Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
38 views
60 pages
chp-6 Computer Networks Scan
Computer science
Uploaded by
K.S.SANTHOSH NARAYANAN
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save chp-6 Computer Networks scan For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
38 views
60 pages
chp-6 Computer Networks Scan
Computer science
Uploaded by
K.S.SANTHOSH NARAYANAN
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save chp-6 Computer Networks scan For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 60
Search
Fullscreen
Computer Networks g.1 INTRODUCTION the greatest breakthrough in technology and communication over the past 30 years has been . From emailing a friend to online bill payment to downloading data from the internet to e-commerce, networking has made our world much smaller and forever changed the way we communicate ihe development and advancement of computer networ salient featur Nerwork provides which have made our life easy and comfortable, be it sending gn email, withdrawing money from an ATM, online railway or zudio and video files, Apart from these, the most extensivel irline reservation or sharing ised feature is the Print command cent from a computer to get a printout from a printer attached to some other computer. All this involves a network. It is the network that connects various computers to each other and handles 2large volume of data. Some of the examples of network in our eve yday life include: + Social network + Mobile network + Network of computers + Airlines, railways, banks, hospital networks 5.2 COMPUTER NETWORK—A BRIEF OVERVIEW Several devices connected to each other for reliable communication/transfer of data constitute network. A network can consist of a computer, fax machine, printer, camera, cell phone, etc. eaie i ec il A collection of interconnected computers is called a Computer Network. Two compute, or devices are said to be interconnected if they are capable of sharing and exchanging informa : ion by following a protocol (set of rules). j = CTM: A computer network is a collection of interconnected computers and other devices to share data and other resources (hardware and software resources), A basic network may connect a few computers placed in a room. The network size Tay van from small to large, depending on the number of computers it connects. A computer network ae include different types of hosts (also called nodes) like server, desktop, laptop, cellular phonge Domain DNS & Data Storage WiFi Router Server Printer Fig, 6.2: The Network Diagram 6.2.1 Advantages of Computer Networks Let us now discuss why networks are essential. Are there any advantages of networked computers over stand-alone machines? Yes, networked systems are far better. A network uses a distributed processing system in which a task is divided among several devices which are interconnected. ‘Therefore, instead of a single computer being responsible for completing the entire task, all the interconnected computers are responsible for completing the task assigned to them. This leads to better performance with high processing speed. Networks have several advantages which are described below: (a) Resource Sharing: The primary use of a network is to share among users programs/ applications, data and peripheral devices connected to the network, irrespective of their physical location. You must have noticed in your networked computer labs that when a print command is given on one computer, the document is printed by a printer attached to some other system. This allows printing of documents by several users and, hence, the printer is shared by multiple users on the network. Other resources like hard disk, DVD drive, scannet, etc., can also be shared on a computer network. For example, sharing database, audio and video files, antivirus software, application software, printers and scanners, etc. Computer Science with Python_— oOo EO xi Communications Aco improved A computer network enables fast, reliable and secure nication between users. 88 commu saves time and offers easy communication methods. For example, it. an organization, managers work at diffe e working on a network, any change White working of Kany change made by one manager on his/her computer can easily pe seen by other managers and employees, Thus information, This increases their efficiency and cod aring n abate ) Redue ans haring resources also reduces communication cost. Using public networks, we can send a large quantity of di networks are playing a very important role in s video data at a low cost rent locations to make financial reports. a network allows managers to easily update allows them to complete their work quickly. mmunication Cost; S| lata at a low cost. Internet and mobile ending and receiving text, image, audio and @ Reliability of Data: Reliability means: backing up of data, ie, data can be copied and stored on multiple computers. In a network BNR. intacmset tem, all computers are connected to each other: Thus, the information or message which is shared by each device is stored on their respective workstations (computers). If, due to some reason (hardware crash, etc.), the data gets corrupted and, thus, becomes unavailable on one computer, a copy of the same data can be accessed from another workstation for future use. This leads to smooth functioning and further processing without disruption, Central Storage of Data: Files can be stored on a central node (the file server) that can be sha and made available to each and every user in an organization. With centralized proc ‘iles @ data is stored and retrieved from a single central location. Thus, there is no duplication of data I and almost no data redundancy. i §.2.2 Disadvantages of Computer Networks ij These are the main disadvantages of computer network: 1 (a) Cost of set-up and maintenance: It is difficult to set up larger networks as the systems on ih a network are sophisticated and complex to run. Even cabling and equipment cost can be i expensive. In addition to this, maintenance cost may be very high for large networks. (0) Threat to data security: Unauthorized access to data leading to data theft or data corruption, computer viruses, worms, malware, phishing, etc,, are some of the threats to network security. 6.3 EVOLUTION OF NETWORK The network did not evolve in a single day; rather, it took decades to become more powerful, efficient and reliable. The network has passed through several stages which are described below: * ARPANET (Advanced Research Project Agency Network): ARPANET, which was jointly designed and named by the Advanced Research Projects Agency (ARPA) and US Department of Defence (DoD), was the first network and came into existence in 1969. It was a project that connected a handful of computers at different universities and US DoD for sharing of data and messages and playing long-distance games, and socializing with people to share their views. The development of ARPANET led to the development of today’s internet. + NSENET (National Science Federation Network): In the mid-80's, another federal agency, NSFNET, created a new network which was more capable than ARPANET. Its main aim was to use network only for academic research and not for any private business activity. Later, many private companies combined their own private networks with ARPANET and NSFNET. to make a more capable and broad network—the Internet, It is the internet that links two or more networks to make a large network for sharing information and messages. 2| ARPANET + NSFNET + PRIVATE NETWORKS = INTERNET Fig. 6.3: Evolution of internet + Internet: In the 1990's, internet, which is a network of networks, came into existence. The internet has evolved from ARPANET. The computers are connected through World Wide Web that comprises a large network and shares a common communication Protocol (Transmission Control Protocol-Internet Protocol, TCP/IP). It allows computers of different types to exchange information and is known as internet. Millions of domestic, business and government networks are connected with each other for the purpose of sharing files, data, email, etc. Most of the computers are not connected directly to the internet. Instead, they are connected to smaller networks which are further connected to a backbone network through gateways. CTM: Network of networks makes the internet. ] + Interspace: Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types such as data files, video, audio and textual data in a 3-D environment. It facilitates online real-time exchange of data. Interspace is the most advanced term of communication available on the internet today. 6.4 HOW DOES INTERNET WORK One of the greatest things about the internet is that nobody really owns it. It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as internet. In fact, the very name comes from this idea of interconnected networks. Since its beginning in 1969, the internet has grown from four host computer systems to tens of millions. However, just because nobody owns the internet does not mean that it is not monitored and maintained in different ways. The Internet Society, a non-profit group established in 1992, oversees the formation of the policies and protocols that define how we use and interact with the internet. eT cases ue RN LU aoogle alin | eoogie Bonich fh Feehing Lueky ennj ofred nF sent ene wee) ahh etl wp ayy, i Fig. 6.4(a): Working of the Internet spabout the basic underlying structure of the internet, eq., domain name servers, we lear fe ecess pnts and backbones, We frst nied to tinderstand how our computer connects ' nk access potter | computer that is connected to | t of a network, even taco speintermet iS Par ein out home. For example, sea asea modem and dial a Tocal sep Ps vy to connect to an Internet ber foie Provider (182). At work, Govier? C27 y be part of a Local Area | cable Modem cout a) Aetork (LAN), but it most likely stil crapects to the internet using an ISP that the company has contra ted with, ‘When t connects to the ISP, it becomes: ce putoftheitnetwork. The ISP may then cuaecttoalarger networkand become | __ Wome asian part of their network. The internet is Fig. 6.4(b): POP and NAP sinply a network of networks. \kstlarge communication companies have their own dedicated backbones connecting various ‘gions, In each region, the company has a Point of Presence (POP). The POP is a place for local seis to access the company's network, often through a local phone number or dedicated line, Theamazing thing here is that there is no overall controlling network. Instead, there are several Sighevel networks connecting to each other through Network Access Points or NAPs Gateway; teway: Gateway is a device that connects dissimilar networks. A backbone is a central interco Sr ; necting structure that connects one or more networks just like the trunk of a tree, tthe source BN pata eo he message to be sent is broken down into small parts called packets ee! ph a serial number, eg., 1, 2, 3. All these packets are sent to the destination Dee. : a computer receives the packets in random order (10 may come before 1) assembled in the order of their number and message is restored. Hoy - itfunetions smoothly: communicatioy Every computer connected to the internet uses the same set of rules Nn. A set of rules is called protocol. Communication protocol used by internet seis TCP/IP. The TCP (Transmission Control Protocol) part is responsible for divid) ing the mo into packets on the source computer and reassembling them at the destination compuger 3% Unternet Protocol) is responsible for handling the address of the destination Computer sy. the packet is sent to its proper destination. thar {na communication network, each device that is part of a network and can receive, Create or send data to different network routes is called a node. In the context of data communicgn” a node can be a device such as a modem, hub, bridge, switch, router, digital tele, oh, Phone handgor a printer, a computer or a server. s 6.4.1 Elementary Terminology of Networks 1. Nodes (Workstations): The term node refers to computers that are attache dtoa Networ, and are seeking to share resources, e,g., PC, smartphones, laptops, ete, Server: A computer that facilitates sharing of data, software and hardware resources network, Servers tend to have more memory, processing power and storage than a workstation, 3. Network Interface Unit (NIU) (MAC Address): A network interface unit is an interpreter that helps in establishing communication between the server and the client. It is also called network adapter, LAN adapter or network interface controller: A Media Access Control (Ac) address is a unique identifier assigned by the manufacturer to NIC for use as a network address in communications. MAC address is a 12-digit hexadecimal number. MAC address is usually written in any one of the following formats: MM:MM:MM:SS:SS:SS MM-MM-MM-SS-SS-SS The first half of MAC address contains the ID number of the adapter manufacturer and second half represents the serial number assigned to the adapter by the manufacturer For example, 00: AO: C9: 18: CS: 38 ey, On the Norma} Manufacturer Id 1D number 4. IP Address: Every machine on a TCP/IP Network has a unique identifying number called an IP Address, It is provided by ISP. 5. Domain Name: It is a way to identify and locate the computers connected to the internet. It must be unique. 6.5 COMPONENTS OF DATA COMMUNICATION A network comprises several components along with their functionalities that contribute to its smooth functioning. To form a network, a lot of hardware devices are required which are described as follows > Sender: A device or a computer that sends the data. » Receiver: A device or a computer that receives the data. * Message: Message is the information to be communicated. It may be text, image, audio or video. * Transmission Medium: A transmission medium is a physical path through which the data flows from sender to receiver. A cable or wire or radio waves can be the medium oN clesta ure UN UCx vot of HUleS that ge hae VEEN Hata Lhanstision, IE represents the communtoation y ee ig which ave Wo be FolLoWed by the sending and receiving devices we = a. ren e>, | te Fol | EF mo ten ne — cate — > SS FQ. 6S: Components ofa Computer Network i i g.6 MODES OF DATA TRANSMISSION I a arog oF Broadband Transmission (hy ya « Thesignal isa radio frequency signal oranatog, Ke, it can consist of continuous electrical | waves that are of varying amplitudes, i «Telephone networks use this type of transmission, Wa | © Requires modem for transmitting data over baseband mediun, Wh iy iy bigtal or Baseband Transmission Wo Wi + No special device for conversion of signal to be transmitted over baseband medium, va i ‘The signal is.a group of discrete electrical units which is transmitted in rapid success | (0) Parallel Communication + When data is transmitted through multiple wires, with each wire carrying each bit itis called parallel communication, {@) Serial Communication + When bits are sent one after another in a series along a wire, it is called serial communication, 10001-- nehronous Transm soos 0001 (@) Synchronous or ion + When sender and receiver synchronize their checks before transmission, £e, the sender first sends control characters to the receiver and then sends the actual data, itis called synchronous transmission, There is no space between data, hence it is efficient for sending large amounts of data, Advantage—Faster than asynchronow Data Flow 11110000 Becuyer Synchronous Transmission mode. Disadvantage—Costly and complex set-up required mputer Networks* In asynchronous transmission, data is preceded and succeeded by a start bit ang toy bit respectively. No synchronization is required. Sender 1110001117 0 | 1 ae Q | Receiver y / Endbit Data _ Start bit Asynchronous Transmission simple and cheap Advantage—Hardware required is Disadvantage—Slower than synchronous mode. 6.7 DIFFERENT WAYS OF SENDING DATA ACROSS NETWORK There are several ways of sending data from one node to another through network. It can be jn the form of calls, messages, etc. By using various types of switching techniques, we can establish the connection/communication. 6.7.1 Network Switching A network is made up of several interconnected nodes. There can be a point-to-point connection or star topology between pairs of devices, but both are not relevant for a large network. Hence, various switching techniques are used to transfer packets of data from one port of a node to another till they reach the destination. A switched network is made up of a series of interconnected Nodes called switches, 6.7.2 Switching Techniques The main goal of networking is the reliable exchange of data or information among several interconnected nodes. For the delivery of data with accuracy, various types of Switching techniques are used, namely: 1. Circuit Switching 2. Packet Switching 3. Message Switching TMi: The technique of sending data across the network is known as Switching technique. The three types of techniques used are circuit switching, packet switching and message switching. 1. Circuit Switching ‘ Circuit switching provides end-to-end connection between two computers. It is established usually in a telephone network where one person is making a call and another is receiving a call, Im a telephone system, the communication must be established between the two participants, ie, the sender and the receiver. The circuit is established between these two participants before the transfer of data takes place. zea ae PR Receiver Caller Fig. 6.6: Circuit Switching Momsen aniahe entire link remains dedicated which guarantees the full bandwidth of the or can use it eve : ; qT suser cant n if the path remains idle. The following actions take place sent by the sender to set is sent by the sender to set up the connection with the receiver. It establishes tion between the two participants ' est signal cal connec @ snysie* ap os are identifies odiate nodes are identified, These nodes are also called switching nodes. er tint sis av f ation node is available, it sends back the acknowledgement of receiving a signal » destina ne dest ransmission begins. ata ence» da data transmission is. complete, the call can be terminated. when the aan crit Saitching is @ connection-oriented service, In this technique, there is a dedicated link cer’ sender and the receiver and no other call can be made during this link, even ifthe link ans packet witching + e @, ee] e i it ig technique, the entire data is divided into small fragments called packets ayer is of a fixed size, usually 128 bytes or 12 bytes. Packet switching is similar to operation. Each packet has a source address as well as destination address (IP address) mitted, in the same way as a postman delivers a letter to a specific destination uapocret swei 8 gach Pi st offic jor being trans! | address jsthere f allows al destination a order During th soeach interme address, itis receive’ ipaddress. «no direct connection established between the sender and the receiver, each packet fferent routes and, therefore, the packets are delivered in a random ‘order at the dress. Itis the TCP protocol which then arranges all received packets in a sequential transfer of packets, each packet has to pass through several intermediate nodes, diate node checks for destination IP address. If the packet matches with the node .d; otherwise, it is passed on to the next node until it reaches the destination Mainframe Receiver Fig.6.7: Packet Switching (TW: Packet switching offers a connectionless service. Datais fragmented into ‘small packets and each packet isoffixed size in packet switching technology. a. Fs~@5 ux tucles, '> are bor hoon iver nucly, 2 oe wr» she aes BER predect Nall wells ie Ab ca3, Messape Switching In message switching, the sender sends the data to a switching office first, which iS then, 'ts buffer: t then checks the available link and, Ifit is free, the data is relayed to another tty office. This process goes on until the data is sent to the destination (receiver), AS the da ing stored in a buffer and then sent to the next switching office, it is also called Store ang ¢. thy switching technique, CTM: Message switching Is a store and forward switching technique where there is no direct | between the sender and the receiver. a 6.7.3 Difference between Circuit Switching and Packet Switching 1. Circuit switching reserves the required bandwidth in advance, whereas Packet Switching bandwidth as and when required by the packets to be transmitted. 2, Circuit switching is a fast technology as compared to packet switching which jg = mechanism of transferring packets from sender to receiver, ley 3, Circuit switching requires a dedicated path. Once the connection js ¢stablisheg communication path is entirely dedicated to it until the data is completely transferred f, sender to receiver, whereas in packet switching, packets can use any dynamic path, 4. Incircuit switching, ifthe path is overloaded, the call is blocked and communication is delayeg. But in packet switching, packets are allocated to different paths, 5. Circuit-switched networks are used for phone calls and packet-switched networks handle data © Packet switching is more efficient because the cost of the link is shared by many users 7. In circuit switching, the telephone message is sent unbroken. The message is Teceived in the Same order as it is originally sent. In packet switching, the message is broken into smaj Packets which are randomly sent from source and received in random order at destination, which is then sequentially arranged, 6.8 DATA COMMUNICATION TERMINOLOGIES 1. Channel: A channel is a communication path through which the data is transmitted from the sender device to the receiver device. 2, Baud: The number of changes in a signal per second is known as baud. It is the measuring unit of the data transfer rate, Technically, baud refers to the number of discrete signal elements transmitted per second, 1 baud represents only 1 signal change per second and is equivalent to 1 bit per second, 3. Bits per second: It is the measuring unit of speed at which data transfer takes place. 4. Bandwidth: The amount of data that can be passed along a communication channel ina given period of time (1 second) is termed as bandwidth, ie, it measures the information- carrying capacity of a line or a network. It is the difference between the highest and lowest frequencies allowed on a transmission media. B=fh-fl where fh and fl are the highest and lowest frequencies. The measuring unit is hertz (Hz), where 10? Hz = 1 Kilo Hertz (KHz), 10? KHz = 1 Mega Hertz (MHz). ase eae1 frequency is 80 Hz and lowest frequency is 50 Hz, what is the and Sif! Infor mation: that is stored within computer systems and transferred over paper network can be divided into two categories—data and signals. Data are entities 1 oo ire stored in the form of 0's and 1's, which convey some special meaning to the computer that? When this data is transmitted from one place to another, it is converted into signal, Beare the electric or electromagnetic encoding of data and are used to transmit data. ‘nmunication/ Transmission Media; It is a means of communication or access (lines § SMcommunication) set up between two organizations to exchange data/information. fommunicatlo” media is the way of transmitting the signal from one place to another. fommunication media js also known as transmission media, It plays an important role in fending and receiving of data to and from the sender and receiver. pata ‘transfer Rate: It is the amount of data transferred in one direction over a link divided | 1 Aft time taken to transfer tin bits per second (bps) The various measuring units are bits persecond (bps) and bytes per second (Bps) or baud, kilobits per second (kbps), megabits per second (mbps), gigabits per second (gbps), terabits per second (tbps.) 1 Kbps=2" bps=1024 bps 1 Mbps=2” bps=1024 Kbps 1 Gbps=2" bps=1024 Mbps 1 Tbps=2" bps=1024 Gbps Example: A user wants to upload a text document at the rate of 10 pages per 20 seconds. what will be the required data rate of the channel? (Assume that 1 page contains {600 characters and each character is of 8 bits). squire data rate = (10260088) 20 = 6400/1024 bps = 6.25 Kbps 6.9 NETWORK DEVICES 1, Modem: A MODEM (Modulator DEModulator) is an electronic device that enables a computer totransmit data over telephone lines. It is a device used to convert digital signals into analog signals and vice versa. There are two types of modems, namely internal modem and external modem. Modulation ere decr! Demodulation = PLL ————— > _ Disital signal ae Sa Demodulation Modulation A ‘Modem Modem Fig. 6.8(a): Working of Modem 4We know computers store and process data in terms of 0s and 1s. However, to tra Hy Nsmit d, from a sender to a receiver, or while browsing the internet, digital data is converteq j.° analog signal and the medium (be it free-space or a physical media) carries the digta the receiver. There are modems connected to both the source and destination node, ae modem at the sender's end acts as a Modulator that converts the digital data into ante signals while the modem at the receiver's end acts as a Demodulator th, ‘at converts th analog signals into digital data for the destination node to understand e RJ-45 Connector: RJ-45 is a standard type of connector for network cables. The RJ-45 (Registered Jack) connectors are the plug- in devices used in networking and telecommunications _ applications. They are used primarily for connecting LANs, particularly Ethernet. Fig 6.8(b): 81-45 Connect ‘CTM:RJ-45 sa short term for Registered Jack-45. itis an eight-wire connector used to connect computenso LANs, especially Ethernets. 3. Ethernet Card: itis a hardware device that helps inthe connection jp of nodes within a network. Ethernet card is also known as a network card, network adapter or NIC (network interface card). It is a card that allows computers to communicate over “ a computer network. On Ethernet card, a physical address of each communicating computer is mentioned. Physical address Fig. 6.8(c): Ethernet Carg is known as MAC address. Hub: It is multi-port and unintelligent network device which simply transfers data from ‘one port of the network to another. A hub is a hardware device used to connect several computers together with different ports. When the packet reaches one port, it is copied to all other ports of the hub without changing the destination address in the frame. Rather, it simply copies the data to all of the nodes connected to the hub. Hubs can be either active or passive. Hubs can usually support 8, 12 or 24 RJ-45 ports. Fig. 6.9: Hub But the problem with hub is that it is not an intelligent device. It shares bandwidth with all the attached devices and broadcasts the data, ie. sends the data frames to all the connected nodes as it does not remember devices/computers connected to it. Also, it cannot filter the data and causes unnecessary traffic jams. A hub can both send as well as receive information, but only one task at a time, However, a hub is an inexpensive way to connect multiple nodes/devices to network. TM: Hub is a device used to connect several computers with each other. Ue e Muna TUT a| a switch (switching hub) is gwitel gs on a network. It filters and for, 5. jevie mititendé ort he packet is Intended across a networy a ‘ ; also we ence and 0 the data packets receive from o one ote to the other port of the networ} deliv’ replicates what it rece that Et the MAC addresses of reo! ce which is used to interconnect comp ards data packe ts only to one or more de a multi-port device but wices for with some Port of network are refreshed and ference between hub and sv witch is he other ports, while switch kee; rE eps a Fig. 6.10: Switch hiss vice that wanes da the conpRES ATLA copy only to that port. An important advantage of using a bridge is that it iS a smarter hub as it can filter network traffic on the basis of the MAC addresses. Fig. 6.11: Ethemet Bridge [[EIMEA ridge is a device that links two segments of the original network together. | 7. Gateway: A gateway is a device that connects dissimilar networks. In internet, several networ are communicating with each other and each network has a different configuration. In order to make reliable communication, there must be a device that helps in communicating Gateway provides the necessary translation of data received from network into a format or protocol recognized by devices within the internal network. PTL STE,Gateway is a device which establishes an intelligent connection between a loc and external networks with completely different structures. ase Web Server Workstation -12: Gateway CTM: Gateway is a device that connects dissimilar networks. : aa 8. Repeater: A repeater is a device that operates only on the physical layer of the OSI model 4. a signal travels a fixed distance, before attenuation of the signal, a repeater is useq Which amplifies and restores signals for long-distance transmission. A repeater is an electron, | device that receives a signal before it becomes too weak and regenerates the original Signal. Also, it is a two-port network device that strengthens the signal intensity and connects two identical networks. In most twisted pair Ethernet configurations, repeaters are require for cable runs longer than 100 metres. A repeater does not change the functionality o¢ the network; instead, it makes the signal strong before it degrades. Repeaters are also extensively used in broadcasting where they are termed as translators or boosters, Weakened Signal Regenerated Signal Repeater No signal through the hill ‘Communication only possible by Bouncing the signal through the repeater Fig. 6.13: Working of a Repeater CTM: Repeater is a device that amplifies a signal that is transmitted across the network so that the signal is received in the same way as it is sent. Cetera_ A router is a networking device : out tothe destination rahi wale that forwards data packets from the source chine ver ani ret he network layer, Which is the letwork by using the shortest path. Routers are weed? third layer of the OSI model. er Us local are route Re ak hi 2 “' area network to the internet. Compared to Mitch, a router has advanced capabilities ‘ ate as er how itis or yor decide/alter how itis Packaged, re ain : co pried over a different type of networ sgaaseo be repackaged the es IP address to connect a | as it can analyze the data being carried over a Land send j i re sun ose data has been divided nts sles : ae network of a different type. For 3 tk which cannot assmaller packets and ther certain size and these packets are to thandle bigger packets. In such a case, n sent over the network by a router. Secondary Router LAN CABLE CONNECTION, —@ urtor TAB MOBILE TAB MOBILE Fig. 6.14: Router fs is a networking device that helps in forwarding packets from one machine to another, 10, Wi-Fi Card: A Wi-Fi card is either an internal or external Local Area Network adapter with a built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables auser to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards as they allow the user to set up connection without any wire. Wi-Fi cards are widely used in notebook computers due to their highly portable nature. The most common Wi-Fi card used indesktop computers is PCI-Express Wi-Fi card made to fit the PCI-Express card slot on the motherboard. 6.10 TYPES OF NETWORKS Acomputer network may be small or big depending upon the number of computers and other retwork devices linked together: Thus, networks vary in size, complexity and geographical spread A computer network can be on a table, in a room, building, city, country, across continents or zround the world. Computer networks can logically be divided into two types: 1. Client-Server network 2. Peer-to-Peer network Gient-Server network: In Client-Server network, multiple clients or workstations are connected toatleast one central server. A server is a powerful computer with all applications and hardware installed in it and a client is a computer which seeks any resource from another So When clients need access to these resources, they access them from the server. This network is used for larger networks. Cuanjes in the network have equivalent, peer hetwork all nod ; Peer-to-Peer network: In Peer-to-Peer network, co hi cet to-Peer network: Ih Pe | server: In this network, all workstations are connected oye bly and function as both client and serv e Asidall akon GHEE ci havin Meee ronordata, This networks idea! for small here tereisnana Sha ‘es, informa ata of dedicated servers. ae iy classified as: On the basis of geographical spread, networks may be cla Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) 1 a 6.10.1 Personal Area Network (PAN) rks establish communic ad PANs are small networks used to es| cas P e handheld devices in the proximity of up to 10 metres using wired USB rey) OF wireen stems like Bluetooth or Infrared. PANs are used to connect computers, laptops, mobiles ang other !Tenabled devices to transfer files including emails, digital photos, audio and video rt PAN may include wireless computer keyboard sy ion between a computer and The Bluetooth technology implements PAN. [ mouse, Bluetooth-enabled headphones, wireless printers and TV remotes. 10 Metres Fig. 6.15: Personal Area Network (PAN) TM: The network that belongs to a single person or user is known as PAN. 6.10.2 Local Area Network (LAN) LAN is a privately owned computer network covering a small geographical area (small physical area), like a home, office or a building such as a school. It can cover an area spread over a few metres to a radius of a few kilometres. Occasionally, a LAN can span a group of nearby buildings. In addition to operating in a limited space, a LAN is owned, controlled and managed by a single person or organization. The geographical area covered by a LAN can range from a single room, a floor, an office having one or more buildings in the same premise, a laboratory, school, college or a university campus. The connectivity is done by means of wires, Ethernet cables, fibre optics or Wi-Fi. A LAN can be set up using wired media (UTP cables, coaxial cables, etc.) or wireless media (infrared, Radio waves). Ifa LAN is set up using unguided media, itis known as WLAN (wireless LAN), The key purpose of a LAN is to share resources. LAN users can share data, programs, printer, disk, modem, etc. Computer Science with Python-Xilf i | jl Py Lae nN is 7) deisel wy’ TAN in your Home LAN in Office cauee
Cost: Cost signifies that the network should be cost-effective. For this, it is required to minimize the installation cost. This can be done by selecting an economical transmission ; medium (that is, wires) for data exchange between the network nodes. The network cost can also be minimized by reducing the distances between the nodes. ‘ > Flexibility: Flexibility signifies that the network must be flexible enough, ic, it should be easy to reconfigure. Reconfiguring a network means to rearrange the existing nodes or add new ones on the network. > Reliability: It refers to the degree of trust that can be placed on a network. Like any other r system, a network can also encounter failure. A network failure can occur due to the j following causes: _ 1. When an individual node stops working. 2. When the entire network fails. This is caused by a more serious fault that stops the ; working of an individual node. : What is Point-to-Point (P-P) Link : A P-P link, also known as a dedicated link, is used to connect two nodes in a network. The function of P-P link is to send and receive data over a network. In a P-P network, each workstation receives data from only one transmitter and each transmitter transmits data only to one receiver, Fig. 6.25 shows a P-P link in a network. Transmit Receive A |. B Receive Transmit Fig. 6.25: A Point-to-Point Link For better performance, the transmit and receive operations can occur over separate cables or wires, or they can occur in turns over the same wire by using different transmission techniques. AP-P link can be established in several ways. The simplest way is to install a P-P link between each pair of computers over a network. Computer Science with Python-XIltit LOR Hh pigisits BTN Ei wie ya ¥ PL ines 10M IRAN RY erie ’! 7 jo " 7 re ee Ht ITE, Ae Rd Hed mute re ws cnn” SS AMIN: AG Al i iba Rhy hak 10 se we Mek MAD apnnnieeliorn | Vi aheHesN Dadtiy mn won Lath | I AER CON) i ABTA Sait bony dayton j a 1 taps Mating heynten Meni st "Ree essere Sol ee shewnwne wrertiong TOO atone a“ Dg he Hh ipseeipis are ihy , wines Media (WINE aM AY: WAKA tation wre Bary racer n wh Pye 0 Lo te CAO tune media wwe Wits Lor Li aneHMinY, dake, Varicnwe WiTKd Commactione we AE Ot syne, contd eae 200 Nbr ype cab > Unguided nadia (Wirehens Madlay: b tranenurien muttia Chant Give wan waite Ge HA if canes Nor anembvion of date te arin 14 wogpeled matin, Wittens UC airnnvn® jo sn Verein 96 NHydKe matin on nem—pnysiea miele am the trannnnaniern Ate Pee dioronugpy varies types Oh wlactromagpatie A164, CR HG ROO WRIE4 ATCA WHA OM ATE transTivhons, AU aNTNtdOns, OMA AIS GRE, IAI URIDINE, CL 47 Gla Windia or Wired Wotwiniciny Verrweonpen 1 Twiieted Vair Cathe hiwisted pair cable is the duet, snphect and the mint enomon type 8 conducted media, it is mats A tw0 pashie insulated copper wires Wich ate United taypther to tort & siunpe wire, Vach wire ve 1 min thick, Out A these two Wires, only one carries the actual gga Wille the het Vs wae for ground relerence, The wires so twisted are neigh tn suhding \orerterence from the nearty stenllar pairs, Wich is Sawn as crommals. Vurioted pair can be species as Caegpry 1-5 and is abbreniated as Cat 1, Catagpnry 6 telished yar can wig yoTt Gata trancnnes #8 290 mbps Sor 100 metres while Category 7 twisted yar can sugyort AM Wwigger Gate ¢ Fig GEV Whcted tat ROE e
You might also like
Web Essentials - IT3401 - Notes
PDF
No ratings yet
Web Essentials - IT3401 - Notes
155 pages
Unit 3 Computer Networks
PDF
No ratings yet
Unit 3 Computer Networks
98 pages
COMPUTER NETWORK
PDF
No ratings yet
COMPUTER NETWORK
74 pages
Networking
PDF
No ratings yet
Networking
6 pages
Netwroks Full PDF
PDF
No ratings yet
Netwroks Full PDF
88 pages
Computer Networking Internet1
PDF
No ratings yet
Computer Networking Internet1
217 pages
ewan 3
PDF
No ratings yet
ewan 3
3 pages
22-23computer Networkingmod1
PDF
No ratings yet
22-23computer Networkingmod1
99 pages
networking
PDF
No ratings yet
networking
13 pages
Computer Applications Unit 2
PDF
No ratings yet
Computer Applications Unit 2
20 pages
DATACOM NOTES
PDF
No ratings yet
DATACOM NOTES
217 pages
BLS International School Computer Science / IP Study Material Topic: Networking
PDF
No ratings yet
BLS International School Computer Science / IP Study Material Topic: Networking
6 pages
DF Module - 2
PDF
No ratings yet
DF Module - 2
29 pages
calendrier_année_scolaire-2024_2025
PDF
No ratings yet
calendrier_année_scolaire-2024_2025
56 pages
IT3401-WE Unit 1
PDF
No ratings yet
IT3401-WE Unit 1
38 pages
IT3401-LN
PDF
No ratings yet
IT3401-LN
136 pages
010.1 Networking 2020-21 Part 1
PDF
No ratings yet
010.1 Networking 2020-21 Part 1
74 pages
Computer Networks CBSE class 12
PDF
No ratings yet
Computer Networks CBSE class 12
50 pages
BASIC NETWORKING MANUAL
PDF
No ratings yet
BASIC NETWORKING MANUAL
39 pages
week1e-notecomputersss3networking1firstterm
PDF
No ratings yet
week1e-notecomputersss3networking1firstterm
13 pages
Networking and Internet
PDF
No ratings yet
Networking and Internet
30 pages
Digital Fluency Unit 2 Notes
PDF
No ratings yet
Digital Fluency Unit 2 Notes
37 pages
1. Internet Overview
PDF
No ratings yet
1. Internet Overview
31 pages
mashishan
PDF
No ratings yet
mashishan
7 pages
Internet
PDF
No ratings yet
Internet
18 pages
Unit 1 Networking and Internet: Structure
PDF
No ratings yet
Unit 1 Networking and Internet: Structure
34 pages
Types of Computer Networks Advantages and Disadvantages
PDF
No ratings yet
Types of Computer Networks Advantages and Disadvantages
6 pages
CN Unit 1.1
PDF
No ratings yet
CN Unit 1.1
77 pages
FORM 4 COMP (Ecolebooks.com)
PDF
No ratings yet
FORM 4 COMP (Ecolebooks.com)
11 pages
Unit 3
PDF
No ratings yet
Unit 3
11 pages
Internet Fundamentals
PDF
No ratings yet
Internet Fundamentals
32 pages
BEST FIT TOPOL Note
PDF
No ratings yet
BEST FIT TOPOL Note
61 pages
CHAPTER 1
PDF
No ratings yet
CHAPTER 1
42 pages
Computer Network
PDF
No ratings yet
Computer Network
28 pages
Chapter 6 - Introduction To Computer Networks
PDF
No ratings yet
Chapter 6 - Introduction To Computer Networks
10 pages
Networking and Internet
PDF
No ratings yet
Networking and Internet
34 pages
network 1
PDF
No ratings yet
network 1
31 pages
Introduction to Communication Networks Notes
PDF
No ratings yet
Introduction to Communication Networks Notes
6 pages
Computer Networks
PDF
No ratings yet
Computer Networks
13 pages
CST303 M1 Ktunotes - in
PDF
No ratings yet
CST303 M1 Ktunotes - in
25 pages
Computer Network
PDF
No ratings yet
Computer Network
35 pages
Roles of Computer in A Network - Computer Help Users On The Network To Share
PDF
No ratings yet
Roles of Computer in A Network - Computer Help Users On The Network To Share
6 pages
CLass 12 - COMPUTER NETWORKS - Study Material
PDF
No ratings yet
CLass 12 - COMPUTER NETWORKS - Study Material
37 pages
COMPUTER NETWORK part 1
PDF
No ratings yet
COMPUTER NETWORK part 1
3 pages
Chapter 8 (Computer Networks- I)
PDF
No ratings yet
Chapter 8 (Computer Networks- I)
11 pages
4.2 Computer Network & Data Communication
PDF
No ratings yet
4.2 Computer Network & Data Communication
26 pages
First Chapter
PDF
No ratings yet
First Chapter
16 pages
COMPUTER APPLICATION Cyber Beans Class 9th
PDF
71% (7)
COMPUTER APPLICATION Cyber Beans Class 9th
64 pages
Chapter 2 Cs Class 12
PDF
No ratings yet
Chapter 2 Cs Class 12
12 pages
Lecture 1- Introduction
PDF
No ratings yet
Lecture 1- Introduction
17 pages
Physics Question Paper Answer Key
PDF
No ratings yet
Physics Question Paper Answer Key
8 pages
The Internet
PDF
No ratings yet
The Internet
10 pages
sermon_01
PDF
No ratings yet
sermon_01
111 pages
Part 1 - Overview Chapter 1-Introduction 1.1.1 Introduction To Computer Networks
PDF
No ratings yet
Part 1 - Overview Chapter 1-Introduction 1.1.1 Introduction To Computer Networks
31 pages
Physics Question Paper
PDF
No ratings yet
Physics Question Paper
6 pages
Lesson-1-ICF-8_094608
PDF
No ratings yet
Lesson-1-ICF-8_094608
3 pages
Data Comms Networks Notes PDF
PDF
No ratings yet
Data Comms Networks Notes PDF
70 pages
Affiliated To Central Board of Secondary Education - New Delhi
PDF
No ratings yet
Affiliated To Central Board of Secondary Education - New Delhi
4 pages
Mark Carlo Sanorjo Bscpe - 3B: Review Questions Fill in The Blanks
PDF
No ratings yet
Mark Carlo Sanorjo Bscpe - 3B: Review Questions Fill in The Blanks
5 pages