0% found this document useful (0 votes)
56 views32 pages

Unit 1

Uploaded by

link7096907539
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views32 pages

Unit 1

Uploaded by

link7096907539
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

ROFEL BBA & BCA College, VAPI

Unit-1
Introduction to
Network
503 NETWORK TECHNOLOGIES
Unit-1 Introduction to Network

1.1. Basics of Network


1.1.1. Types of Networks
1.1.2. Different Topologies (Bus, Ring, Star, Mesh, Tree)
1.2. Types of Networks (LAN, MAN, WAN)
1.3. Terminologies (Internet, Intranet, Unicast, Broadcast, Multicast)

Basics of Network

Introduction: Networking
 A computer network consists of two or more computing devices that are connected in
order to share the components of your network (its resources) and the information
you store there, as shown in figure.

 The most basic computer network (which consists of just two connected computers)
can expand and become more usable when additional computers join and add their
resources to those being shared.
 The first computer is commonly referred to as your local computer. It is more likely to
be used as a location where you do work, a workstation, than as a storage or
controlling location called as a server. As more and more computers are connected to
a network and share their resources, the network becomes a more powerful tool.
Using a network with more information and more capability are able to accomplish
more through those added computers or additional resources.
 One network can be connected to another network and become a more powerful tool
because of the greater resources.

Network Technologies Page 1


Unit-1 Introduction to Network

 Advantages
1. File Sharing: The major advantage of a computer network is that is allows file
sharing and remote file access. A person sitting at one workstation that is
connected to a network can easily see files present on another workstation,
provided he is authorized to do so.

2. Resource sharing: All computers in the network can share resources such as
printers, fax machines, modems and scanners.

3. Communications: It allows users to connect and communicate with each other


easily. Various communication applications included e-mail and groupware are
used. Though e-mail, members of a network can send message and ensure safe
delivery of data to other members.

4. Internet access: Computer networks provide internet service over the entire
network. Every single computer attached to the network can experience the high
speed internet.

5. Entertainment: Many games and other means of entertainment are easily


available on the internet. Furthermore, LAN offers and facilitates other ways of
enjoyments, such as many players are connected through LAN and play a
particular game with each other from remote location.

6. Inexpensive system: Shared resources mean reduction in hardware costs. Shared


files mean reduction in memory requirement, which indirectly means reduction in
file storage expenses. A particular software can be installed only once on the
server and made available cross all connected computers at once. This saves the
expense of buying and installing the same software as many times for as many
users.

7. Flexible access: A user can log on to a computer anywhere on the network and
access his files. This offers flexibility to the users as to where he should be during
the course of his routine.

8. Multiple access: Many of users can access the same information at the same time.

Network Technologies Page 2


Unit-1 Introduction to Network

 Disadvantages:
1. Lack of data security and privacy: Because there would be a huge number of
people who would be using a computer network to get and share some of their
files and resources, a certain user’s security would be always at risk. There might
even be illegal activities that would occur, which you need to be careful about and
aware of.
2. Presence of computer viruses and malwares: If even one computer on a network
gets affected by a virus, there is a possible threat for the other system getting
affected too. Viruses can spread on a network easily, because of the
interconnectivity of workstations.
3. Lack of Independence: since most networks have a centralized server and
dependent clients, the client users lack any freedom whatsoever. Centralized
decision making can sometimes hinder how a client user wants to use his own
computer.
4. Lack of robustness: If a computer network’s main server breaks down, the entire
system would become useless. Also if it has a bridging device or a central linking
server that fails, the entire network would also become useless.

5. Need an efficient handler: for a computer network to work efficiently, it requires


high technical skills.

Components of Network
 Network consist of three primary components.
1) Server
2) Clients and Workstations
3) Resources
 No network could be complete without this three component working together. We
can also add following connecting devices as component.
1) Routers
2) Bridges

Network Technologies Page 3


Unit-1 Introduction to Network

3) Hubs
4) Repeaters
5) Switches

1. Server :
 Server come in many shapes and size. Servers are main component of the network
and it provide a link to resources if necessary to perform any task. The link is provided
to resources on existing server itself or a resources on client computer also.
 Server has the capability of centralizing the control of resources. They can be used to
distribute processes for balancing the load of the computer and it increased the
speed and performance.
 Server perform several task like server provide files to the user on the network that is
called file server. If server provide printing services for user that is called print server.
There are also other task perform by server like remote access services,
administration and mail.
 Server can be multi purpose or single purpose. If the servers are multipurpose then
they can be perform operation on both file server as well as print server. If the server
is single purpose then it is file server only or print server only.
 Server has two categories : dedicated server and non- dedicated server.
1) Dedicated Server :
 This type of servers are assign to provide specific application or services
because dedicated server is specializing in only a few task.
2) Non-dedicated Server :
 This type of servers are assign to provide one or more network services.
A non-dedicated server is accepted to more flexible in its day to day use
than a dedicated server.

Network Technologies Page 4


Unit-1 Introduction to Network

2. Clients and Workstation


 Workstations are computer on that the user on network do their work on computer
and follow the activity like word processing, database design, graphics design, email
and other personal task.
 Workstations are basically nothing more than an everyday computer accept that they
are connected to network to access additional resources. Workstation can range from
a diskless computer system to a desktop system.
 Workstations are also known as client computer. Client computer are allow to
communicate with the server in the network in order to use network resources.
 It takes several items to make workstation into clients. You must install a network
interface card (NIC) because it allow the pc to communicate in a network.
 The client is able to use the server as a storing of more information through the other
computers and other network also.
3. Resources
 The server is to share the resources and the workstation is to used that. A resource is
any item that can be used on a network.
 E.g., printer and any peripherals, files, application, disk storage.

Types of Server
 The word 'server' refers to a powerful specialized machine on which the server
hardware, software, or a combination provides various services to other computers.
 A server can provide various functionalities, and they come in different types and
sizes to facilitate different work or uses. When a Server and its clients computers are
work together then we call it a client/server network, which provides us a centralized
access to information, content, and stored data, etc.

Network Technologies Page 5


Unit-1 Introduction to Network

 Types :
o File Server
o Print Server
o Application Server
o Database Server
o Proxy Server
o Message Server
 Mail Server
 IRC Server
 Chat Server

File Server
 File server provided the service to allow network users to share a files. With network
file service user can exchange, read, write and manage shared file.
 File server provides various services about the file like,
o File transfer
o File storage & data migration
o File update
o File archiving

Print Server
 There is an important factor of computer networking was the demand for ability to
share the printers. A networking represent a new level of computer printing because
a network can,
o Allow user to share printers.
o Allow user to place printers where it is convenient.

Network Technologies Page 6


Unit-1 Introduction to Network

Application Server
 Application server allow client PC to access and used extra computing power and
expensive software application that reside on a shared document.

Message Server
 Message server provides message services in a variety of communication method.
With message server data can be passed in form of graphics, video, audio as well as
text.
 Message server provide four main types of message services like,
o Mail server : this server store mails over the network.
o IRC: Inter Relay Chat consist of various network that allow user to connect to
each other.
o Chat server: it enable people to share information over the internet.

Proxy Server
 A proxy server is a dedicated computer or a software system running on a computer
that acts as an intermediary between an endpoint device, such as a computer, and
another server from which a user or client is requesting a service.
 Proxy server have two main purpose :
o Improve the performance of users by saving their time.
o It also filter the request coming to the server.

Network Technologies Page 7


Unit-1 Introduction to Network

Types of Network
 Network types can be dividing into following categories.

Network
Type

According According
to Size to Role

Peer to Client
LAN MAN WAN PAN SAN CAN Hybrid
Peer Server

1. Types Of Network According to Size


 Computer Networks fall into following classes regarding the size, distance and the
structure.

Local Area Network


 It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory.
 LANs are used widely as it is easy to design and to troubleshoot. Personal computers
and workstations are connected to each other through LANs.
 We can use different types of topologies through LAN, these are Star, Ring, Bus, Tree
etc.
 LAN can be a simple network like connecting two computers, to share files and
network among each other while it can also be as complex as interconnecting an
entire building.
 LAN networks are also widely used to share resources like printers, shared hard-drive
etc.

Network Technologies Page 8


Unit-1 Introduction to Network

Advantages:
 Simple and Inexpensive: The main benefit of the Local Area Network is that it is easy
to set up at a comparatively low price. If an organization wishes to construct a
network at a low price and with flexibility, a Local area network would be an ideal
choice.

 Accessible Software: Programs can also be shared on the Local Area Network.
Incorporate a single licensed program, and any device can use it on a network.

 Rapid Communication: LAN-interlinked devices transfer files and communicate


directly and rapidly based on the LAN model and Ethernet cabling installed. They work
on 1000 Mbps, 100 Mbps, and 10 Mbps.

 Association of Client and Server: All the company-related information is kept on a


single server. If a client asks for the information, the client can access it seamlessly.

 Collaboration of Resources: Components that are expensive, like scanners and


printers, cannot be connected to every device in the office, and it will become a
burdensome task for the organization, but in a LAN, there is a requirement of one
printer and scanner, and everyone can be connected, and they have to send
instructions from their respective machines. This will save the cost and time of the
employee.

 Protection of the Data: In cybercrime, all organizations want their data to be kept
safe. LAN is an ideal place where you can keep your data safe. Suppose a client wishes
to improve, update, and delete data. In that case, they can log into a single server
computer, and other devices will automatically receive their information. It has the
option to give to whom the user wishes to give access to the particular file. Only
approved users can access those files.

 File Locking: LAN allows file locking in its network.

Network Technologies Page 9


Unit-1 Introduction to Network

Disadvantages
 Weak Protection of Data: Unauthorized users can access the file if the server has not
been properly programmed. Due to this, the frequent glitch is observed.

 Maximum Damage: If the device, file, or server crashes, it affects the whole network.

 Installation Charge is Expensive: Installing a LAN is expensive, as it requires


specialized software to install a server. Equipment like cables, routers, and switches
are very expensive. A professional operator is required to troubleshoot and
administer a huge office like LAN.

 Malware: Malware can easily penetrate the LAN, corrupt the whole network, and
destroys important data.

 Maintenance: LAN requires frequent maintenance and the involvement of


technicians and system operators.

Metropolitan Area Network (MAN)


 It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN
and uses the similar technology as LAN.
 It is designed to extend over the entire city. It can be means to connecting a number
of LANs into a larger network or it can be a single cable. It is mainly hold and operated
by single private company or a public company.

Network Technologies Page 10


Unit-1 Introduction to Network

Advantages:
 Security: MAN provides more security as compared to WAN and it is easy to
implement.

 Distance occupies: MAN is occupied more distance as compared to LAN i.e. It is wider
than LAN.

 Less expensive: MAN implementation cost is less than WAN because MAN requires
fewer resources as compared to WAN. It saves implementation costs.

 High speed: Man has a high speed of data transfer because MAN often uses fiber
optics cables that are capable of offering speeds up to 1000Mbps.

 Centralized management: MANs can be centrally managed, making it easier to


monitor and control network traffic.

 Cost-effective: Compared to WANs, MANs are more cost-effective to implement and


maintain.

 Scalability: MANs can be easily scaled up or down to meet changing business needs.

 Improved communication: MANs can improve communication within organizations


by allowing for faster and more efficient sharing of data and resources.

Disadvantages:
 The problem of less security: It is difficult to secure the system from hackers because
of the large area. This is mainly due to safety issues.

 Wire required: more cables are required to connect MAN from one place to another.
MAN requires fiber optics cables which are quite expensive.

 Technical assistance: Here, skilled technicians and administrators are required. This
can overall increase the installation cost.

Network Technologies Page 11


Unit-1 Introduction to Network

 Difficult to manage: MAN consumes a large area then there is difficult to manage a
large network, here is a chance of attacking hackers on the network. Data can be
secured but it needs experienced staff and security tools.

Wide Area Network (WAN)


 It is also called WAN. WAN can be private or it can be public network. It is used for the
network that covers large distance such as cover states of a country. It is not easy to
design and maintain. WAN operates on low data rates.

Advantages
 Large area coverage: WAN covers a large geographical area(1000 km or more than).
Ex. If your business office is situated in another country and you live in another
country then WAN is a platform to communicate with each other(i.e. you and your
office staff members).
 Higher bandwidth: WAN networks usually cover large geographical areas. Ex.1000 km
or more than the wide area network has higher bandwidth than LAN and MAN
networks.

 Centralized data: Using the WAN network you can share the data connected to all the
devices in the respective network. Ex. By using the WAN network, all branches are
capable to share all data through the head office server and you can get support, full

Network Technologies Page 12


Unit-1 Introduction to Network

back up, and other precious data from the head office, and all data gets synchronized
along with all other company branches.

 Message Exchange: With the help of the Internet Of Things (IoT) and LAN, a sudden
growth of WAN-based devices can be seen. This communication via message can be
done fastest with the help of the most popular apps like messenger and WhatsApp.

Disadvantages
 Security issue: WAN faces more security problems than LAN and MAN networks due
to WAN networks more technologies are merged.

 Installation cost: WANs are default complex and complicated because of large
geographical area coverage. Hence there is a set-up cost in expensive WAN that also
needs routers, switches, and other security solutions.

 Troubleshooting issues: Troubleshoot the big challenge on the WAN network and it
requires more time. If any issue occurs in the computer network then it is the most
difficult part to find out the proper cause due to their broad coverage area.

 Maintenance issues: In a WAN network, it is difficult to maintain the network


especially a data center that operates 24/7 is the biggest challenge out of all. Here
24/7 needs assistance from network administrators and technicians. In a WAN,
maintenance cost is high.

Storage Area Network (SAN)


 A storage area network (SAN) is a type of local area network (LAN) is a high-speed
special-purpose network. A SAN typically supports data storage, retrieval and
replication on business networks using high-end servers, multiple disk arrays and
Fiber Channel interconnection technology.

Network Technologies Page 13


Unit-1 Introduction to Network

 The term SAN can sometimes refer to system area networks instead of a storage area
network. System area networks are clusters of high performance computers used for
distributed processing applications requiring fast local network performance. Storage
area networks, on the other, are designed specifically for data management.

Campus Area Network (CAN)


 A campus area networks (CANs) is a computer network interconnecting a few local
area networks (LANs) within a university campus or corporate campus Network.
 Campus area network may link a variety of campus buildings. A campus area network
is larger than a local area network but smaller than a metropolitan area network
(MAN) or wide area network (WAN). Campus area network can also stand for
corporate area network.

Personal Area Network (PAN)


 A personal area network is a computer network organized around an individual
person. Personal area networks typically involve a mobile computer, Personal area
networks can be constructed with cables or wirelessly.
 Personal area networks generally cover a Network range of less than 10 meters
(about 30 feet).

2. Types Of Network According to Role


 According to role networks are divide into three types.
o Peer to peer network (peer based network)
o Client server network (Server based network)
o Hybrid network

Network Technologies Page 14


Unit-1 Introduction to Network

Peer Based Network


 Peer network has no server and use the network to share resources among
independent system. Peer network are defined by a lack of central control over the
network.
 There is no server in peer network so that user simply shares disk space and resources
as they want.
 These networks are organized into work group. The workgroup have very little
security control. There is no central login process.
 If user wants to use any resource on the network then he has to log into one system
on the network.
 User shares the individual resources because there is no central security but user will
have to know the individual password for each secure shared resources.
 Advantages
o These types of computers are used specially for small business because they
could not afford to invest in expensive server hardware and software.
o No extra investment in server hardware and software.
o Easy setup.
o Little administration required.
o Ability of users to control resource sharing.
o Lower cost for small network.
 Disadvantage
o Additional load on computers because of resource sharing.
o Inability to handle as many networks connection as server.
o Lack of central organization which can make finding of data very hard.
o No central point of storage for file.
o Weak security.
o In the peer network, it is difficult to work with large number of system.

Network Technologies Page 15


Unit-1 Introduction to Network

Server Based Network


 Server based network also called as client server network. It is defined by a dedicated
or non-dedicated server on a network.
 It provides security and resources on the network.
 This network divides the processing task between the client and servers. Client called
as front end that requires the services such as file storage and printing same as server
is also called as back end because it gives response to the client request and delivered
their services.
 Server computers are more powerful than client computers.
 Server based network are organized into active directory domain. Domains are
collection of networks and share the security information.
 Computer user cannot access the resources of server in a domain until a domain
controller has given the permission.
 Advantages
o It provides strong central security.
o It provides central file storage which allows all users to work from the same set
of data.
o It provides easy back up of critical data.
o It has the ability to share expensive equipment such as lesser printer, scanner
etc.
o It provides a better security because a single password allows access to all
shared resources on the network.
o Easy manage the system of a large number of users.
 Disadvantages
o Expensive dedicated hardware.
o Expensive network operating system and software.
o Require a dedicated network administration.

Network Technologies Page 16


Unit-1 Introduction to Network

Hybrid Network
 Hybrid network have active directory domain and work group. It is a client server
network and also it has peer sharing resources. So most of the networks are hybrid
network.
 Hybrid network share the resources that are located on the server and the user
access to any resources being shared by peer to peer network.

 Advantages
o It is server based networking and peer based network also. So it shares the
advantages of server based network and peer to peer network.

 Disadvantages
o Hybrid network share the disadvantages of server based network

Network Topologies
 The way in which the connections are made is called the topology of the network.
 There are
o Physical topology
o Logical topology

 Physical Topology :
 It specifically refers to the physical layout of the network. It refers to the location of
the computers and how the cable is run between them.
 The physical topology you choose for your network influences and its influenced by
several factors:
o Office layout

Network Technologies Page 17


Unit-1 Introduction to Network

o Troubleshooting techniques
o Cost of installation
o Type of cable used

 Logical topology :
 Logical or electrical topologies describe the way in which a network transmits
information from one node to the next node, not the way the network looks.
 There are following types of topologies :
o Bus topology
o Ring topology
o Star topology
o Mesh topology
o Hybrid topology

Bus topology

 Physical :
 For simple networks in a small area, the bus physical topology (daisy chaining) may be
the best solution. In the bus topology cable runs from computer to computer, making
each computer a link of a chain.
 All computers on the network share a single cable and this cable is typically coaxial
cable.
 Depending on the type of cable you are using, you can connect a bus topology in two
different ways.
 If your network is using the thicknet coaxial cable, then the bus network will have a
central backbone cable that is the thick coaxial cable. Smaller, thinner cables called
taps or drops will runs from the backbone to each PC in the network. A small device
called a transceiver that connects the thinner cable to the thicknet backbone.

Network Technologies Page 18


Unit-1 Introduction to Network

 As opposed to the thick Ethernet, thinnet drop the backbone idea and connects all
network devices directly. Thinnet use the more flexible coaxial cable as compare to
thicknet.
 Logical :
 Every workstation can send out information in a package called a packet.
 Each time a node on the network has data for another node. The sending node
broadcasts the data to the entire network. The various nodes hear it and look to see if
the data is for them. If so they keep the data. If not, they ignore the data.
 Before a workstation broadcast to the network, it listens to see if anyone else is using
the network. If coast is clear then the workstation broadcast.
 The biggest problem with the broadcast method of bus network is distance. If the
distance between two computers A and B on the same network is too great, they may
not hear each other on the line.
 If they could not hear each other then node A could not tell whether node B is
transmitting or not.
 Thinking that all is quiet, node A may begin its transmission when node B is already
transmitting data. If this happens and two nodes transmit at the same time, an event
called a packet collision occur and it cause a frequency “ripple” on the cable. The first
node detect this increased frequency ripple and it will send a high frequency signal
that will cancel out all other signals.

Network Technologies Page 19


Unit-1 Introduction to Network

 This signal tells all nodes that a collision has occurred and that all nodes on the
network should stop sending packets. At this point, each node waits a random
amount of time and then tries broadcasting again.

 Advantages :
o It is cost effective.
o Cable required is least compared to other network topology.
o Used in small networks.
o It is easy to understand.
o Easy to expand joining two cables together.
 Disadvantages :
o If it is not terminated correctly, then your network can not transmit properly.
o Malfunctioning nodes and cable breaks can cause problem for all computer.
o If the cable is damaged at some point along the way, the network won’t work,
and it can be time consuming to figure out where that break took place.

Network Technologies Page 20


Unit-1 Introduction to Network

o If network traffic is heavy or nodes are more the performance of the network
decreases.
o Cable has a limited length.
o It is slower than the ring topology.

Ring Topology :
 Physical :
 The ring physical topology connects all computers on the network in a loop, running
double cable between each node in order to maintain network integrity.
 The ring topology exists when each of the systems is connected to its respective
neighbour forming a ring, as seen in Figure.
 This ring topology has many of the same strengths and weaknesses of the bus
topology.
 The main difference between the bus and ring is that the ring topology does not
require termination.
 Because the systems are connected all together in a loop, there is no beginning and
end point as there is with the bus topology.
 Every computer is connected to the next computer in the ring and each ring can
transmit the message in a circular format.
 As each computer acts as an amplifier, there is no problem of signal loss.

Network Technologies Page 21


Unit-1 Introduction to Network

 Logical :
 The bus logical topology is a broadcast system- what one station says, all station hear,
but the ring topology doesn’t work that way.
 In the ring topology, used by token ring, every station must repeat what it hears from
the previous station, making a kind of “bucket bridge” of data.
 An entire file can’t be transmitted in one packet, so its pieces will be transmitted as
shown in following figure :

 The heart of the ring topology is the token packet. To avoid packet collision, the ring
topology ensure that only one workstation can send information across the network
at any given time.
 Only the node that has control of the token packet can send information across the
network.
 When a workstation is done with the token packet, it release it to whatever station is
next in line. If nobody grabs it, the workstation releases it a second time. If nobody
response to the token packet for a second time, then work station send out a general
query known as solicit successor frame.
 This frame goes out over the network, asking “who’s supposed to get the token
next?” if workstation responds, the sending workstation address the token to that
workstation and passes the token.
 In ring topology, data is not broadcast on the network but passed from node to node.

Network Technologies Page 22


Unit-1 Introduction to Network

 In ring topology one computer is dedicated to token management. This computer is


called as token master or active monitor. It detects lost tokens, monitor frames
transmissions and create a new token when necessary. The active monitor also
maintains a regular clock tick on the network that keeps all other nodes synchronized.
 Advantages :
o The data being transmitted between two nodes passes through all the
intermediate nodes. A central server is not required for the management of this
topology.
o The traffic is unidirectional and the data transmission is high-speed.
o In comparison to a bus, a ring is better at handling load.
o The adding or removing of network nodes is easy, as the process requires
changing only two connections.
o The configuration makes it easy to identify faults in network nodes.
o In this topology, each node has the opportunity to transmit data. Thus, it is a
very organized network topology.
o It is less costly than a star topology.

 Disadvantages :
o The failure of a single node in the network can cause the entire network to fail.
o The movement or changes made to network nodes affect the entire network's
performance.
o Data sent from one node to another has to pass through all the intermediate
nodes. This makes the transmission slower in comparison to that in a star
topology. The transmission speed drops with an increase in the number of
nodes.
o There is heavy dependency on the wire connecting the network nodes in the
ring.

Network Technologies Page 23


Unit-1 Introduction to Network

Star Topology
 In the star topology, each server and workstation plugs into a central hub that
provides connections to all other devices connected to the hub.
 The centerpiece of star topology is a hub. Hubs come in several different flavors but
the basic design is simple that there is a device that provide a central junction point
for all network cable, providing a connection between each port to permit the
computers plugged into it to talk to each other.
 Each workstation and server on the network has its own connection to the central
switching point. This means that each connection is independent of all other
connections.
 The star topology is also nice for physically distributed networks. E.g., a network with
four computers- three workstations and one server.
 If one workstation is upstairs and two are downstairs but in separate rooms, it’s a lot
easier to cable the network if you don’t have to worry about connecting all the nodes
to each other, and can just concentrate on connecting the individual workstations to
the hub.

 Advantages :
o Due to the centralized nature, it is easy to detect faults in the network devices.
If one node doesn’t work, the problem probably lies somewhere between the
port on the hub and the node that it is physically attached to.
o Due to its centralized nature, the topology offers simplicity of operation.
o It also achieves isolation of each device in the network.

Network Technologies Page 24


Unit-1 Introduction to Network

o Adding or removing network nodes is easy, and can be done without affecting
the entire network.
o Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high-capacity central hub, traffic load can be
handled at fairly decent speeds.
 Disadvantages:
o The large amount of cable it uses. Each connection of network requires its own
cable.
o Network operation depends on the functioning of the central hub. Hence,
central hub failure leads to failure of the entire network.
o Also, the number of nodes that can be added, depends on the capacity of the
central hub.
o The setup cost is quite high.

Distributed star topology


 For large networks, a single hub may not be able to support all the nodes. And it
doesn’t have enough ports for all the computers on the network.
 To connect everyone to the network, you are going to need more than one hub. But
idea of having three or four separate networks in the same building is not very good.
 That’s why a variation on the star physical topology comes in. this variation called the
connected star or distributed star, daisy- chains together the hub on your network so
that all the hubs can communicate as shown in following figure.

Network Technologies Page 25


Unit-1 Introduction to Network

 This configuration does have some of the drawbacks of the bus network in that a
break in the cable connecting two hubs will isolate the part of the network beyond
the break.

Mesh Topology
 In this layout, every system is connected to every other system.
 The main advantage of this topology is high availability. The main disadvantage of this
topology is cost, both administrative and physical.
 Because each system is connected to each other, the amount of cabling and
maintenance necessary , especially in larger networks.
 The formula for determining the amount of cable needed in a mesh network is:
(N x (N – 1))/2,
where N is the number of systems to be interconnected.

 In our example in Figure, we have six systems that require 15 cables to create a mesh
network.
 This topology is mainly used in Wide Area Network environments.

 Advantages
o No data traffic issues as there is a dedicated link between two devices which
means the link is only available for those two devices.
o Mesh topology is reliable and robust as failure of one link doesn’t affect other
links and the communication between other devices on the network.

Network Technologies Page 26


Unit-1 Introduction to Network

o Mesh topology is secure because there is a point to point link thus


unauthorized access is not possible.
o Fault detection is easy.

 Disadvantages
o Expensive
o Since each device needs to be connected with other devices, number of I/O
ports required must be huge.
o Difficult to implement
o Scalability issues because a device cannot be connected with large number of
devices with a dedicated point to point link.

Hybrid Topology
 A combination of two or more different topologies makes for a hybrid topology.
When different topologies are connected to one another, they do not display
characteristics of any one specific topology.

 Star Bus Topology (Tree Topology / Expanded Star Topology) :


 A Star Bus network consists of two or more star topologies connected using a bus
trunk (the bus trunk serves as the network's backbone).
 A tree topology combines characteristics of linear bus and star topologies. It consists
of groups of star-configured workstations connected to a linear bus backbone cable
(See fig. 3).
 Tree topologies allow for the expansion of an existing network, and enable schools to
configure a network to meet their needs.

Network Technologies Page 27


Unit-1 Introduction to Network

 Advantages :
o Point-to-point wiring for individual segments.
o Any topology can be combined with another without making any changes to
existing topology.
o The speed of the topology is compatible because it combines the strengths of
each of the topologies, eliminating weaknesses.
o It is also more efficient
 Disadvantages :
o Installation and configuration of topology is difficult. Because there are
different topologies that need to connect.
o Overall length of each segment is limited by the type of cabling used.
o If the backbone line breaks, the entire segment goes down.

Network Technologies Page 28


Unit-1 Introduction to Network

Terminologies
Internet

 The Internet is a worldwide network of computers that are connected (networked)


and are using the communication method called TCP/IP.
 The Internet was named ARPANET in 1969 by the Advanced Research Projects Agency
of the U.S. Department of Defense with just four computers connected together.

Intranet

 An intranet is a private network contained within an enterprise that is used to


securely share company information and computing resources among employees.
 An intranet can also be used for working in groups and tele conferences.
 Intranets encourage communication within an organization. They let employees easily
access important information, links, applications, forms and databases of company
records.

Extranet

 An extranet is a private network that enterprises use to provide trusted third parties
such as suppliers, vendors, partners, customers and other businesses secure,
controlled access to business information or operations.

Network Technologies Page 29


Unit-1 Introduction to Network

Unicast

 Unicast is a type of transmission in which information is sent from only one sender to
only one receiver.

 In another words, Unicast transmission is between one-to-one nodes (involving two


nodes only).

 Examples of Unicast transmission are http, smtp, telnet, pop3 where the request for
information is directed from one sender to only one receiver at the other end.

 All Ethernet and IP networks support this type of transmission.

Network Technologies Page 30


Unit-1 Introduction to Network

Broadcast

 Broadcast is a type of transmission in which information is sent from just one


computer but is received by all the computers connected to the network.

 This would mean that every time a computer or a node would transmit a packet of
type ‘broadcast’, all the other computers will receive that information packet.

 Examples of broadcast are many but one that would be best to understand here is a
computer ARP (Address Resolution Protocol) which will broadcast the address
resolution request to all other computers on the network.

Multicast

 Multicast is a very much different from Unicast and Multicast in definition and
application as well.

 It is a type of transmission or communication in which there may be more than one


senders and the information sent is meant for a set of receivers.

 One good example of Multicast based network is video transmission network in which
one computer needs to transmit video channel to a specific group of computers.

Network Technologies Page 31

You might also like