You are on page 1of 25

NETWORKING

Definition Of Networking

Networking is the practice of linking two or more computing devices together for the purpose of sharing data and are built with a mix of computer hardware and computer software.

Connecting Below Internet Level


Hub
Center of star topology In Ethernet, multiport repeater or concentrator Hub

Bridge
Connects 2 networks of same technology extended LAN Filters/forwards/floods based on MAC Link layer - frames

Bridge

Switch
Connects 2+ networks packetpacket-switched network Reduces collisions Switch

C I SC O SYS TE M S

C I SC O SYS TE M S

CIS COSY STE MS

Connecting at the Internet Level


Router
Originally gateway Forwards packets based on network layer info (IP) Separate broadcast domains In each domain, IP packet encapsulated in domain-specific domainpacket
CISCOS YS TEMS CISCOS YS TEMS

Router

CISCOS YS TEMS

HARDWARE REQUIREMENTS FOR NETWORKING


Network Card (Ex: LAN Card) CAT 5/6E Optical Fiber Cable RJ 45 Connectors Hub (8-Port or 16-Port) (816Crimping Tools DSL Modem Bridge Router

TYPES OF NETWORKS
LAN LOCAL AREA NETWORK IS A SMALL GEOGRAPHICAL AREA SUCH AS OUR COLLEGE. MAN METROPOLITAN AREA NETWORK IS A NETWORK OVER A LARGER GEOGRAPHICAL AREA SUCH AS A CITY. WAN WIDE AREA NETWORK IS A NETWORK USED OVER AN EXTREMELY LARGE GEOGRAPHICAL AREA SUCH AS ALL THE CONTINENTS.

LAN - Local Area Network


Connects computers that are physically close together ( < 1 mile).
High speed Multi-access Multi-

Technologies:
Ethernet 10 Mbps, 100Mbps Token Ring 16 Mbps FDDI 100 Mbps

Ethernet
Developed in 1976 by Xerox PARC (Palo Alto Research Center) in cooperation with DEC and Intel Is a fast and reliable network solution One of the most widely implemented LAN standards Can support data rates in the range of 10Mbps10Mbps- 10 Gbps Used with a bus or star topology

Token Ring Network


Originally developed by IBM in 1970s Still IBMs primary LAN technology In cases of heavy traffic, the token ring network has higher throughput than ethernet due to the deterministic (non(nonrandom) nature of the medium access Is used in applications in which delay when sending data must be predictable Is a robust network i.e. it is fault tolerant through fault management mechanisms Can support data rates of around 16 Mbps Typically uses twisted pair

FDDI (Fiber Distributed Data Interface)


FDDI is a standard developed by the American National Standards Institute (ANSI) for transmitting data on optical fibers Supports transmission rates of up to 200 Mbps Uses a dual ring First ring used to carry data at 100 Mbps Second ring used for primary backup in case first ring fails If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps Has a range of up to 200 km

Source:http://burks.brighton.ac.uk/burks/pcinfo/hardware/ethernet/fddi.htm

Metropolitan Area Network


A Metropolitan Area Network (MAN) is a network that is utilized across multiple buildings Commonly used in school campuses or large companies with multiple buildings Is larger than a LAN, but smaller than a WAN Is also used to mean the interconnection of several LANs by bridging them together. This sort of network is also referred to as a campus network

Wide Area Network


A Wide Area Network is a network spanning a large geographical area of around several hundred miles to across the globe May be privately owned or leased Also called enterprise networks if they are privately owned by a large company It can be leased through one or several carriers (ISPs(ISPs-Internet Service Providers) such as AT&T, Sprint, Cable and Wireless Can be connected through cable, fiber or satellite Is typically slower and less reliable than a LAN

Example of WAN Application


Sprint Network

LAN
Runs a 100 Mbps LAN

Sprint provisions a connection between the two networks

DC
Runs a 1Gbps LAN

TOPOLOGIES IN NETWORKING
NETWORKS ARE BROKEN INTO VARIOUS TOPOLOGIES. THREE MAIN TOPOLOGIES ARE AS FOLLOWS: yBUS TOPOLOGY ySTAR TOPOLOGY yRING TOPOLOGY

Bus Topology

BUS TOPOLOGY ALLOWS INFORMATION TO BE DIRECTED FROM ONE COMPUTER TO THE OTHER. LOTS OF BINARY COLLISION THOUGH.

Star Topology

STAR TOPOLOGY IS THE MOST COMMON TYPE USED. ALL COMPUTERS ARE ATTACHED TO A HUB. LESS COLLISIONS AND MOST EFFICIENT.

Ring Topology
RING TOPOLOGY- USES A TOKEN TO PASS INFORMATION FROM 1 COMPUTER TO THE OTHER. A TOKEN IS ATTACHED TO THE MESSAGE BY THE SENDER TO IDENTIFY WHICH COMPUTER SHOULD RECEIVE THE MESSAGE. AS THE MESSAGE MOVES AROUND THE RING, EACH COMPUTER EXAMINES THE TOKEN. IF THE COMPUTER IDENTIFIES THE TOKEN AS ITS OWN, THEN IT WILL PROCESS THE INFORMATION.

A DISADVANTAGE OF A TOKEN RING IS IF ONE COMPUTER IS BROKEN OR DOWN, THE MESSAGE CANNOT BE PASSED TO THE OTHER COMPUTERS.

Protocol
Set of rules that allow peering entities to communicate. Example: 2 friends talking on the phone. Peering entities or peers: user application programs, file transfer services, e-mail services, etc. eProtocol layers: reduce design complexity. Main idea: each layer uses the services from lower layer and provide services to upper layer. Higher layer shielded from the implementation details of lower layers. Interface between layers must be clearly defined: services provided to upper layer.

H.R DEPTT.WORKS
CHECKING ,TAKING CARE OF ATTENDANCE &OVER-TIME OF &OVEREMPLOYES SALARY MAINTENANCE EMP.s SAFETY MEASURES

GRATUITY

(Basic*no.of (Basic*no.of years*15)/26 Payment of Gratuity Act, 1972,

RESOURCES
BOOKS : Andrew S. Tanenbaum Uyless Black WEBSITES : http://en.wikipedia.org http://www.cisco.com http://www.networktutorial s.info/

You might also like