Types of Network
Types of Network
Local Area Network :LAN is a privately owned computer network covering a smallgeographical
area (small physical area), like a home, office or a building such as a school. It can cover an area
spread over a few metres to a radius of a few kilometres.
Occasionally, a LAN can span a group of nearby buildings. In addition to operating in a limited
space, a LAN is owned, controlled and managed by a single person or organization. ALAN can be
set up using wired media (UTP cables, coaxial cables, etc.) or wireless media (Infrared, Radio
waves). If aLANis set up using unguidedmedia, it is known as WLAN (wireless LAN).The key
purpose of a LAN is to share resources. LAN users can share data, programs, printer, disk, modem,
etc.
Metropolitan Area Network (MAN):It is larger than a LAN and can cover a city and its surrounding
areas. A MAN usually interconnects a number of LANs and individual computers. It also shares the
computing resources among users. All types of communication media (guided and unguided) are
used to set up a MAN. A MAN is typically owned and operated by a single entity such as a
government body or a large corporation.
Ex : Interconnected offices of a Multinational Corporation (MNC) or cable television networks
available in the whole city.
Wide Area Network (WAN) : This type of network spreads over a large geographical area across
countries and continents. WANS are generally used to interconnect several other types of networks
such as LANs, MANs, etc.They facilitate fast and efficient exchange of information at a high speed
and low cost.
A WAN uses common carriers like satellite systems, telephone lines, etc.
WAN can cover an area with a radius spanning hundreds of kilometres. A network of ATMs, banks,
government offices, international organizations' offices, etc., spread over a country, continent or
covering many continents are examples of WAN.
Alltypes of communication media (guided and unguided) are used to set up a WAN. The internet is
the largest WAN spanning the entire planet.
Personal Area Network (PAN):PANs are small networks used toestablish communication between
a computer and other handheld devices in the proximity of up to 10 metres using wired USB
connectivity or wireless systems like Bluetooth or Infrared.
PANs are used to connectcomputers, laptops, mobiles and other IT-enabled devices to transfer files
including emails, digitalphotos, audio and video, etc. The Bluetooth technology implements PAN.
Ex : Wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and
TVremotes.
Network topologies :Network topology is the arrangement of the elements (computers, links, nodes,
etc.) of a communication network. It can be used to defineor describethe arrangement of various
types of telecommunication networks, including command and control radio networks, industrial
field busses and computer networks.
Some of them are
a. Bus topology
b. Star topology
C. Tree topology
a. Bus topology is amultipoint configuration, i.e., several devices are connected to amain long cable
which acts as a backbone. Nodes are connected by drop lines andtaps. Adrop line is a connection
between the long cable and devices and taps are the connectors that are punctured inside the main
cable.The data flows from one end of the cable to the other.
However, as the signal travels a long distance, it becomes weaker and weaker. Therefore, there
should be a limited number of nodes connected to a line. Ethernet is a common example of bus
topology
Advantages Disadvantages
(a) Nodes can be connected or removed easily (a) Ifthere is a fault or break in the main cable,
from bus network. the entire network shuts down.
(b) It requires less cable length than a star (b) Terminators are required at both ends of the
topology. backbone cable.
(c) Bus network is easy to implement and can (c) Fault isolation is difficult to detect if the
be extended up toacertain limit. entire network shuts down.
(d) It works well for small networks. (d) When the network is required in more than
one building, bus network cannot be used.
(e) The signal becomes weaker if number of
nodes becomes large.
() Performance degradation occurs with the
increased number of nodes.
(g) Collision of data can take place because
several nodes can transmit data to each other at
one time.
b. Star topology : In Star topology, each communicating device is connected to a central controller
called hub. (A hub is a hardwaredevice used toconnect severalcomputers together.) If the data is
required to be sent from one computer and received by another computer, then this can be
accomplished only by the central controller as cach data is first sent to the hub, which then relays
that data to the destination computer. Most popular and widely used LAN technology, Ethernet,
currently operates in Star Topology.
HUB
Advantages Disadvantages
(a) Fewer wires are required as compared to (a)Extra hardware is required for installation of
mesh topology which, thus, reduces the number central controller known as hub.
of input/output ports. (b) Allnodes of star topology are dependent on
(6) Installation and maintenance of network iscentral hub and, therefore, any problem in the
easy and takes less time. hub makes the entire network shut down.
(c)It is casy to detect faults in this network as (c) The performance of the entire network is
all computers are dependent on the central hub. directly dependent on the perfornance of the
This means that any problem which makes the hub. If the server is slow, it will cause the entire
network non-functioning can be traced to thenetwork to slow down.
central hub. (d) More cabling is required in star topology as
(d) The rate of data transfer is fast as all the data compared to any other topology (ring, bus,tree)
packets or messages are transferred through as all nodes are directly connected to a central
central hub. hub.
(e) As the nodes are not connected to each other,
any problem in one node does not hamper the
performance of other nodes in the netvwork.
() Removal or addition of any node in star
topology can take place easily without affecting
the entire performanceof t he network.
c. Tree Topology : In Tree topology, all or some of the devices are connected to the central hub,
called an active hub, and some of the devices are connected to the secondary hub,which may be an
active hub or passive hub.
Anactive hub contains the repeater that regenerates the signal when it becomes weaker with longer
distances.
Apassive hub simply provides a connection between all other connecting nodes.
Node 1
Node 2 Node 3
Node 6
Advantages Disadvantages
a. The tree topology is useful in cases where a a) As mutiple segments are connected to a
star or bus cannot be implemented individually. central bus, the network depends heavily on the
(b) It is most suited in networking multiple bus. Its failure affects the entire network.
departments of a university or corporation, (b) Owing to its size and complexity.
where cach unit (star segment) functions maintenance is not easy and costs are high.
separately, and is also connected with the main Also, configuration is difficult in comparison to
node (root node). other topologies.
(c) The advantages of centralization that are (c) Though it is scalable, the number of nodes
achieved in a star topology are inherited by the that can be added depends on the capacity of the
individual star segments in a tree network. central bus and on the cable type.
(d) Each star segment gets a dedicated link from
the central bus. Thus, failing of one
does not affect the rest of the network.
segment
(e) Fault identification is easy.
() The network can be expanded by the addition
of secondary nodes Thus scalability is achieved.
Network protocols :FTP, PPP, SMTP, POP3, TCP/IP, HTTPS, HTTP, TELNET, VolP
1. File Transfer Protocol : It is the simplest and most secure way to exchange files over the
internet. The main objectives of FTP are:
Transmitting and sharing of files (computer programs and/or data).
Indirect or implicit use of remote computers.
To shielda user from variations in file storage systems among different hosts.
Totransfer data reliably and efficiently.
FTP uses the internet's TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the internet or to upload
a file to a server (e.g., uploading a web page file to a server).
2. Point-to-Point Protocol :It is aprotocol used to establish adirect connection between two nodes.
It can provide connection authentication, transmission encryption and compression. It is used to
connect the Home PC to the server of ISP. The communication takes place through high speed
modem. PPP is used to connect telephone dial-up lines to the internet.
3. Simple Mail Transfer Protocol: SMTP is used for sending email messages to other networks or
computers. It handles only outgoing messages and not incoming messages.
SMTP does not create messages:rather, it helps in forwarding messages between client servers. It
uses TCP to send messages to another host. For receiving messages, another protocol POP (post
office protocol) is used. Thus, email clients require addresses of both SMTP server and another
server that processes incoming messages (usually POP or IMAP).
Sender Mail Server Recever's Mail Server
Mal
Mal
SMTP
Mai
Mal
SMTP POPAMAP
Mal
Mal
Receiver
Sender
4. POP (Post Office Protocol 3) :It is asimple and standard method to access mailbox and download
messages to the local computers. The user can receive messages with the help of POP protocol. The
advantage is that once the messages are downloaded, an internet connection is no longer needed to
read the mail. Auser can read all emails offline as these are savedon the computer's hard disk.
To get a mail from POP server, auser must enter a valid username and password for their email
account. The POP3 protocol thus manages authentication using the user name and password;
however, it is not secure because the passwords, like the email, circulate in plain text over the
network.
5. TCP/IP (Transmission Control Protocol/Internet Protocol) TCP is one of the
main
TCP/IP networks. The IP protocol deals onlywith packets but TCP enables two hosts toprotocols
in
establish a
connection and exchange streams of data. TCP works with the Internet Protocol (IP), which defines
how computers send packets of data to each other. The packets are delivered not in a sequential
order; instead, they are delivered randomly. Now, TCP at the receiver side collects all packets and
arranges them in a sequential order. TCP is areliable stream delivery service that guarantees that all
bytes received will be identical with bytes sent and in the correct order.
6. HTTP (HyperText Transfer Protocol):It is a protocol used for transferring data over the web. It's
the foundation of any data exchange on the Web and it is a protocol used for transmitting hypertext
via the Internet.
7. HTTPS (HyperText Transfer Protocol Secure) : It is the secure version of HTTP. It uses
encryption to secure the data transmitted between the client and server.
Differences :
A
simple HTML Code: OUTPUT
D My first web page X +
<html>
<head>
<title>My first web page</title> My First Heading
</head>
My first paragraph
<body>
<hi> My First Heading </h1>
<p> My first paragraph </p>
</body>
</html>
XML:
XML stands for EXtensible Markup Language
XML is a markup language much like HTML
XML was designed to store and transport data
XML was designed to be self-descriptive
XML is a W3C Recommendation
HTML XML
HyperText Markup Language eXtensible Markup Language.
designed to display data with focus on how data XML was designed to be a software and
looks. hardware independent tool used to transport and
store data, with focus on what data is.
HTML is case insensitive. XML is case sensitive.
HTML is used for designing a web-page to be XML is used basically to transport data between
rendered on the client side. the application and the database.
HTML has its own predefined tags. Uses custom tags defined by the user.
HTML is not strict if the user does not use the XML makes it mandatory for the user the close
closing tags. each tag that has been used.
HTML does not preserve white space. XML preserves white space.
HTML 0s about displaying data, hence static. XML is about carrying information hence
dynamic.
Domain Name: Domain names are used to identify one or more IP addresses. Domain names are
used in URLs toidentify particular web page.
Ex : htp://www.kviisc.org/english-results.htm
URL http://www.kviisc.org/english-results.htm
Domain Name www.kviisc.org
Web page english-results.htm
Protocol http://
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to. There
are only a limited number of such domains. For example:
gov - Government agencies
edu - Educational institutions
org - Organizations (nonprofit)
mil - Military
com - commercial business
net - Network organizations
in - India
" th-Thailand
Because the Internet is based on IP addresses, not domain names, every Web server require a Domain
Name System (DNS)server to translate domain names into IP addresses.
URL: Uniform Resource Locator. It is the global address of documents and other resources on the
World Wide Web.
Website: Collection of web pages which are interlinked to one another. These pages are hypertext
pages and link between pages is known as hyperlink.
Web browser: It is application software though which user can access internet. Example: internet
explorer,Google chrome, Mozilla Firefox, opera, UC browser
Web Server: A web server is a system that uses HTTP to accept request and serve the web pages as
response to users. Every web server has IP address.
Example: Apache web server, Microsoft's Internet Information Server (1S) and nginx (pronounced
engine X) from NGNIX.
Web Hosting: Web hosting is a service that allows organizations and individuals to post a website
on to the Internet. A web host, or web hosting service provider, is a business that provides the
technologies and services needed for the website or webpage to be viewed in the Internet. Websites
are hosted, or stored, on special computers called servers.
Web Scripting: Programming languages which are used to design dynamic web pages, are known as web
scripting languages. There are two types of web scripting languages:
1. Client Side Scripting
2. Server Side Scripting
1.Client Side Scripting: The programming language which executes on client side is known as client side
scripting. There are many client-side scripting languages:
JavaScript
VBScript
HTML (Structure)
AJAX
jQuery etc.
2. Server Side Scripting: program that runs directly on the server. There are several languages that can b¹
used for server-side programming:
PHP (Hypertext Preprocessor )
ASP (Active Server Pages)
Java and JSP( Java Server Pages)
Python