Unit 1
Unit 1
Unit-1
Introduction to
Network
503 NETWORK TECHNOLOGIES
Unit-1 Introduction to Network
Basics of Network
Introduction: Networking
A computer network consists of two or more computing devices that are connected in
order to share the components of your network (its resources) and the information
you store there, as shown in figure.
The most basic computer network (which consists of just two connected computers)
can expand and become more usable when additional computers join and add their
resources to those being shared.
The first computer is commonly referred to as your local computer. It is more likely to
be used as a location where you do work, a workstation, than as a storage or
controlling location called as a server. As more and more computers are connected to
a network and share their resources, the network becomes a more powerful tool.
Using a network with more information and more capability are able to accomplish
more through those added computers or additional resources.
One network can be connected to another network and become a more powerful tool
because of the greater resources.
Advantages
1. File Sharing: The major advantage of a computer network is that is allows file
sharing and remote file access. A person sitting at one workstation that is
connected to a network can easily see files present on another workstation,
provided he is authorized to do so.
2. Resource sharing: All computers in the network can share resources such as
printers, fax machines, modems and scanners.
4. Internet access: Computer networks provide internet service over the entire
network. Every single computer attached to the network can experience the high
speed internet.
7. Flexible access: A user can log on to a computer anywhere on the network and
access his files. This offers flexibility to the users as to where he should be during
the course of his routine.
8. Multiple access: Many of users can access the same information at the same time.
Disadvantages:
1. Lack of data security and privacy: Because there would be a huge number of
people who would be using a computer network to get and share some of their
files and resources, a certain user’s security would be always at risk. There might
even be illegal activities that would occur, which you need to be careful about and
aware of.
2. Presence of computer viruses and malwares: If even one computer on a network
gets affected by a virus, there is a possible threat for the other system getting
affected too. Viruses can spread on a network easily, because of the
interconnectivity of workstations.
3. Lack of Independence: since most networks have a centralized server and
dependent clients, the client users lack any freedom whatsoever. Centralized
decision making can sometimes hinder how a client user wants to use his own
computer.
4. Lack of robustness: If a computer network’s main server breaks down, the entire
system would become useless. Also if it has a bridging device or a central linking
server that fails, the entire network would also become useless.
Components of Network
Network consist of three primary components.
1) Server
2) Clients and Workstations
3) Resources
No network could be complete without this three component working together. We
can also add following connecting devices as component.
1) Routers
2) Bridges
3) Hubs
4) Repeaters
5) Switches
1. Server :
Server come in many shapes and size. Servers are main component of the network
and it provide a link to resources if necessary to perform any task. The link is provided
to resources on existing server itself or a resources on client computer also.
Server has the capability of centralizing the control of resources. They can be used to
distribute processes for balancing the load of the computer and it increased the
speed and performance.
Server perform several task like server provide files to the user on the network that is
called file server. If server provide printing services for user that is called print server.
There are also other task perform by server like remote access services,
administration and mail.
Server can be multi purpose or single purpose. If the servers are multipurpose then
they can be perform operation on both file server as well as print server. If the server
is single purpose then it is file server only or print server only.
Server has two categories : dedicated server and non- dedicated server.
1) Dedicated Server :
This type of servers are assign to provide specific application or services
because dedicated server is specializing in only a few task.
2) Non-dedicated Server :
This type of servers are assign to provide one or more network services.
A non-dedicated server is accepted to more flexible in its day to day use
than a dedicated server.
Types of Server
The word 'server' refers to a powerful specialized machine on which the server
hardware, software, or a combination provides various services to other computers.
A server can provide various functionalities, and they come in different types and
sizes to facilitate different work or uses. When a Server and its clients computers are
work together then we call it a client/server network, which provides us a centralized
access to information, content, and stored data, etc.
Types :
o File Server
o Print Server
o Application Server
o Database Server
o Proxy Server
o Message Server
Mail Server
IRC Server
Chat Server
File Server
File server provided the service to allow network users to share a files. With network
file service user can exchange, read, write and manage shared file.
File server provides various services about the file like,
o File transfer
o File storage & data migration
o File update
o File archiving
Print Server
There is an important factor of computer networking was the demand for ability to
share the printers. A networking represent a new level of computer printing because
a network can,
o Allow user to share printers.
o Allow user to place printers where it is convenient.
Application Server
Application server allow client PC to access and used extra computing power and
expensive software application that reside on a shared document.
Message Server
Message server provides message services in a variety of communication method.
With message server data can be passed in form of graphics, video, audio as well as
text.
Message server provide four main types of message services like,
o Mail server : this server store mails over the network.
o IRC: Inter Relay Chat consist of various network that allow user to connect to
each other.
o Chat server: it enable people to share information over the internet.
Proxy Server
A proxy server is a dedicated computer or a software system running on a computer
that acts as an intermediary between an endpoint device, such as a computer, and
another server from which a user or client is requesting a service.
Proxy server have two main purpose :
o Improve the performance of users by saving their time.
o It also filter the request coming to the server.
Types of Network
Network types can be dividing into following categories.
Network
Type
According According
to Size to Role
Peer to Client
LAN MAN WAN PAN SAN CAN Hybrid
Peer Server
Advantages:
Simple and Inexpensive: The main benefit of the Local Area Network is that it is easy
to set up at a comparatively low price. If an organization wishes to construct a
network at a low price and with flexibility, a Local area network would be an ideal
choice.
Accessible Software: Programs can also be shared on the Local Area Network.
Incorporate a single licensed program, and any device can use it on a network.
Protection of the Data: In cybercrime, all organizations want their data to be kept
safe. LAN is an ideal place where you can keep your data safe. Suppose a client wishes
to improve, update, and delete data. In that case, they can log into a single server
computer, and other devices will automatically receive their information. It has the
option to give to whom the user wishes to give access to the particular file. Only
approved users can access those files.
Disadvantages
Weak Protection of Data: Unauthorized users can access the file if the server has not
been properly programmed. Due to this, the frequent glitch is observed.
Maximum Damage: If the device, file, or server crashes, it affects the whole network.
Malware: Malware can easily penetrate the LAN, corrupt the whole network, and
destroys important data.
Advantages:
Security: MAN provides more security as compared to WAN and it is easy to
implement.
Distance occupies: MAN is occupied more distance as compared to LAN i.e. It is wider
than LAN.
Less expensive: MAN implementation cost is less than WAN because MAN requires
fewer resources as compared to WAN. It saves implementation costs.
High speed: Man has a high speed of data transfer because MAN often uses fiber
optics cables that are capable of offering speeds up to 1000Mbps.
Scalability: MANs can be easily scaled up or down to meet changing business needs.
Disadvantages:
The problem of less security: It is difficult to secure the system from hackers because
of the large area. This is mainly due to safety issues.
Wire required: more cables are required to connect MAN from one place to another.
MAN requires fiber optics cables which are quite expensive.
Technical assistance: Here, skilled technicians and administrators are required. This
can overall increase the installation cost.
Difficult to manage: MAN consumes a large area then there is difficult to manage a
large network, here is a chance of attacking hackers on the network. Data can be
secured but it needs experienced staff and security tools.
Advantages
Large area coverage: WAN covers a large geographical area(1000 km or more than).
Ex. If your business office is situated in another country and you live in another
country then WAN is a platform to communicate with each other(i.e. you and your
office staff members).
Higher bandwidth: WAN networks usually cover large geographical areas. Ex.1000 km
or more than the wide area network has higher bandwidth than LAN and MAN
networks.
Centralized data: Using the WAN network you can share the data connected to all the
devices in the respective network. Ex. By using the WAN network, all branches are
capable to share all data through the head office server and you can get support, full
back up, and other precious data from the head office, and all data gets synchronized
along with all other company branches.
Message Exchange: With the help of the Internet Of Things (IoT) and LAN, a sudden
growth of WAN-based devices can be seen. This communication via message can be
done fastest with the help of the most popular apps like messenger and WhatsApp.
Disadvantages
Security issue: WAN faces more security problems than LAN and MAN networks due
to WAN networks more technologies are merged.
Installation cost: WANs are default complex and complicated because of large
geographical area coverage. Hence there is a set-up cost in expensive WAN that also
needs routers, switches, and other security solutions.
Troubleshooting issues: Troubleshoot the big challenge on the WAN network and it
requires more time. If any issue occurs in the computer network then it is the most
difficult part to find out the proper cause due to their broad coverage area.
The term SAN can sometimes refer to system area networks instead of a storage area
network. System area networks are clusters of high performance computers used for
distributed processing applications requiring fast local network performance. Storage
area networks, on the other, are designed specifically for data management.
Hybrid Network
Hybrid network have active directory domain and work group. It is a client server
network and also it has peer sharing resources. So most of the networks are hybrid
network.
Hybrid network share the resources that are located on the server and the user
access to any resources being shared by peer to peer network.
Advantages
o It is server based networking and peer based network also. So it shares the
advantages of server based network and peer to peer network.
Disadvantages
o Hybrid network share the disadvantages of server based network
Network Topologies
The way in which the connections are made is called the topology of the network.
There are
o Physical topology
o Logical topology
Physical Topology :
It specifically refers to the physical layout of the network. It refers to the location of
the computers and how the cable is run between them.
The physical topology you choose for your network influences and its influenced by
several factors:
o Office layout
o Troubleshooting techniques
o Cost of installation
o Type of cable used
Logical topology :
Logical or electrical topologies describe the way in which a network transmits
information from one node to the next node, not the way the network looks.
There are following types of topologies :
o Bus topology
o Ring topology
o Star topology
o Mesh topology
o Hybrid topology
Bus topology
Physical :
For simple networks in a small area, the bus physical topology (daisy chaining) may be
the best solution. In the bus topology cable runs from computer to computer, making
each computer a link of a chain.
All computers on the network share a single cable and this cable is typically coaxial
cable.
Depending on the type of cable you are using, you can connect a bus topology in two
different ways.
If your network is using the thicknet coaxial cable, then the bus network will have a
central backbone cable that is the thick coaxial cable. Smaller, thinner cables called
taps or drops will runs from the backbone to each PC in the network. A small device
called a transceiver that connects the thinner cable to the thicknet backbone.
As opposed to the thick Ethernet, thinnet drop the backbone idea and connects all
network devices directly. Thinnet use the more flexible coaxial cable as compare to
thicknet.
Logical :
Every workstation can send out information in a package called a packet.
Each time a node on the network has data for another node. The sending node
broadcasts the data to the entire network. The various nodes hear it and look to see if
the data is for them. If so they keep the data. If not, they ignore the data.
Before a workstation broadcast to the network, it listens to see if anyone else is using
the network. If coast is clear then the workstation broadcast.
The biggest problem with the broadcast method of bus network is distance. If the
distance between two computers A and B on the same network is too great, they may
not hear each other on the line.
If they could not hear each other then node A could not tell whether node B is
transmitting or not.
Thinking that all is quiet, node A may begin its transmission when node B is already
transmitting data. If this happens and two nodes transmit at the same time, an event
called a packet collision occur and it cause a frequency “ripple” on the cable. The first
node detect this increased frequency ripple and it will send a high frequency signal
that will cancel out all other signals.
This signal tells all nodes that a collision has occurred and that all nodes on the
network should stop sending packets. At this point, each node waits a random
amount of time and then tries broadcasting again.
Advantages :
o It is cost effective.
o Cable required is least compared to other network topology.
o Used in small networks.
o It is easy to understand.
o Easy to expand joining two cables together.
Disadvantages :
o If it is not terminated correctly, then your network can not transmit properly.
o Malfunctioning nodes and cable breaks can cause problem for all computer.
o If the cable is damaged at some point along the way, the network won’t work,
and it can be time consuming to figure out where that break took place.
o If network traffic is heavy or nodes are more the performance of the network
decreases.
o Cable has a limited length.
o It is slower than the ring topology.
Ring Topology :
Physical :
The ring physical topology connects all computers on the network in a loop, running
double cable between each node in order to maintain network integrity.
The ring topology exists when each of the systems is connected to its respective
neighbour forming a ring, as seen in Figure.
This ring topology has many of the same strengths and weaknesses of the bus
topology.
The main difference between the bus and ring is that the ring topology does not
require termination.
Because the systems are connected all together in a loop, there is no beginning and
end point as there is with the bus topology.
Every computer is connected to the next computer in the ring and each ring can
transmit the message in a circular format.
As each computer acts as an amplifier, there is no problem of signal loss.
Logical :
The bus logical topology is a broadcast system- what one station says, all station hear,
but the ring topology doesn’t work that way.
In the ring topology, used by token ring, every station must repeat what it hears from
the previous station, making a kind of “bucket bridge” of data.
An entire file can’t be transmitted in one packet, so its pieces will be transmitted as
shown in following figure :
The heart of the ring topology is the token packet. To avoid packet collision, the ring
topology ensure that only one workstation can send information across the network
at any given time.
Only the node that has control of the token packet can send information across the
network.
When a workstation is done with the token packet, it release it to whatever station is
next in line. If nobody grabs it, the workstation releases it a second time. If nobody
response to the token packet for a second time, then work station send out a general
query known as solicit successor frame.
This frame goes out over the network, asking “who’s supposed to get the token
next?” if workstation responds, the sending workstation address the token to that
workstation and passes the token.
In ring topology, data is not broadcast on the network but passed from node to node.
Disadvantages :
o The failure of a single node in the network can cause the entire network to fail.
o The movement or changes made to network nodes affect the entire network's
performance.
o Data sent from one node to another has to pass through all the intermediate
nodes. This makes the transmission slower in comparison to that in a star
topology. The transmission speed drops with an increase in the number of
nodes.
o There is heavy dependency on the wire connecting the network nodes in the
ring.
Star Topology
In the star topology, each server and workstation plugs into a central hub that
provides connections to all other devices connected to the hub.
The centerpiece of star topology is a hub. Hubs come in several different flavors but
the basic design is simple that there is a device that provide a central junction point
for all network cable, providing a connection between each port to permit the
computers plugged into it to talk to each other.
Each workstation and server on the network has its own connection to the central
switching point. This means that each connection is independent of all other
connections.
The star topology is also nice for physically distributed networks. E.g., a network with
four computers- three workstations and one server.
If one workstation is upstairs and two are downstairs but in separate rooms, it’s a lot
easier to cable the network if you don’t have to worry about connecting all the nodes
to each other, and can just concentrate on connecting the individual workstations to
the hub.
Advantages :
o Due to the centralized nature, it is easy to detect faults in the network devices.
If one node doesn’t work, the problem probably lies somewhere between the
port on the hub and the node that it is physically attached to.
o Due to its centralized nature, the topology offers simplicity of operation.
o It also achieves isolation of each device in the network.
o Adding or removing network nodes is easy, and can be done without affecting
the entire network.
o Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high-capacity central hub, traffic load can be
handled at fairly decent speeds.
Disadvantages:
o The large amount of cable it uses. Each connection of network requires its own
cable.
o Network operation depends on the functioning of the central hub. Hence,
central hub failure leads to failure of the entire network.
o Also, the number of nodes that can be added, depends on the capacity of the
central hub.
o The setup cost is quite high.
This configuration does have some of the drawbacks of the bus network in that a
break in the cable connecting two hubs will isolate the part of the network beyond
the break.
Mesh Topology
In this layout, every system is connected to every other system.
The main advantage of this topology is high availability. The main disadvantage of this
topology is cost, both administrative and physical.
Because each system is connected to each other, the amount of cabling and
maintenance necessary , especially in larger networks.
The formula for determining the amount of cable needed in a mesh network is:
(N x (N – 1))/2,
where N is the number of systems to be interconnected.
In our example in Figure, we have six systems that require 15 cables to create a mesh
network.
This topology is mainly used in Wide Area Network environments.
Advantages
o No data traffic issues as there is a dedicated link between two devices which
means the link is only available for those two devices.
o Mesh topology is reliable and robust as failure of one link doesn’t affect other
links and the communication between other devices on the network.
Disadvantages
o Expensive
o Since each device needs to be connected with other devices, number of I/O
ports required must be huge.
o Difficult to implement
o Scalability issues because a device cannot be connected with large number of
devices with a dedicated point to point link.
Hybrid Topology
A combination of two or more different topologies makes for a hybrid topology.
When different topologies are connected to one another, they do not display
characteristics of any one specific topology.
Advantages :
o Point-to-point wiring for individual segments.
o Any topology can be combined with another without making any changes to
existing topology.
o The speed of the topology is compatible because it combines the strengths of
each of the topologies, eliminating weaknesses.
o It is also more efficient
Disadvantages :
o Installation and configuration of topology is difficult. Because there are
different topologies that need to connect.
o Overall length of each segment is limited by the type of cabling used.
o If the backbone line breaks, the entire segment goes down.
Terminologies
Internet
Intranet
Extranet
An extranet is a private network that enterprises use to provide trusted third parties
such as suppliers, vendors, partners, customers and other businesses secure,
controlled access to business information or operations.
Unicast
Unicast is a type of transmission in which information is sent from only one sender to
only one receiver.
Examples of Unicast transmission are http, smtp, telnet, pop3 where the request for
information is directed from one sender to only one receiver at the other end.
Broadcast
This would mean that every time a computer or a node would transmit a packet of
type ‘broadcast’, all the other computers will receive that information packet.
Examples of broadcast are many but one that would be best to understand here is a
computer ARP (Address Resolution Protocol) which will broadcast the address
resolution request to all other computers on the network.
Multicast
Multicast is a very much different from Unicast and Multicast in definition and
application as well.
One good example of Multicast based network is video transmission network in which
one computer needs to transmit video channel to a specific group of computers.