Professional Documents
Culture Documents
2. Client –
A computer that use services that a server Provides.
3. Media –
It is a physical connection between the
devices on the network.
4. Users –
Any person that uses a client to access the resources on a network.
NETWORK TOPOLOGY
Ramdeobaba Institute of Computer Application
Networking
1) Bus Topology :-
N1 N2 N3 N4
Terminator Terminator
T - Connector
Advantages :
1. Simple, reliable and easy to use.
2. Requires the least amount of cables.
3. Cheaper when compared with other topology.
Disadvantages :
2) Ring Topology :-
N1 N2
Connector
N4 N3
Advantages :
Ramdeobaba Institute of Computer Application
Networking
1. No signal loss as in bus topology, since the token is regenerate at each node.
2. No terminator required.
Disadvantages :
1. Difficult to troubleshoot.
2. Adding and removing computers disturb the entire network.
3. Expensive when compared with other topology.
3) Star Topology :-
N1
N2 HUB N3
N4
Advantages :
1. Easy to modify and add new computers by simply adding a new cable,
without disturbing the rest of network.
2. Easy to diagnose network fault.
3. Single computer failure does not affect the network.
4. Accommodated multiple cable type (Unshielded twisted pair cable,
Shielded twisted pair cables and others).
5. Ready telephone cable can be used for this type.
Disadvantages :
1. Failure of the central HUB bring the entire network down.
TYPES OF NETWORK
Ramdeobaba Institute of Computer Application
Networking
a) Switched LANs :-
The most common switched LAN is a switched Ethernet LAN, which
may consist of a single switch with a number of attached devices, or a number of
interconnected switches. Two other prominent examples are ATM LAN’s, which
simply use an ATM network in a local area, and Fibre Channel.
b) Wireless LANs :-
Wireless LAN use a variety of wireless transmission technologies and
organizations.
LAN is a group of computers and a network communication device
interconnected with a geographically limited area such as a building or a campus. A
computer communication technology is classified as a local area network if it
provides a way to interconnect multiple computers across short distance. Local area
networks are inexpensive, highly reliable and convenient to install and manage.
Local area network are characterized by following :
1. They transfer data at high speed (higher bandwidth).
2. They exist in a limited geographical area such as a building or campus.
3. The connecting lines linking more than one computer cover a small area upto
10 km. Thus data on network does not travel long distance.
4. If one computer connected to a LAN is down, other computers can still
communicate.
5. LAN permits sharing of data, hardware and software between all computers
connected to it.
The wide area network interconnects local area networks. A wide area
network can be located entirely within a state or a country. It can be interconnected
around the world. A way to build a network that connects multiple computers across
a large geographic distance called wide area network. Wide area network are
characterized by following :
1. They exist in an unlimited geographical area.
2. They usually interconnect multiple local area network.
3. They often transfer at low speed(lower bandwidth).
4. Connectivity and resources- Specially the transmission media usually
managed by a third particular such as a telephone or a cable company.
Wide area network can be further classified into two categories :-
a) Enterprise WAN
b) Global WAN
a) Enterprise WAN –
An enterprise WAN connects widely separated computer resources of
a single organization.
b) Global WAN -
A global WAN interconnects network of several corporation or
organization.
both private and public networks that provide high capacity at low costs over a large
area. A number of approaches have been implemented, including wireless networks
and metropolitan extensions to Ethernet.
The primary market for MANs is the customer that has high capacity
needs in a metropolitan area. A MAN is intended to provide the required capacity at
lower cost and greater efficiency than obtaining an equivalent service from the local
telephone company.
The term metropolitan is referred to as city i.e. it covers a city.
The best known example of a MAN is the cable television network available in
many cities. This system grew from earlier community antenna systems used in
areas with poor over-the-air television reception. In this early systems, a large
antenna was placed on top of a nearby hill and signal was then piped to the
subscribers’ houses.
Starting when the Internet attracted a mass audience, the cable TV
network operators began to realize that with some changes to the system, they could
provide two-way Internet service in unused parts of the spectrum. To a first
approximation, a MAN might look something like the system shown in fig. below.
In this figure we see both television signals and Internet being fed into the
centralized head end for subsequent distribution to people’s homes. This network
covers a large geographic area limited within a city or a town. It provides a
communication between different business house or bank branches located at
different area.
Characteristics :
1. The scope of network covers a large geographic area including different
branches of a particular bank in a metropolitan city.
2. Since it connect different location, the set up is comparatively complex as
compared to LAN.
3. It has ability to connect various LAN’s in the city.
PROTOCOLS
The networking protocol starts the communication process between
computers. A protocol is a set of rule created for the process of communication with
another computer or with an operating system. Protocol exists at several levels in
the OSI communication model. Network protocol govern the way actual
transmission is handled. In the world of networking and data communication,
different types of computer communicate with each other with the help of different
protocols.
A protocol is a set of rules or convention that govern the generation,
formatting, control and interpretation of information i.e. transmitted through a
network or i.e. stored in a database. Basically, a protocol defines what is
communicated, how it is send, when it is transmitted. Syntax, semantics, and timing
are the key protocol elements. Syntax describes the order structure or format of the
data.
Semantics refers to the meaning of a structured block of bits. Timing
describes when data should be send and at what rate.
REFERENCE MODELS :
There are two important network architectures :-
1) OSI reference model.
2) TCP/IP reference model.
The principles that were applied to arrive at these seven layers is summarized as
follows :
1. A layer should be created where a different abstraction is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow
across the interfaces.
5. The number of layers should be large enough that distinct functions need not
be thrown together in the same layer out of necessity and small enough that
the architecture does not become unwieldy.
Now, we will discuss each layer of the model in turn, starting at the bottom
layer. Actually, the OSI model itself is not a network architecture because it does
not specify the exact services and protocols to be used in each layer. It just tells
what each layer should do. However, ISO has also produced standards for all the
layers, although these are not part of the reference model itself. Each one has been
published as a separate international standard.
iv) How the initial connection is established and how it is torn down when both
sides are finished.
v) How many pins the network connector has and what each pin is used for.
The design issues here largely deal with mechanical, electrical, and timing
interfaces, and the physical transmission medium, which lies below the physical
layer.
The main task of the data link layer is to transform a raw transmission facility
into a line that appears free of undetected transmission errors to the network layer. It
accomplishes this task by having the sender break up the input data into data
frames (typically a few hundred or a few thousand bytes) and transmit the frame
sequentially. If the service is reliable, the receiver confirms correct receipt of each
frame by sending back an acknowledgement frame.
Another issue that arises in the data link layer(and most of the higher layers as
well) is how to keep a fast transmitter from drowning a slow receiver in data. Some
traffic regulation mechanism is often needed to led the transmitter know how much
buffer space the receiver has at the moment. Frequently, this low regulation and the
error handling are integrated.
Broadcast networks have an additional issue in the data link layer: how to
control access to the shared channel. A special sub layer of the data link layer, the
medium access control sub layer deals with this problem.
it is too large. The protocols may differ, and so on. It is up to the network layer to
overcome all these problems to allow heterogeneous networks to be interconnected.
In broadcast networks, the routine problem is simple, so the network layer is
often thin or even nonexistent.
conversation with a similar program on the destination machine, using the message
headers and control messages. In the lower layers, the protocols are between each
machine and its immediate neighbors, and not between the ultimate source and
destination machines, which may be separated by many routers. The difference
between layers one through three, which are chained, and layers four through seven,
which are end-to-end, is illustrated in above fig.
CONTENTS