Unit Iv

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

CCA104-Introduction to Computers

Unit -IV

UNIT IV
Concept of computer Networking What is Network? A network group of computers connecting together to communicate, exchange information, and share resources in real-time. Application of network Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Email Message broadcast Remote computing Distributed processing (GRID Computing) Advantages of a Network Simultaneous Access Shared Peripheral Devices Personal Communication Easier Data Backup Simultaneous Access use the same data at the same time.

Example : Companys Quarterly Sales Report which needs to be viewed and updated by several

managers. A network server is a central computer with a large storage device and other resources that all

users can share. If a server stores data files for users to access, it is commonly called file server. The business can store a single copy of a data file on the server that employees can access Then, if one user makes a change to the file, other users will see the change, and no one needed to

whenever they want.

figure out who has the latest copy of the data. In an environment where PCs are not networked, a separate copy of each program must be installed on every computer.

This setup can be costly for two reasons: 1.Software can be expensive. 1

CCA104-Introduction to Computers 2.Long time needed for installing and configuring There are two basic solutions to this problem. 1. Site License

Unit -IV

Purchase a site license for an application. Under a site license, a business buys a single copy of an application and then pays the developer

for a license to copy the application onto a specified number of computers. 2. Network Versions

Connect users computers to a central network server and enable users to share a network version In a network version, only one copy of the application is stored on the server, with a minimum When workers need to use a program, they simply load it from the server into the RAM of their

of a program.

number of files to each users PC.

own desktop computers. Shared Peripheral Devices

Networks can allow businesses to reduce expenses and improve efficiency by sharing data and There are two common ways to share a printer. 1.A printer can directly connected to the network 2.A printer can be attached to the print server, which is a computer that manages one or more printer.

common equipment, such as printers, among many different computers.

Personal Communication

E-Mail-E-mail (electronic mail) is the exchange of computer-stored messages by

telecommunication. Teleconference- A teleconference is a telephone meeting Types of Teleconference Videoconferencing Audio-conferencing Data-conferencing Videoconferencing : Videoconferencing enables real-time communication over a distance by allowing people at two or more sites to communicate with each other by seeing a video picture of the people at the other sites.Each site has one or more cameras, microphones, loudspeakers, and monitors Audio-conferencing : Audio conferencing provides an audio link similar to that of conventional telephone, except that it offers much higher quality audio and enables more than two sites to be linked together. 2

CCA104-Introduction to Computers

Unit -IV

Data-conferencing: Data conferencing enables participants at two or more sites to have a shared workspace on their computer desktops.Data conferencing is often used in conjunction with video or audio-conferencing and can be useful when users at different sites want to work together on documents. VoIP (Voice over Internet Protocol): VoIP systems bypass the need for the cost of regular telephone service by using the companys internal network to send and receive phone calls. VoIP transmits the sound of your voice over a computer network using the IP rather than sending the signal over traditional phone wires. Pure VoIP (Interoffice Connection) The destination computer is identified by its IP address or by a name, which the company translates into an IP address. Easier Data Backup In business, data is extremely valuable, so it is important that employees back up their data. One way to assure that data is backed up is to keep it on a shared storage device that employees can access through a network. Often the network managers make regular backups of the data on the shared storage device. Managers can also use special software to backup files stored on employees hard drives from a central location.

Types of Networks Types of Networks


LAN

Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN) Campus Area Network (CAN) Home Area Network (HAN)

A local area network (LAN) is a computer network that connects computers and devices in a

limited geographical area (less than a few KM) . Example : Computers connected in home, school, computer laboratory, office building, closely

positioned group of buildings, or an airport. Cables, infrared links, or wireless media can be used to connect computers in a LAN. Two computers linked together at home are the simplest form of a LAN. Several hundred computers cabled together across several buildings at school form a more

complex LAN. LAN is mainly private 3

CCA104-Introduction to Computers MAN

Unit -IV

A Metropolitan Area Network is a network that interconnects computers in a geographic area

(metropolitan area or campus) larger than that covered by even a large LAN but smaller than the area covered by a wide area network (WAN).

Example :Several branches of a chain store within a city might find a MAN useful. MANs are usually connected with fiber-optic cable, microwave transceivers or leased data

landlines. MANs ownership usually by more than a single organization WAN A wide area network (WAN) is a computer network that covers a broad area.


CAN

A WAN can be used to connects cities, states, regional, or national boundaries . It is often formed by the joining together of LANs using routers in distant places. WAN can be private or public. WANs are usually connected using the Internet, ISDN landlines or satellite. Example :The network connecting the ATM of a bank located in various cities or countries,

Internet.


HAN

A campus area network (CAN) is a computer network interconnecting a few local area networks

(LANs) within a university campus or corporate campus. Campus area network may link a variety of campus buildings including departments, the

university library and student halls of residence. A campus area network is larger than a local area network but smaller than a metropolitan area

network (MAN) or wide area network (WAN). CAN can also stand for corporate area network.

A home network or home area network (HAN) is a residential local area network. A home area network (HAN) is a network contained within a users home that connects a persons

digital devices, from multiple computers and their peripheral devices. Example : printer, telephones, VCRs, DVDs, TVs, video games, home security systems, smart

appliances, fax machines , and other digital devices that are wired into the network.

Network topologies
The term topology refers to the layout of connected devices on a network. Network Topology 4

CCA104-Introduction to Computers

Unit -IV

A network's topology is the layout of the cables and devices that connect the nodes. Packet: The smallest unit of data transmitted over a computer network is called a packet. A message to be transferred over the network is broken up into small packets by the sending Each packet contains the following info: 1.Header - Sender's address, Destination address 2.Payload - Actual data

computer

Example of Packets Network Topologies for LAN


Bus Topology Star Topology Ring Topology Mesh Topology

Bus Topology

Commonly referred to as a linear bus. All the devices on a bus topology are connected by one single cable. A linear bus topology consists of a main run of cable with a terminator at each end

Merits & Demerits of Bus Topology Merits


Bus topologies are relatively easy to install Requires less cabling. Best suited for small networks. Many devices connect to a single cable "backbone". If the backbone is broken, the entire segment The cable length is limited. This limits the number of stations that can be connected. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down 5

Demerits

fails.

CCA104-Introduction to Computers Star Topology


Unit -IV

A star network has a central connection point - like a hub or switch. All nodes are connected to a central hub. All traffic emanates from the hub of the star. The central site is in control of all the nodes attached The central hub is usually a fast, self contained computer and is responsible for routing all traffic

to it.

to other nodes.

Merits & Demerits of Star Topology Merits


Easy to install and wire. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. The network operation depends on the functioning of the central hub. Hence, the failure of the Requires more cable. More expensive than bus topologies because of the cost of the hubs, etc.

Demerits

central hub leads to the failure of the entire network.

Ring Topology

In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction. Nodes are connected in a circular chain, with the conduit beginning and ending at the same

computer.

CCA104-Introduction to Computers Merits & Demerits of Ring Topology Merits


Unit -IV

Less cable required The data being transmitted between two nodes passes through all the intermediate nodes. A central

server is not required for the management of this topology. Demerits


The movement or changes made to network nodes affects the performance of the entire network. Messages propagate in one direction only The network fails if a single node fails The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. Each node has a separate connection to every other node. Also called as Complete network.

Mesh Topology

Merits & Demerits of Mesh Topology Merits

The arrangement of the network nodes is such that it is possible to transmit data from one node to if any cable fails, there are many other ways for two nodes to communicate. Mesh topology uses lots of cables to connect every node with every other node. It is very Transmission media

many other nodes at the same time.

Demerits

expensive to wire up. Divided into two types 1. Wired media 2. Wireless media Wire-Based Media Twisted Pair Cable

Twisted pair consists of two conductors (normally copper), each with its own plastic insulation, 7

twisted together.

CCA104-Introduction to Computers

Unit -IV

Twisted-pair cable comes in two forms: unshielded and shielded The twisting helps to reduce the interference (noise) and crosstalk. Supports transmission speed up to 1Gbps (bits / sec) Coaxial cable has two conductors. One is a single wire in the centre of the cable,and the other is a wire mesh shield that surrounds Supports transmission up to 10 Mbps. More expensive Fiber Optic cable is made of glass or plastic and transmits signals in the form of light. It can carry data at more than a billion of bits per second(100 Gbps).

Coaxial Cable

the first wire, with an insulator between.


Fiber-Optic Cable

Wireless Media Wireless networks use radio, microwave or infrared signals that travel through the air (called ether) or water for transmitting data.

Three ranges of frequencies 26GHz 40GHz --- microwave 30 MHz 1GHz --- broadcast radio 3x10**11 to 2x10**14 Hz --- infrared Network Interface Cards (NICs) Network Linking Devices Hub Bridge switch Router

Network Hardware

Network Interface Cards (NICs) Each node uses a special device, called a Network interface card (NIC). The card connects to the network media and controls the flow of data.

NICs must use a common network technology to

communicate. The most popular network

technologies for LANs are Ethernet, Fast Ethernet, and Token Ring. Network Linking Devices

Hub - A hub is a connection device for networks. Allows multiple segments or computers to Bridge - A bridge is a device that connects two LANs or two segments of the same LAN. 8

connect and share packets of information.

CCA104-Introduction to Computers

Unit -IV

Switches - A switch is a small hardware device that joins multiple computers together within one Router - A router is an electronic device that interconnects two or more computer networks, and - select the best route to transmit the data.

local area network (LAN).

selectively interchanges packets of data between them.

Protocol

A protocol is a set of rules which is used by computers to communicate with each other across a Protocols take the form of software or hardware that must be installed on every computer on the A single LAN may utilize more than one protocol.

network.

network.

Commonly used protocols 1. TCP/IP-Transmission Control Protocol/Internet Protocol


Connection Oriented Protocol Establish a connection between sender and receiver before start transmitting a data Reliable

Connection oriented Communication Connection-Oriented systems can only work in bi-directional communications environments. To negotiate a connection, both sides must be able to communicate with each other. This will not work in a unidirectional environment. Ex. Telephone systems , mobile Systems 2. UDP -User Datagram Protocol

Connectionless Protocol No need to establish a connection between sender and receiver Unreliable data transfer

Connectionless communication Connectionless communication is usually achieved by transmitting information in one direction, from source to destination without checking to see if the destination is still there, or if it is prepared to receive the information.

CCA104-Introduction to Computers

Unit -IV

When there is little interferance, and plenty of speed available, these systems work fine. In environments where there is difficulty transmitting to the destination, information may have to be re-transmitted several times before the complete message is received. Walkie-talkies, or Citizens Band radios are a good examples of connectionless communication. LAN Technology Ethernet What is Ethernet?

Ethernet is the most widely-installed local area network (LAN) technology(IEEE 802.3). Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Ethernet is also used in wireless LANs. Ethernet typically runs at 10 megabytes per second, though newer systems use 100 Mbps, or even

gigabit of transfer. It has several different flavors, with the original Ethernet designed with 10base5. The "10" stands for 10 megabytes per second. Base is the Base band communications it uses. The "5" stands for a maximum distance of 500 meters to communicate with. There are several flavors of Ethernet: 10Base2 (10 Mbps, 200 meters). 10BaseT (10 Mbps, 100 meters, twisted-pair). 100BaseT (100 Mbps, 100 meter, twisted-pair). Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second and is

typically used for LAN backbone systems. Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second. 10-Gigabit Ethernet provides up to 10 billion bits per second.

ETHERNET Protocol CSMA/ CD Ethernet uses a protocol called CSMA/CD, this stands for Carrier Sense, Multiple Access with

Collision Detection. The problem with having a bunch of devices all connected to the same wire is that they may all

want to communicate at once, but only one message at a time can travel across the cable. CS = Carrier sense: Carrier sense is used when a computer wants to transmit over the wire. It

"listens" - and waits until there is no activity on the cable. When it sees its chance, it transmits. MA = Multiple Access: When one Ethernet station transmits, all the stations on the medium hear

the transmission 10

CCA104-Introduction to Computers

Unit -IV

same

CD = Collision Detection: Carrier sense does not guarantee that two devices will not sense the silence and both transmit simultaneously, and cause a 'collision'. Collision Detection detects this event. Each node involved in the collision will wait a random

number of milliseconds, then repeat the transmission attempt. The random waiting time is important:

If two conflicting computers both waited the same amount of time before retransmitting, they

would collide again and again - and again.

When a node wants to communicate to another node, it transmits its packet (also known as a

frame), a short message containing key data such as a destination address to say where the message should go, and a source address saying which node sent it.

The frame travels to every node on the segment. Each node inspects the frame to see if it is

addressed to him. If not, the node ignores it. If the frame is addressed to the node, the node opens the frame and reads its contents. Advantages & Disadvantages of Ethernet Advantages

Upgradeability Simplicity of installation Connectivity to backbone

Disadvantages Doesnt work for voice. If more than 40% of users attempt to transmit, the congestion and random wait time will

dramatically slow down the whole system.

Value Added Network


What is VAN?

A VAN, or Value Added Network refers to a private network provider that leases communication A VAN is an established data communication network that owns or leases communication A value added carrier leases communications facilities from conventional common carriers and

lines to its subscribers.

facilities and computers to manage communication.

use these in conjunction with computers to build a network which offers new types of communications services and tariffs .These are called VAN. Value Added Network

A value-added network (VAN) is a private network provider that is hired by a company to

facilitate electronic data interchange (EDI) or provide other network services. 11

CCA104-Introduction to Computers

Unit -IV

The other network services are extra security, message delivery, or access to a particular database. EDI can be defined as "the exchange of business data from one organization's computer The EDI messages exchanged are typically Orders and Invoices, although there are hundreds of Before the arrival of the World Wide Web, some companies hired value-added networks to move

application to the computer application of a trading partner".

available messages.

data from their company to other companies. With the arrival of the World Wide Web, many companies found it more cost-efficient to move their data over the Internet instead of paying the minimum monthly fees and per-character charges found in typical VAN contracts. Providers now focus on offering EDI translation, encryption, secure e-mail, management reporting, and other extra services for their customers.

The VAN facilities may include microwave antennas and communication satellites. The owners will design and maintain the value added network They then rent the network simultaneously to many subscribers, who link their equipment to the VAN saves the organizations time and cost of designing and maintaining their own networks. Communication networks serve data transmission, voice transmission or both. The primary service of carriers is data transmission with voice a distance second. If Intelligence is added to a communication network, usually in the form of a computer for

facilities.

transmission switching or processing to provide compatibility between devices the network becomes a value added network. VAN Mailbox

Users of a VAN (Value Added Network) can send messages to and retrieve messages from a

mailbox. This is a specialized subscriber service that will hold messages until the subscriber requests them.

12

You might also like