14.4 Network Structures
14.4 Network Structures
4 Network structures
By Waqqad
Introduction to Peer-to-Peer (P2P) Networks
• Definition:
• A peer-to-peer (P2P) network consists of
computers, known as peers, that connect to
each other directly without requiring a central
server to manage communications.
• Network Configurations:
• A P2P network can range from a small setup of
two computers in a home environment to a
large-scale system with hundreds of devices
connected over the internet.
• Primary Purpose:
• The main reason P2P networks are established
is to enable sharing of data, resources, and
files between users on the network.
Introduction to Peer-to-Peer (P2P) Networks
• Decentralized Structure:
• Unlike client-server models, P2P networks operate
without centralized control, meaning each peer is
independently responsible for data management.
• Equal Responsibility:
• Each peer in a P2P network has the same level of
responsibility and capability, allowing any peer to both
provide and request services.
• Self-Sufficient Communication:
• Peers communicate directly with one another, reducing
the need for centralized infrastructure, which can
simplify network management.
Features of Peer-to-Peer Networks
• Individual Data Storage:
• Data is stored locally on each peer’s device, and each
peer controls how and with whom their data is shared
within the network.
• Peripheral Resource Sharing:
• In addition to data, peers can also share devices such
as printers or external storage with other peers in the
network.
• Privacy and Access Control:
• Each user can designate files and resources as public
(accessible by other peers) or private (restricted to
themselves), managing the accessibility of their data.
Features of Peer-to-Peer Networks
• Performance Impact:
• Accessing a peer’s resources can slow down their
device, as resource-sharing may affect system
performance.
• Lack of Centralized Backup:
• Data is not centrally backed up, so if a peer’s data is
lost, it cannot be recovered by other users unless a copy
exists elsewhere.
• Disorganized Data Sharing:
• Without a central organization, shared public files may
be difficult to navigate, lacking consistent structure.
Disadvantages of Peer-to-Peer Networks
• Centralized Control:
• The server serves as a central point of control,
managing resources and functions for all connected
client devices.
• Dedicated Server Role:
• Servers in a client-server network perform dedicated
functions, such as data storage, resource sharing, or
running applications for clients.
• Request-Response Communication:
• Clients request services from the server, which
responds by performing the task or providing the
requested resource.
Client-Server Network
• Enhanced Security:
• Centralized control allows for streamlined security
management, reducing the risk of unauthorized
access across the network.
• Efficient Resource Management:
• Servers optimize resources by storing data,
applications, and services in one location, making
access and management easier.
• Scalability:
• Client-server networks can easily scale as more client
devices can be added to the network by connecting to
the existing server.
Server Types
File Server
• Data Storage & Management:
• Centralizes data storage, saving
space on individual client devices.
• Universal Access:
• Allows users to access their files
and shared files from any client
computer in the network.
File Server
• Central Backup:
• Enables easy and centralized backup of all
stored data to prevent data loss.
• Collaboration:
• Facilitates sharing and collaboration among
users by providing a single access point for
files.
Web Server
• Web Page Hosting:
• Stores, processes, and transmits
web pages to client devices.
• Content Management:
• Ensures fast and reliable access
to website content for users.
Web Server
• Network Distribution:
• Can distribute content to a wide
user base across the internet.
• Security Measures:
• Often has built-in security
protocols to protect web data
Mail Server
• Email Storage:
• Stores incoming emails for users
until downloaded upon request.
• Email Routing:
• Forwards outgoing messages to
their correct destinations.
Mail Server
• Security Scans:
• Scans emails for viruses, malware,
spam, and inappropriate content.
• Centralized Communication:
• Enables efficient communication
management across a network.
Application
Server
• Software Installation & Execution:
• Hosts and runs desktop and web
applications for client devices.
• Resource Optimization:
• Reduces load on individual devices
by centralizing application
processing.
Application
Server
• Universal Access:
• Provides application access to
multiple clients within the network.
• Scalability:
• Allows easy scaling of applications
to meet user demands.
Print Server
• Print Job Management:
• Manages print requests from clients,
sending them to designated printers.
• Print Queue:
• Queues jobs in high-demand situations,
ensuring order in printing tasks.
Print Server
• Printer Selection:
• Allows jobs to be directed to
specific, nearest, or next available
printers.
• Resource Sharing:
• Enables multiple users to share
printers across the network.
FTP Server
• File Transfer Management:
• Manages data transfer using file
transfer protocol (FTP).
• Activity Logging:
• Keeps records of all FTP activities
for security and management.
FTP Server
• Internet File Transfers:
• Commonly used for transferring
files over the internet.
• User Access Control:
• Regulates access to file resources
and maintains data integrity.
Proxy Server
• Client Intermediary:
• Acts as a bridge between client
requests and other servers.
• Security Enhancement:
• Provides an extra security layer by
concealing client identities.
Proxy Server
• Firewall Capabilities:
• Can act as a firewall, filtering
incoming and outgoing traffic.
• Performance Optimization:
• Often caches frequently accessed
resources to improve speed.
Virtual Server
• Virtualization:
• Runs on virtualized hardware, allowing
multiple virtual servers on one physical
machine.
• Adaptability:
• Can be configured to perform the
functions of any physical server type.
Virtual Server
• Cost-Effective:
• Allows organizations to optimize
resources and reduce physical
hardware needs.
• Scalability:
• Can be adjusted or expanded easily to
meet increased workload demands.
Virtual Server
• Cost-Effective:
• Allows organizations to optimize
resources and reduce physical
hardware needs.
• Scalability:
• Can be adjusted or expanded easily to
meet increased workload demands.
Check Your
Understanding
• Scalability Challenges:
• Scaling up the network requires more powerful
servers and additional infrastructure,
increasing costs.
• Complexity of Configuration:
• Setting up and managing a client-server
network requires careful planning and
knowledge, making it more complex than peer-
to-peer setups.
Server Farm
• Definition:
• A server farm is a large group of networked servers
working together to provide massive computing power
beyond a single server's capability.
• Processing Power:
• Collectively, server farms have immense processing
power, allowing them to handle very large and complex
tasks simultaneously.
• Cooling Requirements:
• Due to the high energy output and processing demand,
server farms need significant cooling systems to
prevent overheating.
Server Farm
• Task Execution:
• Example:
• Definition:
• A LAN is a network connecting computers and devices
within a small geographic area, like a home, school, or
small business.
• Scale:
• LANs range from a simple setup (e.g., two computers
at home) to more complex networks with hundreds of
devices in a business.
• Purpose:
• Primarily created to enable efficient data and resource
sharing, such as files, printers, and other peripherals.
Local Area Network (LAN)
• Components:
• LANs may include switches, routers, servers,
computers, and peripheral devices.
• Speed:
• Typically offers high data transfer speeds due
to the short distances between devices.
• Control:
• Managed by local administrators, allowing
direct control over network security, access,
and configuration.
Wide Area
Network (WAN)
• Definition:
• A WAN connects computers and devices across a large
geographic area, spanning cities, regions, or even
countries.
• Largest Example:
• The internet is the largest WAN, interconnecting millions
of networks worldwide.
• Purpose:
• Used by organizations with multiple branches (e.g.,
banks, government agencies) to facilitate
Wide Area Network (WAN)
• Structure:
• Typically consists of multiple LANs
connected across various locations to form a
unified WAN.
• Data Transmission:
• Uses leased telecommunication lines or
satellite links, leading to typically lower
speeds compared to LANs.
• Management:
• WANs are often managed by telecom
providers, requiring more complex
infrastructure and security measures.
LAN Factors
• Data Transfer Rate:
• LANs support higher data transfer
speeds, often up to 1 Gb per second.
• Data Transmission Errors:
• Fewer errors typically occur because
data is transmitted over shorter
distances.
• Method of Connection:
• LANs are commonly connected using
copper wire, fiber optic cables, or radio
waves, sometimes combining all three.
LAN Factors
• Security:
• Easier to secure due to the smaller
number of devices, with security
responsibility largely managed by the
network’s owners.
• Ownership:
• The network components and devices are
generally owned by the individual or
organization, allowing full control and
maintenance.
WAN Factors
• Purpose of a VPN:
• Allows individuals or organizations to access
sensitive data remotely with enhanced security.
• Security Advantage:
• Helps protect against potential interception by
hackers during data transmission.
• VPN Client Software:
• Users open VPN client software to create and access
the VPN.
Virtual Private Network (VPN)
• Data Encryption:
• Encrypts data before sending it
across the internet to secure its
content.
• Data Transmission Path:
• Data is first routed to a VPN server
before reaching its final destination.
How a VPN Secures Data
• Encryption Process:
• Ensures that even if data is intercepted, it
remains unreadable to unauthorized
users.
• VPN Client and Server Communication:
• Secure communication established only
between VPN client software and VPN
server.
VPN Security Benefits
• Data Encryption:
• Encrypts data so intercepted data packets are
unreadable and meaningless.
• Hidden Final Destination:
• If intercepted between user and VPN server, hackers
cannot trace data to the final destination.
• Masked Sender Identity:
• When intercepted between VPN and destination, the
hacker cannot identify the original sender.
VPN Security Benefits
• Enhanced Privacy:
• Maintains user privacy by preventing
exposure of user identity and location.
• Remote Secure Access:
• Allows secure access to sensitive data
from any remote location, even over
public networks.
Advantages of VPN
• Data Encryption:
• Data is encrypted before it is sent, enhancing security
and protecting against interception.
• Sender Anonymity:
• The VPN keeps the sender's identity private,
protecting it from the destination and any potential
hackers.
• Secure Access to Remote Data:
• VPNs provide secure access to sensitive data from
any location, ideal for remote work or travel.
Advantages of VPN
• Maintenance Responsibility:
• VPN server maintenance is managed by
the VPN provider, reducing the user’s
workload.
• Access to Geo-restricted Content:
• VPNs allow users to access content
restricted by geographic location,
offering greater internet freedom
Disadvantages of VPN
Definition:
A mobile network, also known as a cellular network,
is a wireless WAN that connects portable devices,
such as smartphones, through radio signals.
Coverage:
Mobile networks now cover a significant portion of
inhabited areas worldwide, enabling connectivity
even in remote locations.
Communication Method:
The network uses radio frequencies to transmit and
receive data between devices and base stations.
Mobile Network
• Cell Structure:
• Mobile networks are divided into small
geographic areas called cells to manage network
traffic efficiently.
• Base Stations:
• Each cell contains a radio base station
responsible for sending and receiving
communications within its area.
• Internet Access:
• Base stations are connected to public
telecommunications systems, providing internet
access to users within each cell.
Types of Cells in Mobile Networks
• Picocells:
• These cells cover a very small area, typically less than 200
meters, suitable for densely populated areas like airports or
malls.
• Microcells:
• Covering up to 2 kilometers, microcells are common in urban
areas and help improve network capacity and reduce
interference.
• Macrocells:
• These larger cells cover wide regions, providing network
service in rural or less-populated areas where fewer base
stations are needed.
Types of Cells in Mobile Networks
By Waqqad
1G Network (First Generation)
• Introduction to 1G:
• The 1G network, launched in the 1980s,
marked the beginning of mobile networks
with analog signal transmission.
• Primary Use:
• It primarily supported basic voice calls and
text messages, but data services were not
possible.
• Call Quality Issues:
• Call quality was often poor due to frequent
noise and interference, especially in areas
with limited signal.
1G Network (First Generation)
• Limited Coverage:
• The coverage was limited, with weaker
connectivity and reliability in rural and remote
areas.
• Security Concerns:
• Security on 1G networks was minimal, making
analog signals easy to intercept and less private.
• General Reputation:
• The 1G network became known for its low call
quality, limited capacity, and lack of modern
features.
2G Network (Second Generation)
• Transition to Digital:
• 2G, introduced in the early 1990s, transitioned to
digital transmission, improving call quality and
network reliability.
• Introduction of SMS/MMS:
• It supported GSM technology, allowing data
services like SMS and MMS for the first time.
• Enhanced Security: Enhanced encryption
methods provided more secure and private
communications than
• nalog networks.
2G Network (Second Generation)
• Roaming Feature:
• Roaming was introduced, so compatible phones could
connect to different 2G networks across the globe.
• Data Transfer Speed:
• Data transfer speeds were increased to around 64 Kbps,
allowing for basic mobile browsing and email.
• Significance of 2G:
• 2G offered a notable upgrade over 1G in terms of both
security and data functionality, setting the stage for
mobile internet.
3G Network (Third Generation)
• High-Speed Data:
• Launched in the early 2000s, 3G significantly
increased data speeds to around 2 Mbps,
supporting more advanced mobile functions.
• Expanded Connectivity:
• 3G networks allowed users to browse the
internet, stream multimedia content, and
engage in video calls.
• Backward Compatibility:
• Backward compatibility ensured that 3G
could operate alongside 2G networks,
improving global roaming options.
3G Network (Third Generation)
• Increased Security:
• Improved encryption standards made 3G
connections more secure, enhancing data
privacy for users.
• Support for Mobile Apps:
• This generation supported emerging mobile
applications, allowing functionalities like GPS
and online gaming.
• Impact on Mobile Use:
• 3G networks set a new standard for mobile data,
enabling a shift toward smartphones and data-
centric usage.
4G Network (Fourth Generation)
• Legacy of 4G:
• Latest Generation:
• 5G, the latest generation, offers high-speed,
reliable connections with average download
speeds expected to reach 1 Gbps.
• Fast Initial Testing:
• Initial 5G testing has shown speeds up to 1.5
Gbps, making it ideal for data-heavy tasks like
UHD streaming and augmented reality.
• Low Latency Advantage:
• With lower latency than previous generations, 5G
supports real-time applications, such as remote
medical procedures and autonomous vehicles.
5G Network (Fifth Generation)
• Enhanced Device Connectivity:
• Improved network density allows more devices to
connect simultaneously, ideal for IoT
implementations in smart cities.
• Advanced Security:
• 5G networks offer more advanced encryption and
security, adding layers of protection in data
transfer and personal information.
• Future Potential of 5G:
• Though not fully deployed yet, 5G has
transformative potential, enabling new
technologies and industries through faster, more
reliable connectivity.
Advantages of Mobile Networks
• On-the-Move Connectivity:
• Mobile networks allow users to communicate and
access the internet from virtually any location,
supporting the widespread use of smartphones and
other mobile devices.
• Energy Efficiency with Lower Power Transmitters:
• Dividing the network into cells enables the use of
low-power radio transmitters, reducing energy
consumption and costs.
• Efficient Frequency Use:
• Limited radio frequencies can be reused across
non-adjacent cells, maximizing the number of
simultaneous connections.
Advantages of Mobile Networks