Computer Network
Computer Network
BUSINESS
In the modern era, computers have become a vital component of both commercial and private
operations in the industry sector. As technological developments have accelerated, networking
has become increasingly important. We have gradually transitioned from the first wired
network technology to wireless networking technology. If we look at it now, we can see that
networking affects everything.
A computer network is a collection of interrelated devices that can share resources and
exchange data with one another. A network's devices can be physically connected with wires
or wirelessly with the help of radio waves or infrared signals. These devices employ a set of
regulations and rules called protocols that help to transmit data over physical wire or wireless
technologies.
The main motivation for a computer network is to enable devices to communicate with one
another and share resources, including files, information, apps, and hardware components such
as printers and scanners. E-mail, virtual teamwork, sharing files, video conferencing, playing
games online, and accessing the internet are all potential uses for computer networks. Computer
networks are now a crucial part of any business communication system.
1. Resource Sharing:
Hardware Resources: Computer networks enable the sharing of hardware
resources such as printers, scanners, and storage devices, optimizing resource
utilization.
Software Resources: Networked systems can share software applications and
databases, reducing redundancy and improving efficiency.
2. Data Transfer and Accessibility:
File Sharing: Networks facilitate the seamless transfer of files and data between
connected devices, allowing users to access information from any location
within the network.
Remote Access: With network connectivity, users can remotely access and
control resources and data, fostering flexibility and mobility.
3. Communication and Collaboration:
Email and Messaging: Networks provide the infrastructure for email and
messaging systems, enhancing communication among individuals and
organizations.
Collaborative Tools: Collaborative platforms, enabled by computer networks,
allow users to work together on projects in real-time, regardless of their physical
location.
4. Centralized Data Management:
Centralized Databases: Computer networks support centralized databases,
ensuring that data is stored, updated, and managed in a controlled and
coordinated manner.
Data Security: Centralized data management allows for the implementation of
security measures, backups, and access controls to protect sensitive information.
5. Cost Efficiency:
Shared Resources: By sharing resources, organizations can reduce costs
associated with the purchase and maintenance of redundant equipment and
software.
Communication Cost: Computer networks enable cost-effective
communication, particularly for long-distance or international communication,
compared to traditional methods.
6. Automation and Control:
Industrial Control Systems: Networks play a crucial role in automation and
control systems, allowing for the remote monitoring and management of
industrial processes and machinery.
Smart Devices: The Internet of Things (IoT) relies on networks to connect and
control smart devices, improving efficiency in various domains.
7. Global Information Access:
Internet Access: Computer networks, especially the global internet, provide
access to a vast amount of information and resources from around the world,
facilitating research, education, and business operations.
Information Exchange: Networks enable the exchange of information on a
global scale, fostering innovation, collaboration, and knowledge sharing.
8. Business Operations and Transactions:
E-commerce: Computer networks support e-commerce platforms, enabling
online transactions, electronic payments, and digital commerce.
Supply Chain Management: Networks play a critical role in coordinating and
managing supply chains, connecting suppliers, manufacturers, distributors, and
retailers.
9. Scalability and Flexibility:
Scalability: Networks can easily scale to accommodate the addition of new
devices, users, or resources, allowing organizations to adapt to changing
requirements.
Flexibility: Networked systems provide flexibility in terms of device
connectivity, allowing users to choose from a variety of devices while
maintaining seamless communication.
In summary, computer communication networks are essential for facilitating efficient, secure,
and collaborative information exchange in diverse domains. They form the backbone of
modern computing, supporting the interconnected and digital nature of today's societies and
businesses.
TYPES OF NETWORK
A computer network is a cluster of computers over a shared communication path that works to
share resources from one computer to another, provided by or located on the network nodes.
Bluetooth, Leased
Ethernet & FDDI,
Technology IrDA,Zigb Ethernet Line, Dial-
Wifi CDDi. ATM
ee Up
Above 50
Range 1-100 m Upto 2km 1 – 5 km 5-50 km
km
Transmission
Very High Very High High Average Low
Speed
Private or Private or
Ownership Private Private Private
Public Public
Very
Maintenance Very Easy Easy Moderate Difficult
Difficult
1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected through
a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected
to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then the
sender waits until the media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on "recovery after the collision".
2) Ring Topology
o Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point
of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.
6) Hybrid Topology
1. Network Communication Protocols: These protocols determine the rules and formats to
transfer data across networks. Communication protocols govern various aspects of analog and
digital communications, such as syntax, authentication, semantics, and error detection, among
others. Some key network communication protocols include:
o Hyper-Text Transfer Protocol (HTTP): Commonly referred to as the protocol of the
internet that allows communication between a server and browser.
o Transmission Control Protocol (TCP): A reliable, connection-oriented protocol that
helps in the sequential transmission of data packets to ensure data reaches the
destination on time without duplication.
o Internet Protocol (IP): Facilitates routing the data packets across networks. IP
contains addressing and control information to deliver packets across a network. It
works along with TCP. While it ensures delivering the packets to the right address, TCP
aligns them in the right order.
o User Datagram Protocol (UDP): Unlike TCP, UDP is a connectionless protocol that
doesn’t ensure a connection between the application and server before transmitting a
message. It’s effective for use cases such as broadcasts or multicast connections.
o File Transfer Protocol (FTP): Allows file sharing between servers by establishing two
TCP connections, one for data transfer and the other for control. The data transfer
connection transfers the actual files while the control connection transfers control
information such as passwords to ensure data retrieval in case of data loss.
Helps diagnose network connectivity issues. Network devices employ ICMP for sending error
messages, highlighting congestion and timeouts, and transmitting other operational
information to assist in network troubleshooting.
2. Network Security Protocols: These protocols ensure safe data transmission over the
network connections. Network security protocols define the procedures to secure data from any
unauthorized access. These protocols leverage encryption and cryptography to safeguard. Here
are the most widely used network security protocols:
o Secure File Transfer Protocol (SFTP): Helps securely transfer files across a network
by using public-key encryption and authenticating the client and server.
o Hyper-Text Transfer Protocol Secure (HTTPS): Overcomes the limitation of HTTP
by ensuring the security of data transmitted between the browser and server through
data encryption. HTTPS is a secure version of HTTP.
o Secure Socket Layer (SSL): Primarily helps secure internet connections and safeguard
sensitive data using encryption. SSL protocol enables both server-client communication
and server-server communication.
It stands for Open System Interconnection. It stands for Transmission Control Protocol.
OSI model has been developed by ISO It was developed by ARPANET (Advanced
(International Standard Organization). Research Project Agency Network).
It is an independent standard and generic It consists of standard protocols that lead to the
protocol used as a communication gateway development of an internet. It is a communication
between the network and the end user. protocol that provides the connection among the
hosts.
In the OSI model, the transport layer provides a The transport layer does not provide the surety for
guarantee for the delivery of the packets. the delivery of packets. But still, we can say that it
is a reliable model.
This model is based on a vertical approach. This model is based on a horizontal approach.
In this model, the session and presentation In this model, the session and presentation layer
layers are separated, i.e., both the layers are are not different layers. Both layers are included in
different. the application layer.
In this model, the network layer provides both The network layer provides only connectionless
connection-oriented and connectionless service.
service.
Protocols in the OSI model are hidden and can In this model, the protocol cannot be easily
be easily replaced when the technology replaced.
changes.
OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper interfaces are not properly separated. It is protocol
distinction between them. It is protocol dependent.
independent.
The usage of this model is very low. This model is highly used.
It provides standardization to the devices like It does not provide the standardization to the
router, motherboard, switches, and other devices. It provides a connection between various
hardware devices. computers.