0% found this document useful (0 votes)
1K views155 pages

Computer Network Book

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
1K views155 pages

Computer Network Book

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 155
SRC RO Gi @VED_ENGINEERINGCHA SS ICKR a aU RNS RoC CCMA TY TCM Se el CRT TOR Cel Strictly as per new revised syllabus of ‘I’ Scheme we-f. academic year 2018-2019 Computer Networks Second Year Diploma - Semester IV —_ (Code: 22417) Information Technology (IF). ISBTE Guestions & Answers.) enero wwii Syllabus Unit -1: Fundamentals of Computer Network network, Advantages/benefits of computer network : Sharing [Refer chapter 1 of information, Sharing resources, Centralised management of resources, Backing up of data. 1.2 Classification of networks : Geographical classification, Classification based on ~ transmission technology, (Classification based on network relationships. 1.3 Basics of network computing models : Peer to peer, Client server, Distributed. 14 Network operating system (NOS) its types and features. Gnit- Il: Network Components and | 2.1 Basic components of computer network : Cables, Host, Topologies Communication subnet, NIC. RE 22 Network devices and their role : Repeaters, Hub, Bridges, Switches, Router and Gateway. Wireless infrastructure components : Access point, Clients. Network topologies : Concept, Significance, Bus, Ring, Star, Mesh, Tree, Hybrid, 23 24 Unit-Il: Reference Models for 3.1 Protocol hierarchies : Layered approach Computer Networks. 3.2 Interfaces, Services, Protocols and packets, 33 Design issues for layering, 3.4 OSI reference model : Layers and their functions. 3.5 TCPAP protocol : Layers and their functions. 3.6 OSI model Vs TCP/IP. 3.7 Using basic network services : File sharing, Print sharing, Device sharing. Unit -IV : TCPAP Protocol Sulte ‘Host to network layer protocols : SLIP, PPP. 42 Internet layer protocols : IP, ARP, RARP, ICMP. 4.3. Transport layer protocols : TCP and UDP. 4.4 Application layer protocols : FTP, HTTP, SMTP, TELNET, DNS, BOOTP, DHCP. Unit - V: IP Addressing ‘Addressing : Physical address, Logical address, Port address. 5.2 IP Address : Concept, Notation, Address space. 53 IPv4 addressing : Classes, Subnet mask, Subnetting, Supernetting, 54 Unicast, Multicast, Broadcast address, Multicast operation. 55. IPv6 address, Basic structure. TPv4 versus IPv6. ea PA tebie ot Contents emptor Notrk (T/S0m 4/ sere) nik ws Chapter 1: Fundamentals of Computer Network J-1to1-21 Fen 1.1.2 Need and Applications of Computer Network 1.1.3, Components of a Computer Network wut-2 1.2 Network Benefits .... 4.2.1 Sharing Information 1.2.2 Sharing Resources 1.2.3 Facilitating Centralized Management 1.2.4 — Other Benefits of Computer Networks. 1.2.5 Disadvantages of Networks. 1.3. Notwork Services ... 1.3.1. Service Provided by the Network for Organizations 1.3.2 Services Provided by the Network to People 1.4 Computer Network Criteria . 1.5 Network Scale 1.6 Classification of Networks Geographical Classification 17 17 18 19 1.6.2 1.6.3 1.6.4 165 1.66 167 Local Area Networks (LAN) . Ethemet Metropolitan Area Network (MAN) Wide Area Network (WAN) PAN (Personal Area Network) CAN (Campus Area Network) ‘Comparison of LAN, WAN and MAN ....1-10 Classification Based on Transmission Terminology wt 12 Basics of Network Computing Models Peer-to-Peer Networks .. 194 192 1.93 194 Broadcast Networks Point to Point Networks ‘When to uso Peer to Peer Networks ?..1-12 F to Poor Networks .. Features of Pe ‘Advantages of Peor to Peer Networks .. Disadvantages of Peer to Peer Networks liont / Server Network (Server Based Network)... 1.104 1.102 1.103 1.104 1.40.5 ‘Communication in Client-Server Configuration Advantages of Client-Server Network... Disadvantages of Gti Networks Applications of Client-Server Configuration 115 ‘Types of Servers .. AAS Computer Network (T/Sem 4/ MSBTE) WPhraiectconens co Nr Se STE) 21.3 Host 1.106 Factors infuencing the Choios of Network ... 24.4 Communication Subnet .. 1.10.7 Compatison between Peer-io-Peer "Network and Client-Server Network. 1.11 Network Features, 2.2 Network Interface Card (NIC) 22.1 NIC Operation 23 Network Control / Connecting Devices 1.41.4 Flo Sharing 2.31 Types of Network Connecting 1.412 Printer Sharing Devices .. 1.11.3. Application Services 24 Transceivers 1.114 E-mail : 25 Role of Network Connecting Devices ... 1.115 Remote Access . 117 26 Repeaters... 1.42 Models of Network Computing 1-18 1.13 Distributed Networks 118 26:1 Advantages A Network Operating System (NOS) 262 Disadvantages .. 1.44.1 Peerto Peer NOS .. 27 Hubs 1-142 NOS Based on Client Server Model ...1-19 | 2.8 Bridges 1143. Duties of ANOS 29° Routers . 240 Gateways ... 1.144 Features of Windows NOS " 1.15 Network Functions 2.41 Switches 2.11.1 Comparison of Hub and Switch ‘Unit - 11° | 241.2 Comparison of Router and Bridge . Chapter 2 : Network Components 2.11.3 Comparison of Bridge, Switch and 2410216 torts Hub .. 2.114 Comparison of Bridges, Routers end Switches 212 Modems 2.1. Basic Components of Computer Networks .. 2.12.4 Role of Modem 21.1 Node 2.122 Functions of Modem , 2.4.2 Cables or Links 213 ‘Wireless infrastructure Components .. 2.13.1 Radio NICs .., ‘Table of Contents, 2.19.2 Access Point (AP.) 2.133 Wireless Routers ... 2.13.4 Wireless Repeaters 2.13.5 Antennas 2.14 MSBTE Questions and Answers .. © Review Questions smn Introduction Network Topology Types .. Definition 324 32.2 Types wm 3.2.3 Selection Criteria for Topologies. 3.3. Bus Topology 3.3.1. Performance of Bus Topology .. 23.2 Characteristics of the Bus Topology 2.3.3 Transmission Media for Bus LANs 3.3.4 Repeaters .. 3.3.5 Use of BNC Barrel Connector When to Use the Bus Topology ? 33.6 3.3.7 Features ‘Advantages of Bus Topology 338 Disadvantages of Bus Topology 33.9 3.4 Ring Topology .. Features of Ring Topology . 844 3.42 Transmission Medium for Ring Topology 35 a7 38 39 3.10 Computer Network (17 4) MSBTE) 3.4.3. Problems Faced in the Ring Topology ..8-6 344 ‘Advantages of Ring Topology ee 3.4.5 Disadvantages of Ring Topology Star Topology Hubs 35.1 35.2 Features of Star Topology 3.5.3 Advantages of Star Topology .. 3.5.4 Disadvantages of Star Topology .... Mesh Topology 36.1. Features of Mesh Topology .. 362 Advantages ... 3.6.3 Disadvantages .. ‘Tree Topology .. 87.1 Advantages 37.2 Disadvantages Logical Topology Comparisons ‘Comparison of Star, Bus and Ring Topologies 39.4 3.9.2 Comparison of Bus and Star Topologies 39:3 Comparison of Tree and Mesh Topologies 3.9.4 Comparison of Mesh and Star ‘Topologies Hybrid Topology ... 9.10.1 Advantages of Hybrid Topology .. Table of Contents 3.40.2. Disadvantages .. 313 3.10.3 Applications 13 3.104 Comparison of Star Bus and Star Ring Topologies .. 343 3.11 MSBTE Questions and Answers + Review Question Chapter 4 : Reference Models 4-1 10.437 411 Layered Tasks .. 42 Network Software 42.1 Protocol Hierarchies (Layered Architecture) 4.2.2 Reasons for having Layered Protocols and its Benefits 4.23 Disadvantages of Layered Architecture 4.2.4 How does Data Transfer Take Place ?...4-3 43 Design Issues for the Layers .. 4.3.1 Addressing .. 4.3.2 Direction of Transmission 433 Error Control Avoid Loss of Sequencing Abllity of Receiving Long Messages «4-5 43.6 To.use Multiplexing And Demultiplexing 44 Interfaces and Services... 444° Entities and Peer Entities .. 442 — Service Provider and Service User... 4.4.3 Service Access Points (SAPs) . 444 Interface Data Unit (IDU) .. 4.45 — Service Data Unit (SDU) 4.46 Protocol Data Unit (PDU) 44.7 Connection Oriented and Connectionless Services .. Reference Models . OSI Model. 48.1 Layered Architecture 482 Peerto Peer Processes .. 4.83 Organization of the Layers .. 4.64 — Exchange of Information using the OS! Model. 410 4.7 Data Encapsulation 410 47.1 ASimple Example of Data Encapsulation 47.2 Data Encapsulation in OS! Model. 4.8 — Horizontal Communications 49° Vertical Communications 410. Encapsulation Terminology 4 Functions of Various Layers in the OSI Mode .. att 4.12. The Physical Layer ait 4.13 Data Link Layer z 4.13.2 Network Devices used in DLL .. 4.14 Notwork Layer ... Network Layer Duties .. Connection Oriented and Connectionless Protocols .. 4.14.3 Network Connecting Devices 4.15 Transport Layer 4.15.1 Duties of Transport Layer 4.18.1 Protocols Associated with the Application Layer 4.182 OSI Layers and Associated Protocols... 4.18.3 Merits of OSI Reference Model... 4.18.4 Demerits of OS! Model 4.19 TCP/IP Protocol Model 4.19.1 Layered Architecturo ... 4.19.2 Layers in the TCP/IP Protocol Model ...4-28 4,20 Overview of TCP/IP Architecture 4.20.1 Description of TCP/IP Model 4.21.3 Detailed Introduction to Network Layer . 431 4.21.4 Detailed Introduction to Transport Layer . 4.21.5 Detailed Introduction to Application Layer Comparison of OSI and TCPAP Models 4.22 4.22.1, Demerits of TCPAP Model 423 Using the Basic Network Services .. 4.23.1. File Sharing 4.23.2. Printer Sharing 4.24 MSBTE Questions and Answers . © Review Questions. Chapter 5 : TCP/IP Protocol Suite 5:1 to 5.47 [Syllabus : Host to network layer protocols i IP, ARP, RARP, ICMP, i aver protocols : TCP and UDP, Applicaton layer protocals [ETP, HTTP, SMTP, TELNET, DNS, BOOTP, DHCP. 5A TCPAP Protocol Suite 5.2 Protocols in Host-to-Network Layer .. 5.2.1. SLIP-Serial Line IP 5.2.2 Point-to-Point Protocol (PPP) 5.2.3 Difference between SLIP and PPP 4 jled Description of Each Layer em . . 5.3 Network (Internet) Layer Protocols. - is : 4.21.1 Detailed Introduction to Physi Drm Layer enn senna QO 5.4.1 Mapping of IP Address into a MAC 4.21.2. Detailed Introduction to Data Link Layer Address: 5.42 ARP Operation 55 56 57 58 59 5.10 Table of Contents 5.4.3 ARP Message Format 5.44 — Encapsulation . 5.4.5 Operation of ARP on Intemet. ‘The Reverse Address Resolution (RARP) Protocol Intemet Protocol (IP) 5.6.1 ip Datagram .. 5.62 583 Services Provided by IPv4 584 IPS 585 'Pv6 Packet Format ., (CMP (Intemet Control Message Protocol) 874 ICMP Encapsulation 57.2 ICMP Messages 5M 5.7.3 Message Format. SAT 57-4 Error Reporting Messages (ICMP va) ...5-14 57.5 Query Messages (IcwPva) Transport Layer Protocols .. User Datagram Protocol (UDP) . 5.8.1 Responsibilities of UDP 5.9.2 Advantages of UDP 5.9.3 User Datagram 594 UDP Pseudo Header .. UDP Services 5.10.1 Process to Process Communication . 5.102 Connectionless Services 5.10.3 Flow and Error Contra a1 512 513 814 515 516 8.47 Computer NWO (TS, 5.10.4 Checksum 5.4105 Congestion Contro} Sty 5.106, Encapsulation and Decay, 5.10.7 Queuing 5.108 Matiplexing and Demultpexing 5409 Comparison of UDP and Gena, Protocd Mle, UDP Applications Connectionless Service Lack of Error Control 5.12.3 Lack of Congestion Control 5.124 Typical Applications of UDP. ‘Transmission Control Protocol (TCP) , 5.134 TCP Services .. 5.182 TCP Features ..., 5133 The TCP Protocol 5434 TCP Segment Relaonship between Top and IP Comparison of top ‘and UDP Application Layer 5161 Addressing ‘Table of Contents Computer Network (IT/Sem 4/ MSBTE) 5.18 5.19 5.20 5.21 5.22 5.23 5.24 BATA Domain Name Space .. Distribution of Name Space 5.19.4 DNS in the Intemet .. 5.20.1 5.20.2 5.203 Name Address Resolution 5214 5212 Message Transfer Agent : SMTP... 5.22.1 5.22.2 5.223 5.224 File Transfer Protocol (FTP) . 5.23.1 5.23.2 5233 5.234 5.23.5 5.23.6 HTTP (Hypertext Transfer Protocol). 5.244 5.242 5.2463 Hierarchical Name Space .. Hierarchy of Name Servers Generic Domains .. Country Domain, Inverse Domain Recursive Resolution erative Resolution .. ‘Commands and Responses SMTP (Simple Mail Transfer Protocol) Operation SMTP Commands ‘SMTP Operation Communication in FTP File Types Data Structure ‘Transmission Mode File Transfer FTP Commands Principle of HTTP Operation ... ‘The Web and HTTP .. Non-persistont and Persistent Connection .. 5.24.4 Comparison of HTTP and SMTP .. 5.25 Host Configuration : DHCP 6.25.1. Previously used Protocols .. 5.252 BOOTP .. 5.25.3 DHCP... 5.25.4 Advantages of DHCP .. 6.25.5 Components of DHCP .. 5.25.6 DHCP Operation 5.26 Remote Login... 5.26.1 TELNET 5.26.2 Network Virtual Terminal (NVT) ... 5.26.3 Security Problems of TELNET .. 5.27 MSBTE Questions and Answers 614 6.1.2 Logical Addresses (IP Addresses). 6.1.3 Port Address 6.1.4 Specific Addresses 62 IPv4 Addresses «m0 63 621 622 623 624 625 Classtul Addressing 63.1 63.2 63.3 63.4 63.5 636 6.3.10 63.11 of Contents Uniqueness of IP Addresses ‘Address Space Notation IP Address Assignment... IPv4 Address Format ... IPv4 Address Classes ... Formats of Various Classes .. How to Recognize Classes 7. ‘Two Level Addressing Extracting Information in a Block ... Network Address Network Mask or Default Mask ... Default Masks for Different Classes Finding Network Address using Default Mask Three Level Addressing : Subnetting . Special IP Addresses ... 64 65 66 67 Classless Addressing .. 641 642 643 644 Addressing Types... 65.4 652 653 65.4 Multicast Operation .. IPv6 Addressing .. 66.1 6.6.2 Abbreviation..... Comparison between IPv4 and IPvé * Review Questions. 12 Limitations of IPv4 .. Computer Network (T/S0m 4 ‘Supernetting .. Who Decides the IP Addresses 7, Registered and Unregistered. Addresses .. Solved Examples .. Unicast Addressing Broadeast Addressing .. Multicast Addressing Notations. oo ‘Syllabus = ‘operating system (NOS) its types and features. 1.1 A Network Network: — Network is a broad term similar to “system”, Network is a communication system which supports many users. — The interconnection of one station to many stations is called as networking. — A network is any interconnection of two or more stations that wish to communicate. Node : ~ Each station in a communication network is called as a node. The nodes are connected in different way to each other to form a network. — One of such networks is shown in Fig. 1.1.1. = Many other forms of interconnections are possible. The ‘most familiar network is the telephone system. It isthe largest and most sophisticated network of all, Node \ Link (ca9Fig, 1.1.1: A simple communication network Fundamentals of Computer Network Needs, Uses of computer network, Applications of computer network, Advantages/benefits of computer network : ‘Sharing of information, Sharing resources, Centralised management of resources, Backing up of data, Classification of ‘networks : Geographical classification, Classification based on transmission technology, Classification based on network relationships, Basics of network computing models + Peer to peer, Client server, Distributed, Network 1.1.1 Computer Networks : ~ In context with the computers we can say that a “computer network” is a system which allows ‘communication among the computers connected in the network. During 20" century the most important technology has been the information gathering, its processing and distribution, ~The computers and communications have been merged together and their merger had a very deep impact on the ‘manner in which computer systems are organized. — Inthe old model a single computer used to serve all the computational needs of an organization. But now it is replaced by a new model in which a large number of separate but interconnected computers do the job. — Such systems are called as computer networks. Definition : — Acomputer network is a group of computers and other computing hardware devices are linked together through communication channels to facilitate ‘communication and resource sharing among wide range of users. — Two computers are said to be interconnected if they exchange information, The connection between the separate computers can be done via a copper wire, fiber optics, microwaves or communication satelite. r Fundamentals of Conny Computer Network (Som 4/ MSBTE) 1.1.2 Need and Applications of Compu. 7 112, each node in a computer Network ‘ ve Te computer networks AFC netied tay such as a network is a computer, or a connecting device s' hub, or a switch etc. ‘The computers connected in a network share a folders, applications and resources like scanners, wet cams, printers etc. ~The best example of a computer network isthe Internet. (G1woFig. 1.1.2; A computer network ~ In a computer network we need to make use of hardware and software. ~ The hardware consists of connecting cables, connectors, network connecting devices and the software consists of protocols, programs ete, ~ This enables the systematic exchange of information betsveen the computers connected inthe network, ~ Mhere are various ways of interconnecting. the computers, Protocol : ~ For successful communication to occur, it is not nough forthe “Sender” to simply transmit the message and “assume” that the “receiver” will receive it Properly. ~ There are certain rules that must be followed to ensure Proper communication, — A set of such rules is known as a “protocol” of the ‘computer communication system, Definition : Protocol is defined as the set of rules agreed upon by the sending and receiving computer systems, 10 facilitate a proper communication between them, ~ Many different protocols are used in the modern ‘computer communication system. Need Protocols are needed to ensure proper communication among the computers connected in a computer L 2 3. L 2, 3. 4, 5. network, following points: 1.2 Network Benefits efits: 1.2.1 Sharing Information : wy For sharing the resources MeN ay users. Forsharing of expensive softwares and databare ‘To facilitate communication from one come ng other. ‘To have exchange of data and information anoep users, via the network, For sharing of information over the optic, wide areas. For connecting the computers between vagy buildings of an organization, For educational purposes, 1.1.3 Components of a Computer Network: Following are some of the important components of computer network. ‘Two or more computers. Cables (coaxial, twisted pair or fiber optic) as links between the computers. ‘A Network Interfacing Card (NIC) on each compute, Switches or other suitable connecting device. A software called network operating system, A network is supposed to provide its uses some unique Sapabiltes, beter than what the individual machines and theit software can provide, ‘The benefits provided by the network to the uses can be divided into two categories as follows : 1. Sharing 2. Connectivity Networking allows the users to access the data stored on other's computes, It is possible for every user to share his bit of information with the other users over the network. The informatio sharing can be inthe form of exchange of data, chatting, sending E-mails, sharing video information, groups ete. ae Network (1T/Sem 4/ MSBTE Fundamentals of Comput ny Itis also possible for the users to share the information stalling software on each about various products, movies, technical information, time consuming and difficult, eee ing rael ooks 0 et ~ This problem can be overcome by us — Sharing of information via Internet has become very concept of software resource sharing, on now a days. ' a som ; ~ Inanetwork, we can centrally instal and congue — The information which is to be shared or being shared only one copy of each software and share it should be shared centrally, it must be kept consistent rest ofthe computers. eons and secured. is a ~ This actually saves a fot of time and cost Fig. 12:2 = The access to this stored information should be allowed shows the principle of software sharing. only to the authorized users. — Sharing of information eliminates the need of transferring files on CDs or pen drives etc, 1.2.2 Sharing Resources : Networks can allow its users to share various types of resources, We can broadly categories the shared resources as follows: 1. Shared hardware resources 2. Shared software resources 1. Sharing of hardware resources : = A network allows its users to share the many (6-1399Fig, 1.2.2: Sharing of software resources hardware devices such as printers, modems, fax | 1,2.3 Facilitating Centralized Management : machines, CD ROM players ete. = The computer network facilitates centralized netwodk ~ These resources are available to any one on the ‘management with respect to following : network icrespective of the physical location of the 1. Management of software Lee 2. Maintenance of network = This will save the expenses on duplication of such hardware resources Fig. 1.2.1 shows a laser printer being shared by many users. 4. Contra network security = _Allthis is allowed by the elient — server network. Managing software : = As discussed earlier, it is a very good idea to share the software resources, instead of installing a separate copy of software on each computer. tiie eat rad = Itis possible to load all the important software on a single computer (server). = All the other computers can make use of this centralized software as per their requirements. ‘This reduces the expenses in buying the expensive 3. Keeping the data back up Sharing of software resources : With every computer, we need to install some basic software’s on each computer's hard disk. So each computer on the network will have to - " purchase a eae copy of each software required software's for each individual computer. Tt also to be used. This will increase the cost to be ‘makes the virus checks easy. incurred. Computer Network (iT/Sem 4/ MSBTE) We can add new computers on the existing network without purchasing the software's again. ‘Thus the network helps in maintaining a centralized software bank, Maintenance of network: Backing up date ‘The second aspect in the centralized management isthe ‘maintenance of network. ‘The centralized management allows quick and easy ‘ay tothe routine maintenance of network. ‘The client server networks are maintained centrally. It is an important but difficult job, ‘A central administrator keeps track of the status of the ‘network in respect of its speed, traffic, performance and security Some of the network maintenance tools available to help the network maintenance are as follows : 1. Protocol analyzer, Event viewer. Performance monitor. Network analyzer. 2 a 4 5. Network management protocol. In the process of data backup, data from computer system is copied from the disk to some other medium for keeping it safe, Taking back up periodically is important because it Protects the data against any unpredictable, accidental loss of data due to system failure, computer viruses, or ‘human error. But taking a backup of individual user's data separately is a time consuming and unorganized, Hence in a network, the users first save their important data on the central server and then the backup can be taken on the server data, ‘This reduces the time and stores the backup data at a signal place only. This makes the data retrieval easy, We can have two or thee sets of the entre backup data. This helps in the event of one or two sets getting Corrupt. The duplication of backup data becomes easily > a Fundamentals of Comptr Ney ‘The centralized backup procedures have become now a days due to the advanced technology, ‘There are two basic network backup strategies ; Casy 1. Isolated backup 2. Centralized backup The operating systems will provide tols require fog data backups, For example windows NT proves a tape ‘backup program called as backup. ‘A proper backup policy which is suitable for the given network should be selected. Some of the backup ies areas follows : 1. Fallbackup Replication 3. Incremental or partial backup. 1.2.4 Other Benefits of Computer Networks : Following are some of the other advantages of computer networks. 1. Increased speed: ~ Networks provide a very fast means for sharing and transfer of files. If the computer networks would not have been there, then we would have to copy the files on CDs ot pen drive and send them to the other computers, 2. Reduced cost : Many popular versions of softwares usable for the entire network are now available at a considerably reduced costs as compared to individual licensed copies. Tn addition to this it is also possible to share a Program on a network, It is also possible to upgrade the program. 3. Improved security: ~ _Itis possible to protect the programs and files from illegal copying. By allotting password the ‘access can be restricted to authorised users only, 4. Centralized software managements : Due to the use of computer networks, all the possible due to centralized storage, Softwares can be loaded on one computer. PEP computor Network (/Sem 4/ MSBTE) 15 Fundamentals of Computer Network ai Network Services 1 ee ~All the other computers can make use of this centralized software. It is not necessary to waste time and energy in installing updates and tracking files on independent computers, Electronio-mall: ~The computer network makes the. hardware available which is necessary to install an e-mail system. ~The person to person communication is improved due toa presence of e-mail system. 5 6. Flexible acces: ~ Ibis possible for the authorized users to access their files from any computer connected on the network. ~ _ This provides tremendous flexibility in accessing, 1.2.5 Disadvantages of Networks : Following are some of the disadvantages of computer networks. 1. High cost of installation : = The initial cost of installation of a computer network is high. This is due to the cost of cables, network cards, computers, printers and various softwares that are required to be installed. ~The cost of services of technicians may also get added. Requires time for administration : Computer networks need proper and careful administration and maintenance. This is a time consuming job. 3. Failure of server : — If the file servers “goes down” then the entire network comes to a standstill. ~ If this happens then the entire organization can Jose its valuable time and access to the necessary programs and files. Cable faults : ‘The computers in a network are interconnected with the help of connecting cables. So cable faults can paralize a network. a 4 1.3__Network Services ‘The computer networks are playing an important role in providing services to large organisations as well as to the individual common man. | 1.3.4 Service Provided by the Network for Organizations : ~~ Many organisations have a large number of computers in operation. These computers may be within the same building, campus, city or different cities. - Eventhough the computers are located in different locations, the organisations want to keep tack of inventories, monitor productivity, do the ordering and billing etc, ~The computer networks are useful to the organisations in the following ways : 4. Resource sharing : Teallows all programs, equipments and data available to anyone on the network irrespective of the physical location of the resource and the user 2. High reliability due to alternative sources of data : ~ ‘It provides high reliability by having alternative sources of data. For e.g. all files could be replicated on more than one machines, so if one of them is unavailable due to hardware failure or any other reason, the other copies can be used. ~The aspect of high reliability is very important for military, banking, air traffic control, nuclear reactor safety and many other applications where continuous operations is a must even if there are hardware of software failures, 3. Cost: - Computer networking is an important financial aspect for organisations because it saves money. ~ Organisations can use separate personal computer one per user instead of using mainframe computer Which are expensive, ~The organisations can use the workgroup model (peer to pet) in which all the PCs are networked together and each one can have the access to the other for communicating or sharing purpose. operation it can go in for the domain model in Which there isa server and clients. All the clients can communicate and access data through the server. 4. Communication medium : ~ A computer network provides powerful communication medium among widely separated employees. Using network it is easy for two or more employees, who are separated by geographical locations to work on a report, document or Rand D simultaneously ic. on — line, 1.8.2 Services Provided by the Network to People : ‘The computer networks offer the following services to ‘an individual person : 1. Access to remote information 2. Person to person communication 3. E-commerce 4. Interactive entertainment, ‘Access to remote information : Access to remote information involves interaction between a person and a remote database. Access to remote information comes in many forms like: ~ Home shopping, paying telephone, electicity bills, e-banking, online share market etc, Newspaper is on-line and is personalised, digital library consisting of books, magazines, scientific Journals ec. World wide web which contains information about the arts, business, cooking, government, health, history, hobbies, recreation, science, sports etc, Person to person communication : Person o person communication includes Electronic-mal (e-mail) ~ Real time e-mail ie. video conferencing allows remote users to communicate with no delay by seeing and hearing each other. Video-conferencing is being used for remote school, getting medical opinion from distant specialists etc. Worldwide new groups in which one person posts ‘a message and all other subscribers to the ‘newsgroup can read it or give their feedbacks, 1 2 Interactive entertainment includes : Moltiperson real-time simulation games, Video on demand. Participation in five TV programmes likes contest, discussions etc, 1.4 Computer Network Criteria i, Network i abroad term similar to system. Network ‘communication system which supports many users, In context with the computers we can say that, “computer network” is a. system which alloy ‘communication among the computers connected in he network. ‘A network must be able to meet certain criteria. The ‘most important of them are: 1. Performance 2.Reliability 3, Security Performance : Performance can be measured in diferent ways. We can measure it in terms of transit time and response time, ‘Transit time is defined as the time required for a ‘message to travel from one device othe other, Response time + It isthe time elapsed between the instant of enquiry and the instant of giving response. The other factors deciding the performance are as follows: 1. Number of users. 2, Type of transmission medium, 3. The hardware used, 4. The software used. Reliability : ‘The network reliability is important because it dcies the frequency at which network failure takes place. also decides the time taken by the network to reoo¥! BB coms uter Network (T/Sem 4/ MSBTE) 16 Fundamentals of Com Ue Nota The or wants. security for its Interactive entertainmer = and its robustness in the catastrophe. Security : ‘The network security refers to protection of data fo the unauthorized user or access. It also includes the © protection against damage and recovering itn the event data losses. el ry ‘Computer Network (IT/Sem 4/ MSBTE) 4 Fundamentals of Computer Network ae 1.5 Network Scale : f T + T + = This is an slemative criterion for clasifiation of | PAY | LAN | MAN WAN ca ~ networks. ee eee et Ne ene Notwork) —Hatwerk) Network) Network) Networt) Fig. 1.5.1 gives the network classification based on their physical size. All these systems are multiprocessor systems. Interprocessor | Processorsare | Example of distance: located in network O1m ‘Same circuit Data flow board machine im ‘Same system: Multicomputer 10m Same room LAN 100m ‘Same building LAN Tkm ‘Same campus LAN 10km Same city MAN 100km —_| Same state WAN 1,000 km Same continent WAN 10,000%m | Same planet Internet Fig. 15.1 : Network classification according to scale Beyond the multicomputers are the true networks, in which the computers communicate by exchanging messages over long cables. Such networks are divided into following categories : 1. Local area networks 2. Metropolitan area networks and 3. Wide area networks. Internetwork : ‘The connection of two or more networks is called as an intemetwork. ‘The best example of intemetwork is the Internet. 1.6 Classification of Networks : Geographical Classification : Computer network can be classified based on the geographical area they cover, ie. the area over which the network is spread. Such a classification is shown in Fig. 1.6.1. In this section, we will discuss the following categories of networks : (G-1400 Fig. 1.6.1 : Network categories 1.6.1 Local Area Networks (LAN) : 0.4 What is LAN ? Explain its advantages. (1-14, 4 Marks) Q,2 » What is LAN ? List ts advantages. a (S-15,4 Marks) Q.3._ Enlist and explain four characteristics of LAN. (W185, 4 Marks) 4 Define LAN. Explain its advantages. (W-15, 4 Marks) Definition : ‘The Local Area Network (LAN) is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings. LANs are very widely used in a variety of applications. LANs are easy to design and troubleshoot. The personal computers and workstations in the offices are interconnected via LAN. ‘The exchange of information and sharing of resources becomes easy because of LAN. In LAN all the machines are connected to a single cable. Different types of topologies such as Bus, Ring, Star, Tree etc, are used for LANs. LAN uses a layered architecture and they are capable of operating at hundreds of Mbits/sec. A Local Area Network (LAN) is usually a privately ‘owned and links the devices in a single office, building or campus of upto a few kilometres in size as shown in Fig. 1.6.1. Depending on the needs of an organisation and the type of technology used, a LAN can be as simple as a few ‘computers and a printer at home or it can contain many computers in a company and include voice, sound and video peripherals. ter Network ((T/Sem 4/ MSBTE) LANS are widely used to allow resources to be shared between personal computers or workstations, The Tesources to be shared can be hardware like a printer or ‘softwares or data, Ina LAN one of the computer can become a server serving all the remaining computers called clients. Software can be stored on the server and it can be used by the remaining clients. LAN’ are also distinguished from MAN's and WAN's ‘based on the transmission media they use and topology. In general a given LAN will use only one type of transmission medium. The most common networking topologies used are bus, ring and star. — The data rates for LAN can now range from 10 Mbps. to 16 Gbps. Important characteristics / Features of LAN: 1. Very high degree of interconnection between the computers. High rate of data transmission. Physical connection of computers in a LAN is easy, Every computer in the LAN can communicate with every other computer. 5S. The medium used for data transmission is inexpensive. LAN topologies : — Network topology is defined as the pattern in which the network elements are connected to each other. Different network topologies are : Bus, rng, start. — Various topologies are possible for the broadcast LANS such as bus topology or ring topology as shown in Fig. 1.62. A Cable 7 (Bus) AE [E] Computers (a) Bus topology Cable (b) Ring topology (c3nFig, 1.6.2: LAN topologies 18 Fundamentals of Computor ‘Advantages of LAN 1. High reli comp not affect the entire LAN, = 2, Tis possible to add a new computer easily, ‘The transmission of data is at a very high rate, Sharing of peripheral devices such as printer jg possible, Applications of LAN: 1, File transfer and file access, 2. Personal computing, 3. Office automation. 4, Distributed computing. 5. Word and text processing. 6. Document distribution. 7. Remote access to database. 8 Electronic message handling. 1.6.2 Ethernet : ~ Both Internet and ATM (Asynchronous Transfer Mode) ‘were designed for wide area networking. But in many applications, a large number of computers are to be ‘connected to each other. — For this the Local Area Network (LAN) was introduced. The most popular LAN is called Ethernet. — The IEEE 8023 standard is popularly called as Bthemet. It is a bus based broadcast network with, decentralized control. = Itcan operate at 10 Mbps or 100 Mbps or even above L Gbps. = Computers on an Ethemet can transmit whenever they) want to do so. If two or more machines transait simultaneously, then their packets collide. = Then the transmitting computers just wait for # arbitrary time and retransmit their signal. = There are various technologies availabe in the LN market bt the most popular one of them is Etherntt Definition : = Bthemet isa way of connecting compuesto LAN. It is the most widely used method of voi computers together in LAN. ‘Te basic idea | design isto facilitate multiple compute '° and send data anytime. iter Network (IT/Sem 4/ MSBT! ional Ethemet was created in 1976 and has a data rate of 10 Mbps. 1.6.3 Metropolitan Area Network (MAN) : ~ A MAN is basically a bigger version of a LAN and normally uses similar technology. It is designed to extend over a larger area such as an entire city. — The MAN can be in the form of a single network such as a cable network or it can be a combination of multiple LANs as shown in Fig. 1.6.3. - AMAN may be wholly owned and operated by a private company or it may be a service provided by a public company, such as a local telephone company (telco). (Gs9Fig. 1.6.3 : Metropolitan area network Definition = A MAN is a network that interconnects users with the computer resources in a geographical area Jarger than that covered by a LAN and smaller than that covered bya Wide Area Network (WAN). 1.6.4 Wide Area Network (WAN) : ‘When a network spans a large distance or when the computers to be connected to each other are at widely separated locations a local area network cannot be used. For such situations a Wide Area Network (WAN) must be installed. The communication between different users of “WAN” is established using leased telephone lines or satellite links and similar channels. It is cheaper and more efficient to use the phone network for the links. 19 Fundamentals of Computer Network Definitio A WAN js a telecommunications network or computer network that extends over a large geographical distancelplace. Wide area networks are generally established with leased telecommunication circuits. “Most wide area networks are used for transferring large users. As the data is from blocks of data between its ‘existing records or files, the exact time taken for this data transfer is not a critical parameter. = Anexample of WAN is an airline reservation system. Terminals are located all over the country through which the reservations can be made. tis important to note here that all the terminals use the same centralized common data provided by the central reservation computer. Because of the large distances involved in the wide ‘area networks, the propagation delays and variable signal travel times are major problems. ‘Therefore most wide area networks are not used for time critical applications. As explained earlier they are ‘more suitable for transfer of data from one user to the other which is not a time critical application. Wide area networks are basically packet switching networks. (Ga5Fig. 1.6.4: Wide area network ‘A WAN provides long distance transmission of data, voice image and video information over large geographical areas that may comprise a country, a continent or even the whole world as shown in Fig. 1.6.4. Following are some of the important characteristics of WAN: 1, Remote data entry and access is possible. 2. Communication facility is provided. 3. Centralized information i created and used, 4. WAN spans over a large distance. 1.6.5 PAN (Personal Area Network) : ‘A Personal Area Network (PAN) is a computer Network designed for and organized around an individual person, APAN generally consists of a mobile computer such as a laptop, a cell phone and /or a personal digital assistant (PDA). PAN will allow the communication to take place among these devices. ~ PAN can also be used for communication among Personal devices themselves __(intrapersonal Communication) or for connecting to a higher level network and internet (This is called as an uplink), ‘The PANS can be constructed using cables of it can be wireless. The wireless PANs typically use Bluetooth or sometimes use the infrared connections. ~The PANs generally cover a range upto 10 meters. PAN can be considered as a special type of Local Area Network (LAN), which is designed for one person instead of a group. 1.6.6 CAN (Campus Area Network) : — The Campus Area Network (CAN) is made up of an interconnection of LAN within a limited geographical area. — The network equipments such as switches, routers and the transmission media i. optical fiber etc. are almost entirely owned by the campus owner (i.e. a company, university, government et.) — Forexample, a university CAN would connect different buildings in its campus, such as various departments, library, student hall to each other. CAN could also be thought of as a special case of WAN. Points : 2 “Compare LAN and WAN by ‘considering toy Geographical area 2. Speed 3. Installation cost Compare LAN and WAN (any four points), Diferenfite between LAN ard WAN on foi 4, Communication medin, yea (W16, 4 Maa (S-17, 4 Marky) | “wan | MAN] network [Ownership of Private Private or|Private «| public | public [Geographical | Small Very large | Moderate Area covered (tates or| city) countries) 3. |Design and| Easy Noteasy Not easy maintenance 4, |Communication |Coaxiat [PSTN or| Coaxial medium cable satellite | cables, links PSTN, optical fiber cables, wireless, 5. |Data tates | High low | Moderate (speed) 6. |Mode of|Each station |Each |Each communication {can transmit|station station andreceive cannot can transmit {transmit or receive 7. {Installation cost |Low ‘Moderate | High 8. | Principle Operates on| Switching | Both ‘the principle of broadcasting 9 |Propagation | Short Long | Moderate delay 10.|Bandwidth — | Low High __| Moser) _ Computer Network (IT/Sem 4/ MSBTE) Fundamentals of Computer Network. — Hence routing algorithms play an important role inthe point to point networks. 1.7 Classification Based on Transmission Terminology — Broadly, we can classify the computer networks into ‘two categories on the basis of transmission technology : 1. Broadcast networks 2. Point to point networks, 1.7.1 Broadcast Networks : — Ina broadcast networks all the machines on the network use of share a single communication channel. Short messages called packets sent by any machine are received by all the others (Fig. 1.7.1(@)).. — Broadcast systems generally use a special code in the address field for addressing a packet to all the concemed computers. This mode of operation is called broadcasting. ‘Some broadcast systems also support transmission to only a group of few machines known as multicasting. = Broadcasting is used primarily in the local area = i a2 = (2399 Fig. 1.7.1(a) : Broadcast network 4.7.2 Point to Point Networks : J Packet —+ ZA =| ae Header = In a point to point networks there exist_many connections between individual pairs of machines. To {0 from the source to the destination a packet on this types of network may have to go through intermediate computers before they reach the desired computer. = Asa general rule small networks which are localized in 1 geographical sense tend to use broadcasting (e.g. LAN) whereas networks located in wide geographical areas use point to point transmission (e.g. WAN). = In point to point networks (Fig. 1.7.1(b)) packets can take multiple roots to reach the same destination. (G25 Fig. 1.7.1(b) : A point to point network 1.8 Basics of Network Computing Models = The local area networks are classified into two types 1. Peerto peer networks. 2. Client server networks. = The relationship between each PC or device on the network with the others in terms of control, will be dependent on the choice of network type. — For these two types, the special software is required for controlling the flow of information between the users. The Network Operating System (NOS) is installed on each PC depending on the type of network. NOS monitors the data exchange, flow of files, and other information. — The network operating systems are different for the peer to peer and client server networks. — A peer-to-peer network is analogus to a company that ‘uses decentralized management, where decision are ‘made locally. A client-server network is similar to company that ‘works on the principle of centralized management, where decisions are made in a central location. 9 Peer-to-Peer Networks APeer: — _Asageneral definition, a peer is someone or something that has the same role/rank/status as the object or person is question. = In the context of a computer network, peers are the ‘computers of equal capability. _ Fundamentals of Computer, [FP computor Network (tT/Sem 4/ MSBT < there is no central security, the user win, Structure : - Fig. 1.9.1 shows the structure of the peer-to-peer network. In this type of network, each computer is responsible for making its own resources available t0 other computers on the network. — Each computer is responsible for setting up and ‘maintaining its own security for its resources. = Also each computer is responsible for accessing the required network resources from peer-to-peer relationships. — Peer to peer network is useful for a small network containing less than 10 computers on a single LAN. Each computer maintains its own accounts and their security settings. ~ In peer-to-peer network, every computer can function as both a client and server. Windows 2000 comes in both server and professional versions, but it’s still a Peer-to-peer operating system. — Peer to peer networks do not have a central control system. There are no servers in peer networks. — In this type of network users simply share disk space and resources, such as printers and faxes. — Peer networks are organised into workgroups. Workgroups have very litte security. There is no central login process. — Ifthe user has logged into one peer on the network he can use any resources on the network that are not controlled by a specific password. Poor Peor (c-4wFig. 1.9.1 : Peer-to-peer network “Access to individual resources can be controlled if the user who shared the resources installs a password to access it. ~ since tae iin PSST! OF each sco ae ‘ource which he wants to access. relatively si to peer networks are imple, ane the neork can act 2 len sgh ‘This eliminates the need of expensive server, Io additional software is necessary in order to sty, the peer to peer network. 4.9.1 When to use Peer to Peer Networks 7 ‘The peer to peer networks are suitable forthe folowing working conditions : Irnetwork security is not an important issue, ifthe number of users is less than 10 (small network), {fall the users are situated in the same area. _ Ifthe possibility of future expansion is less, 4.9.2 Features of Peer to Peer Networks ; 1, It is useful for small networks with less than 10 computers. 2, Every computer can work as a client and server. 3, ‘There is no central control system. 4. Operating system used is Windows 2000 and its ‘subsequent versions. 5. No additional software is required to set up the peer to peer network. 6. _Itdoes not offer a high network security. 1.9.3 Advantages of Peer to Peer Networks : Peer networks have many advantages, especialy for Small business houses that cannot afford to buy expensive server hardware and software, 1. No extra investment in server hardware or softwar & required, Use less expensive computer hardware : In pee Peer network, the resources are distributed over ma “Ompulers, So there is no need for higherend-sere computer, Easy to administer + Iq Peer-to-peer network «= mac| ne Performs its own administration EE ‘4, No NOS required : Peer-to-peer network does not require a Network Operating System (NOS). More bullt-in-redundancy : If you have a small network, with 10-20 workstations and each one with some important data on it, and one fails you still have ‘most of your shared resources available, 5. Peer-to-peer network/achieve more redundancy because of smaller possibility of single point of failure. 6. Easy setup and lower cost for small networks. 7. Users can control resource sharing. 8 A user is not dependent on other computers for its operation. 1.9.4 Disadvantages of Peer to Peer Networks : There are several disadvantages of peer-to-peer network, particularly for larger networks as follows : 4. Individual performance Is affected : If some workstations have frequently used resources on them, then the use of these resources by other computer might adversely affects the person using this particular workstation. 2. Less security : ‘A peer-to-peer network operates on the most common desktop operating systems like windows which are not very secure operating systems. 3, Backup is difficult: In peer-to-peer network there is no centralized server. Hence data is scattered over many workstations. So iti difficult to backup all data in an organized manner. 4, Hard to maintain version control : In peer-to-peer network, files are stored on number of different workstations. So it is difficult to manage different document versions or files. 5. As there is no centralized management it makes large peer networks hard to manage and final data easily. 6. Users are supposed to manage their own computers. 7, Itis not possible to save important data in a centralized ‘manner. ae Fundamentals of Network wal load on computer because of resource sharing and absence of server. 1.10 Client / Server Network (Server Based Network) : - In client-server _ network i relationships, certain computers act as server and other act as clients. Definition of cilent ~ A client is a computer running a program that requests services from a server. The individual workstations in a network are clients. Definition of server : = A server is simply a computer that makes the network resources available and provides service to other computers when they request for it. = Local Area Networking (LAN) is based on the client- server network relationship. You can construct a client server network by using one or more powerful networked computers as a servers and the rest of as clients. Client-server network typically uses a directory service to store information about the network and its users. = A client-server network is one in which all available network resources such as files, directories, applications and shared devices, are centrally managed, stored and then are accessed by client. Network configuration : ~ Fig. 1.10.1 shows client-server network configuration. Server YN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy