Introduction To Computer Networking Concepts: 1. What Is A Network?
Introduction To Computer Networking Concepts: 1. What Is A Network?
Chapter 4
Introduction to computer Networking Concepts
1. What is a Network?
In the computer world, the term network describes two or more connected computers that can
share resources such as data, a printer, an Internet connection, applications, or a combination of
these.
The computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
1
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
Disadvantages of Networking
a. Computer viruses can easily be shared affecting badly the network performance and the
performance of the computers.
b. Difficult to secure information. Confidential documents (files) can be accessed without the
knowledge and permission of the owner.
3. Types of Networks
3.1. Based on the size, the Networks are classified into three types:
(a) Local Area Networks (LAN)
(b) Metropolitan Area Network (MAN)
(c) Wide Area Network (WAN)
a) Local Area Network
LAN and is a privately owned network that serves users within a single building as an
office, or a group of buildings close together as a college campus. It is small in size.
b) Metropolitan Area Network
MAN is a communication network covering a large geographic area when compared to
LAN, like a city or suburb. A MAN can support both data and voice, and might even be
related to the local cable television network. Cellular phone systems are also those
systems that come under this type of Network. A MAN is basically bigger version of a
LAN covering a group of nearby corporate offices in a city and might be either private or
public.
c) Wide Area Network
WAN is communication Network spanning a huge geographical area like a state, country
or a continent. It contains a collection of machines intended for running user (i.e.,
application) programs. The Internet links together hundreds of computer WANs.
WANS differ from LANS in the following ways:
WANs cover greater distance.
WAN speeds are slower.
WANs can be connected on demand or be permanently connected. LANs have
permanent connections between stations.
WANs can use public or private network transports. LANs typically use private
transports.
WANs can use either full- or half-duplex communications. LANs typically use half-
duplex communications.
3.2. Based on the relationship among the computers, we can categorize computer
networks as:
A. In peer-to-peer networks, all computers are equal - they are peers. Each computer can be a
client that requests resources and a server that provides resources upon request.
Peer-to-peer networks are characterized by the following:
Security is not centralized; each computer is responsible to check access rights for its
resources.
Network is not scalable; it is good only for a few number of computers (10).
Each user is responsible for local backup.
No specialized operating system is required; the operating systems used in standalone
computers like Windows NT 4.0 Workstation, Windows 95/98, Windows 2000 Pro, etc. are
sufficient.
2
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
3
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
4
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
5
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
A. Twisted-Pair Cable
Twisted pair cabling comes in two varieties: shielded and unshielded.
Unshielded Twisted Pair (UTP) Cable
UTP is the most popular and is generally the best option for school networks (See fig. 1).
6
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
follows a standard borrowed from the telephone industry. This standard designates which wire
goes with each pin inside the connector.
Fig. 2. RJ-45 connector
8
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
7. Networking Devices
2. Hub
A hub is the central device in a star topology. Most hubs are
simple multiport repeaters. That is, they receive a signal on one
port and repeat it to all other ports.
3. Repeaters
Since a signal loses strength as it passes along a cable, it is often necessary to boost the
signal with a device called a repeater. The repeater electrically amplifies the signal it receives
and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a
concentrator. They are used when the total length of your network cable exceeds the
standards set for the type of cable being used.
A good example of the use of repeaters would be in a local area
network using a star topology with unshielded twisted-pair cabling.
The length limit for unshielded twisted-pair cable is 100 meters. The
most common configuration is for each workstation to be connected by twisted-pair cable to
a multi-port active concentrator. The concentrator amplifies all the signals that pass through
it allowing for the total length of cable on the network to exceed the 100 meter limit.
4. Switch
A concentrator is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each
workstation to a central switch/hub. Most switches are active, that is they electrically amplify
the signal as it moves from one device to another.
Switches no longer broadcast network packets as hubs did in the past, they memorize
addressing of computers and send the information to the correct location directly. Switches
are:
a. Usually configured with 8, 12, or 24 RJ-45 ports
b. Often used in a star or star-wired ring topology
c. Sold with specialized software for port management
5. Bridges
A bridge is a device that allows you to segment a large network into two smaller, more
efficient networks. If you are adding to an older wiring scheme and want the new network to
be up-to-date, a bridge can connect the two. The main reason for putting a bridge in a
network is to connect two segments together, or to divide a busy network into two segments.
9
Prepared by @WSU_SoI,2017
Data Communications and Computer Networking Chapter-4
A bridge monitors the information traffic on both sides of the network so that it can pass
packets of information to the correct location. Most bridges can "listen" to the network and
automatically figure out the address of each computer on both sides of the bridge. The bridge
can inspect each message and, if necessary, broadcast it on the other side of the network.
The bridge manages the traffic to maintain optimum performance on both sides of the
network. You might say that the bridge is like a traffic cop at a busy intersection during rush
hour. It keeps information flowing on both sides of the network, but it does not allow
unnecessary traffic through.
6. Router
A router translates information from one network to another; it is similar to a super-
intelligent bridge. Routers select the best path to route a message, based on the destination
address and origin. The router can direct traffic to prevent head-on collisions, and is smart
enough to know when to direct traffic along back roads and shortcuts.
While bridges know the addresses of all computers on each side of the network, routers
know the addresses of computers, bridges, and other routers on the network. Routers can
even "listen" to the entire network to determine which sections are busiest -- they can then
redirect data around those sections until they clear up.
If you have a school LAN that you want to connect to the Internet, you will need to purchase
a router. In this case, the router serves as the translator between the information on your
LAN and the Internet. It also determines the best route to send the data over the Internet.
Routers can:
Direct signal traffic efficiently
Route messages between any two protocols
Route messages between linear bus, star, and ring topologies
Route messages across fiber optic, coaxial, and twisted-pair cabling
7. MODEM
A modem is a device that changes digital data into an analog form for transmission over an
analog medium and then back to digital again at the receiving end. The term “modem” is
actually an acronym that stands for MOdulator/DEModulator.
8. Transmission Protocols
Protocols are suits or standards or languages of communication. Protocols include the
rules for communication, packet size, addressing, and ability to be routed. Computers on
network can’t communicate unless they use same protocol.
Examples of protocols include:
TCP/IP (Transmission Control Protocol/Internet Protocol),
NetBEUI (Net Bios Extended User Interface), and
IPX/SPX (Internet Packet Exchange/Sequential Exchange)
10
Prepared by @WSU_SoI,2017