Unit 1
Unit 1
Need of networks:
The following are the potential needs for computer networks.
File sharing: Networking of computers helps the network users to share data files.
Information exchange: To exchange data and information between different individual users, it is
necessary to interconnect the individual users’ computers.
Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard
drives etc. Without computer networks, device sharing is not possible .
Application sharing: Applications can be shared over the network, and this allows to implement
client/server applications
User communication: Networks allow users to communicate using e-mail, newsgroups, and video
conferencing etc.
Types of Network
Based on Scope/Area
Depending on geographical area covered by network
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3. WAN (Wide Area Network
• Advantages:
1. Provides fast data transfer rates and high-speed communication.
2. Easy to set up and manage.
3. Can be used to share peripheral devices such as printers and scanners.
4. Provides increased security and fault tolerance compared to WANs.
• Disadvantages:
1. Limited geographical coverage.
2. Limited scalability and may require significant infrastructure upgrades to accommodate growth.
May experience congestion and network performance issues with increased usage
• Applications:
1. LAN is used for school environment, offices, hospitals etc as it allows sharing of resources like sharing data,
scanners, printing and internet.
2. LAN serves users at home to access internet.
3. LAN’s are widely used in manufacturing industries where a central server coordinates the activities of other
machines.
4. High speed LANs are typically used to connect many slower networks together.
• Applications:
• Following are some of the uses of Metropolitan Area Network
1. University Campus
2. Airports
3. Public libraries
4. Hospitals
5. Different branches of schools and colleges
6. Cable Television
• Applications:
1. Satellite systems
2. Network providers
3. Companies and offices
1. Point-to-Point Connection
2. Multipoint Connection
1. Point-to-Point Connection
A point-to-point connection provides a dedicated link between two devices.
The entire capacity of the link is reserved for transmission between those two devices.
Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other
options such as microwave or satellite links are also possible.
Point to point network topology is considered to be one of the easiest and most conventional networks
topologies.
It is also the simplest to establish and understand.
Example: Point-to-Point connection between the remote control and Television for changing the channels.
Advantages
1. Cost-Effective
2. Scalability
3. Flexibility
4. Increased Efficiency
5. Simplified Management
6. Enhanced Collaboration
7. Improved Reliability:
8. Greater Access
9. Improved Security
Disadvantages
1. Limited Bandwidth
2. Security
3. Reliability
4. Latency
5. Complexity
6. Network Congestion
7. Limited Control
8. Interference
9. Limited Distance
1. Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a single
cable.
It is bi-directional.
It is a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet
connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc
Advantages:
It is the easiest network topology for connecting peripherals or computers in a linear fashion.
It works very efficiently well when there is a small network.
2. Star Topology
In Star Topology, all the devices are connected to a single hub through a cable.
This hub is the central node and all other nodes are connected to the central node.
The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same
time the hub can be intelligent known as an active hub.
Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers.
In Star Topology, many popular Ethernet LAN protocols are used as CD (Collision Detection), CSMA
(Carrier Sense Multiple Access), etc.
Advantages
If N devices are connected to each other in a star topology, then the number of cables required to
connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports required is
N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
In a Ring Topology, it forms a ring connecting devices with exactly two neighbouring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to
pass through 99 nodes to reach the 100th node.
Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data
Advantages
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Disadvantages
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole topology.
Less secure.
Applications:
The most common access method of ring topology is token passing.
Token passing: It is a network access method in which a token is passed from one node to
another node.
Token: It is a frame that circulates around the network
4. Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel.
In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic
Host Configuration Protocol), etc.
Advantages:
Communication is very fast between the nodes.
Mesh Topology is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
Provides security and privacy.
Disadvantages:
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of devices.
The cost of maintenance is high.
Applications:
A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels.
This topology is also used in military communication systems and aircraft navigation systems.
5. Tree Topology
This topology is the variation of the Star topology.
This topology has a hierarchical flow of data.
In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.
In this, the various secondary hubs are connected to the central hub which contains the repeater.
This data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or
from bottom to top i.e. devices to the secondary hub and then to the central hub.
It is a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
Advantages
It allows more devices to be attached to a single central hub thus it decreases the distance that is
travelled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Disadvantages
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
Applications
A common example of a tree topology is the hierarchy in a large organization.
At the top of the tree is the CEO, who is connected to the different departments or divisions (child
nodes) of the company.
Each department has its own hierarchy, with managers overseeing different teams (grandchild
nodes).
The team members (leaf nodes) are at the bottom of the hierarchy, connected to their respective
managers and departments.
What is Server?
• Server is a computer or device on a network that manages network sources.
• Server is main computer in which network operating system is loaded.
• Two types of server
1. Dedicated server
2. Non dedicated server
Dedicated server
• A Dedicated server is a server that is hosted by a company and only allows one client company to
access the server.
• The word "dedicated" comes from it being "dedicated" to the one client.
• No other clients are allowed to use it. A dedicated server is used to host applications and services.
• Advantages:
1. Response time is very fast
2. It cannot be used as individual computer
3. More reliable, more efficient and more secure.
• Disadvantages:
1. All data is stored on a single server, if server fails all data becomes unavailable.
2. Design, proper management and backup is essential
1. File server:
The central server in a computer network that is responsible for the storage and management of data
files is called a File Server.
In a File Server, users access a central storage space that acts as a medium to store the internal data
The users can share information over a network without having to physically transfer files.
The server administrator has given strict rules that which users have the access to the files. These rules
include opening, closing, adding, deleting, and editing a file.
Features of File Server:
3. Mail server
• Email today is a fundamental part of most organizations.
• The simplest approach is to use an online service for email services. This will work, but an alternative is
to deploy an email server on the network.
• This will manage all aspects of email - sending, receiving and storing emails
• It is similar to post office where mail is stored and sorted before being sent its final destination.
• Commonly used mail server include Microsoft exchange, Qmail, Exim and send mail
Advantages:
• 1. Each person can have their own business related inbox
• 2. Only authorized people can send or receive email
• 3. Spam can be filtered before cluttering up their inbox
• 4. Emails can be archived / stored to meet legal requirements that some companies have to adhere to.
• 5. Each inbox can be allocated a quota limit
• 6. Shared calendars can be set up
Disadvantages:
• 1. Email servers require technical expertise to manage
• 2. For a small organization, a remote email service may be more cost-effective
4. Proxy server
• A 'proxy' is a word meaning substitute or stand-in.
• Proxy server is computer that acts as a gateway between local network and internet within company
• Server receives clients requests and forwards them to other server
Prepared By: Department of Computer Engineering Page 13
Subject Name: Computer Networking Unit-1 Subject Code: 4340703
• Main function of proxy server are caching ,firewalling ,filtering and logging
• Security and performance are increases by proxy server.
Advantages:
1. Provides a fast internet experience
2. Reduces the bandwidth consumed over the internet link
3. Firewall can be set up to block unauthorized data packets
Disadvantages:
1. Can be tricky to set up
2. Not cost-effective for low bandwidth internet use
3. Must have an effective method of updating cached web pages otherwise clients are viewing out of
date pages.
5. Web server
• Web server is a type of hosting where Hyper Text Transfer Protocol (HTTP) is used to respond requests
made by the clients
• The response is shown in the form of a webpage.
• It is a must for the computers to have a web server programs whenever they are hosting websites
• Microsoft internet information server, Google web server, Apache are the popular examples for the web
servers
Advantages:
• It also delivers best insight in way HTTP communication.
• It is more control able and flexible.
• It is hold in protective infrastructure.
• Easy to handle all applications
• You have to permission to set up of customizes server as per your needs.
Disadvantages:
• It may be more expensive compare to use of electronic website hosting.
• Harder to customize hosting service
• Due to overwhelm of server at any time, it can get down your website.