0% found this document useful (0 votes)
15 views37 pages

Unit 9 Computer Network (P1)

The document provides a comprehensive overview of computer networks, detailing various types such as LAN, WAN, MAN, and PAN, along with their characteristics and technologies. It discusses network topologies including bus, ring, star, mesh, and tree, as well as access methods like Token Ring and Ethernet. Additionally, it covers network protocols and standards, including TCP/IP and various application-layer protocols.

Uploaded by

oakarhtet2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views37 pages

Unit 9 Computer Network (P1)

The document provides a comprehensive overview of computer networks, detailing various types such as LAN, WAN, MAN, and PAN, along with their characteristics and technologies. It discusses network topologies including bus, ring, star, mesh, and tree, as well as access methods like Token Ring and Ethernet. Additionally, it covers network protocols and standards, including TCP/IP and various application-layer protocols.

Uploaded by

oakarhtet2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

Unit 9 -Computer Network

Networking/Not-working

3/10/2023

Oakar htet
U-9 VUC Oakarhtet

Table of Contents
Type Of Network.........................................................................................................................................3
LAN – Local Area Network.......................................................................................................................4
WAN – Wide Area Network.....................................................................................................................5
WAN Technologies..................................................................................................................................6
ATM – Asynchronous Transfer Mode..................................................................................................7
MPLS....................................................................................................................................................8
MANs – Metropolitan Area Network.......................................................................................................9
PANs – Personal Area Networks............................................................................................................10
NETWORK TOPOLOGY...............................................................................................................................11
Bus Topology.........................................................................................................................................12
Ring Topology........................................................................................................................................13
Star Topology.........................................................................................................................................14
Mesh Topology......................................................................................................................................15
Tree topology........................................................................................................................................16
NETWORK ACCESS METHODS....................................................................................................................17
TOKEN RING...........................................................................................................................................18
ETHERNET..............................................................................................................................................20
CSMA/CD – Carrier Sense Multiple Access / Collision Detection.......................................................21
CSMA/CA – / Collision Avoidance......................................................................................................22
OSI 7 LAYER MODEL...................................................................................................................................23
TCP/IP 4 LAYER MODEL.............................................................................................................................24
NETWORK PROTOCOLS AND STANDARDS.................................................................................................25
TCP/IP – Transmission Control Protocol / Internet Protocol.................................................................26
Protocols................................................................................................................................................27
FTP – File Transfer Protocol...............................................................................................................27
HTTP – Hypertext Transfer Protocol..................................................................................................27
POP 3 – Post Office Protocol..............................................................................................................27
SMTP – Simple Mail Transfer Protocol...............................................................................................27
DNS – Domain name System.............................................................................................................27
TCP – Transmission Control Protocol.................................................................................................27
UDP – User Datagram Protocol..........................................................................................................27

pg. 1
U-9 VUC Oakarhtet

IP – Internet Protocol........................................................................................................................27
ICMP – Internet Control Messaging Protocol....................................................................................27
DHCP – Dynamic Host Configuration Protocol...................................................................................28
ARP & RARP – Address Resolution Protocol..............................................................................28
AppleTalk Protocol.............................................................................................................................28
LAN STANDARDS........................................................................................................................................29
IEEE – Institute of Electrical & Electronic Engineers......................................................................29
IEEE 802.2 – Management of Ethernet Data Packets........................................................................29
IEEE 802.3 – Definition of MAC Addressing (NIC)..............................................................................29
IEEE 802.5 – Token Passing Management.........................................................................................29
FDDI – Fiber Distributed Data Interface.............................................................................................29
WIRELESS TECHNOLOGIES.........................................................................................................................30
IEEE 802.11 – Wireless Standards (WiFi)...............................................................................................31
Bluetooth...............................................................................................................................................31
3G / 4G (Mobile Phone Technology)......................................................................................................31
InfraRed Standards – IrDA.....................................................................................................................31
Comparison of "peer-to-peer" vs "client-server" (M1)..............................................................................33
Peer-to-peer..........................................................................................................................................33
Client-server..........................................................................................................................................33
Peer-to-Peer Vs Client-Server..............................................................................................34

pg. 2
U-9 VUC Oakarhtet

Type Of Network
There are Different Types of network
 LAN (Local Area Network)
 WAN (Wide Area Network)
 MAN (Metropolitan Area Network)
 PAN (Personal Area Network)
 CAN (Campus Area Network)

LAN – Local Area Network

pg. 3
U-9 VUC Oakarhtet

A Local Area Network (LAN) is a computer network that spans a small geographic
area, typically confined to a single building, campus, or department within an
organization

The primary purpose of a LAN is to enable communication and resource sharing

LANs can be structured in variety of ways, but they typically use Ethernet or Wi-Fi
Technology to connect devices to central hub or switch

WAN – Wide Area Network

pg. 4
U-9 VUC Oakarhtet

A Wide Area Network (WAN) is a computer network that connects devices over a
large geographical area, such as cities, countries, or even continents.

WANs interconnect various types of LANs and other networks together, such as
campus networks, branch office networks, and data center networks

The Internet is the largest WAN in the world, connecting millions of devices across
the globe.

WAN Technologies

pg. 5
U-9 VUC Oakarhtet

Frame Relay is a packet-switched network technology that allows multiple virtual


circuits to be created on a single physical circuit.

A packet-switched network structure is a type of telecommunications network


architecture where data is transmitted over a network in the form of packets.
Each packet contains a portion of the data being transmitted, along with a header
that contains information about the destination and source of the packet. These
packets are then sent over the network and are reassembled at the receiving end.

Frame Relay configuration has any options, yet the actual configuration you
perform can be very basic depending on how many default settings can be used.

ATM – Asynchronous Transfer Mode

pg. 6
U-9 VUC Oakarhtet

(ATM) is a transfer mode for switching and transmission that efficiently and
flexibly organizes information into cells
The difference between frame relay and ATM lies in the speed of transmission,
efficiency, accurate delivery of the packets, etcetera. The frame relay provides
1.544 Mbps or 44.736 Mbps. On the other hand, ATM provides 51 Mbps or 155
Mbps.

MPLS

pg. 7
U-9 VUC Oakarhtet

Multiprotocol Label Switching, or MPLS, is a networking technology that routes


traffic using the shortest path based on “labels,” rather than network addresses,
to handle forwarding over private wide area networks.

pg. 8
U-9 VUC Oakarhtet

MANs – Metropolitan Area Network

Metropolitan Area Network (MAN) is a computer network that connects


computers within a metropolitan area, such as a single large city, multiple
cities/towns, or any large area with multiple buildings.

pg. 9
U-9 VUC Oakarhtet

PANs – Personal Area Networks

Personal Area Network (PAN): It is an interconnection of personal technology


devices to communicate over a short distance, which is less than 33 feet or 10
meters or within the range of an individual person, typically using some form of
wireless technologies.

pg. 10
U-9 VUC Oakarhtet

NETWORK TOPOLOGY
Network topology refers to the arrangement of the different components in a
computer network.

pg. 11
U-9 VUC Oakarhtet

Bus Topology

Bus topology, also known as line topology, is a type of network topology in


which all devices in the network are connected by one central RJ-45
network cable or coaxial cable.
Advantages of Bus Topology
 Works efficiently for small networks
 Easy and cost-effective to install and add or remove devices
 Doesn’t require as much cabling as alternative topologies
 If one device fails, other devices are not impacted
Disadvantages of Bus Topology
 If the cable is damaged, the entire network will fail or be split
 Difficult to troubleshoot problems
 Very slow and not ideal for larger networks

pg. 12
U-9 VUC Oakarhtet

Ring Topology

Ring topology is a type of network topology in which each device is


connected to two other devices on either side via an RJ-45 cable or coaxial
cable.
Advantages of Ring Topology
 Since data flows in one direction, the chance of a packet collision is reduced
 A network server is not needed to control network connectivity
 Devices can be added without impacting network performance
Disadvantages of Ring Topology
 If one device fails, the entire network is impacted
 Can be difficult to architect the necessary cabling
 More expensive to implement than a bus topology

pg. 13
U-9 VUC Oakarhtet

pg. 14
U-9 VUC Oakarhtet

Star Topology

Star topology is a type of network topology in which every device in the network
is individually connected to a central node, known as the switch or hub.
Advantages of Star Topology
 Limits the impact of a single point of failure because each device is isolated
by its relationship to the switch
 Adding or removing devices to the network is simple and doesn’t disrupt
the network
 High-performance as no data collisions can occur
Disadvantages of Star Topology
 Requires more cabling and is more expensive than some alternatives
 If the switch fails, all the connected devices are disabled
 The switch requires more resources and maintenance
 Performance is dependent on the switch

pg. 15
U-9 VUC Oakarhtet

Mesh Topology

Mesh topology is a type of network topology in which all devices in the network
are interconnected. In a mesh topology, data can be transmitted by routing (sent
the shortest distance) and flooding (sent to all devices).
Advantages of Mesh Topology
 Multiple devices can transmit data at the same time, allowing for high
amounts of traffic
 If one device fails, data transmission is not impacted in the rest of the
network
 Adding devices to the network does not disrupt data transmission
 Troubleshooting is easier than with alternative topologies
Disadvantages of Mesh Topology
 Network installation and maintenance is time and resource intensive
High power requirement due to all the devices needing to remain active all the
time

pg. 16
U-9 VUC Oakarhtet

Tree topology

In computer networking, tree topology is a type of network topology that


resembles a tree. In a tree topology, there is one central node (the “trunk”), and
each node is connected to the central node through a single path.
Advantages of Tree Topology

 It can support a large number of nodes.


 It can be easily expanded.
 Additionally, tree topologies are highly scalable and can be easily reconfigured

Disadvantages of Tree Topology

 It can be difficult to troubleshoot issues in a tree topology as each node is


connected to multiple other nodes. This can make it hard to identify where the
issue is located.
 Tree topology can be less reliable than other topologies such as star or mesh as
there are more potential points of failure. If one node goes down, it can affect the
entire network.

pg. 17
U-9 VUC Oakarhtet

NETWORK ACCESS METHODS


An access method is a software component, operating system service or network
interface that handles the storage/retrieval and sending/receipt of data.

pg. 18
U-9 VUC Oakarhtet

TOKEN RING

In a logical ring network, devices are connected in a circular configuration where


each device is connected to its immediate neighbors to form a loop or ring.
A software token is a type of security token that is generated and stored on a
software application, rather than a physical device. The data carried by a software
token typically includes a unique identifier for the token itself
Access tokens are used in token-based authentication to allow an application to
access an API.
In a logical ring network, devices are connected in a circular manner, where each
device is connected to the next device in a sequence, forming a closed loop. To
send data to other devices in the ring, a device can use a technique called token
passing.
Advantages:
 High network efficiency
 Predictable performance
 Security
Disadvantages:
 High implementation cost
 Limited scalability
 Complexity

pg. 19
U-9 VUC Oakarhtet

pg. 20
U-9 VUC Oakarhtet

ETHERNET

Ethernet is defined as a networking technology that includes the protocol, port,


cable, and computer chip needed to plug a desktop or laptop into a local area
network (LAN) for speedy data transmission via coaxial or fiber optic cables.

pg. 21
U-9 VUC Oakarhtet

CSMA/CD – Carrier Sense Multiple Access / Collision


Detection

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a networking


protocol used to manage access to shared communication channels in Ethernet
networks. In CSMA/CD, multiple devices are allowed to share a single
communication channel by listening to the channel and checking for the presence
of other transmissions before attempting to send data.

pg. 22
U-9 VUC Oakarhtet

CSMA/CA – / Collision Avoidance

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is a networking


protocol used to manage access to shared communication channels in wireless
networks, such as Wi-Fi networks. In CSMA/CA, multiple devices are allowed to
share a single communication channel by following a set of rules to avoid
collisions.

pg. 23
U-9 VUC Oakarhtet

OSI 7 LAYER MODEL

pg. 24
U-9 VUC Oakarhtet

TCP/IP 4 LAYER MODEL

pg. 25
U-9 VUC Oakarhtet

NETWORK PROTOCOLS AND


STANDARDS
Protocols and standards make networks work together. Protocols make it possible
for the various components of a network to communicate with each other, and
standards make it possible for different manufacturers' network components to
work together.

pg. 26
U-9 VUC Oakarhtet

TCP/IP – Transmission Control Protocol /


Internet Protocol
Inter-communication between LANs and WANs is about enabling devices and
networks in different locations to communicate and share information with each
other

pg. 27
U-9 VUC Oakarhtet

Protocols

FTP – File Transfer Protocol


FTP (File Transfer Protocol) is a network protocol for transmitting files between
computers over Transmission Control Protocol/Internet Protocol (TCP/IP)
connections.
HTTP – Hypertext Transfer Protocol
HTTP is a protocol for fetching resources such as HTML documents .\
POP 3 – Post Office Protocol
POP3 is a protocol used for retrieving email messages from a mail server.
SMTP – Simple Mail Transfer Protocol
SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving
email messages between email servers.
DNS – Domain name System
DNS (Domain Name System) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private
network.
TCP – Transmission Control Protocol
TCP (Transmission Control Protocol) is a widely used transport layer protocol in
computer networking.
UDP – User Datagram Protocol
UDP (User Datagram Protocol) is a transport layer protocol in computer
networking.
IP – Internet Protocol
IP (Internet Protocol) is a protocol that is responsible for routing data packets
across the Internet.

pg. 28
U-9 VUC Oakarhtet

ICMP – Internet Control Messaging Protocol


The Internet Control Message Protocol (ICMP) is a network layer protocol used by
network devices to diagnose network communication issues .
DHCP – Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol (DHCP) is a network management protocol
used to dynamically assign an IP address to nay device, or node, on a network so
they can communicate using IP (Internet Protocol).
ARP & RARP – Address Resolution Protocol
The ARP retrieves the receiver’s physical address in a network.
The RARP retrieves a computer’s logical address from its available server.
AppleTalk Protocol
AppleTalk is the original networking protocol for Apple Macintosh networks.
AppleTalk enables users to share folders and printers for access by other network
users.

pg. 29
U-9 VUC Oakarhtet

LAN STANDARDS
IEEE – Institute of Electrical & Electronic
Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) creates
international standards for telecommunications, information technology and
power generation.
IEEE 802.2 – Management of Ethernet Data Packets
IEEE 802 is a collection of networking standards that cover the physical and data-
link layer specifications for technologies such as Ethernet and wireless.
IEEE 802.3 – Definition of MAC Addressing (NIC)
IEEE 802.3 is the physical layer and the media access control (MAC) of the data
link layer for wired Ethernet networks
IEEE 802.5 – Token Passing Management
IEEE 802.5 standard for a token-passing ring in Communication networks. A ring
consists of a collection of ring interfaces connected by point-to-point
FDDI – Fiber Distributed Data Interface
Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for
transmission of data in local area network (LAN) over fiber optic cables.

pg. 30
U-9 VUC Oakarhtet

WIRELESS TECHNOLOGIES

pg. 31
U-9 VUC Oakarhtet

IEEE 802.11 – Wireless Standards (WiFi)


IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high frequency radio
waves for connecting the nodes.

Bluetooth
The Bluetooth standard defines the protocols and specifications for wireless
communication between devices. It uses radio waves to transmit data over short
distances, typically up to 10 meters or 33 feet.

3G / 4G (Mobile Phone Technology)


3G are required to meet IMT-2000 technical standards, including standards for
reliability and speed (data transfer rates).
(4G) Long Term Evolution-Advanced (LTE-A) standard is for next-generation local-
and wide-area mobile platforms supporting high peak data rates; handover
between wireless bearer technologies

InfraRed Standards – IrDA


IrDA (Infrared Data Association) is a standard for wireless communication using
infrared light. It was developed in the 1990s as a way to transfer data between
devices without the need

pg. 32
U-9 VUC Oakarhtet

References
https://www.researchgate.net/figure/Local-Area-Network-Scenario_fig1_258790021

https://www.cloudflare.com/learning/network-layer/what-is-a-wan/

https://techdifferences.com/difference-between-frame-relay-and-atm.html

https://www.gartner.com/en/information-technology/glossary/atm-asynchronous-transfer-mode#

https://networkencyclopedia.com/asynchronous-transfer-mode-atm/

https://www.paloaltonetworks.com/cyberpedia/mpls-what-is-multiprotocol-label-switching#

https://www.researchgate.net/figure/M-MPLS-Radio-Access-Network_fig1_4017570

https://cyberhoot.com/cybrary/metropolitan-area-network-man/

https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/

https://www.sciencedirect.com/topics/engineering/personal-area-network#

https://www.computertechreviews.com/definition/pan/

https://www.conceptdraw.com/How-To-Guide/network-topology

https://www.sunbirddcim.com/glossary/bus-topology#

https://www.sunbirddcim.com/glossary/ring-topology#

https://www.sunbirddcim.com/glossary/mesh-topology#

https://www.spiceworks.com/tech/networking/articles/what-is-ethernet/

https://www.techtarget.com/searchnetworking/definition/File-Transfer-Protocol-FTP

https://www.cloudflare.com/learning/ddos/glossary/internet-control-message-protocol-icmp/

https://www.javatpoint.com/dynamic-host-configuration-protocol

https://byjus.com/gate/difference-between-arp-and-rarp/

https://www.techopedia.com/definition/19938/ieee-8023

https://www.techtarget.com/searchnetworking/reference/IEEE-802-Wireless-Standards-Fast-Reference

https://www.tutorialspoint.com/fiber-distributed-data-interface-fddi

https://www.tutorialspoint.com/what-are-the-ieee-802-11-wireless-lan-standards

pg. 33
U-9 VUC Oakarhtet

Comparison of "peer-to-peer" vs
"client-server" (M1)
Peer-to-peer

Peer-to-peer (P2P) refers to a type of network in which participants communicate


and exchange data directly with each other, without the need for a central server
or authority. In a P2P network, every node or computer in the network can act
both as a client and a server, sharing resources and information with other nodes
on an equal basis.

P2P networks can be used for a variety of purposes, such as file sharing,
messaging, and distributed computing. One of the most well-known examples of a
P2P network is the BitTorrent protocol, which is commonly used for sharing large
files over the internet.

Client-server

Client-server is a network architecture in which client devices (such as computers,


smartphones, or tablets) request services or resources from a central server,
which then responds to those requests and provides the necessary data or
services to the clients.

In a client-server network, the server is typically a powerful computer or cluster of


computers that is responsible for managing and storing data, as well as providing
specific services or applications. Clients, on the other hand, are devices that
connect to the server to request resources or services, such as files, applications,
or web page.

pg. 34
U-9 VUC Oakarhtet

Peer-to-Peer Vs
Peer-to-Peer Client-Server

Client-Server

pg. 35
U-9 VUC Oakarhtet

 Client-server networks are managed


centrally, which means that
administrators have more control over
the network

 P2P networks are highly decentralized,  Client-server networks are typically


which means that there is no single point of more secure than peer-to-peer
failure. networks, as access to the network is
managed centrally
 P2P networks can scale very well, as
additional nodes can easily join the  Client-server networks can offer better
network and contribute their resources to quality of service, as the performance of
the network. the network can be more easily
managed
 P2P networks can be very efficient in terms
of resource usage, as nodes in the network  Client-server networks can be more
can share resources and reduce the overall reliable than peer-to-peer networks, as
workload. they are typically built on redundant
and fault-tolerant server hardware.
 P2P networks can provide a high degree of
privacy and anonymity, as there is no  Client-server networks can be more
central authority to monitor or regulate the expensive to set up and maintain than
network. peer-to-peer networks, as they require
powerful servers and specialized
 P2P networks can be more difficult to software to manage and maintain.
secure than client-server networks, as there
is no central authority to manage access to  Client-server networks are vulnerable to
the network or monitor activity. single points of failure, as the central
server can become a bottleneck or point
 P2P networks can be less reliable in terms of failure that can bring down the entire
of quality of service, as the performance of network.
the network is highly dependent on the
quality  Client-server networks can be more
complex to set up and manage than
 P2P networks have been associated with peer-to-peer networks, as they require
illegal activities such as piracy, and as a specialized knowledge and skills to
result, they have faced legal challenges and design, deploy, and maintain.
enforcement actions

 P2P networks can be more difficult to


manage than client-server networks, as
there is no central authority to oversee the

pg. 36

You might also like