Server interaction
Networking
• File server A computer that stores and manages files for multiple users on a
network
• Web server A computer dedicated to responding to requests (from the
browser client) for web pages
Local area network (LAN):

• The Institute of Electrical and Electronics Engineers (IEEE) defines a LAN


as follows:
• “A datacom system allowing a number of independent devices to
communicate directly with each other, within a moderately sized geographic
area over a physical communications channel of moderate data rates”
• Typical characteristics of a LAN environment
• The stations on the network are peers—any station can initiate data exchange with
any other station.
• Full connectivity among all stations
• Fully administered by the owner
• Runs over a shared transmission medium—often, cabling.
• The network is confined to a small area—a single building or a cluster of buildings.
• The data rate is high—several Mbps (million bits per second).
Purpose of a LAN
A LAN permits users to share resources—hardware, software or user-created files. Sharing of
resources makes it possible to maximize the investments made in each resource. Ideally, distant
resources should appear to be local to the user.

• Objectives of an effective LAN


• When implemented, LANs are expected to achieve certain basic objectives:
• • To improve employee productivity.
• • To improve information management.
• • To improve interaction between staff.
• • To reduce/control costs.
• • To provide for standardized hardware and software usage.
An effective LAN is one that meets objectives while fulfilling certain
fundamental requirements:

• Simplicity
• Reliability
• Transparency
• Manageability
Benefits of a LAN

• Shared resources
• Hardware
• Software
• Files
• Security
• Access Control
• Backups
• Improved Communications
• Productivity
• Customer Relations
➢The metropolitan area network (MAN) is
designed to extend over an entire city.
➢It may be a single network such as cable
television network available in many cities.
➢Range: Within 100 km (a city).
❖It provides a good back bone for ❖More cable required for a
a large network and provides MAN connection from one
greater access to WANs. place to another.
❖The dual bus used in MAN helps
the transmission of data in both ❖It is difficult to make the
direction simultaneously. system secure from hackers
❖A Man usually encompasses and industrial espionage
(spying) graphical regions.
several blocks of a city or an entire
city.
• A Wide Area Network
(WAN) connects two or
more LANs, often over
long distance.
• A WAN often connects
different groups in
different countries.
• Range: Beyond 100 km.
•Covers a large geographical area so long •Need a good firewall to restrict outsiders
distance businesses can connect on the one from entering and disrupting the network
network. •Setting up a network can be an expensive, slow
•Shares software and resources with connecting and complicated.
workstations. •Once set up, maintaining a network is a full-
•Messages can be sent very quickly to anyone else time job which requires network supervisors
on the network. These messages can have and technicians to be employed.
pictures, sounds, or data included with them. •Security is a real issue when many different
•Expensive things can be shared by all the people have the ability to use information
computers on the network without having to buy a from other computers. Protection against
different peripheral for each computer. hackers and viruses adds more complexity and
•Everyone on the network can use the same data. expense.
•The topology of a network

defines how the nodes of a network


are connected.
•There are two basic categories of network
topologies: (To define The network)
1. a physical topology.
2. a logical topology.
• Physical topology:
defines how the nodes of the network are physically
connected .

• Logical topology:
How data is transmitted between nodes
▪ (dedicated connections between certain selected source-destination pairs using the underlying physical
topology.)
▪ In order to have an efficient system, the logical topology should be chosen such that
either the average hop distance or the packet
delay or the maximum flowon any link must be minimal.
• Shapes of network topologies :
• Mesh
• Star
• Bus
• Ring
• Tree and Hybrid
Mesh Topology

• A network setup where each computer and network device is


interconnected with one another, allowing for most transmissions
to be distributed, even if one of the connections go down.
• This topology is not commonly used for most computer networks
as it is difficult and expensive to have redundantconnection to
every computer.
• However, this topology is commonly used for wireless networks.
Mesh Topology
1. They use dedicated links so each link can only carry its own
data load. So traffic problem can be avoided.
2. It is robust. If any one link get damaged it cannot affect
others.
3. It gives privacy and security.(Message travels along a
dedicated link)
4. Fault identification and fault isolation are easy.

Mesh Topology
Mesh Topology
• The amount of cabling and the number of I/O ports required are very large.
Since every device is connected to each devices through dedicated links
• The sheer bulk of wiring is larger then the available space.
• Hardware required to connected each device is highly expensive.

1. Telephone Regional office.


2. WAN.(Wide Area Network).
• Here each device has a dedicated point-to-point link to the
central controller called “Hub”(Act as a Exchange).
• There is no direct traffic between devices.
• The transmission are occurred only through the central “hub”.
• The central point may be “passive”, “active”, or “intelligent”.
• A passive hub simply connects the arms of a star, no signal
regeneration is performed.
• An active hub is like a passive hub, except that it regenerates
signals.
• Intelligent hubs not only regenerate signals but also perform
activities such as intelligent path selection and network
management.
Star Topology
1. Less expensive then mesh since each device is
connected only to the hub.
2. Installation and configuration are easy.
3. Less cabling is need then mesh.
4. Robustness.(if one link fails, only that links is
affected. All other links remain active).
5. Easy to fault identification & to remove parts.

Star Topology
• Even it requires less cabling then mesh when compared with
other topologies it still large.(Ring or bus).
• Dependency(whole dependent on one single point(hub). When
it goes down. The whole system is dead.

Star Topology
• Star topology used in LocalArea Networks(LANs).
• High speed LAN often used STAR.

Star Topology
Bus Topology
• A bus topology is multipoint.
• Here one long cable act as a backbone to link all the devices are connected
to the backbone by drop lines and taps.
• Drop line- is the connection the devices and the cable.
• Tap- is the splitter that cut the main link.
• This allows only one device to transmit at a time.
• Single cable connects all network nodes without intervening
connectivity devices.
• Devices share responsibility for getting data fromone point to
another.
• When a device sends a message, it is broadcast down on
the cable in both directions. Terminators at the end of
the cable prevent the signal from reflecting back to the
sender.
• All devices on the cable constantly monitor for
messages meant to them. When a device detects a
message meant for it, it reads the message from the
cable and the other devices will ignore it.
• Since all devices are sharing the same cable, some form
of control is needed to make sure which device will
transmit when, otherwise there will be acollision.
Bus Topology
P
1. Ease of installation.
2. Less cabling.
3. Less expensive.

Bus Topology
1. Difficult reconfiguration and fault isolation.
2. Difficult to add new devices.
3. Signal reflection at top can degradation in quality.
4. If any fault in backbone can stops all transmission.

• Most computer motherboard.

Bus Topology
P
Ring Topology

• Here each device has a dedicated connection with two devices


on either side.
• The signal is passed in one direction from device to device until
it reaches the destination and each device have repeater.
• When one device received signals instead of intended another
device, its repeater then regenerates the data and passes them
along.
• To add or delete a device requires changing only two connections.
Ring Topology
Advantages:
1. Easy to install.
2. Easy to reconfigure.
3. Fault identification is easy.

Disadvantages:
1. Unidirectional traffic.
2. Break in a single ring can break entire network.

Ring Topology
Applications:
• Ring topologies are found in some office
buildings or school campuses.
• Today high speed LANs made this topology less
popular.

Ring Topology
• Alternatively referred to as a star bus topology.
• Tree topology is one of the most common network
setups that is similar to a bus topology and a star
topology.
• A tree topology connects multiple star networks to
other star networks.
Tree Topology
• A network which contain all type of physical
structure and connected under a single backbone
channel.
Hybrid Topology
• Money-Bus n/w may be the least expensive way to install a
n/w.
• Length-of cable needed- the linear bus n/w uses shorter
lengths of cable.
• Future growth-with star topology, expending a n/w is easily
done by adding another devices.
• Cable type-most common used cable in commercial
organizationis twisted pair. Which often used with star
topologies.
Internet, Intranet
and Extranets
What is Internet ?
• It is a Global network of computers (servers or clients) to exchange
information.

• It is a "network of networks" that includes millions of private and public,


academic, business, and government networks (local or Global), linked by
copper wires, wireless connections, and other technologies.
Hardware and Software of Internet

Variety of hardware and software are used to make


Internet functional.

• Modem
Device that enables computers to communicate through
phone lines.
When we start internet the our modem communicates
to modem of ISP.
Continued…

• Computer
In addition to a modem, you need a client capable of handling multiple
data types.
• Software
Two types of software’s required to enable your PC as an Internet PC.
• Communication software to establish connection
• Client software for browsing, e-mail, news.
these software’s are provided with windows itself.
Applications Of Internet
• Download programs and files
• E-Mail
• Voice and Video Conferencing
• E-Commerce
• File Sharing
• Information browsing
• Search the web addresses for access through search engine
• Chatting and many more…
Disadvantages of Internet
• Theft of personal information such as name, address, credit card number etc.
• Virus threats nothing but a program which disrupts the normal functioning of your
system.
• Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system.
• Pornography This is perhaps the biggest threat related to children’s healthy mental life. A
very serious issue concerning the Internet.

Though, internet can also create havoc, destruction and its misuse can be
very fatal, the advantages of it outweigh its disadvantages.
Intranet
What is Intranet ?

• Internal company network that uses Internet standards (HTML, HTTP &
TCP/IP protocols) & software.

• Accessed only by authorized persons, especially members or employees of


the organization
Intranet Security
Two levels of Security required:

• Internal
It can be imposed by Public Key Security & Encryption Key.

• External
Through Firewall.
What is Firewall ?
• Security device located between firm’s internal network (intranet) & external
network (internet).

• Regulates access into & out of a company’s network based on a set of rules.

Note : needs to be upgraded from time to time to check latest potential security problems.
Applications of Intranet
• Sharing of company policies/rules & regulations
• Access employee database
• Distribution of circulars/Office Orders
• Access product & customer data
• Sharing of information of common interest
• Launching of personal/departmental home pages
• Submission of reports
• Corporate telephone directories
Disadvantages

⚫ A company may not have person to update their


Intranet on a routine basis
Management
problem ⚫ Fear of sharing information and the loss of control
⚫ Limited bandwidth for the business
Security ⚫ Unauthorized access
problem ⚫ Abuse of access
⚫ Denial of service
Productivity ⚫ Information overload lowers productivity
problem ⚫ True purpose of the Intranet is unknown to many
employees/departments
⚫ Hidden or unknown complexity and costs
Extranet
What is Extranet ?
• Extranet is an Intranet for outside authorized users using
same internet technology.

• Inter-organizational information system.

• enable outsiders to work together with company’s employees.


• open to selected suppliers, customers & other business partners
Examples..
• Dealers/distributors have access to product files such as :-
1. product specification,
2. pictures,
3. images, etc.
to answer the queries of the customer.
Components of extranets ..
Some basic infrastructure components such as the internet Including :-
• TCP/IP protocols,
• E-mail,
• Web-browsers,
• External business partners &
• Tele-commuting employees place order, check status & send E-mail.
Benefits of Extranet
• Improved quality.
• lower travel costs.
• lower administrative & other overhead costs.
• reduction in paperwork.
• delivery of accurate information on time.
• improved customer service.
• better communication.
• overall improvement in business effectiveness.
Disadvantages
• The suppliers & customer who don’t have technical knowledge feel problem.
• Faceless contact.
• Information can be misused by other competitors.
• Fraud may be possible.
• Technical Employees are required.
Layered System View

Intranet Corporate members

Extranet Clients, partners, customers

Internet Global society: competitors

You might also like