Computer Networks Topic
Computer Networks Topic
NETWORKS
Properties
Computer networks:
1. Facilitate communications
Using a network, people can communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls, and video conferencing.
2. Permit sharing of files, data, and other types of information
In a network environment, authorized users may access data and information stored on
other computers on the network. The capability of providing access to data and
information on shared storage devices is an important feature of many networks.
3. Share network and computing resources
In a networked environment, each computer on a network may access and use resources
provided by devices on the network, such as printing a document on a shared network
printer. Distributed computing uses computing resources across a network to accomplish
tasks.
4. May be insecure
[email protected] 157
ADVANCED COMPUTER APPLICATIONS
A computer network may be used by computer hackers to deploy computer viruses or
computer worms on devices connected to the network, or to prevent these devices from
normally accessing the network (denial of service).
5. May interfere with other technologies
Power line communication strongly disturbs certain forms of radio communication, e.g.,
amateur radio. It may also interfere with last mile access technologies such as ADSL and
VDSL.
6. May be difficult to set up
A complex computer network may be difficult to set up. It may also be very costly to set
up an effective computer network in a large organization or company.
NETWORK TOPOLOGIES
A network topology is the arrangement of elements (such as data links or nodes) in a network. It
is the physical arrangement of terminals in a local area network. The choice of topology is
dependent upon
A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one
port, it is copied to the other ports so that all segments of the LAN can see all packets. A
passive hub serves simply as a conduit for the data, enabling it to go from one device (or
segment) to another. ...
Node – a terminal point in a communications network.
Workstation – A computer terminal or micro- or minicomputer system designed to
support the work of one person.
MESH TOPOLOGY
[email protected] 158
ADVANCED COMPUTER APPLICATIONS
In Other topologies like star and bus, messages are usually broadcasted to every computer,
especially in bus topology.
Similarly in the Ring topology message can travel in only one direction i.e clockwise or
anticlockwise.
[email protected] 159
ADVANCED COMPUTER APPLICATIONS
STAR TOPOLOGY
[email protected] 160
ADVANCED COMPUTER APPLICATIONS
Advantages of star topology
All traffic between two nodes passes through the central node. If the central component
breaks down, the whole network is down.
The number of ports of the central component limits the number of connected nodes.
Costs are usually higher than with bus or ring networks
If you have only one central device and it fails, it brings the network down
A star topology requires a lot of cabling since all data path connections must be to the central
node.
There is no direct communication between or among workstations
Sharing of processor delays in the processing of jobs.
BUS/LINEAR TOPOLOGY
[email protected] 161
ADVANCED COMPUTER APPLICATIONS
Though it is preferable to use the last terms for connections with a
mainframe/minicomputer as in the following diagram.
In a bus messages travel in both directions and do not go through the individual nodes but
every node can hear each message as it goes past.
When the signal/message reaches an end of the bus, a terminator absorbs it, to keep it
from traveling back again along the bus line, to avoid interference with other messages
already in the line.
The data/signals/messages are transmitted in packets along the bus.
Each packet is send with a receiver identification code that is an address of destination
and all computers on the network are permanently on the alert for any messages coming
to them.
When a node breaks down, the network does not break down.
A bus uses relatively less cables compared to other topologies
Direct communication due to direct connection.
Fast processing since there is no Host computer
Once a cable has been laid down any new equipment can easily be connected to the
network by a simple tapping into the cable.
Easy to install
Costs are usually low
Easy to add systems to network
Great for small networks
In a bus topology it is not always easy to add a node. [E.g. installation of extra tap in
thick Ethernet].
Diagnosis/trouble shooting can be difficult.
Expensive to run [several processors] – Detectors.
Communication between components of the network traveling in opposite direction along
the bus can collide causing loss of transmitted information.
Because of this collision a detection system has to be present to control the re-
transmission of lost information thereby making it a more expensive option
Out-of-date technology
If cable breaks, whole network is down
Can be difficult to troubleshoot
Unmanageable in a large network
If a malicious user were on this network and utilized a packet capture program, he could
see every conversation that occurred between machines.
[email protected] 162
ADVANCED COMPUTER APPLICATIONS
RING NETWORK
A ring network has nodes connected in a circular way.
Each node has two neighboring nodes
Data flow is unidirectional.
A message is forwarded in one direction until it reaches the destination with intermediate
nodes acting as relay [store & forward] units.
The destination node copies the message and passes the message again to the ring.
This message then continues to circulate around the ring back to the source.
A network topology in the form of a closed loop or circle. Each node in the network is
connected to the next, and messages move in one direction around the system. When a
message arrives at a node, the node examines the address information in the message. If the
address matches the node's address, the message is accepted; otherwise the node regenerates
the signal and places the message back on the network for the next node in the system. ...
The message return provides the source with a form of acknowledgement. The node
removes its own message from the ring.
Little cabling needed compared to Star.
Each node acts as relay unit.
Packet collisions do not occur because information is traveling in one direction.
[email protected] 163
ADVANCED COMPUTER APPLICATIONS
Relatively cheap to install.
Efficient and accurate means of communication.
There is no dependency on the host computer or file server as each node controls
transmission to and from itself.
When the load on the network increases, its performance is better than that of Bus
topology.
There is no need for network server to control the connectivity between workstations.
Additional components do not affect the performance of network.
Each computer has equal access to resource.
Token ring technology reduces the need of server or central hub to manage the
workstations.
The message return provides the source with a form of acknowledgement. The node
removes its own message from the ring.
Little cabling needed compared to Star.
Each node acts as relay unit.
Packet collisions do not occur because information is traveling in one direction.
Relatively cheap to install.
Efficient and accurate means of communication.
There is no dependency on the host computer or file server as each node controls
transmission to and from itself.
TREE TOPOLOGY
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently.
This topology imitates as extended Star topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network.
Mainly in LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached.
The middle layer is known as distribution layer, which works as mediator between upper
layer and lower layer.
The highest layer is known as core layer, and is central point of the network, i.e. root of
the tree from which all nodes fork.
All neighboring hosts have point-to-point connection between them.
[email protected] 164
ADVANCED COMPUTER APPLICATIONS
Similar to the Bus topology, if the root goes down, then the entire network suffers even
though it is not the single point of failure.
Every connection serves as point of failure, failing of which divides the network into
unreachable segment.
[email protected] 165
ADVANCED COMPUTER APPLICATIONS
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails, network fails.
Tree Topology
HYBRID TOPOLOGY
A network structure whose design contains more than one topology is said to be hybrid
topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
The diagram below represents an arbitrarily hybrid topology.
The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain
topologies.
Most WANs are connected by means of Dual-Ring topology and networks connected to
them are mostly Star topology networks.
Internet is the best example of largest Hybrid topology
[email protected] 166
ADVANCED COMPUTER APPLICATIONS
1. Complex in design.
2. Costly.
[email protected] 167
ADVANCED COMPUTER APPLICATIONS
[email protected] 168
ADVANCED COMPUTER APPLICATIONS
[email protected] 169
ADVANCED COMPUTER APPLICATIONS
[email protected] 170
ADVANCED COMPUTER APPLICATIONS
In a virtual area network, different switches of LAN are logically connected to each other to make
the single switch. This type of network is used to logically differentiate and limit the different
level of computers. For example, there are different departments in the office like the accounting
department, support department, and administrative department. All the computers of these
departments are logically connected to the same switch but one department computer cannot
access another department computer. So same department computers can communicate with each
other but different department computers cannot communicate with each other.
Sharing of resources:
All the resources are attached to one network and if any computer needs any resources then it can
be shared with the required computer. Types of resources are the DVD drive, printers, scanners,
modems and hard drives. So there is no need to purchase separate resources for each computer
and it saves money.
All the data from attached computers can be stored in one server. If any computer (Client) needs
data then that computer user can simply log in and access the data from the server. For example
movies and songs can be stored on the server and can be accessed by any authorized user (Client
computer).
In offices and net cafes, we can see that one internet connection is shared between all computers.
This is also the type of LAN technology in which main internet cable is attached to one server
and distributed amoung attached computers by the operating system.
Software programs can also be shared on the LAN. You can use single licensed software and any
user can use it in the network. It is expensive to buy a license for each user in the network so
sharing software program is easy and cost-effective.
Securing of data:
Keeping data on the server is more secure. And if you want to change or remove any data you can
do it easily on one server computer and other computers can access updated data. You can also
give access or revoke access to specific users so that only authorized users can access the data in
the network.
[email protected] 171
ADVANCED COMPUTER APPLICATIONS
Communication is easy, fast, and time-saving:
In LAN computers can exchange data and messages in the easy and fast way. It also saves time
and makes our work fast. Every user can share messages and data with any other user on LAN.
The user can log in from any computer on the network and access the same data placed on the
server.
Computer identification:
Each computer is given a MAC address and is temporarily stored in the switch or router during
communication. All computers on the LAN are identified by MAC addresses which are used to
send and receive messages and data. Note that MAC address is stored in the network adapter that
is attached in the motherboard of each computer. In old computers, network adapters were not
built in with motherboards but in modern computers, they come built-in with motherboards.
If the server computer is not set up correctly and there is a leak in security then unauthorized
users can access the data also. So there should be privacy policy and rules set up correctly on the
server.
Limitation of distance:
Local area networks are usually made within a building or nearby building and cannot extend to
the wider area.
If any file on the server is corrupted or hard drive fails then all the attached computers face
problems in functioning properly.
It is expensive to set up LAN because there is special software required to make a server. Also,
communication devices like hubs, switches, routers, cables are costly. The special administrator is
required to maintain and troubleshoot LAN for a large office.
[email protected] 172
ADVANCED COMPUTER APPLICATIONS
Wide area network (WAN) is a type of network that provides transmission of voice, data,
images, and videos over the large geographical area. WAN is made with the
combinations of LAN and MAN. The transmission of data is carried out with the help of
hubs, switches, fiber optics, modem, and routers. To transfer data from any computer
over the internet we use some technologies including:
[email protected] 173
ADVANCED COMPUTER APPLICATIONS
[email protected] 174
ADVANCED COMPUTER APPLICATIONS
Wide
area network (WAN) diagram
Centralized data:
Your company doesn’t need to buy email, files, and backup servers, they can all reside on
head office. All office branches can share the data through the head office server. You
can get back up, support, and other useful data from the head office and all data are
synchronized with all other office branches.
[email protected] 175
ADVANCED COMPUTER APPLICATIONS
Software companies work over the live server to exchange updated files. So all the coders
and office staff get updated version of files within seconds.
Global business:
Now everyone with computer skills can do business on the internet and expand his
business globally. There are many types of business like a shopping cart, sale, and
purchase of stocks etc.
High bandwidth:
If you get leased lines for your company then it gives high bandwidth than normal
broadband connection. You can get a high data transfer rate that can increase your
company productivity.
[email protected] 176
ADVANCED COMPUTER APPLICATIONS
Troubleshooting problems:
As WAN covers a lot of areas so fixing the problem in it is difficult. Most of WAN wires
go into the sea and wires get broken sometimes. It involves a lot of resources to fix lines
under the sea. In ISP (Internet service provider) head office many of internet lines,
routers are mixed up in rooms and fixing issues on the internet requires a full-time staff.
1. Speed. Networks provide a very rapid method for sharing and transferring files.
Without a network, copying them to floppy disks, then carrying or sending the
disks from one computer to another shares files. This method of transferring files
(referred to as sneaker-net) is very time-consuming.
[email protected] 177
ADVANCED COMPUTER APPLICATIONS
server, instead of on all the individual workstations. Low cost. Single device
shared by several machines reduce the need to buy many peripheral devices.
Resource sharing also serves money. An installation can have several low-cost
work stations accessing a single file-server. That puts a lot of processing power
on the user’s desk without the expense of large mainframe systems.
7. Flexible Access. Networks allow data & information access from any computer
in the campus.
[email protected] 178
ADVANCED COMPUTER APPLICATIONS
spreadsheets.
DISADVANTAGES
3. File Server May Fail. Although a file server is no more susceptible to failure
than any other computer, when the files server "goes down," the entire network
may come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
4. Cables May Break. Some of the configurations are designed to minimize the
inconvenience of a broken cable; with other configurations, one broken cable can
stop the entire network.
5. Security concerns. Some user can gain unauthorized access to private data. There
is a danger of hacking, particularly with wide area networks. Security procedures
are needed to prevent such abuse. Of all the disadvantages, the greatest drawback
is security concerns; therefore, network security is a priority in the development
of network applications.
[email protected] 179
ADVANCED COMPUTER APPLICATIONS
enter the system via the network.Viruses can spread to other computers
throughout a computer network.
NETWORK SECURITY
The field of network security in general and of TCP/IP security in particular is too wide
to be dealt with we take the most common security exposures and measures to counteract
them. Because many, if not all, security solutions are based on cryptographic algorithms.
Security Issues
This section gives an overview of some of the most common attacks on computer
security, and it presents viable solutions to those exposures and lists actual
implementations.
Common Attacks
For thousands of years, people have been guarding the gates to where they store their
treasures and assets. Failure to do so usually resulted in being robbed, neglected by
society or even killed. Though things are usually not as dramatic anymore, they can still
become very bad. Modern day I/T managers have realized that it is equally important to
protect their communications networks against intruders and saboteurs from both inside
and outside. We do not have to be overly paranoid to find some good reasons why this is
the case:
Tapping the wire: to get access to clear text data and passwords
Impersonation: to get unauthorized access to data or to create unauthorized e-
mails, orders, etc.
Denial-of-service: to render network resources non-functional
Replay of messages: to get access to and change information in transit
Guessing of passwords: to get access to information and services that would
normally be denied.
Guessing of keys: to get access to encrypted data and passwords (brute-force
attack, chosen cipher text attack, chosen plaintext attack)
Viruses, Trojan horses and logic bombs: to destroy data
Though these attacks are not exclusively specific to TCP/IP networks, they should be
considered potential threats to anyone who is going to base his/her network on TCP/IP,
which is what the majority of enterprises, organizations and small businesses around the
world are doing today. Hackers (more precisely, crackers) do likewise and hence find
easy prey.
[email protected] 180
ADVANCED COMPUTER APPLICATIONS
User IDs: Make sure that every user has a password and that users are locked out
after several logon attempts with wrong passwords (typically five attempts). Keep the
passwords to superuser accounts (root, supervisor, administrator,etc.) among a very
limited circle of trusted system, network and security administrators.
System defaults: Make sure that default user IDs are either disabled or have
passwords that adhere to the minimum requirements stated above. Likewise, make
sure that only those services are enabled that are required for a system to fulfill its
designated role.
Physical access: Make sure that access to the locations where your systems and users
physically reside is controlled appropriately. Information security begins at the
receptionist, not at the corporate firewall.
Help desk: Make sure that callers are properly identified by help desk representatives
or system administrators before they give out "forgotten" passwords or user IDs.
Social engineering is often the first step to attack a computer network.
[email protected] 181
Setting up a LAN is expensive:
It is expensive to set up LAN because there is special software required to make a server. Also,
communication devices like hubs, switches, routers, cables are costly. The special administrator is
required to maintain and troubleshoot LAN for a large office.
• A Local Area Network (LAN) is a private computer network that connects computers in
small physical areas. Example: A small office, A Single building, Multiple buildings
inside a campus etc. Wide Area Networks (WAN) is type of computer network to
connect offices which are located in different geographical locations. Wide Area Network
(WAN) depends mainly on Internet Service Providers (ISPs) for connection solutions.
• Local Area Network (LAN) has higher bandwidth rates. Current Local Area Networks
(LANs) runs on bandwidths of 100 Mbps, 1 Gbps or 10 Gbps. Wide Area Networks
(WAN) has lower bandwidth rates compared with Local Area Network (LAN). Current
Wide Area Networks runs on bandwidths of 4 Mbps, 8 Mbps, 20 Mbps, 50 Mbps or 100
Mbps.
• Local Area Network (LAN) bandwidth rates are almost constant. Local Area Network
(LAN) bandwidth rates are dependent on characteristics of the LAN technology in use
(Normally FastEthernet or Gigabit Ethernet). Since most of Wide Area Networks (WAN)
connectivity solutions are dependent on Internet Service Providers (ISPs), budget related
constraints affect the quality of WAN.
• Most of the current Local Area Networks (LANs) use Ethernet as the LAN Standard
(FastEthernet 100 Mbps, or Gigabit Ethernet 1/10 Gbps). WAN uses technologies like
VPN (Virtual Private Network) over Internet, MPLS, FrameRelay, or Leased Lines as
WAN connectivity solutions.
• Since Local Area Networks (LANs) are private networks, managed by dedicated local
network administrators, Local Area Networks (LANs) are more reliable and secure than
Wide Area Networks (WANs). Since Wide Area Networks (WANs) involve 3rd party
service providers, WAN networks are less reliable and secure.
• Initial set-up costs for Local Area Networks (LANs) are low as the devices required to
set up the networks are cheap. Initial set-up costs for Wide Area Networks (WANs) are
high, because of the devices (Routers, Firewalls etc), cables and manpower required.
• Local Area Networks (LANs) running costs are less Wide Area Networks (WANs)
running costs are high. Wide Area Networks (WANs) normally have recurring monthly
cost as Service Provider access fees.
[email protected] 37
• Wide Area Networks (WANs) are more congested than Local Area Networks (LANs).
Comparison Chart
BASIS OF
LAN MAN WAN
COMPARISON
Metropolitan Area
Expands to Local Area Network Wide Area Network
Network
A network that connects a It covers relatively It spans large locality and
Meaning group of computers in a large region such as connects countries together.
small geographical area. cities, towns. Example Internet.
Ownership of
Private Private or Public Private or Public
Network
Design and
Easy Difficult Difficult
maintenance
Propagation Delay Short Moderate Long
Speed High Moderate Low
Fault Tolerance More Tolerant Less Tolerant Less Tolerant
Congestion Less More More
Used for College, School, Hospital. Small towns, City. Country/Continent.
LAN WAN
Stands For Local Area Network Wide Area Network
Local areas only (e.g., homes, offices, Large geographic areas (e.g., cities, states,
Covers
schools) nations)
WAN (Wide Area Network) is a computer
LAN (Local Area Network) is a
network that covers a broad area (e.g., any
computer network covering a small
Definition network whose communications links cross
geographic area, like a home, office,
metropolitan, regional, or national boundaries
school, or group of buildings.
over a long distance).
Speed High speed (1000 mbps) Less speed (150 mbps)
Data transfer WANs have a lower data transfer rate compared
LANs have a high data transfer rate.
rates to LANs.
The network in an office building can
Example The Internet is a good example of a WAN
be a LAN
Tend to use certain connectivity WANs tend to use technologies like MPLS,
Technology technologies, primarily Ethernet and ATM, Frame Relay and X.25 for connectivity
Token Ring over longer distances
Computers connected to a wide-area network are
One LAN can be connected to other
often connected through public networks, such as
Connection LANs over any distance via telephone
the telephone system. They can also be connected
lines and radio waves.
through leased lines or satellites.
Layer 2 devices like switches and Layers 3 devices Routers, Multi-layer Switches
Components bridges. Layer 1 devices like hubs and and Technology specific devices like ATM or
repeaters. Frame-relay Switches etc.
[email protected] 38
LAN WAN
LANs tend to have fewer problems
Fault associated with them, as there are WANs tend to be less fault tolerant as they
Tolerance smaller number of systems to deal consist of large number of systems.
with.
Data
Experiences fewer data transmission Experiences more data transmission errors as
Transmission
errors compared to LAN
Error
WANs (like the Internet) are not owned by any
Typically owned, controlled, and
one organization but rather exist under collective
Ownership managed by a single person or
or distributed ownership and management over
organization.
long distances.
For WANs since networks in remote areas have
If there is a need to set-up a couple of
to be connected the set-up costs are higher.
Set-up costs extra devices on the network, it is not
However WANs using public networks can be
very expensive to do that.
setup very cheaply using just software (VPN etc).
Have a small geographical range and Have a large geographical range generally
Geographical
do not need any leased spreading across boundaries and need leased
Spread
telecommunication lines telecommunication lines
Because it covers a relatively small Maintaining WAN is difficult because of its
Maintenance
geographical area, LAN is easier to wider geographical coverage and higher
costs
maintain at relatively low costs. maintenance costs.
High bandwidth is available for
Bandwidth Low bandwidth is available for transmission.
transmission.
Congestion Less congestion More congestion
[email protected] 39
Personal Area Network (PAN) Diagram
Personal area network does not require extra wire or space. For connecting two devices
you only need to enable Bluetooth in both devices to start sharing data among them. For
example, connecting wireless keyboard and mouse with the tablet through Bluetooth.
Many devices can be connected to one device at the same time in a personal area
network. You can connect one mobile to many other mobiles or tablets to share files.
Cost effective:
No extra wires are needed in this type of network. Also, no extra data charges are
involved so PAN is an inexpensive way of communication.
Easy to use:
[email protected] 40
Reliable:
If you use this type of data connection within 10 meters then your network is stable and
reliable.
Secure:
This network is secured because all the devices are authorized before data sharing. Third
party injection and data hacking are not possible in PAN.
Infrared is the technology used in TV remotes, AC remotes, and other devices. Bluetooth,
infrared and other types of PAN is used to interconnect digital devices in offices,
meetings, and conferences.
One person can synchronize several devices i.e. download, upload and exchanging data
among devices.
Portable:
A person can move devices as it is a wireless network and data exchange is not affected.
That mean PAN is portable as well.
Signal range is maximum 10 meters which makes limitation for long distance sharing.
As personal area network also use infrared so it can interfere with radio signals and data
can be dropped.
Bluetooth and infrared have a slow data transfer rate as compared to another type of
networks like LAN (local area network).
Health problem:
In some cases, PAN uses microwave signals in some digital devices which have a bad
effect on the human body like brain and heart problems may occur.
[email protected] 41
Costly in terms of communication devices:
Personal area network is used in digital devices which are costly so it is another
disadvantage of PAN. Examples are smartphones, PDA, laptops, and digital cameras.
TV remote use infrared signals which have a problem that they travel in straight line. So
this counts another disadvantage of PAN.
· Wireless keyboards
· Wireless Mice
· Smartphones
· TV remotes
· Wireless printers
· Gaming consoles
· Smartphone technologies include Infrared, Bluetooth, FireWire, ZigBee,
Ultrawideband, Wibree, wireless USB
DEFINE THE TERM NETWORK OPERATING SYSTEM (NOS) AND STATE THE
PURPOSE OF A NOS IN A NETWORK SYSTEM
· Basic operating system features support like protocol support, processor support,
hardware detection and multiprocessing support for applications
· Security features like authentication, restrictions, authorizations and access
control
· Features for file, Web service, printing and replication
· Directory and name services management
· User management features along with provisions for remote access and system
management
[email protected] 42
DESCRIBE THE FOLLOWING FOUR COMMONLY USED
NETWORKING COMMUNICATION MEDIA:
TRANSMISSION MEDIA
[email protected] 45
Transmission media is a pathway that carries the information from sender to receiver. We
use different types of cables or waves to transmit data. Data is transmitted normally through
electrical or electromagnetic signals.
[email protected] 46
Types of Transmission Media
Bound transmission media are the cables that are tangible or have physical existence and are
limited by the physical geography. Popular bound transmission media in use are:
Each of them has its own characteristics like transmission speed, effect of noise, physical
appearance, cost etc.
Unbound transmission media are the ways of transmitting data without using any cables. These
media are not bounded by physical geography. This type of transmission is called Wireless
communication. Nowadays wireless communication is becoming popular. Wireless LANs are
being installed in office and college campuses. This transmission uses
1. Microwave,
2. Radio wave,
3. Infra-red
4. Bluetooth
5. Wi-Fi
6. Satellite Communication
7. Lasers
[email protected] 47
DESCRIBE THE FOLLOWING COMMUNICATION
DEVICES
1. Hubs
2. Repeaters
3. Routers
4. Bridges
5. Gateway
6. Modems
There are five basic devices which are used for data transmission. These are:
Networking Devices