1. Introduction to Networks

UNIT 1 :INTRODUCTION TO
NETWORKS
Network Technologies
Introduction : Networking
• A network is a link between two or more computer to
communicate and share resource
OR
• A network is a set of devices connected by media links or
communication channel.
Data Communication [Analog, Digital]
• A word ‘Data’ refers to facts, concept & instruction
presented in any form Data Communication is exchange
of data between 2 devices via same form of transmission
medium such as a wire cable.
Fundamental characteristics of DC
• 1) Deliver :- system must deliver data to correct
destination.
• 2) Accuracy :- system must deliver data
accurately[correctness].
• 3) Timeliness :- system must deliver data in timely
manner.
Components of Data Communication
1. Message
The message is an information or data to be communicated. It is consist of text,
number, sound or video or any combination of his.
2. Sender
The sender is a device that sends the data message. It can be a computer,
workstation, time for handset, video camera and so on.
3. Receiver
The receiver is a device that receives the data. It can be a computer, workstations,
time for handset, video camera and so on.
4. Medium
The transmission medium is physical path by which a message travels from sender
to receiver. It can consist of twisted pair cable, co-axel cable, laser etc.
5. Protocols
A protocol is a set of rules that controls the data. It represents an agreement
between the communicating devices without a protocol two devices may be connected but not
communicating.
Network Application
• Marketing and Sales
• Financial Services
• Electronic mail
• Directory Services
• Information Services
• Teleconferencing
• Cellular Telephone
• Cable Television
Types of Network
1. LAN (Local Area Network):
• A LAN is introducing to connect the computer in a single office,
campus or building.
• A LAN can be as single as two PC or it can extent throughout
company and include voice, sound and video voice.
• The earliest LAN couldn’t cover a great distance.
• LAN is design to allow resources to be shared and exchange
information between personal computer and workstations.
• LAN has data rates in 4 to 16 mbps rate. Today’s speeds are
increasing and can reach 100 mbps or more than data.
• LAN use single cable to which all machine are attached.
• LAN
2. MAN ( Metropolitan Area Network):
• MAN is basically bigger version of LAN.
• MAN is design to extent over and entire city.
• It may be a signal network such as a cable television
network or it may be connecting a number of LAN into a
larger network. So that, resources may be shared LAN to
LAN.
• For ex. A company can use a MAN to connect the LAN in
all of its office throughout a city.
• A MAN support both data and voice.
MAN
3. WAN ( Wide Area Network ):
• WAN provides long distance transmission of data, voice,
image and video information over large geographical area
that may be a country.
• WAN play an important role in the future development of
corporate networks.
• A WAN is comprised of multiple LAN connected to each
other. So that, user and computer in one location can
communicate with user and computer in other location.
4. WLAN ( Wireless Local Area Network):
• Unlike LAN, in WLAN no wire are used but radio signals
are the medium for communication.
• Wireless network cards are used in this type of network.
• Known as WIFI.
WAN:
5. CAN [Campus Area Network]
• Connecting with multiple LAN but smaller then a MAN.
• This kind of network mostly used in large university or local
offices and buildings.
6. SAN [Storage Area Network]
• SAN technology is use for data storage.
• SAN connect a server to a data storage device by using fiber
channel technology.
7. PAN [Personal Area Network]
• PAN is a computer network used by an individual person.
• A mobile computer or cellular phones are example of personal
area network.
Advantages of network
• File sharing
• Software cost and management
• Security
• Resource Sharing
• Communication
• Flexible access
• Faster Problem Solving
• Security through redundancy
• Collaborative process
Disadvantages Of Network
• If server develops a fault user may not be able to run the
•
•
•
•
•
application programs.
A fault in the network can call user to loss of data.
It is difficult to make the system secure from hacker.
As graphics increases on a network the performance
decreases unless it is design properly.
The larger the network becomes fault to manage.
It would take a long time to install software application on
each computer one at a time.
Network Criteria [width / limit]
• Criteria for network includes three things:
1. Performance, 2. Reliability 3. Security
1. Performance:
• Performance can be measurable in many terms including transmit
time and response time.
• Transmit Time: the amount of time required for a message to travel
from one device to another.
• Response Time: Response time is a time between an inquiry and a
response.
• The performance of a network depends on following number of
factors :
1. Number of Users
2. Type of transmission medium
3. Hardware
4. Software
1. Number of users:
The large number of users can slow the response time in a network.
2. Types Of Transmission media:
The medium define the speed at which data can travel through a
connection. If the medium is good than data transfer faster on the
network.
3. Hardware:
A good hardware is also affect on the network in both speed and
capacity of transformation.
4. Software :
The software is used to process data at the sender, receiver and
intermediate node also affect network performance.
2. Reliability [Dependability]
Frequency of failure:
It may possible to occur failure in network. The strong
network is always perform better and take very less time in
failure.
Recovery time of a network after a failure:
How long does it take to restore service? A network that
recovers quickly is more useful than one that does not.
Natural Calamities:
A network must be protected from natural calamities such
as fire, earth quakes, floods etc.
3. Security
Network security includes
unauthorized access and virus.
protecting
data
from
Unauthorized access:
For a network to be useful, sensitive data must be
protected from unauthorized access. So on the network
only authorize person can access the data which provides
much more security.
Virus:
A good network is protected from virus by hardware and
software design
Clients, Servers and Peers
• Three roles for computer in local area network
Client : client computer means user which use the network
but not provide network resources.
2. Servers : Server computer means server which provide
network resources.
3. Peers : Peers computer is the combination of both client as
well as server.
1.
• Base on the roles of the computers, networks are divided into
three types.
• Server Based Network[also called Client-Server]
• Peer Based Network[also called Peer-to-Peer]
• Hybrid Network
Server Based Network
• Server based networks are servers that provide security
•
•
•
•
and resource to the networks.
A server based network divided processing clients and
servers.
Clients often send a front-end request service, such as file
storage and printing and servers often send a back end
response which delivers them.
Server computers are more powerful then clients
computers.
In this kind of network user’s information is stored
centrally. So that, user only need to log on once.
• Server Based Network
Advantage of Server based Network:
• Strong central security.
• Central file storage, which allows all the users to work from the same,
set of data and provides easy back up of critical data.
• Ability to share expansive equipment[kit] such as laser printers and
mass storage.
• Easy manageability of a large number of user’s.
• Central organization, which keep data from getting lost among
computers.
Disadvantage of Server based Network:
• Expansive dedicated hardware.
• Expansive network operating system, software and client licenses.
Peer Based Network
• Peer networks are those networks where no
•
•
•
•
central
control is available over the network.
There are no server in peer network user simply share
disk space and resource such as printer and faxes.
Because there is no central security, you will have to know
the individual password for each secure shared resource
you wish to access.
Peer networks are organized into workgroups.
When a number of users are accessing resource on a
peer, the user of that peer will decrease performance.
• Peer Based Network
Advantages of peer based network:
• No extra investment in server hardware or software
required.
• Easy setup.
• No network administration required.
• Ability of users to control resource sharing.
• Lower cost for small networks.
Disadvantage of peer based network:
• Additional load on computer because of resource sharing.
• Lack of central organization, which can make data hard to
find.
• Weak security.
Hybrid Network
• Hybrid networks have all three types of computers operating on them.
• This means that while most shared resources are located on servers,
network users still have access to any resources begin shared by
peers.
 Advantage of Hybrid Network
• The advantages of server based networking.
• Many of the advantages of peer based networking.
• Ability of users and network administration to control security based
on the importance of the shared resources.
 Disadvantages of Hybrid Network
• The disadvantages of server based network.
Server Types
• There are many types of server are available.
• Common server types are:
1. File servers
2. Print servers
3. Application servers
4. Massage servers
5. Database servers
• A server in a network which is used to perform specific
task in support of computer on the network.
1. File Servers
• File servers allow networks users to share files.
• File server are the network application that store, retrieve
and move data.
• Users can exchange, read, write and manage shared files
and the data contained[control] in them.
• File servers provides file services like:
a. File transfer
b. File storage and migration[shifting]
c. File update synchronization
d. File archiving[Back up]
A. File Transfer
• Ability to copy and share file across a network.
• When a user transfers a confidential file, they need a
network security.
• Every network operating system has its own level of file
security.
B. File Storage and migration
• Huge amount of data must be storage some where.
• Most storage is made on hard drive.
• Hard drive can be access quickly.
Data Migration:
• The process by which data is moved from online to offline or
near line storage is called Data Migration.
C. File update synchronization
• These services ensuring that user have the latest copy of file.
• File update synchronization service can be managing file by
monitoring the date time stamp on file to determine which file
where save more recently.
D. File Archiving[Backup]
• File archiving is the process of backing up files on offline
storage devices, such as taps or optical disks.
• You can backup all the servers on network onto a single
backup storage.
2. Print Servers
• Print services are network services which control printing and
•
•
•
•
•
•
•
fax machine.
Print server allow users to share printers.
Allow you to place printers where convenient.
Allow users to share network fax services.
Achieve better workstation performance by using high speed
network data transfer.
You can place printers anywhere on a network and anyone
network can use anyone of those printer.
From application you can send a document to a fax queue,
which then takes care of the faxing.
With a fax server, you can receive faxes directly on your
workstation.
3. Application Servers
• Application services allows client PCs to access and use
extra computing power and expansive software
application that located on a shared computer or another
computer.
• Application servers may be dedicated to specific
functions. So that, they can take on common tasks for
clients or they can provide file, print, communication and
database services.
4. Message Servers
• Message servers provide massage services in a variety of
communication method then file server. With file servers
data can pass between users only in file from.
• with message services, data can take the from of
graphics, video or audio as well as text and binary data.
• There are four main types of message service:
• a. Electronic Mail
• b. Workgroup Applications
• c. Object-oriented Applications
• d. Directory services
5. Database Servers
• Data services can provide a network with powerful
database capabilities.
• Database servers provide services including security,
database optimization, data integrity, data distribution and
utilization database management system.
• The database application run on two separate
components:
• i. Client-side Application
• ii. Server-side Application
Network Topology
• The way in which the connections are made is called the
topology of the network.
• A topology means a layout of a network.
• Topology can be either of two types:
1.Physical Topology: Which describe how the cable are
run?
2.Logical Topology: Which describe how network message
travels?
1. Physical Topologies
• Physical topologies describe that how the cables are run.
• Physical topologies affected by several factors are:
1. Official Layout
2. Troubleshooting Techniques
3. Cost of Installation
4. Type of Cable used
Types of physical topologies:
1.
2.
3.
4.
5.
Bus Physical Topology
Star Physical Topology
Ring Physical Topology
Mesh Physical Topology
Hybrid Physical Topology
1. The Bus Physical Topology
• All computers on the networks share a single cable and
this cable is typically co-axial cable.
• The bus physical topology is used when a network is
small, simpler or temporary.
• The Cable runs from computer making each computer a
link of chain.
Advantages of Bus Physical Topology
• The bus is simple.
• Reliable in very small network.
• Easy to setup.
• Easy to understand.
• It is less expansive because it require the list amount of cable to
connect the computer together.
• It is easy to extant the bus.
Disadvantages of Bus Physical Topology
• The biggest problem with bus network is that is it is not terminated
correctly, then your network can not transmit properly.
• The network will not transmit correctly if even one node on a network
not work properly because the system depends on every node.
• If the node is active but will not work properly, then problems will
occur.
• The active node will still attempt to process packets or massage but
will do it incorrectly. That’s way the whole network will collapse[fail].
• Cable breaks also create a problem if the cable is damage at some
point and network may not work.
2. The Star Physical Topology
• In the star topology, every server and workstation plugs into a
central hub that provides connections to all other devices
connected to the hub.
• How a Star Network Works?
• Each computer on a star network communication with a central
hub that resend a massage either to all the computers or only
to the destination computer.
• Each node on the network has its own connection to the central
switching point. That is each connection is independent on all
other connections.
• A break in one workstation cable will not affect another
workstation’s connection.
• Diagram
Advantages of Star Physical Topology
• The network is relatively easy to cable.
• It is easy to modify and add rest of the network.
• Single computer failures do not necessarily bring down
the whole network.
• You can use several cable types in the same network with
the hub.
Disadvantages of Star Physical Topology
• If the central hub fails the whole network fails.
• It is costly.
• Each piece[part] of network is required its own cable to
run.
3. The Ring Physical Topology
• In this type of topology, each node is connected to two other nodes
end create a ring.
• The ring physical topology connects all computers on the network in
loop, running double cable between each node in order to maintain
network.
• Each computers is connected to the next computer with the last
connected to the first.
How a Ring Network works?
• Every computer is connected to the next computers in the
ring and each transmits what it receives from the previous
computer.
• The message flow around the ring in one direction. Since,
each computer retransmit what it receives. A ring is an
active network and is not subject to the single loss
problem.
• There is no termination because there is no end to the
ring.
Advantages of Ring Physical Topology
• Because every computer is given equal access to the
token[permission],
no
one
computer
can
monopolized[control] the network
Disadvantages of Ring Physical Topology
• Failure on one computer, all the ring can affect the whole
network.
• It is difficult to troubleshoot a ring network.
• Adding or removing computer upset the network.
DAS : A computer that is connected to both rings is called
Dual Attachment Station [DAS] and one of the rings is
broken by cable fault, computer switches to the other ring,
providing continued full access to the entire network.
2. Logical Topologies
• Logical or electrical topologies describe the way in which
a network transmits information from one node to the next
node.
Types of logical topologies:
1. The Bus Logical Topology
2. The Ring Logical Topology
3. The Mesh Logical Topology
1. The Bus Logical Topology
• The bus logical topology is broad cast system which means
what one station says all station hear.
How does the Logical Bus Topology works?
• A node on the network has data for another node; the sending
node broadcast the data to the entire network.
• Every node on the network hears it and looks to see it the data
is for them. If so, they keep the data. If not they ignore the data.
• On a bus network every workstation can send out information
in a package called a packet.
• When a station has data to send it first listen to the channel.
• If the channel is busy then station waits until it become ideal.
2. The Ring Logical Topology
• The ring topology is used in token ring and Fiber Distributed
Data Interface [FDDI].
How It Works?:
• Every station must repeat what it hears from the previous
station.
• When a piece of data gets back to the originator, it stops.
• An entire file can’t be transmitted in one packets. So, its pieces
will be transmitted.
Token:
• Token is a special frame which contains bit pattern that is
completely different from any other data flow.
• Token is permission for data transmission.
• The ring logical topology is used token packet.
The Ring Logical Topology
• Diagram:
How dose the token packet move around the network?
• If station has data to send it, keep the token and send a
•
•
•
•
•
data frame.
When a workstation is done with token packet, it releases
it to whatever station is next in line.
If nobody keep it, the workstation is released second time.
If nobody response to the token packet for a second time
then the work station stand out a general query known as
a solicit success or frame.
This frame goes out over the network, asking, “Who is
supposed to get the token ring next?”
If a workstation responds, the sending workstation
addresses the token to that workstation and passes the
token.
3. The Mesh Logical Topology
 Mesh Logical Topology
• The mesh topology connects all devices to each other. It allows
communication to continues in the event of a break in any one
connection.
• While the data is travelling network, it is automatically configuration to
reach the destination by talking the shortest roots.
Advantages of Mesh Physical Topology
• A mesh topology is robust. If one link becomes unusable, it does not
affect the entire system.
• Another advantage is privacy or security. When every massage sent,
travels along the dedicated line only the intended recipients it.
Disadvantages of Mesh Physical Topology
• The Devices must be connected to other devices, installation and
reconfiguration are difficult.
• The hardware require to connect each link (input, output ports and cable)
can be very expansive.
Networks Protocols
• Protocols are set of rules that provides way for computers to
exchange information.
• Networks are full of protocols.
• A computer needs to know exactly how message will arrive from the
network. so it can make sure the message gets to the right price.
Hardware Protocol:
• Hardware protocols define how hardware devices operate and the
work together.
Software Protocol:
• Programs communicates with each other via software protocols.
• Network Client Computers and network server computers have
protocol package that must be loaded to allow them to talk to other
computer.
Wireless Network
• A wireless network enables people to communicate and
•
•
•
•
access applications and information without wires
A wireless network is a computer network that uses wireless
data connections between network nodes.
Wireless networking is a method by which homes,
telecommunications networks and business installations avoid
the costly process of introducing cables into a building, or as a
connection between various equipment locations.
Wireless telecommunications
networks are generally
implemented and administered using radio communication.
Examples of wireless networks include cell phone networks,
wireless local area networks (WLANs), wireless sensor
networks, satellite communication networks.
Ad-hoc Wireless Network
• A wireless ad hoc network, also known as a wireless
mesh network or mobile ad hoc network (MANET), is a
wireless network made up of radio nodes organized in a
mesh topology.
• Each node forwards messages on behalf of the other
nodes and each node performs routing.
• Ad hoc networks can "self-heal", automatically re-routing
around a node that has lost power.
Sensor Wireless Network
• It works on principle that consist sensor which are
distributed thick and adhoc method.
• This sensor works with each other to senses a physical
phenomenal and then information gather to its process to
get relevant result.
• Wireless sensor network consist of protocol and algorithm
with self organizing capabilities.