Unit 9 Networking and Notworking by Min Myat
Unit 9 Networking and Notworking by Min Myat
Unit 9- Compute
Networking/
Not-working
By-
[Author Name]
2 | Page
Min Myat
(Kyan)
Table of Contents
Types of networks..............................................4
LANs – Local Area Networks....................................5
WANs – Wide Area Networks.....................................6
WAN Technologies..............................................7
ATM – Asynchronous Transfer Mode..............................8
MANs – Metropolitan Area Network..............................9
PANs – Personal Area Networks.................................9
NETWORK TOPOLOGY..............................................10
Bus Topology.................................................11
Ring Topology................................................12
Star Topology................................................13
[Author Name]
3 | Page
Mesh Topology................................................14
Tree Topology................................................15
NETWORK ACCESS METHODS........................................16
TOKEN RING...................................................17
Ethernet.....................................................18
CSMA/CD – Carrier Sense Multiple Access / Collision Detection 19
CSMA/CA – / Collision Avoidance..............................20
OSI 7 LAYER MODEL............................................21
TCP/IP 4 LAYER MODEL.........................................22
NETWORK PROTOCOLS AND STANDARDS...............................23
TCP/IP.......................................................24
TCP/IP 4-layer model and OSI 7-layer model...................25
NETWORK PROTOCOLS............................................26
FTP – File Transfer Protocol.................................27
HTTP – Hypertext Transfer Protocol...........................27
POP 3 – Post Office Protocol.................................27
SMTP – Simple Mail Transfer Protocol.........................27
DNS – Domain name System.....................................27
TCP – Transmission Control Protocol..........................27
UDP – User Datagram Protocol.................................27
IP – Internet Protocol.......................................28
ICMP – Internet Control Messaging Protocol...................28
DHCP – Dynamic Host Configuration Protocol...................28
ARP & RARP – Address Resolution Protocol.................28
LAN STANDARDS.................................................29
IEEE – Institute of Electrical & Electronic Engineers....29
IEEE 802.2 – Management of Ethernet Data Packets.............29
IEEE 802.3 – Definition of MAC Addressing (NIC)..............29
IEEE 802.5 – Token Passing Management........................29
FDDI – Fiber Distributed Data Interface......................30
WIRELESS TECHNOLOGIES.........................................30
IEEE 802.11 – Wireless Standards (Wi-Fi) Bluetooth...........30
3G / 4G (Mobile Phone Technology)............................30
InfraRed Standards – IrDA....................................30
[Author Name]
4 | Page
Peer-to-Peer network..........................................32
Client/server networks........................................32
Benefits and Disadvantages of using Peer-to-Peer Network.....33
Benefits and Disadvantages of using Client/server networks...34
[Author Name]
Types of networks
WAN Technologies
[Author Name]
7 | Page
[Author Name]
8 | Page
WAN Technologies
Frame Relay is a high-performance packet-switched
networking protocol used to connect Local Area Networks (LANs)
and Wide Area Networks (WANs). It is a Layer 2 protocol that
operates at the data link layer of the OSI model.
Packet Switching transmits data across digital networks by
breaking it down into blocks or packets for more efficient
transfer using various network devices. Each time one device
sends a file to another, it breaks the file down into packets so
that it can determine the most efficient route for sending the
data across the network at that time. The network devices can
then route the packets to the destination where the receiving
device reassembles them for use.
[Author Name]
9 | Page
[Author Name]
10 | P a g e
(Goyal, 2023)
[Author Name]
11 | P a g e
NETWORK TOPOLOGY
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Tree Topology
[Author Name]
12 | P a g e
Bus Topology
Bus topology is a specific kind of network topology in which
all of the various devices in the network are connected to a
single cable or line. In general, the term refers to how various
devices are set up in a network.
(Rouse, 2015)
Advantages of Bus Topology
It is the easiest network topology for connecting
peripherals or computers in a linear fashion.
It works very efficiently well when there is a small
network.
The length of cable required is less than a star topology.
Disadvantages of Bus Topology
Bus topology is not great for large networks.
Identification of problems becomes difficult if the whole network
goes down.
Troubleshooting individual device issues is very hard.
(pulkitagarwal03pulkit, 2022)
[Author Name]
13 | P a g e
Ring Topology
Ring topology also called as the Ring Network, is a network
topology method, in which two other nodes, forward and backward,
are linked for each node exactly so as to form a single
continuous path for signal communication. Basically, ring
topology is divided into the two types which are Bidirectional
and Unidirectional.
(Sathyanarayanan, 2023)
Advantages of Ring Topology
High Data Transmission Rate
Minimal Impact of a Single Device Failure
Cost-effective
(Kumar, 2023)
[Author Name]
14 | P a g e
Star Topology
Star topology is a network topology in which each network
component is physically connected to a central node such as a
router, hub or switch.
[Author Name]
15 | P a g e
Mesh Topology
Mesh topology is a network setup where each computer and
network device are interconnected with one another.
Advantages of Mesh Topology
Addition of new devices does not affect the network.
Data transmission is consistent.
Disadvantages of Mesh Topology
There is high risk of redundant connection
The additional cost is required for each node
[Author Name]
16 | P a g e
Tree Topology
A tree topology is a special type of structure where many
connected elements are arranged like the branches of a tree.
[Author Name]
17 | P a g e
TOKEN RING
ETHERNET
[Author Name]
18 | P a g e
TOKEN RING
Connecting devices in a logical ring is a common way to create
a network topology where devices are connected in a circular
manner.
The software token is a packet of data that is passed from one
device to another in the ring. The device that possesses the
token has the authority to transmit data, and once it has
finished transmitting, it passes the token to its neighbor.
To access the free token, a device needs to monitor the
network to detect when the token is available. Once it detects
that the token is free, it takes possession of the token and can
then transmit data to other devices in the ring. When the
transmission is complete, the device releases the token, and it
continues to circulate around the ring until it is needed again.
When a device needs to send data to other devices in the
ring, it waits for the token to come to it. Once it has the
token, it can transmit the data to the next device in the ring.
The data is then passed from device to device until it reaches
its destination. Once the data has been successfully transmitted,
the token is released, and the cycle continues.
[Author Name]
19 | P a g e
Ethernet
Ethernet is a type of communication protocol that is created at
Xerox PARC in 1973 by Robert Metcalfe and others, which connects
computers on a network over a wired connection. It is a widely
used LAN protocol, which is also known as Alto Aloha Network. It
connects computers within the local area network and wide area
network. Numerous devices like printers and laptops can be
connected by LAN and WAN within buildings, homes, and even small
neighborhoods.
[Author Name]
20 | P a g e
[Author Name]
21 | P a g e
[Author Name]
22 | P a g e
[Author Name]
23 | P a g e
[Author Name]
24 | P a g e
[Author Name]
25 | P a g e
TCP/IP
[Author Name]
26 | P a g e
[Author Name]
27 | P a g e
NETWORK PROTOCOLS
Network protocols are sets of rules and standards that govern
the way data is transmitted, received, and interpreted over a
network. These protocols provide a standardized way of
communication between devices, ensuring that data is transmitted
and received correctly, efficiently, and securely.
These are some common network protocols
FTP – File Transfer Protocol
HTTP – Hypertext Transfer Protocol
POP 3 – Post Office Protocol
SMTP – Simple Mail Transfer Protocol
DNS – Domain name System
TCP – Transmission Control Protocol
UDP – User Datagram Protocol
IP – Internet Protocol
ICMP – Internet Control Messaging Protocol
DHCP – Dynamic Host Configuration Protocol
ARP & RARP – Address Resolution Protocol
[Author Name]
28 | P a g e
[Author Name]
29 | P a g e
IP – Internet Protocol
IP (Internet Protocol) is a network-layer protocol used to
transmit data packets between hosts over IP networks, including
the Internet.
[Author Name]
30 | P a g e
LAN STANDARDS
[Author Name]
31 | P a g e
WIRELESS TECHNOLOGIES
[Author Name]
32 | P a g e
Peer-to-Peer network
Client/server networks
[Author Name]
33 | P a g e
Benefits
Cost-effective: P2P networks are cost-effective as they do
not require a central server, which eliminates the cost of a
dedicated server and reduces maintenance costs.
Easy to set up: P2P networks are easy to set up as they do
not require specialized hardware or software.
Scalability: P2P networks are highly scalable as new nodes
can be easily added to the network without affecting the
existing nodes.
Robustness: P2P networks are more robust than client/server
networks as they do not depend on a central server. If one
node fails, other nodes can continue to function.
An entire library of files is available for you to find
online: You can easily locate and download files online using
[Author Name]
34 | P a g e
Disadvantages
Security: P2P networks are more vulnerable to security
threats such as malware and unauthorized access because
there is no centralized security control.
Performance: P2P networks can suffer from performance
issues, especially when the network is large, and the nodes
have limited resources.
Reliability: P2P networks can be less reliable than
client/server networks as they rely on the availability and
reliability of individual nodes.
Limited management capabilities: P2P networks have limited
management capabilities, making it difficult to monitor and
manage the network.
The files or resources are not centrally organized with a
P2P network: A P2P network stores files or resources on
individual computers instead of using a centrally organized
public area. That means it can be challenging for some
people to locate specific files when the owner of a PC
doesn’t seem to have a logical filing system.
Dependence on other users: P2P networks rely on the
availability of other users, which can impact network
performance and availability.
[Author Name]
35 | P a g e
Benefits
Security: Client/server networks offer better security than
P2P networks as all data is stored on a central server, and
security can be easily controlled and managed.
[Author Name]
36 | P a g e
Disadvantages
Cost: Client/server networks are more expensive to set up
and maintain as they require specialized hardware and
software.
[Author Name]
38 | P a g e
References
[Author Name]