0% found this document useful (0 votes)
4 views

Computer Network Chapter1

Notes book

Uploaded by

pranaypatle8668
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Network Chapter1

Notes book

Uploaded by

pranaypatle8668
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Tatbie of Cotents

Computer tletwor tTSe4/ WseTE,


Unit- I
161 Lat Aree fietwoks (LAN)
Chapter 1: Fundamentals of Computer Network 162 Ererret
1-1 to 1-21
Syllabus : Needs, Uses of computer network, 1.6.3 Metropnan Area tiewt tMAN)
of computer network, Applications
network: ShaDng of Advantagesbenefits of computer 1.6.4 Wrse Aree tiet (IAN)
Centralised management information,
of reeources,
Sharing resources,
Backing up of
Classification of data, 1.6.5 PAN (Persrel Aree tietr, 1-19
networks: Geographical cdassification,
Classification based
Classification based on transrnissin technoiogy,
on 1.6.6 CAN (Carnps Area tietw 1-19
network
network computing models : Peerrelationships, Basics of
to peer, Client sever,
1.6.7 1-1

Distributed, Network operating system (NIS) its types and 1.7 Classiiation Bases n Trarriss
feeture6. Terrinciogy 111

1.1 A Network
.1-1 1.7.1 Broardas Ngtuors 1-11

1.1.1 Computer Networks 1.72 Poirt to Port tietws 111


.1-1

1.1.2 Need and Applicatons of Computer 1.8 Basics of Netwotk nptrg res 1-11

Network 1.9 Peer-to-Peer tletwths 1.11


.1-2
1.9.1 When to Use Peer o Peer ietws ?.1-12
1.1.3 Cornponents of a Computer Network ...1-2
12 Network Benefits 1-2 1.92 Foatures d Peer io Peer tietts ..1-12
1.2.1 Sharing Information ..1-2 1.9.3 Advarntages of Peer to Peer
Networks 1-12
1.22 Sharing Resources .1-3
1.94 Disadvarnages t Per Poe
1.2.3 Facilitating Centralized Managerment. .1-3
Networks .1-1%
1.2.4 Other Benefits of Computer Networks ...14 1.10 Client /Server tietwork
(Server Based Networ) 1-1%
1.2.5 Disadvantages of Networks 1-5
1.10.1 Cornruniztnin Ciert-terver
1.3 Network Services .1-5
Cortiguration
1.3.1 Service Provided by the Network for
1.10.2 Adrarntages of CiertServe
Organizations 1-5
Network 1-14

1.3.2 Services Provided by the Network to


1.10.3 Disasvantages Cliert-Serve
People ...1-6 Networks 1-14

1.4 Cormputer Network Criteria 1-6


1.104 Appliratons of Giert-Serve rtgrtirr
........1-7
1.5 Network Scale 1-15

1.6 Classification of Networks Geographical Classification 1-15


.1-7 1.10.5 Types of Servers
MErTE)
Cormputer Notwork (IT/Sern 4/

K Table of Contents
2.1.3 Host
of
Inftuencingthe Choice
1.10.6 Factors .1-15 Cornrnunication Subnet
2.1.4
Network
Peer-to-Peer 2.2 Network Interface Card (NIC)
Comparison between
1.10.7 ......1-15
Network
Network andClient-Server 2.2.1 NIC Operation
...1-16
Devicos
1.11 Network Features
2.3 Network Control / Connecting
1-16
1.11.1 File Sharing
2.3.1 Types of Network Connecting
1-16
1.11.2 Printer Sharing Devices
24

1.11.3 Application Services 1-16 24


Transceivers
2.4
1-17 2-4
1.11.4 E-mail
2.5 Role of Network Connecting Devices
.... 1-17 25
1.11.5 Remote Access Repeaters
2.6
1.12 Models of Network Computing .1-18
.2
2.6.1 Advantages
1.13 Distributed Networks .1-18
2-6
.1-19 2.6.2 Disadvantages
1.14 ANetwork Operating System (NOS) ...
2-6
1.14.1 Peer to Peer NOS ..1-19 2.7 Hubs

2-7
1.14.2 NOS Based on Client Server Model .....1-19 2.8 Bridges

2.9 Routers .2-8


1.14.3 Duties of A NOS ..1-19

2.10 Gateways .2-9


1.14.4 Features of Windows NOS . . . . . . . . .1-20

1-20
2.11 Switches .2-10
1.15 Network Functions

Review Questions. .1-20 2.11.1 Comparison of Hub and Switch .2-11


Unit - II
2.11.2 Comparison of Router and Bridge ..... 2-11
Chapter 2: Network Components 2.11.3 Comparison of Bridge, Switch and
2-1 to 2-16
Hub 2-11
Syltabus: Basic components of computer network
Cables, Host, Communication subnet, NIC, Network 2.11.4 Comparison of Bridges, Routers and
devices and their rote : Repeaters, Hub, Bridges, Switches,
Router and Gateway, Wireless infrastructure Switches .2-11
components
Access point,Clients. 2.12 Modems
.2-12
2.1 Basic Cormponents of Computer
Networks......2-1 2.12.1 Role of Modem .2-12
2.1.1 Node
.2-1 2.12.2 Functions of Modem
.2-1
2.1.2 Cables or Links
..2-1 2.13 Wireless Infrastructure
Components .2
GHAN

Fundamentals of Computer Network


Unit-l

Syllabus :
Needs, Uses of oomuter nenwork, Applicabons ot oomputer network, Advantagesbenefits of computer network
of
Shaningof infomation, Sharing resources, Centralised management of resources, Backingup of data, Classification
on
networks : Geographical cassification, Classihcstion based on transmission technokogy, Classification based
Distributed, Network
nework relstonships, BsSicS of network computing modes : Peer to peer, Client server,
operating system (NOS) its types and features.

1.1.1Computer Networks :
1.1 A Network:
In context with the computers we can say that a
Network: "computer network" is a system which allows
Network is a broad term similar to "system". Network communication among the computers connected in the
is acommunication system which supports many users. network.

The interconnection of one station to many stations is During 20" century the most important technology has
called as networking. been the information gathering, its processing and
distribution.
A netwwork is any interconnection of two or more
stations that wish to communicate. The computers and communications have been merged
together and their merger had a very deep impact on the
Node :
manner in which computer systems are organized.
Each station in a communication network is called as a
In the old model a single computer used to serve all the
node. The nodes are connected in different way to each
other to form a network. computational needs of an organization. But now it is
replaced by a new model in which a large number of
One of such networks is shown in Fig. 1.1.1. separate but interconnected computers do the job.
Many other forms of interconnections are possible. The Such systems are called as computer networks.
most familiar network is the telephone system. It is the
Definition:
largest and most sophisticated network of all.
-Node
A computer network is a group of computers and other
computing hardware devices are linked together
through communication channels to facilitate
communication and resource sharing among wide range
of users.
Unk
Two computers are said to be interconnected if they
exchange information. The connection between the
(G-13)Fig. 1.1.1 :Asimple communication network separate computers can be done via a copper wire, fiber
optics, microwaves or communication satellite.
Fundamentais of Computer Network
1-2
KP Computer Network (IT/Sem 4/ MSBTE) Computer
cach node in a computer
1.1.2 Need and Applications of
As shown in Fig. 1.1.2, Network:
connecting device such as a the
network is a computer, or a are needed because of
The computer networks
hub, or a switch etc. following points :
share files. the
The computers connected in a network such as printers among all
For sharing the resources
folders, applications and resources like scanners, web users.
cams, printers etc. softwares and database.
2. For sharing of expensive the
The best example of a computer network is the Internet. communication from one computer to
3. To facilitate
other.
amongst the
have exchange of data and information
4 To
Hub
users, via the network.
over the geographically
5. For sharing of information
wide areas.
between various
computers
6. For connecting the
buildings of an organization.
(G-1395)Fig. 1.1.2 : A computer network
make use of 7. For educational purposes.
In a computer network we need to Network:
hardware and software. 1.1.3 Components of aComputer
components of a
The hardware consists of connecting cables, Following are some of the important
the
connectors, network connecting devices and
computer network.
software consists of protocols, programs etc. 1. Two or more computers.
optic) as links
This enables the systematic exchange of
information 2. Cables (coaxial, twisted pair or fiber
network.
between the computers connected in the between the computers.
There are various ways of
interconnecting the 3 A Network Interfacing Card (NIC) on each computer.
computers. 4. Switches or other suitable connecting device.
Protocol: 5. A software called network operating system.
occur, it is not
For successful communication to 1.2 Network Benefits:
message
enough for the "sender" to simply transmit the
receive it
and "assume" that the "receiver' will A network is supposed to provide its uses some unique
properiy. capabilities, better than what the individual machines
followed to ensure
There are certain rules that must be and their software can provide.
proper communication. The benefits provided by the network to the users can
as a "protocol" of the
A set of such rules is known be divided into twO categories as follows :
cornputer communication system.
1. Sharing
Definition: 2. Connectiity
Protocol is defined as the set of rules agreed upon by 1.2.1 Sharing Information :
the sending and receiving computer systems, to
Networking allows the users to access the data stored
facilitate a proper communication between them.
on other's computers.
Many different protocols are used in the modern
computer communication system. It is possible for every user to share his bit of
information with the other users over the network.
Need:
Protocols are needed to ensure proper communication The information sharing can be in the form of exchange
among the computers connected in a computer of data, chatting, sending E-mails, sharing video
network. information, groups etc.
13 Fundamentals of Computer Nework
Computer Nework (T/Sem MSBTE)
cach computer is
t is also pssble for the users to share the information In addition, installing software on
about vanous prxducts, movies, technical information, time consuming and diffeult.
using the
Oking, travei bOson ntemet. This problem can be overcome hy
Concept of software esource sharing
Sharing of infornation via Intemet has bevome very
ommon now a days. In a network, we can centratty install ani configure
The infomation which is to be shard or beng shart only one copy of each software and share it aong
should be shared centrally. it mast be kept consistent rest of the computers.
and secured This actually saves a lot of time and cost Fg 122
The acoess to this stored informaton should be allowed shows the principle of software sharing

only to the authorized users. Node t


Gaphic
ties
Shanng of information eliminates the need of
Node 2 Centralzed
transferng fies on CDs or pen dives etc.
storag Databa fes
1.2.2 Sharing Resources :
Node 3
Networks can allow its users to share various types of
Spesadsheets
resources. We can broadly categories the shared resoures as
follows : Node 4

Shared hardware resoures Word processing


documnts
Shared software resources
Common softwars
1. Sharing of hardware resources :

A network allows its users to share the many (GI39Fig. 1.22 :Sharing of software resources
hardware devices such as printes, modems, fax 1.2.3 Facilitating Centralized Management :
network
machines, CD ROM players etc. The computer network facilitates centralzed
management with espect to following:
These rsources are available to any one on the
etwork imespective of the physical location of the 1 Management of software
resource and the user. 2. Maintenance of network

This wilH save the expenses on duplication of such 3. Keeping the data back up
bardware resources Fig. 1.2.1 shows a laser printer
being shared by many users. 4 Central network security
All this is allowed by the client - server netwon.
Laser
printer Managing software:
As discussed earlier, it is a very god içca lo share
a
User 4
the software rsoures, instead of instalhng
User 3
User f User 2 separate copy of software on cach computer.
on
GISFig. 1.21:Sharing of hardware resources It is possible to load allthe important software
single computer (sever).
2. Sharing of software resources :
of th
some All the other computers can make use
With every computer, we need to install centralized softw are as per their equirments
basic software's on each computer's hard disk.
will have to This reduces the expenses in buying the expensiv
So cach computer on the network software's for each individual computer. l
equired
purchase a separate copy of each software makes the virus checks casy.
to be used. This will increase the cost to be
incured
tey veiwh( i m MaiE) funtamentas a amuta Natwan

The eralized hakup Ndus huve h aRS


w** wi p haning sofiwae again

Isaiated hackup
AMatntenanee of netwok .
Canralizd hakup

e enaized nangeen allows quek and eany hkp pgram allad as hck un
A pr akup ywhah s saiiahie ia th gvan

pocRs are as lollows


Rull hakup
ew of ssvd, iafi, itomaeand Roplcaion
Sos oi ile eiwok manienaice kools availathie to Incemenial or partial hackup
1.2.4 Other Benefits of Computer Networks:
' t analyox Pollowing ar some of the thet avanias a
ivent vewe Ompute notwarks.
1 Inoraasad spad
Neiwob analyze Notwarks provnde a vnn fas mans T shuin
and raAnNÍar ol tules
Neiwk anagenen poocol
Backing up data If the oomputer networks wauid nat he hn
thare, then we woald have 0 the fies an C
la de pea l data bac kup, data from compute or pen drive and send them to the othat
om
Reduoed oost :
hu keeping ii safe
Many ppular versions of softas UShic tar the
Iaking a k p p ally is impotant tecauIse i! entire natwork are now AVALahic a à
poeis the daia againsi any unprelictable, accidental OnSIArah
mduced costs RS OMnard t intvituàl nSA
liss of daia due t syslem failure, computer viruscs, or
copics.
luman cm
In addition to thus ii is also Ssihie
Bui taking a hakup of indivdual user's data separatcly shur i
prngram on A netwnk I5 so SSie
is a ne consumng and unorganized
upgrade the program
Hece in a nclwouk, the users fust save heir impolani
data on he cenral server and then the hackup can he
Improved ecurty:
laken onte serveL dala II is possibie to proiet the prograrns und fies tror
This vduces the ime and slocs ithe thackup data at a ilegal copying
sigaal plae only This makes the data retrieval casy By aliOttung paSSWOrd tht aESS cA
TsI
We can have (wo o hree seLs of the entre hackup data O authorised users only.
This lps n ihe cvenl of onc oi two seLs getung Cantraliznd ofware manageme
cwp Ihe duplkcalion of backup data hecomes casily Due tO he us of
cOMNe w
pNsihie duc to conralized slorage soffwares car be oaded on t DOm
Computer Network (IT/Sem 4/ MSBTE) 1-5 Fundanentals of Conputer Netwok
All the other computers can make use of this 1.3 Network Servlces :
centralized software. It is not necessary to waste
time and energy in installing updates and tracking The computer netwoks are playng an tnaNtant ole in
files on independent computers. providing services to large organ1satos aN well ax tu the
5. Electronic-mall : individualcommon man.
The computer network makes the hardware 1.3.1 Servlce Provided by the Network for
available which is necessary to install an e-mail Organizations :
system. Many organisations have a large number of computers
The person to person communication is improved in operation. These computers may be within the sae
due to a presence of e-mail system. building, campus, city or ditferent citics.
6. Flexible access: Eventhough the computers are located in ditlerent
It is possible for the authorized users to access locations, the organisations want to keep rack ot
their files from any computer connected on the inventories, monitor productivity, do the ondering and
network. billing etc.
The computer networks are useful to the orgnisations
This provides tremendous flexibility in accessing.
in the following ways :
1.2.5 Disadvantages of Networks :
1. Resource sharing :
Following are some of the disadvantages of computer
networks. It allows all programs, equipments and data available to
1. High cost of installation : anyone on the network irrespective of the physical
location of the resource and the user.
The initial cost of installation of a computer
network is high. This is due to the cost of cables, 2. High reliability due to alternative sources of data :
network cards, computers, printers and various It provides high reliability by having alternative
softwares that are required to be installed. sources of data. For e.g. all files could be
The cost of services of technicians may also get replicated on more than one machines, so if one of
added. them is unavailable due to hardware failure or any
other reason, the other copies can be used.
2. Requires time for administration :
Computer networks proper and careful
need The aspect of high reliability is very important for
time military, banking, air traffic control, nuclear
administration and maintenance. This is a
reactor safety and many other applications where
consuming job. continuous operations is a must even if there are
3. Failure of server: hardware or software failures.
down" then the entire
If the file servers "goes 3. Cost :
network comes to a standstill. Computer networking is an important
financial
entire organization can aspect for organisations because it saves
moncy.
If this happens then the
to the necessary Organisations can use separate personal computer
lose its valuable time and access
mainframe computer
programs and files. one per user instead of using
which are expensive.
4. Cable fauts : workgroup model
the The organisations can use the
network are interconnected with the PCs are networked
The computers in a (peer to peer) in which all the access to the
faults can paralize a together and each one can
have
help of connecting cables. So cable pupose.
network. other for communicating or sharing
Notwork
Fundamentals of Computer
Computer Network (IT/Sem 4/ MSBTE)
1-6
C2
security for its Interactive entertainment :
The organisation, if it wants 3.
the domain model in Interactive entertainment includes
operation it can go in for
which there is a server and clients. All the clicnts Multiperson real-time simulation
games
can communicate and access data through the
Video on demand.
server.
likes quiz,
4 Communication medium : Participation in live TV programmes
contest, discussions ctc.
A computer network provides a powerful
Crlterla :
communication medium among widely separated 1.4 Computer Network
employees. system. Network i
Network is a broad term similar to
Using network it is easy for two or more supports many users.
a communication system which
employees, who are separated by geographical can say that, a
locations to work on a report, document or R and In context with the computers we
which allow,
D simultaneously i.e. on - line. "computer network" is a system
in the
communication among the computers connected
1.3.2 Services Provided by the Network to
network.
People :
certain criteria. The
A network must be able to meet
The computer networks offer the following services to
most important of themare:
an individual persSon :
1. Performance 2.Reliability 3. Security
1. Access to remote information

2 Person to person communication Performance :


Performance can be measured in different ways. We
3 E-commerce
can measure it in terms of transit time and response
4 Interactive entertainment.
time.
1. Access to remote information :
Transit time is defined as the time required for a
Access to remote information involves interaction
message to travel from one device to the other.
between a person and a remote database. Access to
remote information comes in many forms like : Response time : It is the time clapsed between the
Home shopping, paying telephone, electricity bills, instant of enquiry and the instant of giving response.
e-banking, on line share market etc. The other factors deciding the performance are as
Newspaper is on-line and is personalised, digital follows :
library consisting of books, magazines, scientific 1. Number of users.
journals etc.
World wide web which contains information about 2. Type of transmission medium.
the arts, business, cooking, government, health, 3. The hardware used.
history, hobbies, recreation, science, sports etc. 4. The software used.
2. Person to person communication :
Reliablity:
Person to person communication includes:
The network reliability is important because it decides
Electronic-mail (e-mail).
the frequency at which network failure takes place.
Real timne e-mail i.e. vide0 conferencing allows
remote users to communicate with no delay by It also decides the time taken by the
network to recover
seeing and hearing each other. Video-conferencing and its robustness in the
is being used for remote school, getting medical catastrophe,
opinion from distant specialists etc. Security:
Worldwide new groups in which one person posts The network security refers to protection of data from
a message and all other subscribers to the the unauthorized user or access. It also
includes the data
newsgroup can read it or give their feedbacks. protection against damage and recovering it in the events of
data losses.
1-7 Fundamentals of Computer Network
1.5 Network Scale: Networks

Ihas iN an aliaiv crttenon for lassifiraiMm of PAN LAN MAN WAN CAN
(Personal {acat (Metropoitan (Wide (Campus
Area Area Area Area Area
F 15l gies the ewwÀ Nehwork) Network) Network) Network) Network)
classifwation hased on
their phyial sie All thse Sstens are
ltipnvesSOr (Gi400Fig. 1.6.1: Network categories
inierr 1.6.1 Local Area Networks (LAN): L
Proessors ae Example of W-14. S-15, W-15
distae located in netwerk ISBTE Questions
Sax ut Data fiow Q.1 What is LAN ?Explain its advantages.
Machine
(W-14, 4 Marks)
Multicuputer 0.2 What is LAN ? List its advantages.
LAN (S-15,4 Marks)
Q.3 Enlist and explain four characteristics of LAN.
I00 m Sax building LAN
(W-15, 4 Marks)
LAN Q.4 Define LAN. Explain its advantages.
10 km (W-15, 4 Marks)
MAN
100km Sak state Definition:
WAN
L.000km Sak ontinent WAN The Local Area Network (LAN) is a network which is
10, 000 km Same planet designed to operate over a small physical area such as
Intermet
an office, factory or a group of buildings. LANs are
Fig. 1.5.1: Netwerk ciasification sccording to scale
very widely used in a variety of applications.
Beyond the mulicomputers are the true networks, in
LANS are easy to design and troubleshoot. The
which he computers communicate by exchanging
messaes over loag cables. personal computers and workstations in the offices are
interconnected via LAN.
Such networts are divided into following categories :
The exchange of information and sharing of resources
Locl rsneworts
becomes easy because of LAN.
2 Metropolitan aranetworks and
In LAN all the machines are connected to a single
3 Wide arra networks.
cable. Different types of topologies such as Bus, Ring.
Internetwork : Star, Tree etc. are used for LANS.
The connection of two or more networks is called as an
LAN uses a layered architecture and they are capable
internetwork of operating at hundreds of Mbits/sec.
The best exampie of internetwork is the Internet.
A Local Area Network (LAN) is usuaily a privately
1.6 Classification of Networks : owned and links the devices in a single office, building
Geographical Classification: of campus of upto a few kilometres in size as shown in
Fig. 1.6.1.
Computer network can be classified based on the
geograpical area they cover, ie. the area over which Depending on the needs of an organisation and the type
the network is spread. of technology used, a LAN can be as simple as a few
COmpuiers and a printer at home or itcan contain many
Such a classifcation is sbon in Fig. 1.6.1.
computers in a company and include voice, sound and
In this section. we will discuss the following categories
video peripherals.
of networks :
Fundamentals o!
MSBTE) 1-8
Computer Network (|T/Sem 4/
allow resources to be
shared Advantages of LAN:
LANS are widcty tased to workstations, The individual compters cea
between personal computers
or 1. High reiabilsty. Failure of
a printer or not affect the entire LAN.
resources to be shared can be hardware like
computer casily
softwares or data. 2. It ispossible to add a new
in aLAN One of the computer can become a server a very high rate
3. The transmission of data is at
serving all the remaining computers called clients. 4. Sharing of peripheral de vices
ssch as printer 8
Software can be stored on the server and it can be used
possible.
by the remaining clients.
Applications of LAN :
LAN's are also distinguished from MAN's and WAN's
based on the transmission media they use and topology. 1.
File transfer and file access.
In general a given LAN will use only one type of
transmission medium. The most common networking
2. Personal computing.
topologies used are bus, ring and star. 3 Office automation.
The data rates for LAN can now range from 10 Mbps 4. Distributed computing.
to 16 Gbps. 5. Wordand text proccssing.
Important characteristics /Features of LAN: 6. Document distribution.
1. Very high degree of interconnection between the
7. Remote access to database.
computers.
2. High rate of data transmission. 8. Electronic message handling.
3. Physical connection of computers in a LAN is casy. 1.6.2 Ethernet :
4. Every computer in the LAN can communicate with
Both Internet and ATM (Asynchronous Transfer Mode)
every other computer.
5. The medium used for data transmission is inexpensive.
were designed for wide area networking. But in nany
applications, alarge number of computers are to be
LAN topologies : connected to each other.
Network topology is defined as the pattern in which the For this the Local Area Network (LAN) was
network elements are connected to each othcr.
introduced. The most popular LAN is called Ethernet.
Different network topologies are :Bus, ring, star etc.
Various topologies are possible for the broadcast LANs The IEEE 802.3 standard is popularty called as
Ethernet. It is a bus based broadcast network with
such as bus topology or ring topology as shown in
Fig. 1.6.2. decentralized control.
It can operate at 10 Mbps or 100 Mbps or even above I
Cable
Gbps.
(Bus) Computers on an Ethernet can trans1nit whenever they
Hu want to do so. If two or more machines transmit
Computers simultaneously, then their packects collide.
(a) Bus topology Then the transmitting computers just wait for an
arbitrary time and retransmit their signaB.
Computers There are various technologies available in the LAN
market but the most popular one of then is Ethernet.
Definition:

Ethernet is a way of connecting computers Logether in a


LAN. t is the most widely used method of linking
Cable
computers together in LAN. The basic idea behind its
(b) Ring topology
(G-32)Fig. 1.6.2 : LAN topologies design is to facilitate multiple computers to access it
and send data anytime.
Computer Network (IT/Sem 4/ MSBTE) 1-9 Fundamentals of Computer Network
Traditional Ethernet was created in 1976 and has a data Definition :
rate of 10 Mbps.
1.6.3 Metropolitan Area Network (MAN): A WANis a telecommunications network or computer
A MAN is network that extends over a large geographical
basically a bigger version of a LAN and
normally uses similar technology. It is designed to distance/place. Wide area networks are generally
extendover larger area such as an entire city.
a established with leased telecommunication circuits.

The MAN can be in the form of a single Most wide area networks are used for transferring large
network such
as a cable network or it can be a blocks of data between its users. As the data is from
combination of
multiple LANs as shown in Fig. 1.6.3. existing records or files, the cexact time taken for this
A MAN may be wholly owned and data transfer is not a critical parameter.
operated by a
pnvate company or it may be a service provided by a Anexample of WAN is an airline reservation system.
public company, such as a local telephone company Terminals are located all over the country through
(telco).
which the reservations can be made.

LAN It is important to note here that all the terminals use the
LAN same centralized common data provided by the central
reservation computer.
LAN
Because of the large distances involved in the wide
Public city network
area networks, the propagation delays and variable
signal travel times are major problems.
Therefore most wide area networks are not used for
LAN
time critical applications. As explained earlier they are
more suitable for transfer of data from one user to the
other which is not a time critical application. Wide area
(G-3)Fig. 1.6.3 : Metropolitan area network
networks are basically packet switching networks.
Definition:
AMAN is a network that interconnects users with the
computer resources in a geographical area larger than
that covered by a LAN and smaller than that covered
by a Wide Area Network (WAN).
1.6.4 Wide Area Network (WAN):
When a network spans a large distance or when the
computers to be connected to each other are at widely
be
separated locations a local area network cannot (G-35)Fig. 1.6.4 : Wide area network
used.
A WAN provides long distance transmission of data,
For such situations a Wide Area Network (WAN) must
different voice image and video information over large
be installed. The communication between
geographical areas that may comprise a country, a
users of "WAN" is established using leased telephone shown in
continent or even the whole world as
lines or satellite links and similar channels.
the phone Fig. 1.6.4.
It is cheaper and more efficient to use
network for the links.
Fundamentais of Computer Network
Computer Network (|T/Sem 4/ MSBTE) 1-10
MAN :
Characteristics / features of WAN: 1.6.7 Comparisonof LAN, WAN and
W-14, W-16, S-17
Following are some of the important characteristics of MSBTE Questions
following
WAN: Q. 1 Compare LAN and WAN by considering
Remote data entry and access is possible. points :
(W-14, 4 Marks)

Communication facility is provided. 1. Geographical area 2. Speed


2
3. Installation cost 4. Communication medium.
Centralized information is created and used. points).
3
Q.2 Compare LAN and WAN (any four (W-16, 4 Marks)
4 WAN spans over a large distance. following
Q.3 Differentiate between LAN and WAN on
1.6.5 PAN (Personal Area Network): points :
A Personal Area Network (PAN) is a computer (a) Speed (b) Area
Communication media.
network designed for and organized around an (c) Installation cost (d) (S-17, 4 Marks)
individual person.
WAN MAN
Sr. Parameter L N
A PANgenerally consists of a mobile computer such as
a laptop, a cell phone and /or a personal digital assistant No.
of Private Private or|Private or
(PDA). PAN will allow the communication to take 1.Ownership
network public public
place amnong these devices.
PAN can also be used for communication among 2. Geographical Small Very large Moderate
personal devices themselves (intrapersonal Areacovered (states or(city)
countries)
communication) or for connecting to a higher level
network and internet (This is called as an uplink). 3. Design andEasy Not easy Not easy
maintenance
The PANs can be constructed using cables or it can be
wireless. The wireless PANS typically use Bluetooth or 4. CommunicationCoaxial PSTN orCoaxial
sometimes use the infrared connections. medium cable satellite cables,
links PSTN,
The PANs generally cover a range upto 10 meters. optical
PAN can be considered as a special type of Local Area fiber
Network (LAN), which is designed for one person cables,
instead of a group. wireless.

1.6.6 CAN (Campus Area Network) : 5. |Data rates High low Moderate
(speed)
The Campus Area Network (CAN) is made up of an
6.Mode of Each station Each Each
interconnection of LAN within a limited geographical
communication can transmit station station
area.
and receive cannot can

The network equipments such as switches, routers and transmit transmit


or receive.
the transmission media i.e. optical fiber etc. are almost
7. Installation cost Low Moderate High
entirely owned by the campus owner (i.e. a company,
university, government etc.) 8. Principle |Operates on Switching Both
For examnple, a university CAN would connect different the principle|
of
buildings in its campus, such as various departments,
broadcasting
library, student hall to each other. 9 Propagation Short Long Moderate
CAN Could also be thought of as a special case of delay
WAN.
10.Bandwidth Low High Moderate
Computer Network (|T/Sem 4/ MSBTE) 1-11 Fundamentals of Computer Network
1.7 Classification Based on Hence routing algorithms play an important role in the
Transmission Terminology: point to point networks.
Bradly, we can classify the computer networks into
fwo categories on the basis of
transmission technology : Path
)

Brvadcast networks
Point to point networks.
Sender Path (1 Recetver

1.7.1 Broadcast Networks : Path


(2)

In a hroadcast networks all the machines on the Path (2


network use or share a single communication channel.
Short messages called packets sent by any machine are
reeived by all the others (Fig. 1.7.1(a)). (G295) Fig. 1.7.1(b) :Apoint to point network
Bradcast systenms generally use special code in the 1.8 Basics of Network Computing
address field for addressing a packet to all the Models:
concerned computers. This mode of operation is called
broadcasting. The local area networks are classified into two types:
1. Peer to peer networks. 2. Client server networks.
Some broadcast systems also support transmission to
only a group of few machines known as multicasting. The relaionship between each PC or device on the
network with the others in terms of control will be
Brvadcasting is used primarily in the local area
networks. dependent on the choice of network type.
For these two types, the special software is required for
controlling the flow of information between the users.
The Network Operating System (NOS) is installed on
Packet
each PC depending on the type of network. NOS
monitors the data exchange, flow of files, and other
Data
information.
Header The network operating systems are different for the
peer to peer and client server networks.
A peer-to-peer network is analogus to a company that
uses decentralized management, where decision are
(G-239) Fig. 1.7.1(a) : Broadcast network
1.7.2 Point to Point Networks : made locally.
A client-server network is similar to company that
exist many
In a point to point networks there works on the principle of centralized management,
To
connections between individual pairs of machines. where decisions are made in a central location.
packet on this
go from the source to the destination a
intermediate 1.9 Peer-to-Peer Networks :
types of network may have to go through
computers before they reach the desired computer. A Peer :
which are localized in
As a general rule small networks As a general definition, a peer is someone or Something
use broadcasting (e.g.
a geographical sense tend to that has the same role/rank/status as the object
or
LAN) whereas networks located in wide geographical person is question.
(e.g. WAN).
areas use pointto point transmission In the context of a computer
network, peers are the
1.7.1(b) packets can
In point to point networks (Fig. computers of equal capability.
same destination.
take muitiple roots to reach the
Fundamentals of Computer Network
Computer Nehwork(1/ien 4 MSWE)
1-12
the user will have lo
Sincethere is no central security,
Strueture : cach secured shared
er to eer know individual password for
t 9 |stWN the sinutue of he access.
resourewhich he wants to
neiwok In this tve of network, cwh compuler is relatively simple. Each
Insitble for making its own resouNes available to Peer to peer networks are well .
as client as
othctcomputers on the network. computer in the network can act
server as per requiement.
liach conputer is esousible for setting up and server.
maintaining its own security for its resounves. This clininates the nced of expensive
to set un
Also cah computer is respxnsible for wvessing the No additional software is necessary in order
required network IeSOUNCs from peertopeer the peer to peer network.
Networks ?
elationships. 1.9.1 When to use Peer to Peer
Pecr to peer nctwork is uscful for a Nall network the following
The peer topeer networks are suitable for
containing less than 10 computers on a single LAN. working conditions :
Each computer maintains its own accounts and their
issue.
If network security is not an important
sccurity settings. network).
If the nunber of users is less than 10 (small
In peer-to-peer network, every computer can function
If all the users are situated in the same
area.
as both a client and server. Windows 2000 comes in
both server and professional versions, but it's still a If the possibility of future expansion is less.
peer-t0-peer operating system. 1.9.2 Features of Peer to Peer Networks :
Peer to peer networks do not have a central control
1. It is useful for small networks with less than 10
system. There are no servers in peer networks.
computers.
In this type of network users simply share disk space
and resoures, such as printers and faxes. 2. Every computer can work as a client and server.
Peer networks are organised into workgroups. 3. There is no central control system.
Workgroups have very little security. There is no 4. Operating system used is Windows 2000 and its
central login process. subsequent versions.
If the user has logged into one peer on the network he 5. No additional software is required to set up the peer to
Can use any resources on the network that are not
peer network.
controlled by a specific password.
6. It does not offer a high network security.
Peer Peer
1.9.3 Advantages of Peer to Peer
Networks :
Peer networks have many advantages, especially for
small business houses that cannot afford to buy expensive
server hardware and software.
1. No extra investnent in server hardware or software is

Peer Peer
required.
2. Use less expensive computer hardware : In peer-to
(G-40)Fig. 1.9.1 :Peer-to-peer network
peer network, the resources are distributed over many
Access to individual resources can be controlled if the
user who shared the resources installs a computers, so there is no need for higher-end-server
password to
access it. computer.
3. Easy to administer : In
peer-to-peer network each
machine performs its own administration.
Fnteettate o te Natwoh

1.10 Cllent /Server Network


(Server Based Network) :
Ietw eiatinahi,

Pre Defnith of etlent:

Iiwwt ar ienty

Defniton of eerver:
A verver is sinyl a Mter that unakex te etwok
mnNN availalle and oviteN Nervie o her
1.9.4 Disadvantages of Peer to Peer muniterN when they mqwstfr it.
Networks :
Lwal ANa Neiwuking (LAN) iN haNed m the client
There sever netww* rlatimship. You wan onstwt u cient
netn paiculariy for larger nTwrds ss ÂNhy:
1. Iindividual pertormance is sftected : netwrd muters as a sCIvers and the est of as
clients Client server network (ypicallyuseN ndirevtory
II soe wortstatons heve freqndy used unes on servie o stoe intumation atut the nctwork and its
them then the use of these esuNS hy ocher couter
mght adversely affects the pesn using this particular A chent-server neiwork is one in wich all available
workstadon network such files, diretories,

2 Less security : applications and shared devices, are centrally managcd,


stored and then are aoessed by client.
A peer-to-peer etwork operates on the most cOmmon
Network configuration:
desktop operating systems like windows which are t
Fig. 1.10.l shows client-server nctwork configuration.
very secure operating systems Server

3 Backup is difficut:
server.
In peer-to-peer Detwork there is N centralized
Hence data is scattered over many workstations. So it is
difficult to backup alldata in an organized manner.
Hard to maintain version control :
number of
In peer-to-peer network, files are stored on
different workstations. So it is difficult to manage
Clent Clent Clent
different document versions or files. Cient

(G4nFig. 1.10.1 : Client server network relationship


5. As there is no centralized management it makes large
In the client server networks the servers provide
peer networks hard to manage and final data easily.
security and administration of the entire network.
6 Users are supposedto manage their own computers. are
In client-server networks the processing tasks
in a centralized
7 It is not possible to save important data divided between clients and servers. Clients
request
servers
manne. services such as file storage and printing and
deliver them.
Computer Network (IT/Sem 4/ MSBTE) 1-14 Fundamentals of Computer Network

Server : (a) Shared resources are located in a centralized area


The central computer whxh is more powerful than the and they are administered centrally.
clients and which allows the clients to access its (b) The servers are physically placed in secure
softwares and database is called as the server. location such as lockable separate server room.

Server computers typically are more powerful than (c) The operating system runs on client-server are
client computers or are optimised to function as designed to provide better security to network.
Servers. to network due to good
(d) Better security
No user can access the resourres of the servers until be administration.
has been authenticated (pemitted) by the server to do 2. Better pertormance:
The dedicated server computers are more expensive
Operating system : than standard computer workstations, but they also
We can use any common operating system such as offer considerably better perfornance.
Windows 7 for a client.
3. Centralized backup :
But the server is loaded with a special operating system
Backing up company's important data is much easier
such as Microsoft Windows Server 2008. when it is located on a centralized server. Centralized
1.10.1 Communication in Client-Server backup is much faster too.
Configuration : 4 Higher reliability :
Fig. 1.10.2 explains the principle of communication in In client server network centralized dedicated server
the client server configuration.
provide more reliability. It has built-in redundancy.
Response 5 Central file storage, which allows all users to work
Server Chent from the same of data.
Request 6. Reduces cost because of sharing of hardware and
software.
(GDFig. 1.10.2 : Clhent/server communication
7. Increased speed due to dedicated server for sharing
The client places a request on the server machine when
he wants an access to the centralised resources. resources.

8. Single password allows access to all shared resources.


The server rrsponds to this request and sends the signal
accordingly to the client as shown in Fig. 1.10.2. 9. Central organisation which keeps data from getting lost
The software run at the client computer is called as among computers and easy manageability of large
number of users.
client program. This software configures that particular
computer to act as a client. 10. The individual users don't have to manage or share
Similarly the software run on the server computer is resources.
called as server program. It configures that particular 1.10.3 Disadvantages of Client-Server
computer to act as a server. Networks:
1.10.2 Advantages of Client-Server 1. Professional administration is
required : Client
Network: Server networks usually need professional
The advantages of clhent-server network are administration. Youcan hire a network administrator or
follows : you can use a company which provides professional
1. The network is secure: network administration services.
2. We have to use a high speed server
In client-server network's high security is computer with lots
because of of memory and disk space.
several things :
Computer Network (IT/Sem 4/ MSBTE) 1-15 Fundamentais of Computer ietworr
3 It requires a special network operating system and a The application servers also provide securty ad
number of client licenses.
efficiency
4 Expensive dedicated hardware needs to be used.
Message servers :
1.10.4 Applications of
CIient-Server
Configuration :
It is used to co-ordinate the interaction between usrs
documents and applications.
Some of the important applications are as follows : The data can be in the form of audo. vIdeo, benary, text
E-mail clients. oF graphics. The simpie file server can not handie all
Web browsers. these, so message server has to be used
FTP (file transfer) clients. It handles all the conpiex data types by usng vanous

1.10.5 Types of Servers : types of communication methods


The commonly used serversS are of following types : Database servers :

1. File servers It is a type of application server.


2. Print servers It allows the users to access the antralised srong
3.
database.
Application servers
4. Message servers
1.10.6 Factors Influencing the Choice of
Network:
5. Database servers
The factors which influence the choice between te
Windows NT server support all of these capabilities peer to peer or client server networks are as follows:
and can by itself serve in all of these capacities
1. Need of network security.
simultaneously on a small network. 2 Is the network administration needed ?
On large networks however a number of servers are
3. Is the central storage of files essential ?
required to increase the access speed. 4. How much important is cost effectiveness ?
File servers : 5. Is resource sharing necessary ?
Some of the important features of file servers are as
6. Will there be any future expansions of e
follows: network?
These servers provide the services such as storing, 1.10.7 Comparison between Peer-to-Peer
retrieving and moving the data. Network and Client-Server Network:
A user can read, write, exchange andmanage the
files
Sr. Peer-to-peer Cient-server
with the help of file servers.
No.
namely
A file can be stored in three different ways 1. It is much like company It is much like compary
online, offline and nearline storage. uses decentralized using centralized

mànagement. manageRaL
Print servers :
In this each machine has In this server has mor
printing on the 2
The print server controls and manages same power. power and cheat bas less
network. power.

I also offers the fax service to the


network users.
3. Uses It bas to ue erpeasve
less expensive
print services computer hardware. hardwarr.
A user can access fax and
Compiex to setup
4. Easy to setup and professional
simultaneously. require
administer.
administrator
Application servers :
shared by the users in a Very secure
The expensive softwares can be 5. Less secure.

network with the help of application servers.


Fundamentals of Computer Network
2 Computer Network (|T/Sem 4/ MSBTE) 1-16
processing files
Peer-to-peer Cllent-server 2 User needs regular access of word A
Sr.
No. spreadshccts so they access easily. n

6 Decentralized backup Centralized backup ie. Disadvantages :


i.e. difficult to backup. casy to backup. Conflicting problem arises if same file is
7. Network 0.S. not Network O.S. equired. simultaneously accessed by multipie users.
required. properly.
2 Lesssecure if permission to access is not set
8. It has built-in Not built-in redundancy.
redundancy. 1.11.2 Printer Sharing : Adva
as they can
9. It is suitable for small It is suitable for large Printer sharing is beneficial to many users 1.
network.
share a costly and higher quality printers.
network.

Poor performance. Better performance. different ways on


Printer sharing can be done in several
printer
1.11 Network Features : network. The most common way is to use
contains the print
queues on server. The printer queue 3.
are finished
Now you can understand the types of things you can do jobs until any currently running print jobs
waiting jobs to the
with a network. The following are the features of network : and then automatically send the 4

1. File sharing. printer. i.e. printer connected to server.


each
2 Printer sharing. Another way to share printer on a network is that 5.

3 Application services. workstation accesses the printer directly. i.e. printer


connected to the network just like network workstation. D
4. E-mail.
In the first method that uses printer queues always have
5 Remote access.
a print server. That print server handles the job of
6. Internet and intranet.
sending each print job to the printer.
7. Network security : Internal and extermal.
Advantages :
1.11.1 File Sharing : 1 Reduce number of printer you need.
File sharing is the primary feature of network. Due to 2 Share costly high quality color laser printers.
use of networks the sharing of files becomes easier.
Disadvantages :
File sharing requires a shared directory or disk drive 1 Reduce server performance if printer is connected to
which many user can access over the network. When
server.
many users are accessing the same file on network,
2 Each user must wait its turn, if many users are request
more than one person can make changes to a file at the
same time. They might both making conflicting printer at once and the printer is directly connected to
network.
changes simultaneously.
Hence most of software programs don't allow multiple 1.11.3 Application Services:
changes to a single file at the same time. Just as you can share files on a network, you can also
Network operating systems that perform file sharing share applications on a network. For example you can
also exercise and monitor the security of these shared have a shared copy of Microsoft office or some other
files and what kind of access they have. For example : application and keep it on the network server.
Some users might have permission to view only certain When a particular workstation wants to run the
shared files, while other user have permission to edit or program, it loads the files from the network into its
even delete certain shared files.
own memory and run that program normally.
Advantages:
Keeping applications centralized reduces the amount of
1. Easily share information on network. storage space needed on cach workstation. It is easier to
administer the application in a centralized manner.
pl Computer Network (|T/Sem 4/ MSBTE) 1-17 Fundamentals of Computer Network

Another application service you can have on the Clhent-server e-mail systems, are more secure and far
network is a shared installation. This enables you to use more powerful than file based e-mail system. They
workstation without CD-ROM for installation. i.e. offer additional features that enable you to use the e
contents of CD-ROM copy to the server, then run the mail system for different business processes.
installation program for workstation from server. This
Advantages :
makes installing application much faster and more
convenient. 1. Helpful for communication within a company or
outside a company.
Advantages :
2 Faster communication.
Reduces the amount of disk space needed on each
Disadvantages :
workstation.
1. Network becomes unreliable due to viruses.
2. Centralized administration, so provide higher security
and reliability. 2. Require more security.
3. Without CD-ROM we can install the software on 1.11.5 Remote Access :
workstation over network. Another important feature of network is remote access
4 Installing application on workstation is much faster and to the network resources. Using this feature users can
more convenient. access their files and e-mail, when they are travelling or
5 This gives economical solution for more costly working on remote location.
softwares. Remote access feature is implemented as per user need
Disadvantages : or business need. Some of the features are all follows:
1 Setting up a simple remote access service
1 It increases network traffic on network.
connection on a windows 2000 server with using
2 If server fail or crash, then workstation is useless on
modem.
network.
2 Using a dedicated remote access system, which
3 Requires network license copy for application software handles many modems.
or business software.
3. Using dial-up mechanism with modem for
1.11.4 E-mail :
workstation on the network.
E-mail is extremely valuable and important feature for 4. Setting up a Virtual Private Network (VPN)
communication within organization or outside the connection to the Internet.
people in world.
5. Installing Windows Terminal Services On
E-mail service can be used by user in two different windows 2000 server.
ways :
Advantages :
(a) File based and (b) Client server.
1. User access their files and e-mail from remote location.
File based e-mail system is the one that consists of a set 2.
of files kept in a shared location on a server. File based
It enables users access to centralized application, stored
private or shared files on LAN,
e-mail system requires gateway server for connecting
or handling the e-mail interface between the two Disadvantages :
systems using gateway software that is part of the file 1. Require more security.
based e-mail system. 2 More hardware or complex hardware required.
A client-server e-mail system is the one where an e Different types of remote access technologies :
mail server contains the messages and handles all
Following are different types of Remote Access
incoming and outgoing mail.
Technologies (Connection Types) as follows:
1. Public Switched Telephone Networks (PSTN)
Fundanmentals of

Computer Network (|T/Sem 4/ MSBTE)


1-18 Computer Net
Leased line.
2.
Network) Computer 1
3. ISDN (Integrated Services Digital
4. Cable TV

5. DSL (Digital Subscriber ILine)


4
1.12 Models of Network Computing : Ad
1.
There are two basic models followed by the computer (G-1397)Fig. 1.12.1(b) :Distributed computing model
networks. The model of network computing basically Networks :
1.13 Distributed
decides the way in which data is to be processed in a 2
network.
A system with one control unit (master computer)
The two models are : many slaves, or a large computer with remote printe
1 CentralizeVcomputing model and terminals is not called a computer network, iti
called a Distributed System.
2 Distributed computing model
Centralized computing model : In distributed system the existence of multiple
autonomous computers is not visible to the user.
In this model, there is a mainframe computer at the
center of the network which does all the processing With a computer network, the user has to conciously
work.
log onto a machine, submnit jobs remotely, move files

Terminals are connected to the main frame computer.


around etc. in short handle all the network managemen
They function only as input/output devices. No personally.
processing takes place here. With a distributed system nothing of this need to done
Two or more mainframe computers are inter connected explicitly, it all happens automatically because the
viaa network but terminals are never interconnected. system takes care of it without the users knowledge.
Mainframe
Computer
Basically a distributed system is a software system built
on top of a network. The software gives it a high degree
of cohesiveness homogeneity and transparency to the
system.
Distributed network is the network system over which
Terminal 1 computer programming, software and data are spread
out acrOSS more than one computers.
2

(G-1399)Fig. 1.12.1(a) : Centralized computing model Goal :

Distributed computing model : The goal of a distributed network is to share resources

In this model, many computers are used. They are to accomplish a single or similar goal.
capable of operating independently. A distributed network uses a
network management
Processing of data takes place on each individual software which monitors and manages the following
computer. tasks :

The networks enable these computers the exchange 1. Data routing.


data and services among them but no assistance is 2 Allocating network bandwidth.
provided for the processing of data. 3 Access control etc.
Now a days the combination of centralized and
Examples :
distributed models called hybrid computing model is
used. Following are the examples of distributed networks:
1. Client server networks.
1-19
Fundamentals of Computer Network
Computer Netwok (|T/Sem 4 MSBTE)
ability to use resources
2 Agent hased networks. They all have the same
available on the network.
Decentralized networks.
Examples of Peer to Peer NOS:
Cloud computing.
1. Apple share :
Advantages of Distritbuted Networking : only the
It is advantageous when the computing resources It is a NOS used for the network connecting
1
(Computers and servers) are physically distributed in Apple products.
2. LANtastic :
many places.
windows
It is helipful in the situations where resource sharing This NOS supports DOS and Microsoft
becomes problematic. computers.
3 Distributed computing is helptul for high fault 3. Windows for workgroups :
tolerance systems. This NOS is used for networking peer to peer windows

1.14 ANetwork Operating System (NOS) : computers.


1.14.2 NOS Based on Client Server Model :
Definition:
Network operating systems can be based on the client
A network operating system (NOS) is a computer server model.
operating system that is primarily designed to support
work station, personal computers and sometimes old Examples :
terminals connected to a LAN. Following are the examples of NOS based on client
What does NOS do ? server model :

1. Novell Netware.
ANOS enables the sharing of data, users, groups,
security, applications and other network functions 2 Windows server.
typically over a LAN or a private network. 3 Banyan VINES.
Historical NOS: Other Examples :
Early microcomputers uses the operating systems such Some other examples of NOS are UNIXLinux,
as CP/M, DOS (Disc Operating System) and classic Netware, Microsoft Windows NT, Microsoft Windows
Mac OS. Server 2008, etc.
These operating systems were designed for one user on 1.14.3 Duties of A NOS :
one computer.
Typically a NOS is supposed to handle the following
Types of NOS: network duties :
But after the availability of local area network 1 Providing access to emote printers to every user
technology, the following two approaches to handle by queueing the jobs.
sharing were tried:
2. To enable and manage the access to files on
1. Peer to peer NOS. remote systems.
2 NOS based on the client server model. 3. Grating access to remote applications such as the
1.14.1 Peer to Peer NOS: Internet.
ln a peer to peer NOS, all the users are allowed to share 4. To provide routing services.
resources and files on their computers and access the 5. To make the entire network secure against viruses,
shared resources from the other computers. hackers and data corruption.
There is no centralized management. All the connected 6. To provide the basic network administration.
computers are equally important.
Fundamentals of Computer
omputer vetwork (IT/Sem 4 MSBTE)
1-20 Netwotk
Telegraph network which uses message
1.14,4 Features of Windows NOS:
1
switching
for the transfer of text messages called telegrame
network which uses circuit
Folowng are some important features of windowWS
NOS
2. Telephone messages.
for the transfer of voice
switching
1 Adrectory service. 3 Internet operation is based on packet switching
data.
which provides the transfer of digital
2 Chent support
Review Questions
3 Interoperability Windows NOS also support
UNDX, Novell Netware, Windows NT etc.
Q. 1 Define the following terms :
4 Auhentication : Deals with users logging on. 1. Network 2. Protocol 3. Handshaking
between computer network and
Fle and print services. Q.2 Distinguish
Active durectory. distributed system.
by the
Provides 8ecurity. State and explain the services provided
7

Q.3
I mantains the netwwork connections to the network to organizations.
ServerS.
Q. 4 State and explain the services provided by the
1.15 Network Functions : network to people.
Q. 5 What are the performance parameters of a network ?
The basic function of a network is to transfer
information between source machine and Q. 6 State and explain the transmission technologies used
destination rachine. in computer networks.

The folowing is a list of functions that a network must Q.7 State the various types of networks.
caTy out: Q.8 Write a short note on LAN.
1 Basic user service ie. the primary services that are
Q. 9 Write a short note on MAN.
provided by the network to its users.
Q. 10 Write a short note on WAN.
2 Switching facility for connecting users.
Transmission system for transmission of data on Q. 11 Compare LAN and WAN.
3.
the medium Q.12 Write a note on: Peer to peer networks.
4. Routing in order to decide the path of the packets. Q. 13 State the advantages and disadvantages of peer to
peer network.
5. Multiplexing for sharing multiple infornation
channels. Q. 14 State merits and demerits of client server network.

6. Infornation representation for determining the Q. 15 Wite a short note on: Client server network.
format of infornation handled by the network. Q. 16 State the various functions carried out by a network.
7. Addressing for identifying the end system
Q. 17 Explain the human network.
(Terminal).
Q. 18 What is family network ?
The essential network functions include all

Lransnission, multiplexing, routing and switching in a Q. 19 Explain different types of human networks.
network
Q. 20 What is the need of computer network ?
The services that are provided to the use are built on
the basic transfer capability of a network. Q. 21 State various components of a computer network.
Q. 22 Explain the two models of network computing.
There are three types of networks in existence which
uSe three different types of switching techniques : Q. 23 What is network plan ? What is its importance ?
Fundamerntala of Conputer Network
Computer Network (IT/Sem 4/ MSBTE) 1-21

a. 24 State various benefits of computer networks. Q. 32 Detine clent and server.

Q. 25 Explain any two benefits in detat. Q. 33 State cifterernt types of servera anxd axptain

Q. 26 Explain the centrallzed management ot software, Q. 34 What are the factors influencing the dhoce of
maintenance, data backup. network.

Q. 27 Explain the disadvantages of networks. Q. 36 Sate ditteret network oaturaa

Q. 28 State advantages of LAN. a. 36 Explain file aharing and priter nharing


Q. 29 State disadvantages of LAN. a. 37 Explain the appication services.

0. 30 Compare peer to peer and ciont server network. Q. 38 Explain E -malland Henote Access

a. 31 State advantages of cBient server networks.

You might also like