0% found this document useful (0 votes)
8 views12 pages

CH 3. Networking

Rudiments of Computer Science Class 12 WBCHSE Board Chapter: 3 Network - 3

Uploaded by

debjitdutta556
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
8 views12 pages

CH 3. Networking

Rudiments of Computer Science Class 12 WBCHSE Board Chapter: 3 Network - 3

Uploaded by

debjitdutta556
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
geen cer eeeneeen Rudiments of Computer Science Peau a Nene eee concert Mts sd x at ae 2 ER ed na computer network, the computers ae connected to each | [-TaaaGacan RESO [inctpctcotmgrncccamernss aaa the layout of different devices like computers, printers, backup | * Name tortor actiecures 1 devices tna network and their mode of fonction, neon are usually classified based on two properties viz. Are! and Topology. ‘+ Architecture: Network architecture refers to the mode of functioning of a network. It can be of ‘two basic types. These are Client-Server and Peer-to-Peer architecture. + Topology: Specifies the geometric arrangement of computers in the network i. the way in which the different network devices are connected. Examples include bus, ring, star topologies. ERE Network architecture defines how a network functions. This indicates whether all computers in the ‘etwork have the same role or certain computers have some special role in the network. Accordingly, We have either a client-server network or a peer-to-peer network. ‘Client Server Network: A client server network uses a distributed computing scheme whereby interaction takes place between two programs communicating across a network. In this model an application is split into a front-end client component with which the user machine interacts, and a back-end server component which processes the data, In a client-server environment a server is therefore a special computer, which all the [Giant other computers in the network connect to as clients for processing data, It is | ‘tent capable of handling multiple connections from different sources simultaneously. Since 4 server is used to serve other computers, these have high-end components as [Over ‘compared to other computers in the network. It also has built-in fault tolerance | feqteet ‘mechanisms to handle system failures ‘A client onthe other hand is usually a low-end computer. sz depends on the services provided by the sever to cary ou § (P| (BS ‘arlous operations. The lent sends a request to he serve for SS Eevee the specifi operation that may include file operations, print wabe jobs database access ete Thesenerintumanswersthe request FLEE by sending back the specific requirement tothe client. Client o™™ — computers in client-server network communicate with the Server with the help of et of eommon languages or protocols ike TCPIIP Corporate networks are usually client-server networks as they offer better security features, | Applications in the Internet also follow a client server approach, where the user acts as a client 0 request for an Internet service from a specific server. P2841 35 | | ettunetioning ofa | evar elant | op ‘Advantages of Client-Server ‘Architecture Advantages of Peer-to-Peer Architecture Op Difference between Client Server & P2P Network Part 2: Chapter 3 Advantages of using client-server architecture: 0 ‘her Sener actin a. Files stored on high-speed file servers can be easily made | , CS re saastoy aig available to the clients, cece «+ Shiery wo args tae b. Since data is stored centrally in the server, updates need to Gusev senare be carried out at a single place. + Stain ona disadvantage of using @ courses ¢. It reduces the load on client computers as processing of | Soniodeomen towed! complex queries takes place on the server computer that is Server ant a pet per avd specially equipped for these operations. 4. Asa server has greater security controls than client computers, servers guarantee that only those clients with the appropriate permissions may access and change data, Disadvantages of using client-server architecture: ‘4, With increase in number of client requests to a given server, the server can become overloaded, b. In case the server stops working, the requests made by client computers cannot be served. [Peer to Peer Networks (P2P Networks): In client-server architecture a server usually controls access to other clients. However, a Peer-to-Peer network architecture allows the client computers to bypass servers and directly communicate with other ‘computers. Win-2007, 2010 ete. have peer-to-peer networking support which allows any computer to establish a communication with another computer. In a peer-to-peer network there is no particular computer as such which acts as a server. In general, each computer in the network acts both as a client and as a server as per requirement. ich computer has its own hard-disk and can work independently if required. Network resourees like printers can be connected to any computer in the network and shared by the other computers, Advantages of using peer-to-peer architecture: 4 Its relatively less expensive to set up, eliminating the need for costly servers. b, Its relatively easier to setup the network. c. It makes networks fast by reducing network traffic load on busy centralised servers. | 4. Problem faced due to breakdown of central server does not arse in this typeof network Disadvantages of using peer-to-peer architecture a, There isa lack of central server-based administration, b, Since data is not protected by traditional server-based security mechanisms, it is less secure Differences between Client Server and Peer-to-Peer networks Roms In this architecture clients need to connect to | 1. This architecture allows a client computer © 4 server, which usually contols access 10 | "bypass servers and to directly communica ater cies. With other computers. 2A dedicated computer acs as server othe |2. Each computer in the nerwork acts both @ oer computers or cents client and asa server as required 3, tis more expensive and not that easy toset | 3. It is less expensive and easier to seup ® up, as special purpose computers and software | P-2-P network as no special requirement 8 |__may bereguied. | there. 2-3-2 36 usimentsof Computer Science ‘Notwork Architecture and Topologies (emerson 4. It is easier to administer a Client Server | 4, There is a lack of centr network from the cea admis ‘Security features of a server 1s less secure and prone server-based data hacking. ‘6. Operating systems include Windows Server | 6, Operating systems include Windows 2007, 2008, Novel Neware 2010 3.3 Network Topologies: {A topology implies pictorial representation or map of how Vials mom esbo?) Tt the different devices in the network are connected. Itis similar |= * Sue Pastbaze nev Pri ferent the network are connected. Iti simi pebieens network, Network topologies are important because: ‘rw dogan BUS saa toa oor plan of building and hence represents alayout ofthe | stmsmamunenstan 5 Cente + The network topology determines the system performance. * The network topology determines the cable media type used to connect the network, + The network topology determines the cast of cabling the network, + Some data access methods can work only with specific topologies. Depending upon how the connection is made, there are two aspects of LAN topology. These are + Physical Topology | + Logical Topology | ‘An analogy can be drawn between a street map and computer networks to explain the concept. Ina | street plan, the roads are laid out to ensure that all areas of the ity are connected by the streets, giving everyone access to every part of the city. Similarly, the Physical topology ofa network determines hhow all the computers should be connected so'that every computer has access to every other computer in the network. It serves asa visual road map. (Once the roads are laid out, the next thing is to decide how to handle the traffic. Some roads ean be ‘one-way, while others can be two-ways. Moreover, specific trafic signs are put at strategic points to control the traffic efficiently. Similarly, in a computer network, the means and methods to handle the digital traffic fall under the Logical topology of a network. Thus, the Logical topology deals with how the actual signals flow through the network. ‘The different Physical Topologies by which network devices are connected are discussed next, | Physical BUS Topology: = ‘Layout: The physical Bus Topology uses a single trunk eable called the baekbone cable Computers are attached to the backbone using smaller cables called drop cables. Thick or thin co-axial cable and fibre optic cable can be used for the backbone, Special connectors called PRAKALBS——ConputersPentaret ‘T-connectors are used to connect a drop cable —_— to the backbone cable. A device called a Terminator, fited at the two ends ofthe bus absorbs the signal atthe ends ‘+ Function: Only one node can transmit at a time. The transmiting node puts the message Topolomy ‘Atopoogy imple 2 pictoral representation ot map ofhow the dierent devices in te network connected, Physical Topology Physiea topology determines how the computers shouldbe connected Ina network & Loaial Topoleay Logical topology eat with how the actual signals flow trough the network, a BUS Topology BUS Topoleay Inthis topology a the nodes inthe | network are connected toa addressed to another device in the network. All devices receive the message, but only the node ‘whose address matches with the destination address of the message accepts the message. | «Example: 10BaseS and 10Base? Ethernet connections in a LAN are examples of bus topology 37 ‘common backbone | bus cable using drop | cabo. o STAR Topology | STAR Topology In this topology exch Part 2: chaptor 3 = Advantages: + This topology uses lesser amount of cable length compared to other topologies. + With the minimum cable length requirement, it is @ cheaper topology to implement ‘Extending a bus on either end is relatlvely easy. ‘Failure of one station does not affect others. “Sain wo vantage Tug Ba ‘poly + Che too Bo apg, 2 {eh ply ae Pn mina ‘ane ra : + Dene tly. ram Sgr 9 Sr logy + Sit wo eoeige of aig Sur iepsoy «She wollte oS ebgy 3 {ens eros pens: pag 1 1 Ghe an exam of Sa 1 Dede ig ety + Drona dap ra eg pag ‘+ Disadvantage: ‘The network fails in case of a damage in the bus cable ‘The number of nodes and the distance between nodes should be maintained to maintain a readable signal ‘+ Lis difficult to troubleshoot such a network. ‘Performance degrades as additional computers are added. Physical STAR Topology: ‘+ Layout: Star topology isthe most reliable and widely used topotogy at present. In this topology each network device is directly connected to central computer and all data/information passthrough this central server. Usually, UTP cable is used with the maximum length of cable between the server and the nade not exceeding 100m. Function: When a node sends data, the message gets transmitted to all the other nodes. All devices in the network receive the message, but only the node whose address matches with the destination address of the message, accepts it Example: This type of topology is usually used with a 10BaseT Ethernet LAN. Advantage: ‘tis easy to set up a star network asthe star structure ofthis topology ensures that the network does not get disturbed when a new node is added. + Moreover, ff any one link breaks, the station using that is affected only. A defective node can be easily removed without affecting the working of the network. 1 Itis easy to monitor and troubleshoot. Disadvanta ‘The length of eable required for this topology is greater than that required by a bus topology than linear bus topologies because of the cost of the hubs/switch etc. ls then the operation of the whole If the central device network also fails, Layout: In Ring Topology, each device is serially connected in 14 closed loop forming a ring, with each node connected to two ‘ther nodes. The signal is received by the NIC at the input end ‘ofa node and passed on to the output end, after regenerating the signal, Ring topology uses STP eable with D connectors. 2-3-4 © Examp! + Advantage: © Disadvantage: ‘Rudiments of Computer Science Network Architecture and Topologies |In reality, the ring in a ring topology is actually formed within a central device called a Multi-station Access Unit (MAU). Therefore, from ‘outside, the topology looks like a physical star. Function: To send data, a device has to collect a special electronic ‘message called a token. The message, along with the token travels in circular manner from one node to the next in a given direction. The node whose address matches with the end address ofthe data accepts the data and acknowledges is receipt, It then retransmits the data back to the source node, where itis finally removed from the network and the token made free to be used by other nodes. ‘he IBM Token Ring network and FDDI networks uses ring topology. QC: Serene As only a single station can transmit data at any given Sm tre time, data collision is absent. + Gre intaterefRig 09) 2 2 S macoMaur * The network access is not under a central control, | 7 28ebePeleh stay, 3 1 Dra adagnt sh opty 4 Every computer in the ring gets equal opportunity to send | | yen ’damente Met tonoa its data, and no computer can dominate the network ‘pen? 2 + Using STP cables longer distances can be traversed | 1 Suesnsnaninegcn wor! ‘without much signal loss, ‘+ As there isno open end, it eliminates signal bounce problems and need for cable termination, ‘+ Disadvantage: ‘As every station is involved in the transfer of data, if a link breaks down then the entre network comes to a halt. A bi-directional ring can solve this problem to some extent + Incase ofa cable breakdown, the entire network comes to a halt. + Aring network is also a litte difficult to reconfigure, in Mesh topology each network node is connected to ‘multiple modes through separate cable links. This provides ‘multiple paths for the data from the source to the destination,“ ‘There are two types of mesh connections. In a partial mesh = -—* topology, some of the computers are connected to all the cable ‘computers, whereas some are connected to only those with which they frequently exchange data. In a full mesh topology, cach » ical ‘computer is connected to all the other computers. a te Funetion: It functions similar to Bus topology. All devices receive the message. Only the node ‘whose address matches with the destination address ofthe data packet, accepts it. ‘+ Example: This type of topology is used in mission eritical applications where a fault in the network cannot be tolerated. The Internet uses « partial mesh topology. Advantage: ‘As there are multiple connections with altemative paths between two nodes, tis is the most reliable type of topology. Communication within the network is guaranteed * Complexity and cost of setting up the network increases with increase in number of nodes. = Difficult to troubleshoot due to its complexity. P2385 39 a MESH Topology MESH Topoon / Part 2: Chapter 3 Physical TREE Topology: ‘+ Layout: Tree topology is used in a point-to-point network and looks like an inverted tree, It usually consists of groups of star-configured workstations connected to a central hub. I uses an active hub or repeater to connect the nodes in the star network, * Function: Acts like a bus topology. A bub accepts data from one node and sends it to the other nodes and hubs. Example: This topology is used in configuring domain name servers, © Advantage: * The major advantage is that when one hub breaks | down, only stations connected to that hub get affected. [ff = Siem sto cara oe The rest ofthe network functions a usual 1 1 Ghe alton of Tee peony | * allows for the expansion of an existing network + Sle ceo mt oes «Su fates te Sarat ing Tonle. ‘ ‘Setting up a tree topology is complicated in comparison toa simple star or bus topology. & Diet teen cd ee a Sars coe cneta Ee called the backbone with two open ends.

You might also like