EL 303 SP 21 CCN LEC1 Introduction
EL 303 SP 21 CCN LEC1 Introduction
EL 303 SP 21 CCN LEC1 Introduction
• Universe, Galaxy
• Human Body
• Tree
• Spider web
• Family
• Terrorists
• Trains
• Air Routes
Man Made Networks - Computer Networks
• A computer network is a group of computer
systems and other computing hardware devices
that are linked together through communication
channels to facilitate communication and
resource-sharing among a wide range of users.
Why we need “Computer Networks”?
• Facilitate communication via email, video conferencing, instant
messaging, etc.
• Enable multiple users to share a single hardware device like a
printer or scanner.
• Enable file sharing across the network.
• Allow for the sharing of software or operating programs on
remote systems.
• Make information easier to access and maintain among
network users.
Network Components
• User
• Sender
• Receiver
• Medium
• Protocol
• Application
• Cloud
Protocol
Every Application we use needs a
Protocol:
• Web Browsing
• File
Upload/Download
• Video Streaming
• WhatsApp
• Email
• Counterstrike
• File copy
• Ecommerce
Networking Devices
• Server
• Client
• NIC
• Hub
• Switch
• Router
• Gateway
• Firewall
• IDS
Medium
Classification and
Topologies
How do we Classify Networks?
• A computer network can be classified into
different categories.
• Different criteria are used to classify computer
networks. Following are the criteria widely used.
• Geographical spread
• Topology
• Ownership
Categories of Computer Networks
• Local Area Networks (LAN).
• Global Area Networks (GAN).
• Personal Area Networks (PAN).
• Home Area Networks (HAN).
• Wide Area Networks (WAN).
• Campus Networks.
• Metropolitan Area Networks (MAN).
• Enterprise Private Networks.
• Internetworks.
• Backbone Networks (BBN).
• The internet.
Categories of Computer Networks
https://www.youtube.com/watch?v=XZmGGAbHqa0
Networking Standards
Topologies
Network Topology
• Network Topology refers to layout of a network.
• How different nodes in a network are connected to each other and
how they communicate is determined by the network's topology.
Network Topology
• Two main types of networking topologies are 1) Physical topology 2)
Logical topology
• Physical topology:
• This type of network is an actual layout of the computer cables and
other network devices
• Logical topology is the arrangement of devices on a computer
network and how they communicate with one another.
• Logical topologies describe how signals act on the network
Consideration
• Money. A linear bus network may be the least expensive way to install
a network; you do not have to purchase concentrators.
• Length of cable needed. The linear bus network uses shorter lengths
of cable.
• Future growth. With a star topology, expanding a network is easily
done by adding another concentrator.
• Cable type. The most common cable in schools is unshielded twisted
pair, which is most often used with star topologies.
Point to Point
https://www.youtube.com/watch?v=AEiaLXDJ7Yc
Advantages of Bus topology:
• Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.
• Difficult troubleshooting: It requires specialized test equipment to determine
the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
• Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
• Reconfiguration difficult: Adding new devices to the network would slow
down the network.
• Attenuation: Attenuation is a loss of signal leads to communication issues.
Repeaters are used to regenerate the signal.
Ring Topology
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will
retransmit to the next node.
• The data flows in one direction, i.e., it is unidirectional.
• The data flows in a single loop continuously known as an endless
loop.
• It has no terminated ends, i.e., each node is connected to other node
and having no termination point.
• The data in a ring topology flow in a clockwise direction.
Token
• The most common access method of the ring topology is token
passing.
• Token passing: It is a network access method in which token is passed from
one node to another node.
• Token: It is a frame that circulates around the network.
Ring
Mesh Topology
• Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
• There are multiple paths from one computer to another computer.
• It does not contain the switch, hub or any central computer which acts as a central point of
communication.
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where communication failures are
a critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
• Where n is the number of nodes that represents the network.
Working of Token passing
https://www.youtube.com/watch?v=YCNnxtqeWtQ
Advantages of Ring topology:
• Advantages:
• Offers the easiest method for error detecting and troubleshooting
• Highly effective and flexible networking topology
• It is scalable so you can increase your network size
• Disadvantages:
• The design of hybrid topology is complex
• It is one of the costliest processes