Computer Networking: Submitted by
Computer Networking: Submitted by
Computer Networking: Submitted by
Networking
Submitted By:
Computer Networking
Table of Contents
Introduction................................................................................................................................1
Advantages & Disadvantages of Computer Networking.......................................................2
Components of a Network.........................................................................................................4
Types of Networks.....................................................................................................................7
1. LAN - Local Area Network............................................................................................7
2. WAN - Wide Area Network...........................................................................................7
Difference between Local Area Network (LAN) & Wide Area Network (WAN)............8
1. Peer-to-peer networks.....................................................................................................9
2. Client/server networks....................................................................................................9
Difference between Peer-to-Peer Network & Client/Server Network.............................10
I. Topology.......................................................................................................................11
1. Bus topology..........................................................................................................11
2. Ring topology........................................................................................................11
3. Star topology..........................................................................................................12
II. Protocol......................................................................................................................13
Common types of protocols:................................................................................................13
III. Architecture...............................................................................................................14
Wireless Networks...................................................................................................................15
Advantages & Disadvantages of WLAN.............................................................................16
Introduction
A computer network, often simply referred to as a network, is a collection of computers and
devices connected by communications channels that facilitates communications among users
and allows users to share resources with other users. Networks may be classified according to a
wide variety of characteristics. A computer network allows sharing of resources and
information among devices connected to the network.
Facilitating Communications
Using a network, people can communicate efficiently and easily via e-mail,
instant messaging, chat rooms, telephone, video telephone calls, and video
conferencing.
Sharing Hardware
In a networked environment, each computer on a network can access and use
hardware on the network. Suppose several personal computers on a network each
require the use of a laser printer. If the personal computers and a laser printer are
connected to a network, each user can then access the laser printer on the
network, as they need it.
Sharing files, data and information
In a network environment, any authorized user can access data and information
stored on other computers on the network. The capability of providing access to
data and information on shared storage devices is an important feature of many
networks.
Sharing Software
Users connected to a network can access application programs on the network.
Fig 1 gives an example of a network in a school comprising of a local area network or LAN
connecting computers with each other, the internet, and various servers.
Other users,
computers
1
Computer Networking
File Sharing: The major advantage of a computer network is that is allows file
sharing and remote file access. A person sitting at one workstation of a
network can easily see the files present on the other workstation, provided he
is authorized to do so. It saves the time which is wasted in copying a file from
one system to another, by using a storage device. In addition to that, many
people can access or update the information stored in a database, making it up-
to-date and accurate.
Increased Cost Efficiency: There are many softwares available in the market
which are costly and take time for installation. Computer networks resolve this
issue as the software can be stored or installed on a system or a server and can
be used by the different workstations.
2
Computer Networking
Expensive Set Up: The initial set up cost of a computer network can be high
depending on the number of computers to be connected. Costly devices like
routers, switches, hubs, etc., can add up to the bills of a person trying to install
a computer network. He will also have to buy NICs (Network Interface Cards)
for each of the workstations, in case they are not inbuilt.
Dependency on the Main File Server: In case the main File Server of a
computer network breaks down, the system becomes useless. In case of big
networks, the File Server should be a powerful computer, which often makes it
expensive.
3
Computer Networking
Components of a Network
Structured Cabling
The two most popular types of structured network cabling are twisted-pair (also known as
10BaseT) and thin coax (also known as 10Base2). 10BaseT cabling looks like ordinary
telephone wire, except that it has 8 wires inside instead of 4. Thin coax looks like the copper
coaxial cabling that's often used to connect a Video Recorder to a TV.
10BaseT Cabling
When 10BaseT cabling is used, a strand of cabling is inserted between each computer and a
hub. If you have 5 computers, you'll need 5 cables. Each cable cannot exceed 325 feet in
length. Because the cables from all of the PCs converge at a common point, a 10BaseT
network forms a star configuration.
Fig 4a shows a Cat5e cable, with a standard connector, known as an RJ-45 connector.
Fig 4b shows a standard Cat5e Wall Outlet socket which the cables are connected to.
Fig 4c shows a standard Cat5e Patch Panel Wall Outlet socket which is used to terminate the
cables from various points in the school bank to a central point.
Fig 4d shows a wall mounted cabinet used to house and protect patch panel cables and
connectors.
4
Computer Networking
10BaseT cabling is available in different grades or categories. Some grades, or "cats", are
required for Fast Ethernet networks, while others are perfectly acceptable for standard
10Mbps networks--and less expensive, too. All new networks use a minimum of standard
unshielded twisted-pair (UTP) Category 5e 10BaseT cabling because it offers a performance
advantage over lower grades.
5
Computer Networking
way of building today's networks. With switching, each connection gets "dedicated
bandwidth" and can operate at full speed. In contrast, a hub shares bandwidth across multiple
connections such that activity from one PC or server can slow down the effective speed of
other connections on the hub.
Now more affordable than ever, Dual-speed 10/100 autosensing switches are recommended
for all school networks. Schools may want to consider upgrading any hub based networks
with switches to improve network performance – i.e. speed of data on the network.
6
Computer Networking
Types of Networks
There are many categories under which networks can be classified into.
The following types of network are categorized on the basis of the number of systems or
devices that are under the networked area:
A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one
building will contain a few small LANs (perhaps one per room), and occasionally a
LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often
but not always implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled,
and managed by a single person or organization. They also tend to use certain
connectivity technologies, primarily Ethernet and Token Ring.
As the term implies, a WAN spans a large physical distance. The Internet is the
largest WAN, spanning the Earth.
A WAN differs from a LAN in several important ways. Most WANs (like the
Internet) are not owned by any one organization but rather exist under collective or
distributed ownership and management. WANs tend to use technology like ATM,
Frame Relay and X.25 for connectivity over the longer distances.
7
Computer Networking
Difference between Local Area Network (LAN) & Wide Area Network (WAN)
8
Computer Networking
When a group of two or more computers are linked together, they can broadly be classified
into two types of networks:
1. Peer-to-peer networks are more commonly implemented where less then ten
computers are involved and where strict security is not necessary. All computers have
the same status, hence the term 'peer', and they communicate with each other on an
equal footing. Files, such as word processing or spreadsheet documents, can be shared
across the network and all the computers on the network can share devices, such as
printers or scanners, which are connected to any one computer.
Peer to Peer
Network
File Server
Other equipment
9
Computer Networking
10
Computer Networking
In addition to these types, the following characteristics are also used to categorize different
types of networks:
I. Topology
The shape of a local-area network (LAN) or other communications system is known as its
topology. There are three principal topologies used in LANs:-
1. Bus topology: All devices are connected to a central cable, called the bus or
backbone. Bus networks are relatively inexpensive and easy to install for small
networks. Ethernet systems use a bus topology.
Difficult to administer/troubleshoot
Limited cable length and number of stations
A cable break can disable the entire network; no redundancy
Maintenance costs may be higher in the long run
Performance degrades as additional computers are added
2. Ring topology: All devices are connected to one another in the shape of a closed
loop, so that each device is connected directly to two other devices, one on either side
of it. Ring topologies are relatively expensive and difficult to install, but they offer
high bandwidth and can span large distances.
11
Computer Networking
3. Star topology: All devices are connected to a central hub. Star networks are
relatively easy to install and manage, but bottlenecks can occur because all data must
pass through the hub.
12
Computer Networking
These topologies can also be mixed. For example, a bus-star network consists of a high-
bandwidth bus, called the backbone, which connects a collection of slower-bandwidth star
segments.
II. Protocol
An agreed-upon format for transmitting data between two devices. The protocol
determines the following:
i. The type of error checking to be used data compression method,
ii. If any how the sending device will indicate that it has finished sending a
message
iii. How the receiving device will indicate that it has received a message.
There are a variety of standard protocols from which programmers can choose. Each
has particular advantages and disadvantages; for example, some are simpler than
others, some are more reliable, and some are faster.
From a user's point of view, the only interesting aspect about protocols is that your
computer or device must support the right ones if you want to communicate with
other computers. The protocol can be implemented either in hardware or in software.
Internet Protocol
Transmission Control Protocol
Hypertext Transfer Protocol
Post Office Protocol
File Transfer Protocol
Importance of Protocol
The protocols in human communication are separate rules about appearance, speaking,
listening and understanding. All these rules, also called protocols of conversation, represent
different layers of communication. They work together to help people successfully
communicate. The need for protocols also applies to network devices. Computers have no
way of learning protocols, so network engineers have written rules for communication that
must be strictly followed for successful host-to-host communication. These rules apply to
different layers of sophistication such as which physical connections to use, how hosts listen,
13
Computer Networking
how to interrupt, how to say good-bye, and in short how to communicate, what language to
use and many others. These rules, or protocols, that work together to ensure successful
communication are grouped into what is known as a protocol suite.
III. Architecture
The term architecture can refer to either hardware or software, or to a combination of
hardware and software. The architecture of a system always defines its broad outlines, and
may define precise mechanisms as well.
An open architecture allows the system to be connected easily to devices and programs made
by other manufacturers. Open architectures use off-the-shelf components and conform to
approved standards. A system with a closed architecture, on the other hand, is one whose
design is proprietary, making it difficult to connect the system to other systems.
14
Computer Networking
The difference between a topology and an architecture. A topology is concerned with the
physical arrangement of the network components. In contrast, an architecture addresses the
components themselves and how a system is structured (cable access methods, lower level
protocols, topology, etc.). An example of an architecture is 10baseT Ethernet which typically
uses the start topology.
Wireless Networks
The term 'wireless network' refers to two or more computers communicating using standard
network rules or protocols, but without the use of cabling to connect the computers together.
Instead, the computers use wireless radio signals to send information from one to the other. A
wireless local area network (WLAN) consists of two key components: an access point (also
called a base station) and a wireless card. Information can be transmitted between these two
components as long as they are fairly close together (up to 100 metres indoors or 350 metres
outdoors).
Suppliers would need to visit the schools and conduct a site survey. This will determine the
number of base stations you need and the best place(s) to locate them. A site survey will also
enable each supplier to provide you with a detailed quote. It is important to contact a number
of different suppliers as prices, equipment and opinions may vary. When the term 'wireless
network' is used today, it usually refers to a wireless local area network or WLAN. A WLAN
can be installed as the sole network in a school or building. However, it can also be used to
extend an existing wired network to areas where wiring would be too difficult or too
expensive to implement, or to areas located away from the main network or main building.
Wireless networks can be configured to provide the same network functionality as wired
networks, ranging from simple peer-to-peer configurations to large-scale networks
accommodating hundreds of users.
15
Computer Networking
Fig 7b: Desktop PC Wireless LAN card Fig 7c: Laptop PC Wireless LAN card
Wireless LANs have advantages and disadvantages when compared with wired LANs. A
wireless LAN will make it simple to add or move workstations, and to install access points to
provide connectivity in areas where it is difficult to lay cable. Temporary or semi-permanent
buildings that are in range of an access point can be wirelessly connected to a LAN to give
these buildings connectivity. Where computer labs are used in schools, the computers
(laptops) could be put on a mobile cart and wheeled from classroom to classroom, providing
they are in range of access points. Wired network points would be needed for each of the
access points.
Installation can be fast and easy and can eliminate the need to pull cable through walls
and ceilings
Access to the network can be from anywhere in the school within range of an access
point
Where laptops are used, the ‘computer suite’ can be moved from classroom to
classroom on mobile carts
While the initial investment required for wireless LAN hardware can be similar to the
cost of wired LAN hardware, installation expenses can be significantly lower
Where a school is located on more than one site (such as on two sides of a road), it is
possible with directional antennae, to avoid digging trenches under roads to connect
the sites
16
Computer Networking
They allows the possibility of individual pupil allocation of wireless devices that
move around the school with the pupil.
Lower wireless bandwidth means some applications such as video streaming will be
more effective on a wired LAN
Devices will only operate at a limited distance from an access point, with the distance
determined by the standard used and buildings and other obstacles between the access
point and the user
Long-term cost benefits are harder to achieve in static environments that require few
moves and changes
It is easier to make a wired network ‘future proof’ for high data transfer.
17
Computer Networking
Cost
The network version of most software programs are available at considerable savings when
compared to buying individually licensed copies. Besides monetary savings, sharing a program
on a network allows for easier upgrading of the program. The changes have to be done only once,
on the file server, instead of on all the individual workstations.
Resource Sharing
Sharing resources is another area in which a network exceeds stand-alone computers. Most
schools cannot afford enough laser printers, fax machines, modems, scanners, and CD-ROM
players for each computer. However, if these or similar peripherals are added to a network, they
can be shared by many users.
Flexible Access
School networks allow students to access their files from computers throughout the school.
Students can begin an assignment in their classroom, save part of it on a public access area of the
network, then go to the media center after school to finish their work. Students can also work
cooperatively through the network.
Security
Files and programs on a network can be designated as "copy inhibit," so that you do not have to
worry about illegal copying of programs. Also, passwords can be established for specific
directories to restrict access to authorized users.
18
Computer Networking
19