Puter Networks

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 54

Data Communications and

Computer Networks

Chapter 3
Computer Networks

1
Outline:
 Why networks
 Network evolution
 Elements of networks(Components)
 Network categories
 Network topologies
 Network operating systems
 Network services
 Network scopes (LAN, WAN, MAN, SAN, VPN)
 Intranet and extranet
 Bandwidth and throughput
 Network Devices
2
I. Why Networks?
Resource sharing and communication
 How can these resources be shared?
 Files
 Printers
 Databases
 Scanners
 How can computers be used for
communication?

3
II. Network Evolution

4
Sneakernet pros and cons
 Feasible for sharing small files now and then
 Almost no security problem (do not allow
anyone coming close to your computer!)
 Cannot handle Large files
 Time consuming
 Too inefficient
 …generally awkward

5
Network Evolution (cont.)
Solution 2: Mainframes
 Powerful computers which make up the ‘brain’
of the system - called Mainframes
 Users work on simple computers called
terminals
 – Mainframes
 Do all the work of processing
 Called the back end
 – Terminals
 Have some way of sending/receiving information to/from
mainframes
 Called front end, client or dumb stations
6
Mainframe pros and cons
 Facilitates resource sharing
 Mainframe is heavily loaded with work
 Requires large network bandwidth
 Is not robust – if mainframe fails, the system
will be crippled
 Security is something to worry about

7
Network Evolution (cont.)
Solution 3: Client/Server
 Similar to mainframes
 Server (back end) is a powerful computer doing
tasks like processing and storage
 Client (front end) is a less powerful computer
which does some part of the work

8
Client/Server pros and cons
 Tasks are shared between the client and the
server
 If server fails, client can continue doing some
work
 Gives some freedom to clients like storing their
own files
 Is scalable - other services and clients can be
easily added
 Security is something to worry about

9
III. Elements of Networks
 Resources – anything which could be used
by computer in the network like a printer
 Media – means of sending information
 Protocols – language of communication

10
IV. Network Categories
 Peer to peer
 Server based
 Enterprise

11
a. Peer to peer network
 Computers within the network are called
hosts
 Any host can share its resources with the
others

12
b. Server based
 There is a dedicated computer for giving
services – called server

13
Ads of server based over peer
to peer networks
 Management can be done centrally
 User login information can be assigned in one place
 Access to multiple shared resources can be centrally
granted
 Servers are optimized to handle heavy
processing loads and dedicated to
handling requests from clients

14
c. Enterprise network
 Several networks are interconnected over
a large area
 Networks could use different protocols
 Gateways handle the task of translating
one protocol into another

15
V. Network Topologies
The following topologies are used:
 Bus topology
 Star topology
 Ring topology
 Mesh
 Hybrids

16
a. Bus topology
 All computers in the network or nodes connect to the
same cable
 Sender sends data on the bus
 All computers pick up the data
 Only the destination computer will use the data
 Others discard it when they know that it was not sent
for them

17
Bus topology – pros and cons
 Simple to implement
 Inexpensive
 Easy to expand
 Difficult to figure out problems if network fails

18
b. Star topology
A central device connects every node

19
Star topology – pros and cons
 If a cable or a node breaks, only one node is
affected
 Easy to expand
 If central device fails, the entire network will be
down.

20
c. Ring topology
 Each node is connected to the nearest two
nodes
 Data goes in clockwise or anticlockwise direction
 Each computer sends the data to the nearest
host if it was not sent to it.

21
Ring topology – pros and cons
 Can work well in heavy network traffic
 Difficult to expand
 Difficult to find problems

22
d. Mesh topology
Multiple paths to nodes

23
Mesh topology – pros and cons
 Reliable
 Supports heavy network traffic

24
e. Hybrid topology

25
Hybrid topology – pros and cons
 Can be easily expanded
 If devices which connect the group of
computers with others fail, connection will be
lost

26
VI. Operating Systems
 An operating system is a software which
controls the resources of a computer
 Examples
 – MS DOS
 – UNIX
 – Windows 95/98/ME/2000/XP/2003/Vista
 – Redhat Linux
 – Solaris
 – Free BSD

27
VI. Network Operating Systems
 Network operating systems are operating
systems which are capable of giving some
service on the network
 Examples
 – Windows 2000
 – Novell NetWare
 – Redhat Linux
 If all operating systems agree on a specific
language that they speak, they will be able to
operate with each other – called interoperability
28
VII. Network Services
 File services
 Print services
 Communication services (remote servers)
 Mail services
 Web services

29
VIII. Network Scopes
 Network scope describes the extent at
which a network provides coverage
 Basically categorized on the basis of area
covered

30
a. LAN
A short for Local Area Networks
 Operate within a limited geographical area
 Allow multi access to high bandwidth media
 Control the network privately under local
administration
 Provide full time connectivity to local services
 Connect physically adjacent devices

31
b. WAN
A short for Wide Area Networks
 Operate over a large geographical area
 Allow access over serial interfaces operating
at lower speeds
 Provide full time and part time connectivity
 Connect devices separated over wide, even
global areas

32
c. MAN
A short for Metropolitan Area Networks
 Spans a metropolitan area
 Usually linked with a high speed media

33
d. SAN
A short for Storage Area Network
 Dedicated to move data between network
servers and storage resources
 Allow concurrent access of disks or tapes
 Are fault tolerant

34
e. VPN
A short for Virtual Private Networks
 A private network constructed over a public
network
 Additional services are usually proprietary
services

35
IX. Intranet and Extranet
Intranet
 Restricted access network
 Owned and managed by a company
 Enables people within the company to
share resources, some of them being
confidential
 Basically constructed for the internal
needs of a company

36
Intranet and Extranet (cont.)
Extranets
 An extension of intranets
 Restricted access network
 Allow secure interaction between two or
more intranets
 Access is accomplished through
passwords, and IDs

37
X. Bandwidth and Throughput
 Bandwidth is the amount of information that can
flow through a network connection in a given
amount of time, usually measured in B/sec (bps)
KB/sec (kbps), MB/sec (Mbps), GB/sec (Gbps),
TB/sec (Tbps)
 Bandwidth is
 Finite
 Not free
 Key factor in analyzing network performance,
designing new networks and understanding the
internet
 Its demand is ever increasing
38
Bandwidth and Throughput (cont.)
 Throughput is the actual measured bandwidth
(also called actual bandwidth)
 Measured during specific
 – Time
 – Internet routes
 – Set of data

39
Bandwidth and Throughput (cont.)
 Usually less than bandwidth
 The following factors affect bandwidth:
 – Internetworking devices
 – Type of data being transferred
 – Network topology
 – Number of users on the network
 – User computer
 – Server computer
 – Power conditions

40
XI. Network Devices
 Layer 1 devices
 Layer 2 devices
 Layer 3 devices
 CSU/DSU, NIC, Modem
 Common peripheral ports

41
42
43
44
45
46
47
48
49
50
51
52
53
54

You might also like