0% found this document useful (0 votes)
12 views38 pages

Unit 9 Networking and Notworking by Min Myat

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views38 pages

Unit 9 Networking and Notworking by Min Myat

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

1 | Page

Unit 9- Compute
Networking/
Not-working

By-

[Author Name]
2 | Page

Min Myat
(Kyan)

Table of Contents
Types of networks..............................................4
LANs – Local Area Networks....................................5
WANs – Wide Area Networks.....................................6
WAN Technologies..............................................7
ATM – Asynchronous Transfer Mode..............................8
MANs – Metropolitan Area Network..............................9
PANs – Personal Area Networks.................................9
NETWORK TOPOLOGY..............................................10
Bus Topology.................................................11
Ring Topology................................................12
Star Topology................................................13

[Author Name]
3 | Page

Mesh Topology................................................14
Tree Topology................................................15
NETWORK ACCESS METHODS........................................16
TOKEN RING...................................................17
Ethernet.....................................................18
CSMA/CD – Carrier Sense Multiple Access / Collision Detection 19
CSMA/CA – / Collision Avoidance..............................20
OSI 7 LAYER MODEL............................................21
TCP/IP 4 LAYER MODEL.........................................22
NETWORK PROTOCOLS AND STANDARDS...............................23
TCP/IP.......................................................24
TCP/IP 4-layer model and OSI 7-layer model...................25
NETWORK PROTOCOLS............................................26
FTP – File Transfer Protocol.................................27
HTTP – Hypertext Transfer Protocol...........................27
POP 3 – Post Office Protocol.................................27
SMTP – Simple Mail Transfer Protocol.........................27
DNS – Domain name System.....................................27
TCP – Transmission Control Protocol..........................27
UDP – User Datagram Protocol.................................27
IP – Internet Protocol.......................................28
ICMP – Internet Control Messaging Protocol...................28
DHCP – Dynamic Host Configuration Protocol...................28
ARP & RARP – Address Resolution Protocol.................28
LAN STANDARDS.................................................29
IEEE – Institute of Electrical & Electronic Engineers....29
IEEE 802.2 – Management of Ethernet Data Packets.............29
IEEE 802.3 – Definition of MAC Addressing (NIC)..............29
IEEE 802.5 – Token Passing Management........................29
FDDI – Fiber Distributed Data Interface......................30
WIRELESS TECHNOLOGIES.........................................30
IEEE 802.11 – Wireless Standards (Wi-Fi) Bluetooth...........30
3G / 4G (Mobile Phone Technology)............................30
InfraRed Standards – IrDA....................................30
[Author Name]
4 | Page

Peer-to-Peer network..........................................32
Client/server networks........................................32
Benefits and Disadvantages of using Peer-to-Peer Network.....33
Benefits and Disadvantages of using Client/server networks...34

[Author Name]
Types of networks

There are so many types of networks.

 LANs – Local Area Networks

 WANs – Wide Area Networks

 WAN Technologies

 MANs – Metropolitan Area network

 PANs – personal area network


6 | Page

LANs – Local Area Networks


LAN stands for Local-area Network. It is a computer network
that covers a relatively small area such as within a building or
campus of up to a few kilometers in size. LANs are generally
used to connect personal computers and workstations in company
offices to share common resources, like printers, and exchange
information. A number of experimental and early commercial LAN
technologies were developed in the 1970s.

[Author Name]
7 | Page

WANs – Wide Area Networks


WAN stands for Wide Area Network. It is a computer network
that covers a large geographical area consisting of two or more
LANs or MANs. These networks are established with leased
telecommunication circuits, in which two sides which are
connected have routers that connect the LAN of both sides
together in a network to facilitate communication.

[Author Name]
8 | Page

WAN Technologies
Frame Relay is a high-performance packet-switched
networking protocol used to connect Local Area Networks (LANs)
and Wide Area Networks (WANs). It is a Layer 2 protocol that
operates at the data link layer of the OSI model.
Packet Switching transmits data across digital networks by
breaking it down into blocks or packets for more efficient
transfer using various network devices. Each time one device
sends a file to another, it breaks the file down into packets so
that it can determine the most efficient route for sending the
data across the network at that time. The network devices can
then route the packets to the destination where the receiving
device reassembles them for use.

[Author Name]
9 | Page

ATM – Asynchronous Transfer Mode


Asynchronous transfer mode (ATM) is a switching technique used
by telecommunication networks that uses asynchronous time-
division multiplexing to encode data into small, fixed-sized
cells.
Frame relay doesn't offer quantifiable support quality. In
contrast, the ATM enables quantifiable support quality. The cost
of frame relay is low than ATM. In contrast, the ATM is more
expensive than the frame relay.

[Author Name]
10 | P a g e

MANs – Metropolitan Area Network


MAN or Metropolitan area Network covers a larger area than
that covered by a LAN and a smaller area as compared to WAN. MAN
has a range of 5-50km. It connects two or more computers that are
apart but reside in the same or different cities. It covers a
large geographical area and may serve as an ISP (Internet Service
Provider). MAN is designed for customers who need high-speed
connectivity. Speeds of MAN range in terms of Mbps. It’s hard to
design and maintain a Metropolitan Area Network.

PANs – Personal Area Networks


Personal Area Network (PAN) is the computer network that
connects computers/devices within the range of an individual
person. As PAN provides a network range within a person’s range
typically within a range of 10 meters (33 feet) it is called a
Personal Area Network. A Personal Area Network typically involves
a computer, phone, tablet, printer, PDA (Personal Digital
Assistant) and other and other entertainment devices like
speakers, video game consoles, etc.

(Goyal, 2023)

[Author Name]
11 | P a g e

NETWORK TOPOLOGY

Network topology refers to the physical and logical arrangement


of nodes and connections in a computing network. These are some
Topology

 Bus Topology

 Ring Topology

 Star Topology

 Mesh Topology

 Tree Topology

[Author Name]
12 | P a g e

Bus Topology
Bus topology is a specific kind of network topology in which
all of the various devices in the network are connected to a
single cable or line. In general, the term refers to how various
devices are set up in a network.
(Rouse, 2015)
Advantages of Bus Topology
 It is the easiest network topology for connecting
peripherals or computers in a linear fashion.
 It works very efficiently well when there is a small
network.
 The length of cable required is less than a star topology.
Disadvantages of Bus Topology
Bus topology is not great for large networks.
Identification of problems becomes difficult if the whole network
goes down.
Troubleshooting individual device issues is very hard.
(pulkitagarwal03pulkit, 2022)

[Author Name]
13 | P a g e

Ring Topology
Ring topology also called as the Ring Network, is a network
topology method, in which two other nodes, forward and backward,
are linked for each node exactly so as to form a single
continuous path for signal communication. Basically, ring
topology is divided into the two types which are Bidirectional
and Unidirectional.
(Sathyanarayanan, 2023)
Advantages of Ring Topology
 High Data Transmission Rate
 Minimal Impact of a Single Device Failure
 Cost-effective

Disadvantages of Ring Topology


 Limited Bandwidth
 Single Point of Failure
 Expensive

(Kumar, 2023)

[Author Name]
14 | P a g e

Star Topology
Star topology is a network topology in which each network
component is physically connected to a central node such as a
router, hub or switch.

Advantages of Star Topology


 The network is highly scalable.
 It is the most efficient.
 It has a centralized network management system.
Disadvantages of Star Topology
 Central device dependency
 It is very expensive.
 It requires additional equipment.

[Author Name]
15 | P a g e

Mesh Topology
Mesh topology is a network setup where each computer and
network device are interconnected with one another.
Advantages of Mesh Topology
 Addition of new devices does not affect the network.
 Data transmission is consistent.
Disadvantages of Mesh Topology
 There is high risk of redundant connection
 The additional cost is required for each node

[Author Name]
16 | P a g e

Tree Topology
A tree topology is a special type of structure where many
connected elements are arranged like the branches of a tree.

Advantage of Tree Topology


 Easier detection of error.
 Failure of a solo node will not disturb the other nodes.
Disadvantages of Tree Topology
 Difficulty in maintenance and configuration.
 Difficult to install a tree topology network.

[Author Name]
17 | P a g e

NETWORK ACCESS METHODS

These are some types of networks access methods

 TOKEN RING

 ETHERNET

[Author Name]
18 | P a g e

TOKEN RING
Connecting devices in a logical ring is a common way to create
a network topology where devices are connected in a circular
manner.
The software token is a packet of data that is passed from one
device to another in the ring. The device that possesses the
token has the authority to transmit data, and once it has
finished transmitting, it passes the token to its neighbor.
To access the free token, a device needs to monitor the
network to detect when the token is available. Once it detects
that the token is free, it takes possession of the token and can
then transmit data to other devices in the ring. When the
transmission is complete, the device releases the token, and it
continues to circulate around the ring until it is needed again.
When a device needs to send data to other devices in the
ring, it waits for the token to come to it. Once it has the
token, it can transmit the data to the next device in the ring.
The data is then passed from device to device until it reaches
its destination. Once the data has been successfully transmitted,
the token is released, and the cycle continues.

[Author Name]
19 | P a g e

Ethernet
Ethernet is a type of communication protocol that is created at
Xerox PARC in 1973 by Robert Metcalfe and others, which connects
computers on a network over a wired connection. It is a widely
used LAN protocol, which is also known as Alto Aloha Network. It
connects computers within the local area network and wide area
network. Numerous devices like printers and laptops can be
connected by LAN and WAN within buildings, homes, and even small
neighborhoods.

[Author Name]
20 | P a g e

CSMA/CD – Carrier Sense Multiple Access / Collision Detection


CSMA/CD (Carrier Sense Multiple Access/ Collision Detection)
is a media access control method that was widely used in Early
Ethernet technology/LANs when there used to be shared Bus
Topology and each node (Computers) were connected By Coaxial
Cables.

[Author Name]
21 | P a g e

CSMA/CA – / Collision Avoidance


CSMA is a basic method that controls the communication of
multiple participants on a shared and decentralized transmission
medium. However, this is now available in three different
variants, which depend on the transmission medium.

[Author Name]
22 | P a g e

OSI 7 LAYER MODEL


OSI stands for Open Systems Interconnection. It has been
developed by ISO – ‘International Organization for
Standardization ‘, in the year 1984. It is a 7-layer architecture
with each layer having specific functionality to perform. All
these 7 layers work collaboratively to transmit the data from one
person to another across the globe.

[Author Name]
23 | P a g e

TCP/IP 4 LAYER MODEL


The TCP/IP 4-layer model, also known as the Internet Protocol
Suite, is a conceptual model used to describe the communication
protocols used on the internet. The 4 layers of the TCP/IP model
are:
 Application Layer
 Transport Layer
 Internet Layer
 Link Layer

[Author Name]
24 | P a g e

NETWORK PROTOCOLS AND STANDARDS

Network protocols are sets of rules and procedures that govern


the communication between network devices. They are essential for
enabling communication between different devices on a network and
ensuring that data is transmitted accurately and efficiently.
Standards are guidelines, specifications, or criteria that are
developed by industry groups, organizations, or governments to
ensure consistency, interoperability, and quality in products,
services, and processes. Standards can cover a wide range of
areas, including technology, engineering, manufacturing, safety,
health, and environmental protection.

[Author Name]
25 | P a g e

TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol) is a


suite of communication protocols used to connect devices over the
Internet or any other network that uses the Internet Protocol
(IP). It is a set of protocols that govern the way data is
exchanged between devices over a network, providing a
standardized and reliable way of communication.

[Author Name]
26 | P a g e

TCP/IP 4-layer model and OSI 7-layer model


The TCP/IP model is often compared to the OSI (Open Systems
Interconnection) 7-layer model, which is a conceptual framework
for understanding network communication. The TCP/IP model is
often considered a more practical and simplified version of the
OSI model, as it combines several layers into one or two layers,
such as the application layer and the transport layer.

[Author Name]
27 | P a g e

NETWORK PROTOCOLS
Network protocols are sets of rules and standards that govern
the way data is transmitted, received, and interpreted over a
network. These protocols provide a standardized way of
communication between devices, ensuring that data is transmitted
and received correctly, efficiently, and securely.
These are some common network protocols
 FTP – File Transfer Protocol
 HTTP – Hypertext Transfer Protocol
 POP 3 – Post Office Protocol
 SMTP – Simple Mail Transfer Protocol
 DNS – Domain name System
 TCP – Transmission Control Protocol
 UDP – User Datagram Protocol
 IP – Internet Protocol
 ICMP – Internet Control Messaging Protocol
 DHCP – Dynamic Host Configuration Protocol
 ARP & RARP – Address Resolution Protocol

[Author Name]
28 | P a g e

FTP – File Transfer Protocol


FTP (File Transfer Protocol) is a network protocol used for
transferring files between computers on a network. It is an
application layer protocol that uses the client-server
architecture, with the client initiating the transfer and the
server responding to the client's requests.

HTTP – Hypertext Transfer Protocol


HTTP (Hypertext Transfer Protocol) is an application-layer
protocol used for transferring data over the Internet. It is the
foundation of data communication on the World Wide Web and is
used for exchanging text, images, videos, and other types of data
between web servers and clients.

POP 3 – Post Office Protocol


POP3 (Post Office Protocol version 3) is a standard protocol
used for receiving email messages from a remote server. It is an
application layer protocol that operates on top of the TCP/IP
protocol suite and is commonly used by email clients to retrieve
messages from a mail server.

SMTP – Simple Mail Transfer Protocol


SMTP (Simple Mail Transfer Protocol) is a standard protocol
used for sending email messages between servers on the Internet.
It is an application layer protocol that operates on top of the
TCP/IP protocol suite and is commonly used by mail transfer
agents (MTAs) to send and receive email messages.

DNS – Domain name System


DNS (Domain Name System) is a hierarchical naming system that
is used to translate human-readable domain names (such as
www.example.com) into IP addresses (such as 192.0.2.1) that are
used to identify network devices on the Internet.

TCP – Transmission Control Protocol


TCP (Transmission Control Protocol) is a connection-oriented
protocol that is used to ensure reliable and ordered delivery of
data between applications over IP networks.

UDP – User Datagram Protocol


UDP (User Datagram Protocol) is a connectionless transport
protocol that is used to send datagrams (packets) of data between
applications over IP networks.

[Author Name]
29 | P a g e

IP – Internet Protocol
IP (Internet Protocol) is a network-layer protocol used to
transmit data packets between hosts over IP networks, including
the Internet.

ICMP – Internet Control Messaging Protocol


ICMP (Internet Control Message Protocol) is a network-layer
protocol used to send error messages and operational information
about network conditions between hosts over IP networks,
including the Internet.

DHCP – Dynamic Host Configuration Protocol


DHCP (Dynamic Host Configuration Protocol) is a network
protocol used to automatically assign IP addresses and other
network configuration settings to devices on a network.

ARP & RARP – Address Resolution Protocol


ARP (Address Resolution Protocol) and RARP (Reverse Address
Resolution Protocol) are two network protocols used to map
between network addresses and physical addresses in a local area
network (LAN).

[Author Name]
30 | P a g e

LAN STANDARDS

LAN stands for Local Area Network, which is a computer network


that connects devices within a limited geographical area such as
an office, building, or campus.

IEEE – Institute of Electrical & Electronic Engineers

The Institute of Electrical and Electronic Engineers (IEEE) is


a global association and organization of professionals working
toward the development, implementation and maintenance of
technology-centered products and services.

There are some common IEEE standards


 IEEE 802.2 – Management of Ethernet Data Packets
 IEEE 802.3 – Definition of MAC Addressing (NIC)
 IEEE 802.5 – Token Passing Management

IEEE 802.2 – Management of Ethernet Data Packets

IEEE 802.2 is a standard for the Logical Link Control (LLC)


sublayer of the Data Link Layer in computer networking. The LLC
sublayer is responsible for managing communication between
devices on a shared medium, such as Ethernet.

IEEE 802.3 – Definition of MAC Addressing (NIC)


IEEE 802.3 is a standard that specifies the physical and data
link layer protocols for Ethernet networks. The data link layer
of IEEE 802.3 includes the Media Access Control (MAC) sublayer,
which is responsible for providing access to the physical layer
for transmitting and receiving data.

IEEE 802.5 – Token Passing Management


IEEE 802.5 is a standard for token ring local area networks
(LANs) developed by the Institute of Electrical and Electronics
Engineers (IEEE). Token ring is a type of LAN in which devices
are connected in a ring topology and data is transmitted
sequentially from one device to the next using a special data
packet called a token.

[Author Name]
31 | P a g e

FDDI – Fiber Distributed Data Interface


FDDI (Fiber Distributed Data Interface) is a high-speed LAN
(Local Area Network) standard that uses fiber optic cables to
transmit data.

WIRELESS TECHNOLOGIES

Wireless technologies are technologies that enable


communication between devices without the use of physical cables
or wires.

IEEE 802.11 – Wireless Standards (Wi-Fi) Bluetooth

IEEE 802.11 and Bluetooth are two widely used wireless


technologies that enable communication between devices without
the use of physical cables or wires.

3G / 4G (Mobile Phone Technology)

3G (Third Generation) and 4G (Fourth Generation) are mobile


phone technologies that enable high-speed wireless data transfer
on mobile devices.

InfraRed Standards – IrDA

IrDA (Infrared Data Association) is a standard for wireless


communication using infrared light. It was developed in the 1990s
as a way to transfer data between devices using beams of infrared
light.

[Author Name]
32 | P a g e

Peer-to-Peer network

Peer-to-Peer (P2P) network is created when two or more PCs


are connected and share resources without going through a
separate server computer. A P2P network can be an ad hoc
connection—a couple of computers connected via a Universal Serial
Bus to transfer files.

Client/server networks

A client-server network is a form of internet network that


consists of a single central computer functioning as a server and
directing several other computers, referred to as clients.
Clients can access shared files and information kept on the
serving machine by connecting to the server.

[Author Name]
33 | P a g e

Benefits and Disadvantages of using Peer-to-Peer Network

Benefits
 Cost-effective: P2P networks are cost-effective as they do
not require a central server, which eliminates the cost of a
dedicated server and reduces maintenance costs.
 Easy to set up: P2P networks are easy to set up as they do
not require specialized hardware or software.
 Scalability: P2P networks are highly scalable as new nodes
can be easily added to the network without affecting the
existing nodes.
 Robustness: P2P networks are more robust than client/server
networks as they do not depend on a central server. If one
node fails, other nodes can continue to function.
 An entire library of files is available for you to find
online: You can easily locate and download files online using

[Author Name]
34 | P a g e

peer to peer network, especially if you prefer torrent files.


Several online sources and websites provide massive libraries
of high-quality content that you can access at any time.
 Better performance: P2P networks can leverage the resources
of all connected nodes, resulting in better performance and
faster data transfer rates.
 Increased privacy: P2P networks can offer increased privacy,
as users can communicate and share files without relying on
centralized servers.
 Innovation: P2P networks can foster innovation by allowing
users to share and collaborate on new ideas and projects.
 Accessibility: P2P networks allow users to access files and
resources from anywhere in the world, as long as they have an
internet connection.
 Customization: P2P networks can be customized to fit the
specific needs of users or organizations, making them more
flexible than traditional network architectures.

Disadvantages
 Security: P2P networks are more vulnerable to security
threats such as malware and unauthorized access because
there is no centralized security control.
 Performance: P2P networks can suffer from performance
issues, especially when the network is large, and the nodes
have limited resources.
 Reliability: P2P networks can be less reliable than
client/server networks as they rely on the availability and
reliability of individual nodes.
 Limited management capabilities: P2P networks have limited
management capabilities, making it difficult to monitor and
manage the network.
 The files or resources are not centrally organized with a
P2P network: A P2P network stores files or resources on
individual computers instead of using a centrally organized
public area. That means it can be challenging for some
people to locate specific files when the owner of a PC
doesn’t seem to have a logical filing system.
 Dependence on other users: P2P networks rely on the
availability of other users, which can impact network
performance and availability.

[Author Name]
35 | P a g e

 Unpredictable network behaviour: P2P networks can exhibit


unpredictable behaviour due to the lack of centralized
control, making it difficult to manage and troubleshoot
issues.
 Legal issues: P2P networks can be used for illegal
activities, such as piracy or copyright infringement, which
can lead to legal consequences for users.
 Complexity: P2P networks can be more complex to set up and
manage than traditional client-server architectures,
requiring specialized knowledge and skills.

Benefits and Disadvantages of using Client/server networks

Benefits
 Security: Client/server networks offer better security than
P2P networks as all data is stored on a central server, and
security can be easily controlled and managed.

 Scalability: Client/server networks are highly scalable and


can easily accommodate new users and applications.

 Centralized management: Client/server networks offer


centralized management capabilities, making it easier to
monitor and manage the network.

 Performance: Client/server networks can offer better


performance than P2P networks as the server can handle high
volumes of data and processing.

 Expand server: You can add more storage capacity to the


server if you have more files to store. You can add one more
hard drive to the server easily to expand server storage.

 Centralized control: A client/server network provides


centralized control over network resources and user access.
 Efficient resource utilization: Client/server networks allow
for efficient resource utilization, as servers can share
resources among multiple clients.

[Author Name]
36 | P a g e

 Robust backup and recovery: Client/server networks enable


robust backup and recovery procedures, ensuring that data
can be restored in case of disasters.
 Better support: Client/server networks often have better
support options and resources available, as they are
typically developed and maintained by commercial entities.
 Improved data integrity: Client/server networks provide
improved data integrity, as data is stored centrally and
managed through consistent protocols.

Disadvantages
 Cost: Client/server networks are more expensive to set up
and maintain as they require specialized hardware and
software.

 Complexity: Client/server networks can be complex to set up


and maintain, requiring specialized IT knowledge and skills.

 Single point of failure: Client/server networks have a


single point of failure, which can result in system downtime
and data loss.

 Limited scalability: Client/server networks can have limited


scalability when the network becomes too large or complex,
and the server cannot handle the load.

 Very expensive: The server computer needs to have a high


processor and initial investment to buy server is high.

 Network congestion: Client/server networks can experience


network congestion if too many clients are accessing the
same resources simultaneously.
 Limited user control: Client/server networks provide limited
user control, as all user access and permissions are managed
centrally.

 Network security risks: Client/server networks can be


vulnerable to security risks, such as unauthorized access or
data breaches, if not properly secured.
[Author Name]
37 | P a g e

 Dependency on hardware: Client/server networks are dependent


on the hardware capabilities of servers, which can impact
network performance.

 Limited resource sharing: Client/server networks may have


limited resource sharing options, as resources are typically
allocated to specific clients rather than shared among all
users.

[Author Name]
38 | P a g e

References

Goyal, A., 2023. geeksforgeeks. [Online]


Available at: https://www.geeksforgeeks.org/types-of-area-
networks-lan-man-and-wan/
[Accessed 24 May 2023].
Kumar, S., 2023. tutorialspoint. [Online]
Available at: https://www.tutorialspoint.com/advantages-and-
disadvantages-of-ring-topology
[Accessed 24 May 2023].
pulkitagarwal03pulkit, 2022. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/advantages-and-
disadvantages-of-bus-topology/
[Accessed 24 May 2023].
Rouse, M., 2015. techopedia. [Online]
Available at: https://www.techopedia.com/definition/17045/bus-
topology
[Accessed 24 May 2023].
Sathyanarayanan, A., 2023. educba. [Online]
Available at: https://www.educba.com/what-is-ring-topology/
[Accessed 24 May 2023].

[Author Name]

You might also like