Mba It
Mba It
Networking
What is Networking ?
Definition
• In the world of computers, networking is the
practice of linking two or more computing
devices together for the purpose of sharing
data and other resources. Networks are built
with a mix of computer h/w and computer
s/w.
Concept of Network
• What is network ?
A generic term “network” refers to a group of
entities (people , objects, etc.) which are
connected to one another. A network,
therefore, allows material or immaterial
elements to be circulated among all of these
entities, based on well defined rules.
• Network : A group of computers and
peripheral devices connected to each other.
Note that the smallest possible network is two
computers, connected together.
Server
Advantages & Disadvantages of Linear Bus
Topology
Advantages of a Linear Bus Topology
• Easy to connect a computer or peripheral to a linear bus.
• Requires less cable length than a star topology.
Disadvantages of a Linear Bus Topology
• Entire network shuts down if there is a break in the main cable.
• Terminators are required at both ends of the backbone cable.
• Difficult to identify the problem if the entire network shuts
down.
• Not meant to be used as a stand-alone solution in a large
building.
2.Star Topology
• A star topology is designed with each node
(machines) connected directly to a central
network hub, switches or server.
Advantages & Disadvantages of Star
Topologies
Advantages of a Star Topology
• Easy to install and wire.
• No disruptions to the network when connecting or removing
devices.
• Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
• Requires more cable length than a linear topology.
• If the hub, switch, or concentrator fails, nodes attached are
disabled.
• More expensive than linear bus topologies because of the cost
of the hubs, etc
Tree or Expanded Star
Hub,
Routers
A network topology is the way in which hardware devices and cables are connected. A
hybrid topology (sometimes called a mesh or mixed topology) connects network
components by combining the features of two or more other topologies (such as star,
bus, ring and token-ring). The resulting hybrid topology exhibits features (and
limitations) of its comprising network components. Examples of hybrid topologies
include the star-wired ring and star-wired bus
Advantages & Disadvantages of Hybrid
Technology
Advantages of a Hybrid Topology
• It provides a better result by it.
• It can be designed in many ways for various
purposes.
Disadvantages of Hybrid Topology
• It is costly.
• Difficult to identify the problem if the entire
network shuts down.
Mesh Topology
Nodes
•A switch that also performs routing operations. Usually a switch operates at layer 2 (the Data
Link layer) of the OSI Reference Model while routers operate at layer 3 (the Network layer).
Routing switches, however, perform many of the layer 3 functions usually reserved for routers.
And because the routing is implemented in hardware rather than software, it is faster. The
downside of routing switches is that they are not as powerful or as flexible as full-fledged
routers. Because they perform some layer 3 functions, routing switches are sometimes called
layer-3 switches.
Routers
• A device that forwards data packets along networks. A
router is connected to at least two networks,
commonly two LANs or WANs or a LAN and its ISP’s
network. Routers are located at gateways, the places
where two or more networks connect. Routers use
headers and forwarding tables to determine the best
path for forwarding the packets, and they use
protocols such as ICMP to communicate with each
other and configure the best route between any two
hosts.
• Very little filtering of data is done through routers.
Gateway
• A network gateway is an internetworking system capable of
joining together two networks that use different base
protocols(configuration of s/w & h/w). A network gateway
can be implemented completely in software, completely in
hardware, or as a combination of both. Depending on the
types of protocols they support, network gateways can
operate at any level of the OSI Model.
• This device that converts one protocol or format to another.
A network gateway converts packets from one protocol to
another. An application gateway converts commands and/or
data from one format to another. An e-mail gateway
converts messages from one mail format to another
Uses of Network
• There are three most common benefits of using
LAN :
1) Increased efficiency,
2) Improved communications,
3) Lowered Costs.
• LAN’s increase the efficiency of workers by letting
exchange data and by eliminating redundant
effort. The most common means of sharing
information on LAN is the corporate database.
Corporate commonly have several
departments performing different tasks, but
the departments generally working with the
same type of information:
- File sharing i.e. sharing the same info or data.
- Improves communications having own mail server.
- Lowers the cost of stationeries & labors .
- Quicker than manual.
- Examples : Education system, Online shopping
websites, production company etc.
Types of Area Network
• LAN : A local area network (LAN) supplies
networking capability to a group of computers
in close proximity to each other such as in an
office building, a school, or a home. A LAN is
useful for sharing resources like files, printers,
games or other applications. A LAN in turn
often connects to other LANs, and to the
Internet or other WAN.
• MAN : A metropolitan area network (MAN) is
a large computer network that spans a
metropolitan area or campus. Its geographic
scope falls between a WAN and LAN. MANs
provide Internet connectivity for LANs in a
metropolitan region, and connect them to
wider area networks like the Internet.
WAN: A wide area network (WAN) is a
telecommunications network, usually used for
connecting computers, that spans a wide
geographical area. WANs can by used to connect
cities, states, or even countries. WANs are often
used by larger corporations or organizations to
facilitate the exchange of data, and in a wide
variety of industries, corporations with facilities
at multiple locations have embraced WANs.
Increasingly, however, even small businesses are
utilizing WANs as a way of increasing their
communications capabilities.
TCP/IP Model & OSI Reference Layers
TCP/IP Model OSI Model TCP/IP Model
(Before OSI)(in CUI) (when GUI came in network) (in GUI)
1. Application 1.Application Layer 1.Application
2. Transportation 2.Presentation Layer 2.Transportation
3. Network 3.Session Layer 3.Internet
4. Data Link 4.Transport Layer 4.Point-to-Point
5. Physical 5.Network Layer (Host – to - network)
6.Data Link Layer
7.Physical Layer
Protocols along with OSI Layers
OSI Layers Protocols
1. Application
2. Presentation Layer HTTP, FTP, SMTP,MIME,POP3,IMAP
3. Session Layer
4. Transport TCP UDP
5. Network Layer
6. Data Link Layer IP
7. Physical Layer
Protocols on Computer Network
1)HTTP : HTTP is an application protocol which
defines how files on the world wide web are
transferred. HTTP is the framework for how
browsers will display and use file formats.
When you enter in a URL with HTTP at the
beginning, you are requesting a web page
which can contain other elements (such as
pictures) and links to other resources.
2) FTP: File Transfer Protocol (FTP), a standard
Internet protocol, is the simplest way to
exchange files between computers on the
Internet. Like the Hypertext Transfer Protocol
(HTTP), which transfers displayable Web pages
and related files, and the Simple Mail Transfer
Protocol (SMTP), which transfers e-mail.
3) Telnet : Telecommunication network- This
protocol is used for remote login. Through this
protocol one can control the other machine
(computer) from a far distance(remote).
4) SMTP: Simple Mail Transfer Protocols –As the name says ,
this protocol is used specifically for simple text format e-
mails. In case of special effects like attached files of
pictures, multimedia files then this protocol uses MIME.
5) MIME : Multi-Purpose Mail Extension – Through this
protocol all the other multi-media files are being
transferred by e-mail used by SMTP.
6) POP3 : Post office Protocol – For e.g. Outlook Express
mails or IMAP (Internet Mail Access Point). These two
protocols are used for secure office purposes in
exchanging some business information between two
organizations. These two is being utilized by SMPT.
7) TCP : Transmission Control Protocol – Protocol which ‘controls’ the
transmission of data / info. on the computer network . Through this
protocol data are being transmitted in frames from source and
acknowledgement of each frame is received properly to the
destination. If either frame is corrupted or contains any errors
while transmission then it is rectified through error control (check)
methods or that frame is resend . TCP is used in sending &
receiving critical and sensitive data and information within or
outside organization for serious business purposes . This is also why
TCP is known as connection –oriented protocol/services.
8) UDP : User Datagram Protocol – When huge data/information are
to be transmitted via computer network then instead of TCP UDP is
used. For e.g. audio/video files which needs no acknowledgement
to sender nor any error check control methods for repairing on
frames to retransmit . Because of this it is know as connectionless
protocol.
9) IP : Internet Protocols- Two most important
rules & regulations of this protocols are first
IP addresses through which source and
destination are recognized among whom data
has to be transmitted(exchanged) either wired
or wireless.
Physical layer
• Physical layer defines the means of transmitting
raw bits rather than logical data packets over a
physical link connecting network nodes. The bit
stream may be grouped into code words or
symbols and converted to a physical signal that
is transmission medium. The physical layer
provides an electrical , mechanical and
procedural interface to the transmission
medium.
The Transmission Medium
• Magnetic Tape
• Twisted Pair
• Coaxial Cable
• Fiber Optic
1.Magnetic Tape
• Magnetic Tape is a thin tape to which one can
record or store information such as audio, video
and data from the computer. It is an external
storage device (backup) usually for both readable
and writable, consisting of a loop of flexible
celluloid like material that can store data in the
form of tiny magnetic fields that can only be
accessed. A drawback of that it can only be
accessed by starting at the beginning and rolling
through the tape until the desired data is located.
2. Twisted Pair
• Twisted pair is the ordinary copper wire that
connects home and many business computer to the
telephone company. To reduce crosstalk or
electromagnetic induction between pairs of wires,
two insulated copper wires are twisted around each
other. For some business locations, twisted pair is
enclosed in a shield that functions as a secure
(shielded them electromagnetic interferences). This
is known as shielded twisted pair (STP). Ordinary
wire is unshielded twisted pair(UTP).
3.Coaxial Cable
• Coaxial Cable is a copper wire in the center of
a cable which is surrounded by insulation and
then a grounded shield of braided wire. The
shield minimizes electrical & radio frequency
interference. Primary use was started by the
cable television industry than widely used in
computer network. Lesser susceptible of
interference but can carry much more data
than twisted pair.
4.Fiber Optic
• A technology that uses glass (or plastics)
threads(fibers) to transmit data. A fiber optic
cable consists of a bundle of glass threads ,
each of which is capable of transmitting
messages modulated into light waves.