0% found this document useful (0 votes)
8 views80 pages

14.4 Network Structures

The document provides an overview of network structures, focusing on Peer-to-Peer (P2P) and Client-Server networks. It outlines the definitions, features, advantages, and disadvantages of each type, highlighting aspects such as decentralized control in P2P networks and centralized management in Client-Server networks. Additionally, it discusses various server types and the characteristics of Local Area Networks (LANs) and Wide Area Networks (WANs).

Uploaded by

haris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views80 pages

14.4 Network Structures

The document provides an overview of network structures, focusing on Peer-to-Peer (P2P) and Client-Server networks. It outlines the definitions, features, advantages, and disadvantages of each type, highlighting aspects such as decentralized control in P2P networks and centralized management in Client-Server networks. Additionally, it discusses various server types and the characteristics of Local Area Networks (LANs) and Wide Area Networks (WANs).

Uploaded by

haris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 80

14.

4 Network structures

By Waqqad
Introduction to Peer-to-Peer (P2P) Networks
• Definition:
• A peer-to-peer (P2P) network consists of
computers, known as peers, that connect to
each other directly without requiring a central
server to manage communications.
• Network Configurations:
• A P2P network can range from a small setup of
two computers in a home environment to a
large-scale system with hundreds of devices
connected over the internet.
• Primary Purpose:
• The main reason P2P networks are established
is to enable sharing of data, resources, and
files between users on the network.
Introduction to Peer-to-Peer (P2P) Networks

• Decentralized Structure:
• Unlike client-server models, P2P networks operate
without centralized control, meaning each peer is
independently responsible for data management.
• Equal Responsibility:
• Each peer in a P2P network has the same level of
responsibility and capability, allowing any peer to both
provide and request services.
• Self-Sufficient Communication:
• Peers communicate directly with one another, reducing
the need for centralized infrastructure, which can
simplify network management.
Features of Peer-to-Peer Networks
• Individual Data Storage:
• Data is stored locally on each peer’s device, and each
peer controls how and with whom their data is shared
within the network.
• Peripheral Resource Sharing:
• In addition to data, peers can also share devices such
as printers or external storage with other peers in the
network.
• Privacy and Access Control:
• Each user can designate files and resources as public
(accessible by other peers) or private (restricted to
themselves), managing the accessibility of their data.
Features of Peer-to-Peer Networks

• Dual Role of Peers:


• In a P2P setup, each device can function both as a client
(requesting data) and as a server (providing data),
eliminating the need for dedicated server resources.
• Cost Efficiency:
• P2P networks are generally more affordable than client-
server networks as they don’t require costly central
servers or specialized network management
infrastructure.
• Network Flexibility:
• Peers can join and leave the network freely, which
provides flexibility in network configuration and usage
based on current needs.
Peer-to-Peer File Sharing

• Digital Media File Sharing: P2P networks are


commonly used for sharing media files, including
audio, video, and document files, through direct
exchange between users.
• Dedicated P2P Software: Specialized software,
such as BitTorrent, is used to facilitate file
sharing by connecting users who possess
desired files with those looking to download
them.
• Dynamic Data Transmission: Files are often
broken into small pieces and distributed across
different peers, which are then reassembled at
the receiving peer to reconstruct the complete
file.
Peer-to-Peer File Sharing
• Efficient File Transfer:
• P2P networks are highly efficient for transferring
large files across networks, particularly when
distributing large media content to multiple users
simultaneously.
• Controversial Use Cases:
• While P2P technology is versatile, it has been
criticized and regulated in some cases due to its use
in illegal file sharing, especially regarding
copyrighted media.
• Legal and Ethical Issues:
• Many P2P networks have faced scrutiny and legal
challenges as unauthorized sharing of copyrighted
files violates intellectual property laws, raising
ethical and legal concerns for users.
Advantages of Peer-to-Peer Networks

• Low Setup Cost: Peer-to-peer networks are


relatively cheap to set up as they do not require
expensive servers or extensive infrastructure.
• Ease of Setup: Minimal technical knowledge is
needed to establish a P2P network, making it
accessible for a range of users.
• Resource Sharing: Users can easily share data
and resources, such as files or printers,
directly between devices on the network.
Advantages of Peer-to-Peer Networks

• Reduced Network Traffic: P2P networks often


experience less congestion than client-server
models due to their decentralized nature.
• User Control: Each peer has full control over
the data stored on their own device, providing
flexibility in managing data access and privacy.
• Resilience to Individual Failure: If a peer
device fails, it has minimal impact on the
network as a whole, only affecting the data
temporarily unavailable from the failed device
Disadvantages of Peer-to-Peer Networks

• Performance Impact:
• Accessing a peer’s resources can slow down their
device, as resource-sharing may affect system
performance.
• Lack of Centralized Backup:
• Data is not centrally backed up, so if a peer’s data is
lost, it cannot be recovered by other users unless a copy
exists elsewhere.
• Disorganized Data Sharing:
• Without a central organization, shared public files may
be difficult to navigate, lacking consistent structure.
Disadvantages of Peer-to-Peer Networks

• Individual Security Responsibility:


• Each peer must manage their own security,
increasing the risk of virus transmission if users
are not vigilant.
• Scalability Limitations:
• P2P networks can become inefficient and
challenging to manage as the number of
connected peers increases.
• Data Integrity Risks:
• There is no centralized control over data accuracy
or reliability, making data management less
structured than client-server networks.
Client-Server Network

• Centralized Control:
• The server serves as a central point of control,
managing resources and functions for all connected
client devices.
• Dedicated Server Role:
• Servers in a client-server network perform dedicated
functions, such as data storage, resource sharing, or
running applications for clients.
• Request-Response Communication:
• Clients request services from the server, which
responds by performing the task or providing the
requested resource.
Client-Server Network
• Enhanced Security:
• Centralized control allows for streamlined security
management, reducing the risk of unauthorized
access across the network.
• Efficient Resource Management:
• Servers optimize resources by storing data,
applications, and services in one location, making
access and management easier.
• Scalability:
• Client-server networks can easily scale as more client
devices can be added to the network by connecting to
the existing server.
Server Types
File Server
• Data Storage & Management:
• Centralizes data storage, saving
space on individual client devices.
• Universal Access:
• Allows users to access their files
and shared files from any client
computer in the network.
File Server

• Central Backup:
• Enables easy and centralized backup of all
stored data to prevent data loss.
• Collaboration:
• Facilitates sharing and collaboration among
users by providing a single access point for
files.
Web Server
• Web Page Hosting:
• Stores, processes, and transmits
web pages to client devices.
• Content Management:
• Ensures fast and reliable access
to website content for users.
Web Server
• Network Distribution:
• Can distribute content to a wide
user base across the internet.
• Security Measures:
• Often has built-in security
protocols to protect web data
Mail Server
• Email Storage:
• Stores incoming emails for users
until downloaded upon request.
• Email Routing:
• Forwards outgoing messages to
their correct destinations.
Mail Server
• Security Scans:
• Scans emails for viruses, malware,
spam, and inappropriate content.
• Centralized Communication:
• Enables efficient communication
management across a network.
Application
Server
• Software Installation & Execution:
• Hosts and runs desktop and web
applications for client devices.
• Resource Optimization:
• Reduces load on individual devices
by centralizing application
processing.
Application
Server
• Universal Access:
• Provides application access to
multiple clients within the network.
• Scalability:
• Allows easy scaling of applications
to meet user demands.
Print Server
• Print Job Management:
• Manages print requests from clients,
sending them to designated printers.
• Print Queue:
• Queues jobs in high-demand situations,
ensuring order in printing tasks.
Print Server
• Printer Selection:
• Allows jobs to be directed to
specific, nearest, or next available
printers.
• Resource Sharing:
• Enables multiple users to share
printers across the network.
FTP Server
• File Transfer Management:
• Manages data transfer using file
transfer protocol (FTP).
• Activity Logging:
• Keeps records of all FTP activities
for security and management.
FTP Server
• Internet File Transfers:
• Commonly used for transferring
files over the internet.
• User Access Control:
• Regulates access to file resources
and maintains data integrity.
Proxy Server
• Client Intermediary:
• Acts as a bridge between client
requests and other servers.
• Security Enhancement:
• Provides an extra security layer by
concealing client identities.
Proxy Server
• Firewall Capabilities:
• Can act as a firewall, filtering
incoming and outgoing traffic.
• Performance Optimization:
• Often caches frequently accessed
resources to improve speed.
Virtual Server
• Virtualization:
• Runs on virtualized hardware, allowing
multiple virtual servers on one physical
machine.
• Adaptability:
• Can be configured to perform the
functions of any physical server type.
Virtual Server
• Cost-Effective:
• Allows organizations to optimize
resources and reduce physical
hardware needs.
• Scalability:
• Can be adjusted or expanded easily to
meet increased workload demands.
Virtual Server
• Cost-Effective:
• Allows organizations to optimize
resources and reduce physical
hardware needs.
• Scalability:
• Can be adjusted or expanded easily to
meet increased workload demands.
Check Your
Understanding

Quiz Title: Peer-to-Peer (P2P) and


Client-Server network
Quiz Link:
https://quizizz.com/admin/quiz/6724aa
c5df8fa8f280b4f056
Client-Server Network: Advantages

• Centralized File Location and Backup:


• All files are stored centrally, allowing for regular
backups, ensuring data is secure without
individual responsibility.
• Centralized Security Management:
• Security is managed from a central server,
reducing the need for each user to manage
individual security measures.
• Controlled Access Levels:
• Access levels can be customized for resources
and data, ensuring only authorized users have
access to sensitive information.
Client-Server Network: Advantages

• Centralized Software and Peripheral


Updates:
• Updates can be rolled out across the
network from one central location,
maintaining consistency and reducing
reliance on users to update individually.
• Efficient Resource Management:
• Resources such as printers and storage are
easily managed and shared, improving
overall network efficiency.
Client-Server Network: Disadvantages

• High Initial Setup Cost:


• Setting up requires expensive equipment like servers,
making it a significant initial investment.
• Ongoing Maintenance Costs:
• Maintenance requires specialized knowledge and
skills, which can be costly to hire or contract.
• Single Point of Failure:
• Server failure can halt access to resources for all
users, making the entire network dependent on server
stability.
Client-Server Network: Disadvantages

• Scalability Challenges:
• Scaling up the network requires more powerful
servers and additional infrastructure,
increasing costs.
• Complexity of Configuration:
• Setting up and managing a client-server
network requires careful planning and
knowledge, making it more complex than peer-
to-peer setups.
Server Farm

• Definition:
• A server farm is a large group of networked servers
working together to provide massive computing power
beyond a single server's capability.
• Processing Power:
• Collectively, server farms have immense processing
power, allowing them to handle very large and complex
tasks simultaneously.
• Cooling Requirements:
• Due to the high energy output and processing demand,
server farms need significant cooling systems to
prevent overheating.
Server Farm

• Task Execution:

• Multiple servers in a farm can collaborate to execute large tasks


efficiently, with each server managing parts of the workload.

• High Server Count:

• Server farms can include thousands of servers, maximizing


capacity and redundancy.

• Example:

• Google’s server farm, one of the largest globally, contains over


10,000 servers to manage vast amounts of data and processes.
Local Area Network (LAN)

• Definition:
• A LAN is a network connecting computers and devices
within a small geographic area, like a home, school, or
small business.
• Scale:
• LANs range from a simple setup (e.g., two computers
at home) to more complex networks with hundreds of
devices in a business.
• Purpose:
• Primarily created to enable efficient data and resource
sharing, such as files, printers, and other peripherals.
Local Area Network (LAN)
• Components:
• LANs may include switches, routers, servers,
computers, and peripheral devices.
• Speed:
• Typically offers high data transfer speeds due
to the short distances between devices.
• Control:
• Managed by local administrators, allowing
direct control over network security, access,
and configuration.
Wide Area
Network (WAN)
• Definition:
• A WAN connects computers and devices across a large
geographic area, spanning cities, regions, or even
countries.
• Largest Example:
• The internet is the largest WAN, interconnecting millions
of networks worldwide.
• Purpose:
• Used by organizations with multiple branches (e.g.,
banks, government agencies) to facilitate
Wide Area Network (WAN)

• Structure:
• Typically consists of multiple LANs
connected across various locations to form a
unified WAN.
• Data Transmission:
• Uses leased telecommunication lines or
satellite links, leading to typically lower
speeds compared to LANs.
• Management:
• WANs are often managed by telecom
providers, requiring more complex
infrastructure and security measures.
LAN Factors
• Data Transfer Rate:
• LANs support higher data transfer
speeds, often up to 1 Gb per second.
• Data Transmission Errors:
• Fewer errors typically occur because
data is transmitted over shorter
distances.
• Method of Connection:
• LANs are commonly connected using
copper wire, fiber optic cables, or radio
waves, sometimes combining all three.
LAN Factors
• Security:
• Easier to secure due to the smaller
number of devices, with security
responsibility largely managed by the
network’s owners.
• Ownership:
• The network components and devices are
generally owned by the individual or
organization, allowing full control and
maintenance.
WAN Factors

• Data Transfer Rate:


• WANs generally have lower data transfer speeds,
often less than 200 Mb per second.
• Data Transmission Errors:
• Higher likelihood of errors due to data transmission
over longer distances.
• Method of Connection:
• WANs use a variety of connections, including copper
wires, fiber optic cables, radio waves, microwaves,
leased lines, and satellites.
WAN Factors
• Security:
• More challenging to secure due to a larger
number of devices; organizations often
depend on the security measures of
external providers.
• Ownership:
• Parts of the WAN are typically owned by
third parties, meaning that organizations
must rely on external parties for control
and maintenance.
Virtual Private Network (VPN)

• Purpose of a VPN:
• Allows individuals or organizations to access
sensitive data remotely with enhanced security.
• Security Advantage:
• Helps protect against potential interception by
hackers during data transmission.
• VPN Client Software:
• Users open VPN client software to create and access
the VPN.
Virtual Private Network (VPN)

• Data Encryption:
• Encrypts data before sending it
across the internet to secure its
content.
• Data Transmission Path:
• Data is first routed to a VPN server
before reaching its final destination.
How a VPN Secures Data

• Anonymity Through VPN Server:


• When data arrives at the destination, it appears to be
sent from the VPN server, masking the original
sender.
• Protection Against Packet Interception:
• Without a VPN, packet inspection reveals both the
sender and receiver.
• Minimizes Hacking Risk:
• Reduces the chance of hacker access to sensitive
data and user accounts.
How a VPN Secures Data

• Encryption Process:
• Ensures that even if data is intercepted, it
remains unreadable to unauthorized
users.
• VPN Client and Server Communication:
• Secure communication established only
between VPN client software and VPN
server.
VPN Security Benefits

• Data Encryption:
• Encrypts data so intercepted data packets are
unreadable and meaningless.
• Hidden Final Destination:
• If intercepted between user and VPN server, hackers
cannot trace data to the final destination.
• Masked Sender Identity:
• When intercepted between VPN and destination, the
hacker cannot identify the original sender.
VPN Security Benefits

• Enhanced Privacy:
• Maintains user privacy by preventing
exposure of user identity and location.
• Remote Secure Access:
• Allows secure access to sensitive data
from any remote location, even over
public networks.
Advantages of VPN

• Data Encryption:
• Data is encrypted before it is sent, enhancing security
and protecting against interception.
• Sender Anonymity:
• The VPN keeps the sender's identity private,
protecting it from the destination and any potential
hackers.
• Secure Access to Remote Data:
• VPNs provide secure access to sensitive data from
any location, ideal for remote work or travel.
Advantages of VPN

• Maintenance Responsibility:
• VPN server maintenance is managed by
the VPN provider, reducing the user’s
workload.
• Access to Geo-restricted Content:
• VPNs allow users to access content
restricted by geographic location,
offering greater internet freedom
Disadvantages of VPN

• Legal and Ethical Concerns:


• In some countries, VPN use is illegal or controversial
due to potential misuse for anonymity in criminal
activity.
• Reliance on Third-Party Security:
• VPN security depends on the provider’s effectiveness
in software and server maintenance.
• Cost Involvement:
• Many VPN services require a subscription fee, which
could be an ongoing monthly or annual cost.
Disadvantages of VPN

• Potential Slower Speeds:


• VPN encryption and rerouting may
reduce internet speeds, impacting
performance for data-heavy tasks.
• Limited Device Support:
• Some VPN providers restrict the
number of devices that can use the VPN
simultaneously.
Check Your
Understanding

Quiz Title: client-server, server


farms, LAN, WAN
Quiz Link:
https://quizizz.com/admin/quiz/6
725eb49b68e76464c5e3ed1
Mobile Network

Definition:
A mobile network, also known as a cellular network,
is a wireless WAN that connects portable devices,
such as smartphones, through radio signals.
Coverage:
Mobile networks now cover a significant portion of
inhabited areas worldwide, enabling connectivity
even in remote locations.
Communication Method:
The network uses radio frequencies to transmit and
receive data between devices and base stations.
Mobile Network

• Cell Structure:
• Mobile networks are divided into small
geographic areas called cells to manage network
traffic efficiently.
• Base Stations:
• Each cell contains a radio base station
responsible for sending and receiving
communications within its area.
• Internet Access:
• Base stations are connected to public
telecommunications systems, providing internet
access to users within each cell.
Types of Cells in Mobile Networks

• Picocells:
• These cells cover a very small area, typically less than 200
meters, suitable for densely populated areas like airports or
malls.
• Microcells:
• Covering up to 2 kilometers, microcells are common in urban
areas and help improve network capacity and reduce
interference.
• Macrocells:
• These larger cells cover wide regions, providing network
service in rural or less-populated areas where fewer base
stations are needed.
Types of Cells in Mobile Networks

• Cell Size and Usage:


• The size of each cell is optimized based on
population density and geographic needs, with
smaller cells in busy areas and larger cells in
rural zones.
• Seamless Connectivity:
• As a user moves, their connection is handed over
from one cell to another without interruption.
• Public Services Link:
• Cells connect through the telecommunications
network to provide internet and other services
across wide geographic regions.
Mobile Network
Generations

By Waqqad
1G Network (First Generation)

• Introduction to 1G:
• The 1G network, launched in the 1980s,
marked the beginning of mobile networks
with analog signal transmission.
• Primary Use:
• It primarily supported basic voice calls and
text messages, but data services were not
possible.
• Call Quality Issues:
• Call quality was often poor due to frequent
noise and interference, especially in areas
with limited signal.
1G Network (First Generation)

• Limited Coverage:
• The coverage was limited, with weaker
connectivity and reliability in rural and remote
areas.
• Security Concerns:
• Security on 1G networks was minimal, making
analog signals easy to intercept and less private.
• General Reputation:
• The 1G network became known for its low call
quality, limited capacity, and lack of modern
features.
2G Network (Second Generation)

• Transition to Digital:
• 2G, introduced in the early 1990s, transitioned to
digital transmission, improving call quality and
network reliability.
• Introduction of SMS/MMS:
• It supported GSM technology, allowing data
services like SMS and MMS for the first time.
• Enhanced Security: Enhanced encryption
methods provided more secure and private
communications than
• nalog networks.
2G Network (Second Generation)

• Roaming Feature:
• Roaming was introduced, so compatible phones could
connect to different 2G networks across the globe.
• Data Transfer Speed:
• Data transfer speeds were increased to around 64 Kbps,
allowing for basic mobile browsing and email.
• Significance of 2G:
• 2G offered a notable upgrade over 1G in terms of both
security and data functionality, setting the stage for
mobile internet.
3G Network (Third Generation)

• High-Speed Data:
• Launched in the early 2000s, 3G significantly
increased data speeds to around 2 Mbps,
supporting more advanced mobile functions.
• Expanded Connectivity:
• 3G networks allowed users to browse the
internet, stream multimedia content, and
engage in video calls.
• Backward Compatibility:
• Backward compatibility ensured that 3G
could operate alongside 2G networks,
improving global roaming options.
3G Network (Third Generation)

• Increased Security:
• Improved encryption standards made 3G
connections more secure, enhancing data
privacy for users.
• Support for Mobile Apps:
• This generation supported emerging mobile
applications, allowing functionalities like GPS
and online gaming.
• Impact on Mobile Use:
• 3G networks set a new standard for mobile data,
enabling a shift toward smartphones and data-
centric usage.
4G Network (Fourth Generation)

• Introduction of High-Speed 4G:


• Introduced in the late 2000s, 4G networks offered
much faster theoretical speeds of up to 1 Gbps, ideal
for high-demand applications.
• Support for Streaming and Gaming:
• This generation became widely adopted for activities
such as HD video streaming, online gaming, and rapid
downloads/uploads.
• Broadband Replacement:
• 4G was viewed as a potential broadband
replacement, with speeds comparable to home
internet, suitable for data-intensive tasks.
4G Network (Fourth Generation)

• Improvements in VoIP and Video Calls:

• VoIP and video calling quality improved on 4G, making these


services viable alternatives to traditional calls.

• Enhanced App and Cloud Support:

• Enhanced support for mobile applications and cloud-based


services expanded user possibilities and productivity.

• Legacy of 4G:

• 4G networks laid the groundwork for a fully connected mobile


ecosystem, leading to further innovation in mobile technology.
5G Network (Fifth Generation)

• Latest Generation:
• 5G, the latest generation, offers high-speed,
reliable connections with average download
speeds expected to reach 1 Gbps.
• Fast Initial Testing:
• Initial 5G testing has shown speeds up to 1.5
Gbps, making it ideal for data-heavy tasks like
UHD streaming and augmented reality.
• Low Latency Advantage:
• With lower latency than previous generations, 5G
supports real-time applications, such as remote
medical procedures and autonomous vehicles.
5G Network (Fifth Generation)
• Enhanced Device Connectivity:
• Improved network density allows more devices to
connect simultaneously, ideal for IoT
implementations in smart cities.
• Advanced Security:
• 5G networks offer more advanced encryption and
security, adding layers of protection in data
transfer and personal information.
• Future Potential of 5G:
• Though not fully deployed yet, 5G has
transformative potential, enabling new
technologies and industries through faster, more
reliable connectivity.
Advantages of Mobile Networks

• On-the-Move Connectivity:
• Mobile networks allow users to communicate and
access the internet from virtually any location,
supporting the widespread use of smartphones and
other mobile devices.
• Energy Efficiency with Lower Power Transmitters:
• Dividing the network into cells enables the use of
low-power radio transmitters, reducing energy
consumption and costs.
• Efficient Frequency Use:
• Limited radio frequencies can be reused across
non-adjacent cells, maximizing the number of
simultaneous connections.
Advantages of Mobile Networks

• Extended Geographic Coverage:


• Mobile networks use multiple transmitters in separate
cells, covering a much larger area than a single, high-
powered transmitter would allow.
• Enhanced Signal Range:
• Using numerous low-power transmitters ensures robust
coverage across wide areas without requiring high power
levels.
• Increased Network Reliability:
• If one base station fails, it only impacts the specific cell it
serves, leaving the rest of the network unaffected and
ensuring continued service elsewhere.
Disadvantages of Mobile Networks

• Variable Reception Quality:


• Signal reception can degrade near the edge of a cell,
resulting in weaker signals and possible interruptions in
communication.
• Frequency Interference Concerns:
• The allocation of frequencies must be carefully managed to
avoid overlap and interference between neighboring cells.
• Technology Limitations for 5G:
• The technology for full 5G implementation is still limited,
with high costs and slow adoption potentially delaying its
widespread usability.
Disadvantages of Mobile Networks

• High Infrastructure Costs:


• Setting up and maintaining a network of
numerous transmitters and base stations can be
costly for providers.
• Environmental Impact:
• The increased number of transmitters may impact
landscapes and contribute to electronic waste,
especially during technology upgrades.
• Security and Privacy Issues:
• Mobile networks are susceptible to security
breaches, and user data can be vulnerable if
proper measures are not implemented.
Check Your Understanding

Quiz Title: Understanding of mobile


networks
Quiz Link:
https://quizizz.com/admin/quiz/6729191
9f5beaa109054cb85

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy