Академический Документы
Профессиональный Документы
Культура Документы
NETWORKING CONCEPTS
1
Name of the Topic Slide Number
Network Concepts 4-10
Client-Server Architecture 10
Evolution of Internet 11-12
How Internet Works? 13-15
Interspace 16
Networking Terms 17-21
Switching Techniques 22
Transmission Media (Wired) 23-27
Comparison between various Wired Media 28
Transmission Media (Wireless) 29-33
Data Communication Technologies 34-35
Types of Networks 36-39
Difference between types of Networks 40
Name of the Topic Slide Number
Network Topologies 41-50
Comparison between several Topologies 51
Network Devices 52-60
Communication Protocols 61-63
Web Scripting 64-65
Network Security 66-71
NETWORK: When two or more communicating devices
are connected with each other, it is termed as a network.
For example, telephone network, computer network, ATM
network etc.
4
Going online: Connecting to a collection of
interconnected computers on a
network.
• Do banking
• Pay bills
• Buy groceries
• Book vacation travel
• Send messages
• Participate in discussions
• Do research
• Play games
5
Thus, a Network is a collection of computers,
display terminals, printers, and other devices linked
either by physical or wireless means.
Two computers are said to be interconnected if
they are able to exchange information.
6
Networks
◆ Network is two or more computers that
are connected so that data and resources
can be shared.
7
Computer Network leads to
◆ Resource sharing
◆ To provide high reliability
◆ Saving money and time
◆ To provide better communication
Advantages & Disadvantages of Networking
Advantages Disadvantages
1. Systems are complex and
1. It allows sharing of
sophisticated to run so it adds to
resources.
costs and needs specialist staff to
2. It allows to share Storage. run the network.
3. It allows sharing of 2. If networks are badly managed
hardware and software. then productivity falls.
4. Improved communication, 3. File security is more important
i.e., e-mails.
8
Applications of Networks
◆Sharing
◼ Sharing of peripherals like
Printers, scanners, internet connection.
◼ Information is shared in multi-user systems.
◆Access to remote database.
◆Communication facilities
◼ Cansend video, graphics and text to other
nodes.
9
Computer networks and in turn Networking
works on client/server architecture.
11
❖ The internet is a WAN which spans the entire
planet.
❖ The word internet comes from the term
Inter-networking
❖ It was started as a United States government
project, sponsored by the Advanced Research
Projects Agency (ARPA); thus, originally it was
called the ARPANET.
❖ The internet grew quickly throughout the 1980s
and 1990s.
12
How does internet works?
Most computers are not connected directly to internet, rather
they are connected to smaller networks, which in turn are
connected through GATEWAYS to the internet BACKBONE.
BACKBONE
GATEWAYS
Network Protocols
Every computer connected to the network follows the same
set of rules for communication. These set of rules are called
Protocols.
14
Network protocols are layered such that each one relies
on the protocols that underlie it. Sometimes referred
to as a protocol stack
Protocol Stack
Communication Protocol - TCP/IP
◆ The TCP (i.e., Transmission Control Protocol) part is responsible
for breaking the file/message into packets at the source
computer.
◆ TCP is also responsible for reassembling the received packets
at the destination or recipient computer.
◆ The IP (i.e., Internet Protocol) part is responsible for handling the
address of destination computer so that each packet is routed
(sent) to its proper destination.
15
It a client/server software program that allows multiple
users to communicate online with real-time audio, video
and text chat in dynamic 3D environments.
16
❖ NODES (WORKSTATIONS)
❖ SERVER
❖ MAC ADDRESS
A network can have more than one server also. Each server has a
unique name on the network and all users of network identify the
server by its unique name.
17
Server
Non-Dedicated
Dedicated Server
Server
19
MAC ADDRESS
The MAC address refers to the physical address assigned by
NIC manufacturer.
MAC addresses are useful for network diagnosis because they never
change, as opposed to a dynamic IP address which can change from
time to time. For a network administrator that makes a MAC address a
more reliable way to identify senders and receivers of data on the
network.
21
They are employed to provide communication between
two computers.
Switching
Techniques
22
Transmission Media is also termed as Communication Channels
or Connecting cables or Connecting media.
The cables that connect two or more workstations are termed as
communication channels. Transmission media or communication
channels of network is nothing but the cable/media which provides the
link.
• Twisted pair
Guided cable
• Coaxial cables
Media
• Optical fibres
Transmission
Media It include waves
through air, water or
vacuum:
Unguided * Microwaves
Media * Radio waves
* Satellites
* Infrared
* Laser 23
Twisted Pair Cable
It is the most common form of wiring in data communication applications.
It consists of two identical wires wrapped together in a double helix.
The bleeding of a signal from one wire to another which can corrupt
signal and cause network errors. This form of signal interference is
called crosstalk. To reduce crosstalk, wires are twisted in pair in twisted
pair cables.
Advantages Disadvantages
1. It is simple in design. 1. Data transmission
2. It is easy to install and characteristics are not good.
maintain. 2. It is incapable of carrying a
3. It has a low weight. signal over long distances
4. It can be easily because of high attenuation.
connected. 3. It has low bandwidth
5. It is inexpensive. capabilities so unsuitable for
broadband applications.
24
Coaxial Cable
Dielectric
It consists of a solid wire core surrounded material Braided
by one or more foil or wire shields, each outer Outer
separated by some kind of plastic insulator. conductor cover
The inner core carries the signal, and the shield provides the ground, has high
electrical properties and is suitable for high speed communication used for TV
signals.
Advantages
Disadvantages
1. Transmission capabilities
are better than twisted pair 1. Expensive compared to twisted pair.
cables.
2. Not compatible with Twisted Pair
2. It can be used for
cable.
broadband transmission
(Cable TV transmission).
3. Offers higher bandwidths
up to 400 MBPS
25
Optical Fibres
Fibre Optics cables work on the principle of light. Light is
electromagnetic in nature.
It can transmit more information down a single strand over a
wider set of frequencies. Each cable can send several
thousand telephonic conversations or computer
communications.
light
cladding jacket
core
Disadvantages
1. Installation problem.
2. Are fragile and may need special care to provide the robustness
required for office environment.
3. Connecting two fibres together or a light source is difficult to
make and maintain.
27
Comparison between Transmission Cables
Twisted Pair UTP 100 Mtrs 200 Mbps Easy Cheapest High
Cable STP 100 Mtrs 500 Mbps Moderate Moderate Moderate
28
Micro wave Transmission
(It is line of sight transmission)
Microwave signals are used to transmit a data without cables.
The microwave signals are similar to radio and television.
Signals are used for long distance
communications.
It consists of:
1. Transmitter
2. Receiver
3. Atmosphere
29
Advantages:
Disadvantages
1. Insecure communication.
2. Susceptible to weather effects like rains, thunderstorms,
etc.
3. Bandwidth allocation is extremely limited.
4. The cost of design, implementation and
maintenance is high.
30
Radio Wave Transmission
Radio wave transmission uses radio frequencies. It
functions even though line of sight is interrupted. Thus, it
is not commonly used because of possible interference
from other sources of electromagnetic radiation, such as
old electric drills and furnace motors.
Advantages
1. It offers mobility. Disadvantages
4. Offers ease of
communication over
difficult terrains.
31
Satellite Transmission (for intercontinental
communication)
Satellite communication involves
sending of data signals from
ground station to another using
satellite as the medium of
transmission.
Advantages
1. The area covered is
very large
2. Cable laying is very
Disadvantages
difficult and
expensive so
1.Technological limitations preventing
satellite proves to be the use of large, high gain antennas
on the satellite platform.
the best alternative.
2. High investment cost and insurance
cost.
32
Infrared light
Laser transmission
It requires direct line of sight. It is unidirectional like microwave,
but has much higher speed than microwaves. It is point-to point
transmission, typically between buildings.
33
DATA COMMUNICATION TECHNOLOGIES
34
❖ Bandwidth: It refers to the difference between the highest and
lowest frequencies of a transmission channel. Highest bandwidth
channels are called Broadband channels and low bandwidth
channels are called Narrowband channels. It is measured in hertz
(Hz).
◆ Kilohertz(kHz) : thousand cycles per second
◆ Megahertz(MHz): thousand kHz
◆ Gigahertz(GHz): thousand MHz
◆ Terahertz(THz): thousand GHz
35
TYPES OF NETWORK
On the basis of Geographical spread, computers and their networks
are classified as follows: ◆ Local Area Networks (LAN)
◆ Metropolitan Area Networks (MAN)
◆ Wide Area Networks (WAN)
◆ Wireless Networks
◆ Home Networks
◆ Internetworks
Classification of interconnected processors by scale
Square metre
36
Local Area Networks
A Local Area Network (LAN) covers a small distance and a
small number of computers.
A LAN often connects the machines in a single room or
building.
37
Metropolitan Area Networks
A metropolitan area network (MAN) is a network that
interconnects users with computer resources in a geographic
area or region larger than that covered by even a large local area
network (LAN) but smaller than the area covered by a wide area
network (WAN).
38
Wide Area Networks
A Wide Area Network (WAN) connects two or more LANs,
often over long distances.
A LAN usually is owned by
one organization, but a WAN
often connects groups in
different countries.
Internetworks
◆ Collection of interconnected networks is called
internetwork or internet.
◆ Internet is one specific internet or internetwork.
◆ A common form of internet is a collection of
LANs interconnected by a WAN.
◆ An internetwork is formed when distinct networks
are interconnected.
39
Difference between three types of Networks
Metropolitan
( LAN, MAN and WAN) Area Networks
40
Network Topologies
The layout or pattern of interconnection of nodes in a network is
called Network Topology.
2. Flexibility
3. Reliability
Network Structure
Network structure can be classified into two broad
categories:
❖ Point-to-Point
❖ Broadcast Channels
41
Point-to-Point
When a message is sent from one node to another via one or
more intermediate nodes, the packet is received at each
intermediate node in its entirety, stored there until the required
output line is free and then forwarded.
A subnet using this principle is called a point-to-point,
store and forward or packet-switched subnet.
Following are the topologies used for point to point:
◆ Star
◆ Ring
◆ Tree
◆ Complete
◆ Intersecting Ring
◆ Irregular
42
Broadcast Channels
This type of network has a single communication channel that
is shared by all the machines on the network.
Packets sent by any machine are received by all other machines.
An address field within the packet specifies for whom it is
intended. Upon receiving a packet, a machine checks the
address field. If the packet is intended for some other
machine, it is just ignored. If it is intended for that machine, it
accepts the packet.
Broadcast channels allow two types of transmission
◆ Multicasting
Transmission for more than one but not for everyone.
◆ Broadcasting
Transmission for everyone.
Following are the topologies used for broadcast channels:
◆ Bus
◆ Satellite or Radio
◆ Ring
43
Star Topology
A star network consists of central switch or hub computer,
which acts as a router to transmit messages.
Advantages
◆ Ease of service.
◆ One device per connection.
◆ Centralized control/Problem
diagnosis.
◆ Simple access protocols.
◆ Security can be implemented
in the hub/switch.
Disadvantages:
1. Long cable length.
2. Difficult to expand.
3. Central node dependency.
44
Ring Topology
Disadvantages
1. Node failure causes
network failure.
2. Difficult to diagnose
faults.
3. Network reconfiguration is
difficult.
45
Bus Topology
A continuous coaxial cable to which
all the devices are attached.
All nodes can detect all messages
sent along the bus.
Advantages
1. Short cable length and
simple wiring layout.
2. Resilient architecture.
3. Easy to extend.
4. Cheapest topology to
implement.
Disadvantages
1. Fault diagnosis is difficult.
2. Fault isolation is difficult.
3. Repeater configuration.
4. Nodes must be intelligent.
46
Bus Topology
A bus network is passive – the computers on the bus simply listen
for a signal; they are responsible for moving the signal along.
However, many active architectures can also be described as a
"bus" as they provide the same logical functions as a passive bus.
For example, switched Ethernet can still be regarded as a logical
bus network, if not a physical one. Indeed, the hardware may be
abstracted away completely in the case of a software bus.
47
Tree Topology
48
Graph Topology
Nodes are connected together in an arbitrary fashion.
A link may or may not connect two or more nodes.
There may be multiple links.
It is not necessary that all the nodes are connected.
49
Mesh Topology
In mesh topology, each node is connected to more than
one node to provide an alternative route.
Fully Connected
50
Comparison among various Topologies
51
A Modem is a Network device which connects a workstation/node to
other workstations via telephone lines and facilitates
communication. A Modem converts digital signals to analog signals
and vice versa.
Modem
External Internal
Modem Modem
52
RJ-45 is an 8-wire
connector which is
commonly used to connect
computers on the LAN.
RJ stands for Registered
Jack.
53
Ethernet – a LAN RJ-45
architecture, it uses bus CONNECTOR
or star topologies and can
support data transfer AUI
(Auxiliary Unit
rates up to 10Mbps . The Interface)
CONNECTOR
computers that are part of
Ethernet, have to install a
special card called
BNC
Ethernet card (LAN card). CONNECTOR
(Bayone-Neill
–Concelman)
54
A hub is the simplest of these devices. It is used to connect several
computers on the network. Any data packet coming from one port is sent to
all other ports. It is then up to the receiving computer to decide if the
packet is meant for it.
◆ The biggest problem with hubs is their simplicity. Since every packet is sent
out to every computer on the network, there is a lot of wasted transmission.
This means that the network can easily be bogged down.
◆ Hubs are typically used on small networks where the amount of data going
across the network is never very high.
55
Hubs can support 8,12 or 24 RJ-45 ports.
They are often used in a star or ring
topology.
56
Repeater is a network device which amplifies and restores
signals for long-distance transmission.
57
A bridge goes one step up on a hub in that it looks at the
destination of the packet before sending it. If the destination
address is not on the other side of the bridge, it will not transmit
the data.
A bridge only has one incoming and one outgoing port. Bridges can
filter traffic based on MAC addresses.
Abridge is a device that links two networks together.
61
File Transfer Protocol (FTP)
Ensures proper transfer of files from one network in an
organization to another, i.e., REMOTE LOGIN.
FTP can also be defined as a set of rules, which
enables files to be uploaded or downloaded on a
network. It serves as client server process.
62
SLIP/PPP
63
Web Scripting
64
Types of Scripts
CLIENT SIDE SCRIPTS SERVER SIDE SCRIPTS
1. It enables interaction within a 1. It enables the completion or
web page. carrying out of a task at the
2. They are browser-dependent as server end and then sending the
they are downloaded at the client result to the client end.
side and then interpreted and
2. It does not depend on browsers.
executed by the browser.
65
Network Security refers to certain control mechanisms
set up to ensure that properly authenticated users get
access only to those resources that they are entitled to
use.
66
The system designed to prevent unauthorized
access to or from a private network is called
Firewall.
67
They are the programmers who are interested in
gaining knowledge about computer systems and
possibly using this knowledge for playful pranks.
Cyber crimes are crimes which are committed with the use of computers
through the internet. For example,
1. Tampering with computer source documents
2. Hacking
3. Publishing of information (obscene) in electronic form
4. Child pornography
5. Accessing protected system
6. Breach of confidentiality and privacy
69
It is the code hidden in a
program such as a game
or spreadsheet that looks
safe to run but has hidden
side effects.
It is a program designed to
replicate and run
independently and travel
from computer to
computer across network
connections.
70
It is an electronic junk mail or junk newsgroup
postings.