The document provides an overview of network protocols and types, including LAN, WAN, and MAN, as well as various network topologies such as star, bus, ring, mesh, and tree. It discusses the roles of different network components like routers, gateways, and bridges, and explains the OSI network model with its seven layers. Additionally, it highlights the benefits of computer networks, including resource sharing and communication efficiency.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
24 views2 pages
Chapter 2
The document provides an overview of network protocols and types, including LAN, WAN, and MAN, as well as various network topologies such as star, bus, ring, mesh, and tree. It discusses the roles of different network components like routers, gateways, and bridges, and explains the OSI network model with its seven layers. Additionally, it highlights the benefits of computer networks, including resource sharing and communication efficiency.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Computer Science Notes 5
CHAPTER 02 Network Protocols:
Network protocols are formal standards and policies COMMUNICATION NETWORKS comprised of rules, procedures and formats that define Computer Network: A group of computers connected communication between two or more devices over a together to communicate, exchange information, and share network. their resources with each other is called a network. 1. Ethernet: It is a LAN protocol, it uses high speed Workgroup Computing: It is also known as collaborative network cable and bus topology, so it is relatively computing. It enables the individuals and teams of certain simple and cheaper. projects to use computer networks for the purpose of Carrier Sense Multiple Access (CSMA) Methods: cooperation, consultation, and information sharing. ◦ CSMA/CD: (Collision Detection) Detects Groupware: A groupware is a software which enables users collisions after they occur. After detecting a to work in workgroup computing. This software is used to collision, both devices wait a random amount of perform activities on a network. time and then try to re-transmit their data Telnet: It is the software tool that allows one computer to packets again. (Common in Ethernet) connect to another computer and make use of the other ◦ CSMA/CR: (Collision Resolution) It involves a computer’s information. central arbitration mechanism to avoid Gopher: Gopher was an older text-based system for collisions altogether (Less common) accessing information on the internet, predating the web. It ◦ CSMA/CS: (Carrier Sense) Avoids collisions by has largely been replaced by web browsers. waiting for a clear channel before transmitting. FTP: File Transfer Protocol is a protocol to transfer files (Simpler but potentially less efficient) from one computer to the other on a computer network. 2. Token Ring: In token ring network, all computers are Uploading involves sending a file from your computer to connected in a ring topology and pass one or more another, while downloading is the opposite. logical tokens from host to host. Only a host that holds Internet: The internet is a huge collection of millions of a token can send data, and tokens are released when computers all linked together using a computer network. receipt of the data is confirmed. Intranet: Intranet is a privately-owned, secure, business 3. TCP/IP(Transmission Control Protocol/Internet network based on Internet Technology (uses TCP/IP), Protocol): It is the protocol used by every computer on although not necessarily connected to the Internet. the internet. TCP/IP allows one computer to talk to Extranet: Two or more intranets connected together in another computer via the Internet through compiling such a way that they enable collaboration among the packets of data and sending them to right location. companies that own the separate intranets is called Network Types: extranet. • LAN: Local area network is a network that spans a WWW: World Wide Web is a collection of millions of linked small geographical area such as a building or a web pages that can be accessed through internet. campus consisting of few buildings in a small area. Email (Electronic Mail): Email is a method for sending and • WAN: Wide Area Network - It spans a large receiving digital messages between computers connected geographical area such as among cities, counties or over wired or wireless networks. It has several advantages: continents. Internet is an example of wide area • Distance: Eliminates geographical limitations, networks. allowing communication all over the world. • MAN: A Metropolitan Area Network connects an • Cost-Effectiveness: Provides a less expensive way area larger than a LAN but smaller than a WAN, to send messages. such as a city, with dedicated or high-performance Components of local area network: hardware. • Network Interface Card (Ethernet Card) Network Models: Network-interface-card (NIC) connects each computer 1) Client / Server Model: In this type of network, one to the wiring in the network. NIC is a circuit board that or more computers are dedicated servers and the fits in one of the computer's internal expansion slots. remaining computers work as clients. Some computers have built in NIC. • Server/Host Computer: A server is a computer or • Bridge program that provides functionality for other Bridge is a device that connects similar networks and programs or devices, called clients. forwards data packets to the appropriate destination. • Client/Terminal: A client is a piece of computer • Gateway hardware or software that accesses a service made Gateway is a collection of hardware and software available by a server. resources that enables communication between 2) Peer to Peer Model: In this type of network, every different types of networks, often translating computer can play the role of server or client protocols to ensure data compatibility. depending on the nature of communication. There • Router is no clear distinction between the server and client Router is a device that keep track of all possible routes machines and all nodes have equal status. (from source to the destination) that a message can 3) Hyrid Model: Hybrid networks are the networks follow to be delivered to the destination. that are based on both peer-to-peer & client-server model. Hybrid networks incorporate the best Computer Science Notes 6 features of both models. directly to the tree bus. Network Topology Advantages: Physical arrangement or layout of connected devices on a • useful in cases where a star or bus cannot be network is called network topology. Following types of implemented individually topologies are used in network: • failing of one segment does not affect the rest of the Star Topology network. In this topology, all computers are connected to a central • The network can be expanded by the addition of devices called hub. Hub receives the message from one secondary nodes. node and pass it on to the other node۔ Disadvantages: Advantages • network depends heavily on the bus. Its failure affects • This topology offers simplicity of operation. the entire network. • Adding or removing network nodes is easy. • maintenance is not easy • It is easy to detect faults in the network devices. • costs are high Disadvantages Network Standards: • If central device fails, the entire network fails. Network standards are precise documents containing • The setup cost is quite high. technical and physical specifications of network being Bus Topology established. A bus topology connects all devices on a network to a single De Jure Standards shared cable, often called the backbone. A special device De Jure means ‘by law’. These standards are properly called terminator is connected on both ends of the series approved by some governing body. (bus) to absorb the signals. De Facto Standards Devices broadcast data packets onto the cable. Each device De facto means ‘by facts’ or ‘by tradition’. These standards listens for packets addressed to it and ignores others. are most commonly used by organizations worldwide. Collision detection protocols (like CSMA/CD) help manage Benefits of Computer Networks: simultaneous transmissions to avoid data corruption. 1. Networks allow users to access shared programs and Advantages: data. • It is easy to set up, handle, and implement. 2. Networks allow users to share peripheral devices such as • It is best-suited for small networks. printers and hard disks. • Less expensive OSI Network Model Disadvantages: Open Systems Interconnection (OSI) network model is a • A fault in the bus leads to network failure. reference model that consists of seven layers that perform • It is only suitable for networks with low traffic. different functionality during data communication process. Ring Topology These 7 layers are given below: A ring topology is a network configuration in which device Application Layer: This layer interacts with software connections create a circular data path. Each networked applications that implement a communicating device is connected to two neighboring nodes. component. It is works in high-level APIs, including Advantages: resource sharing, remote file access • A central server is not required for the management of Presentation Layer: This layer is responsible for this topology. translation of data between a networking service and • It is less costly than a star topology. an application; including character encoding, data • easy to identify faults in network nodes. compression and encryption/decryption Disadvantages: Session Layer: This layer is responsible for managing • Failure of a single node in the network can cause the communication sessions, i.e., continuous exchange of entire network to fail. information in the form of multiple back-and-forth • Data sent from one node to another has to pass transmissions between two nodes Transport Layer: Reliable transmission of data through all the intermediate nodes. Mesh Topology segments between points on a network, including segmentation, acknowledgment and multiplexing is In this Topology, every network node is connected to every carried out through transport layer. other node of the network. Network Layer: Network layer is responsible for Advantages: • The failure of a single node does not cause the entire structuring and managing a multi-node network, including addressing, routing and traffic control. network to fail Data Link Layer: Data Link layer is responsible for • It can handle heavy traffic due to alternate paths. reliable transmission of data frames between two Disadvantages: nodes connected by a physical layer. • A lot of cabling is required. Physical Layer: Physical layer is responsible for • Due to its complexity, the administration of a mesh transmission and reception of raw bit streams over a network is difficult. physical medium. Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect