Computer Network
Computer Network
Computer Network
For computer network connection, there are different devices are used:
● Modem
● Router
● Gateway
● Switch
● Bridge
● Hub
● Firewall
Modem
● Modem stands for modulator Demodulator.
● Modem is an internetworking device. It facilitates connection to the internet by
transmitting and receiving data over telephone line.
● Main task of modem is to convert digital signal to analog and analog to digital
signals.
● Using modulation technique it converts digital signal to analog signal. And
de-modulation technique used to convert analog signal to digital signal.
● Modem works on data link layer. It does not provide security.
Router
● A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data
sent through the internet, such as a web page or email, is in the form of data
packets.
● A router is connected to two or more data lines from different IP networks.
When a data packet comes in on one of the lines, the router reads the network
address information in the packet header to determine the ultimate destination.
● Router is a network device that helps to pass data in one or more network. It
connect two or more network but it works only in similar network.
● Main task of router is to identify a rout/path between two network devices.
Router works on network layer. It provide security to protect network.
● It sends data in packet format. It connects multiple PCs in network via Ethernet
cable or WiFi.
● It has a capacity to store routing details so it is both hardware and software
device. Router creates a routing table for storing routing detail.
● There are two types of routing perform y router. [1] Static routing [2] Dynamic
routing.
Gateway
Active Hubs − Active hubs amplify and regenerate the incoming electrical signals
before broadcasting them. They have their own power supply and serves both as a
repeater as well as connecting centre. Due to their regenerating capabilities, they
can extend the maximum distance between nodes, thus increasing the size of LAN.
Intelligent Hubs − Intelligent hubs are active hubs that provide additional network
management facilities. They can perform a variety of functions of more intelligent
network devices like network management, switching, providing flexible data rates
etc.
Bridge
● Bridge is device which use to divide large network in to small network.
● Bridge also sends frames from device to device. It control traffic in network.
● A network bridge is a device that divides a network into segments. Each
segment represent a separate collision domain, so the number of collisions on
the network is reduced. Also, because each collision domain has its own
separate bandwidth, a bridge also improves the overall network performance.
● If the bridge determines that the destination host is on another segment of the
network, it forwards the frame to that segment.
● Bridge works on physical layer and data link layer. Bridge also helps device to
identify their packet.
● It also performs a role of repeater. Bridge regenerates signals and forward
new copy of signal to device whose address is match.
● Bridge basically works in a bus topology. The bridge is used to reduce
network traffic.
Firewall
● A firewall is a network security device that monitors incoming and outgoing
network traffic and permits or blocks data packets based on a set of security
rules. Its purpose is to establish a barrier between your internal network and
incoming traffic from external sources (such as the internet) in order to block
malicious traffic like viruses and hackers.
● A firewall is used to protect more secure network from a less secure network.
Generally, firewalls are used to protect your internal/private LAN from the
Internet.
● A firewall generally works at layer 3 and 4 of the OSI model. Layer 3 is the
Network Layer where IP works and Layer 4 is the Transport Layer, where
TCP and UDP function. Many firewalls today have advanced up the OSI
layers and can even understand Layer 7 – the Application Layer.
How Firewall Works?
● Firewalls carefully analyze incoming traffic based on pre-established rules and filter
traffic coming from unsecured or suspicious sources to prevent attacks.
● Firewalls guard traffic at a computer’s entry point, called ports, which is where
information is exchanged with external devices. a firewall’s safety comes from
monitoring and regulating traffic that goes in and out of your network. This is
accomplished using a few different methods, including packet filtering, a proxy
service, and stateful inspection.
● Firewalls can be either hardware or software, and they form a wall between your
network and the internet or between segments of your network and the rest of your
system.
● Not only do firewalls keep malicious code out of your network, but some, because
they can examine data both as it comes in and goes out, can also prevent an
attacker from using your system to spread harmful code.
● Firewall filters keep harmful data outside your computer. Some of the top risks from
which firewalls protect your computer include attacks, remote logins, spam, and
viruses.
Network Types
● A computer networks is an interconnected system of devices, represented as
network nodes, that share information, data and resources among each other.
● Larger networks use devices like routers and switches to create the
underlying network infrastructure.
● Not all the networks are same. Each network type is different by its size,
distance it covers and physical architecture. Some computer networks are
wired and wireless.
● A network can be build with a small handful of device within a single room to
millions of devices spread across the entire world.
Generally, we all know categories of network,
● Local Area Network(LAN)
● Metropolitan Area Network(MAN)
● Wide Area Network(WAN)
● Personal Area Network(PAN) etc.
LAN (Local Area Network)
● A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, university campus or office building.
● LAN usually private/owned network. It established network in single building or campus
up to a few kilometres.
● LAN can span up to 1 meter to 100 meter but now a days LAN can span up to kilometer.
● LAN is widely used to connect personal computer and workstation in company, college to
share resources and exchange data.
● LANs use both wired and wireless connectivity options. Wireless LAN (WLAN) has
surpassed traditional wired LAN in terms of popularity, but wired LAN remains the more
secure and reliable option.
● Wired LANs use physical cables, like Ethernet, twisted pair, coaxial cable and switches;
WLANs use devices, like wireless routers and access points, to interconnect network
devices through radio frequency waves.
● Most common LAN Topology is Bus, Ring and Star.
● Traditional LAN Data Rate is 4 to 6 Mbps. Todays speed is increasing and data rate is up
to 100 Mbps.
● It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and ethernet cables.
● The data is transferred at an extremely faster rate in Local Area Network. And it provides
higher security.
The distinguishing features of LAN are
● Network size is limited to a small geographical area, presently to a few
kilometers.
● Data transfer rate is generally high. They range from 100 Mbps to 1000 Mbps.
● In general, a LAN uses only one type of transmission medium, commonly
category 5 coaxial cables.
● A LAN is distinguished from other networks by their topologies. The common
topologies are bus, ring, mesh, and star.
● The number of computers connected to a LAN is usually restricted. In other
words, LANs are limitedly scalable.
● Originally, coaxial cables were used for communications. But now twisted pair
cables and fiber optic cables are also used.
LAN Diagram
MAN(Metropolitan Area Network)
● A metropolitan area network (MAN) is a computer network that connects computers within a
metropolitan area, which could be a single large city, multiple cities and towns, or any given
large area with multiple buildings.
● The term is also used to describe the interconnection of several local area networks in a
metropolitan area through the use of point-to-point connections between them .
● It is designed to extend over an entire city or town. MAN can connect large network through
fiber optic or coaxial cable now a days it can be connected wireless.
● MANs typically combine the networks of multiple organizations, instead of being managed
by a single organization.
● A MAN is larger than a local area network (LAN) but smaller than a wide area network
(WAN). MAN is made up of interconnected LANs.
● Like WANs, a MAN is made up of interconnected LANs. Because MANs are smaller, they
are usually more efficient than WANs, since data does not have to travel over large
distances.
● MANs typically combine the networks of multiple organizations, instead of being managed
by a single organization.
● Most MANs use fiber optic cables to form connections between LANs. Often a MAN will run
on "dark fiber" — formerly unused fiber optic cables that are able to carry traffic.
Where is MAN Used?
● Digital cable television
● Government agencies use it
● Campuses of universities
● Broadband through cable
● Previously, it was used to link the many branches of the local school.
● While in the hospital (for communication between doctors, research offices,
labs)
● A system of fire stations
● Traveling through airports
● Community college collaboration around the country
● Public libraries use it
Metropolitan area network advantages and
disadvantages
● The primary advantage of a MAN over a WAN is the high bandwidth enabled
by the dedicated links of a metropolitan area network. This application of a
MAN provides higher speed, from 1 gigabit per second to 100 Gbps, and
lower latency than would be possible over a WAN. Since the organization
maintains control of the connection, it can apply traffic shaping and increased
security.
● Disadvantages of a MAN over a WAN include potentially higher costs, greater
complexity and additional logistics required to maintain the links. A
well-designed MAN will also have redundant connections, requiring at least
two connections per building.
WAN(Wide Area Network)
● The Internet
● 4G Mobile Broadband Systems
● A network of bank cash dispensers.(a machine that people use to get money from their
bank accounts by using a special card.)
● LANs are often connected to WANs, for example, a school network could be
connected to the Internet.
● WANs can be connected together using the Internet, leased lines or satellite links.
The distinguishing features of WAN are:
● WANs have a large capacity, connecting a large number of computers over a
large area, and are inherently scalable.
● They facilitate the sharing of regional resources.
● They provide uplinks for connecting LANs and MANs to the Internet.
● Communication links are provided by public carriers like telephone networks,
network providers, cable systems, satellites etc.
● Typically, they have low data transfer rate and high propagation delay, i.e.they
have low communication speed.
Network Topologies
Routing:
In the routing mode, before delivering data packets to the destination, the data is
communicated in a prearranged path containing many hopping across nodes. All
the intermediate nodes require to active and remain connected in order to transmit
the data over the network.
Flooding:
In the Flooding model, in the network, the data is transmitted to every active
nodes. The addressed data is consumed by a node otherwise, if it finds that the
data is not addressed, it passes it to the next node.
Advantages of Mesh Topology
● Failure during a single device won’t break the network.
● There is no traffic problem as there is a dedicated point to point links for every
computer.
● Fault identification is straightforward.
● This topology provides multiple paths to succeed in the destination and tons
of redundancy.
● It provides high privacy and security.
● Data transmission is more consistent because failure doesn’t disrupt its
processes.
● Adding new devices won’t disrupt data transmissions.
● This topology has robust features to beat any situation.
● A mesh doesn’t have a centralized authority.
Disadvantages of Mesh Topology
● It’s costly as compared to the opposite network topologies i.e. star, bus, point
to point topology.
● Installation is extremely difficult in the mesh.
● Power requirement is higher as all the nodes will need to remain active all the
time and share the load.
● Complex process.
● The cost to implement mesh is above other selections.
● There is a high risk of redundant connections.
● Each node requires a further utility cost to think about.
● Maintenance needs are challenging with a mesh.
Tree Topology
● A tree topology is a special type of structure where many connected elements are arranged like the
branches of a tree.
● A tree topology is also known as a star bus topology. It incorporates elements of both a bus topology
and a star topology.
● if the main cable (trunk) between the two star topology networks failed, those networks would be
unable to communicate with each other. computers on the same star topology would still be able to
communicate.
● In a tree topology, any two linked nodes can only have one mutual connection, hence there can only
be one link between them.
● If you have small sub-departments or departments and, this topology is very useful.
There are several ways to define tree topology; such are as follows:
● A tree topology combines several star topologies by connecting several components to the centre
node.
● It may define by experts as tree topology is a combination of bus and star topologies in which all
nodes are attached with the help of a single central node.
● Every node in this architecture is connected one to one in a hierarchy level, with each neighbouring
node on its lower level. Each secondary node has a point-to-point link to the parent node, and all
secondary nodes under its jurisdiction have point-to-point connections to the tertiary nodes. When
examined in a visual sense, these systems resemble a tree structure.
How Tree Topology Network Works?
● if the server wants to establish a connection to Node I, it will digest or
encapsulate the destination address and data
● Then, it will transmit the signal to Backbone Cable after completing the
encapsulation process.
● The encapsulated package will start to pass on both sides of branches of the
Bus Backbone Network.
● There are three types of Hub that can be used in the Three Topology
Network, which are Intelligent Hub, Active Hub, and Passive Hub.
Scalable: This type of network can be expanded without any problem. You just need an
additional hub to connect the new topology to the existing network of topology.
Effective: End users can share their files from one office to another and the speed of data is also
high in the network.
Combined features: When you connect two or more topologies then the resulting topology will
get benefits from all the combined topologies.
Flexible: You can add and remove nodes from the network easily without any issue.
Reliable: if there occurs any error in the network then the error can be identified and fixes easily.
Large traffic: This topology can handle a large amount of data traffic. You will not face any traffic
issue if you expand or collapse the network. You can make a large network easily.
Disadvantages of hybrid topology
Complex: As there are two or more topologies connected so the number of nodes
increases also. This will make the network very large and handling all the issues in
the nodes become difficult.
A lot of cables: As the network grows, the number of cables required to connect
also increases. It becomes difficult for a network technician to handle all the
cables together.