You are on page 1of 15

Networking Concepts

These days. computers are used at


almost every place such as offices, shops OBJECTIVES
and homes. Computer networks have After having studied this lesson, you
extended the power of a computer beyond will be able to:
the expanse of a room. With the progress
understand the need for computer
in technology. these computer networks networks.
form the core of communication. The
describe the types of computer
Internet is an example of the world wide networks.
network of computers that is growing at a
illustratethe different network
rapid rate. topologies.
define protocols-HTML and TCP/IP.
A computer network consists of two
identify the different types of
OFmore computers that are linked in transmission media used for a computer
order to share resources such as printers, network.
exchange files and allow communication. Bdescribe the use of various network
Let us learn more about computer devices.
networks. state the need for network security

NEED FOR COMPUTER NETWORKS


vital part of any organisation. Some of the
Nowadays computer networks are a

advantages of computer networks are


share such as
Resource Sharing: All computers in a network can resources

printers, fax machines, modems and


scanners.

File Sharing and Remote Database Access: A computer network allows sharing
to remote database. You can easily access
the files stored on
of files and access
networking allows many people to work
various computers on a network. Also,
on the data stored in a database.
Simultaneously
allow people to communicate
Ease of Communication: Computer networks of
facilities. This makes the transmission
through emails and instant messaging
information easier, more efficient and less expensive.

1
TyPES OF COMPUTER NETwORKS
The following are the types of network based the
on geographical area covered or scale
of the network.
Local Area Network (LAN): A LAN is a
computer network that is limited to a
local area such as a laboratory, a school or
an office building.

Personal Area Network (PAN): A PAN is a computer network organised around


a person. It is used for communication between devices such as phones, personal
digital assistants. printers and laptop that are in close proximity. You can use these
networks to transter files, photos, etc., between the various devices.

NTER

LAN

PERASONAL AREA
NETWORK

Fig 1.1 LAN Fig 1.2 PAN

Metropolitan Area Network (MAN): A MAN is a computer network that usually


covers a larger area than a LAN. For example, a network that connects two offices
in a city, a neighbourhood area and so on.

PRINTER

ROUTER
SERVER XSTO
SWITCH

DOO

MAN

PRINTER OFFICE-B

SWITCH SERVER
ROUTER

OFFICE-A
Fig 1.3 MAN

2
Wide Area Network
(WAN): A WAN is a computer network that spans a wide
geographical area. A WAN may be spread across cities, countries and continents. A
WAN 1S tormed by connecting various LANs and MANs. The Internet is considered
to be the largest WAN.

LAN

LAN
WAN LAN

LAN

Fig 1.4 WAN

NETWORK TOPOLOGIES
Topology refers to the layout pattern in which various computers are connected to one
another to form a network. The computers on a network are also referred to as nodes.
There four main types of topologies. They are:
are

Bus Topology: In bus topology, all the computers are connected to a


single
cable called the bus (Fig. 1.5). The transmission of data from any computer travels
through the length of the bus in both the directions and can be received by all other
computers on the network. If the address of a computer is that of the intended
recipient, it accepts the data; otherwise, the data is rejected. The advantage of the
bus topology is that it is quite easy to set up. However, a network cannot function if
there are breaks in the bus.

Node

Bus

Fig 1.5 Bus topology

3
RingTopology: In ring topology,
each Node
computer is connected to two
other computers so as to form a closed
ring-like structure (ie. 1.6). In this
topology, data is transmitted in one
direction only. The disadvantage
of the ring network is that the
breakdown of any one computer on a
ring can disable the entire system or
network.
Star Topology: In star
all the
topology,
computers are connected to a
central computer or a central node
Fig. 1.0. The data to be exchanged
between any two computers Fig 1.6 Ring topology
passes
through the central node. The central
node controls all the activities of Central node
the nodes. More
computers can be
easily added to the network. The
breakdown of computers, except
the central node, does not affect the
Node
functioning of the network. However,
the failure of the central node disables
the communication across the entire
network.
MeshTopology: In mesh topology,
every computer 1s connected to every
other computer on the network. Full Fig 1.7 Star
topology
mesh topology (Fig. 1.8) is very expensive to
topology is implemented in which a computerimplement. Normally, partial mesh
is connected to a few other
inthe network (F'ig. 1.9). computers
Fig 1.8 Full mesh topology
Fig 1.9 Partial mesh topology
4
PROTOCOLS

Protocol 1s a set ot rules used by computers on a computer network to communicate


with each other The computers that follow the same rules or protocols are able to
exchange intormation even if they have different operating systems. Some examples of
protocols a r e :

HTTP (Hyper Text Transfer Protocol): It is a protocol used between a web


server and a web browser for
transferring HTML pages.
TCPAP (Transmission Control Protocol/Internet Protocol): TCP is a protocol
that is used along with the IP to send data over the Internet. The information
is transmitted across the Internet in the form of bundles called packets. TCP
is responsible for dividing the data into packets before they are sent and for
reassembling the packets when they arrive at the destination. IP is a set of
specifications that determines the best route for the packets across the Internet so
that the packets reach their destination address.

TRANSMISSION MEDIA
Computers must be connected to each other to form a network. Computers can be
connected using wires/cables or they can be connected in a wireless manner.

Wired Transmission Media


There are various types of cables that can be used for setting up a network. Some of
them are discussed here.
Twisted Pair Cable: It consists of a pair of insulated wires twisted together. The
use of two wires twisted around each other helps to reduce disturbance noise in the
signals.
The twisted pair cable is often used in two or more pairs, all within a single cable.
Twisted pair cabling comes in two varieties-shielded (Shielded Twisted Pair or
STP) and unshielded (Unshielded Twisted Pair or UTP).UTP cable is the most
commonly used cable in computer networking.

Fig 1.10 Shielded twisted pair cable Fig 1.11 Unshielded twisted pair cable

5
Coaxial Cable (coax): lt is an electrical cable with a conductor at its centre
TTE T ) . The inner conduetor is surrounded by a tubular insulating layer. The
insulating layer is surrounded by a conductive layer called the shield, which is
finally covered with a thin insulating layer on the outside.

Copper wire
Outer plastic sheath
(conductor) Insulator Shield (insulating layer)

Glass core
Fig 1.12 Coaxial wire

Optical Fibre Cable: It consists of a central


glass
core surrounded
by several layers of protective
material (Fig. 1.1:). It transmits
data in the form of Fig 1.13 Optical fibre cable
light rather than electronic signals, thus eliminating
the problem of electrical
interference. Quick Fact
Fibre optie cable is expensive as compared to
Optical fibres use the principle
coaxial and twisted pair cables but can transmit
total internal reflection of
signals over much longer distances. It also has the
light for the propagation of
capability to carry data at a very high speed.
light signals
Wireless Transmission Media
In wireless networks, data is transmitted without wires. Some of the
ways in which
wireless networkS may be set up are as follows:
Infrared: The communication range of the devices
waves is very limited. Infrared waves
communicating through infrared
cannot penetrate walls or other obstructions
and so there should be no physical barrier between the
communication between a TV set and a remote control
communicating devices. The
waves. Infrared mouse and
happens through infrared
keyboard are other examples of devices that make use of
infrared waves for data transmission.
Microwave Transmission: Microwaves are unidirectional.
terrestrial communication (on the surface of the They can be used for
earth) or for satellite communication.
Microwaves propagation is line-of-sight communication.
So, when used for terrestrial
communication, the towers with antennas mounted on them
need to be in direct sight
of each other. The antennas are
usually located at substantial
ground level to extend the range between antennas and to be ableheights
above the
to transmit over
obstacles. You must have noticed high towers with
microwave antennas in your city.
Microwaves can pass through the earth's atmosphere
transmit information between satellites and easily and can be used to
the earth's
base station (ig. 1.14).

6
Microwave tronsmiss on Fig 115 Microwave antenna

Radiowave Transmission: Radio waves


are omn1directional. which means that they
travel in all directions trom the source. so that

the transmitter and receiver do not have to

be caretully ahgned physically. Radio waves


are easy to generate, can travel long distances
and penetrate through buildings easily. So
are widely used for communication both
they
indoors and outdoors (Fig 1 16). However.
at all radio waves are subject to
frequencies.
interference from motors and other electrical

equipment.
Bluetooth and Wi-Fi are both wireless
technologies that use radio trequency waves to

create networks.

Fig 1 l6 Radiowave antenna


Bluetooth technology is used for exchanging
data over short distances using
radio w a v e s . This
power, has a
low short range (30 feet
technology uses

speed. Bluetooth
approx.) and medium transmission
be used to transfer songs or pictures
technology can

phones Bluetooth headset can


between two mobile or a

be used with a mobile phone.


Wi-Fi technology also makes use of radio waves
Fig 1.17 Bluetooth technology
to transmit and receive data. This technology
to go farther
requires energy but enables the signal
more
transmission.
(300 feetapprox.) with a faster rate of
This technology is used to set up networks in
which a
the data into a
computer's wireless adapter translates
radio signal and transmits it. A wireless router receives
the signal, decodes it and sends it to the Internet using a

wired connection.

Fig 1.18 Wi-Fi technology


NETWORK DEVICES
Various devices are used for setting up a computer network. Let us discuss a few
devices that play a crucial role in a computer network.

NIC (Network Interface Card): It is a hardware


device that is attached to a computer to enable it to
communicate over the network (Fig. 1.19). The NIC
has a ROM chip that contains a unique number,
which is the hardware address or the Media Access
Control (MAC) address. This hardware address
uniquely identifies a computer on the network.
Modem (short for modulator-demodulator);: It is Fig 1.19 Network Interface Card
an electronic device that converts the digital signals of a computer into an analog
form so that they can travelover a telephone line (Fig. 1.20). Atthe destination, the
receiving modem converts the analog signals back into their digital form so that the
destination computer understands them.

ANALOG SIGNAL
DIGITAL SIGNAL DIGITAL SIGNAL

COMPUTER MODEM MODEM COMPUTER


TELEPHONE
LINE

Fig 1.20 Transmission of signals through modem

8
Modems are used for connecting computers to the Internet. Modems are connected to
a computer and a telephone line (Fig. 1.22).

Phone Line Wall Jack Computer


Modem
Phone Line
Splitter
Internet
Cable

Phone
Fig 1.21 Modem Fig 1.22 Connection of modem

Hub: A hub is a device that is used to connect computers in a network (Fig. 1.2).
In a hub, when one computer sends data on the network, the hub simply forwards
the packets to all the other computers connected to it (Fig. 1.24). Each computer is
responsible for determining which packets are destined for it and which are to be
ignored.
Dual Speed Hub
10/100 Mbps

Fig 1.23 Hub Fig 1.24 Networking using a hub

Switch: A switch is a device that is also used to connect


computers in a network (Fig. 1.25). However, a switch is a more
intelligent device than a hub. Unlike a hub, the switch sends
the incoming data to the desired destination only. It records
the addresses of all the computers connected to it. So, when a Fig 1.25 Switch
packet is received, the switch reads the information about the destination address
to determine if the destination device is connected to it or not. If the destination
deviee is connected, the switch forwards the packet only to that destination device.
In this way, the other computers do not have to read and deal with data that is not
meant for them.

9
QUTA QUESTION
1. Fill in the blanks.
() A network that is imited to a small geographical area such as a laboratoru i
nown as a
(b) The Internet is an example of
(e) Central node dependency problem arises in networks with
topology
(d) A device that can convert digital signals into analog torm and vIce versa is knou
nown
(e) Adevice that is used to connect computers in a network is called
( A transmission medium that transmits data in the form of light signals is referu.
to as red
(gThe data is transmitted across the Internet in the form oflittle bundles are
lled
NETWORK SECURITY
A computer on a network can be accessed
by many users. Security measures have ta ho
taken to protect networks from unauthorised access and to prevent data or
information
theft.
Threats to Computers
Files can be shared between the computers on a network. This makes a
computer
vulnerable to attacks by viruses, worms, Trojan horses, etc., that can
easily spread
because of the underlying network. Let us discuss some of the common threats
to
computers.
Virus: A computer virus spreads itself from one computer to another and
interferes
with the normal operations of a computer. Viruses attach themselves to
any type
of file and spread when these infected files are copied to other
computers. People
unknowingly spread a computer virus by sharing infected files or sending e-mails
with viruses as attachments.
Worm: A worm is a computer program that uses
computer networks to send copies
of itself to other computers on a network. A virus
requires human action such as
transferring of an infected file to spread itself. A worm can spread without any
human action too. It replicates itself without the
knowledge of the user. Worms
can cause severe harm to a computer network such as
blocking
the and
network
reducing the speed of the network.
Trojan Horse: A computer program that appears to be a useful software but
actually causes damage once installed or executed on your computer system
is known Trojan horse or a Trojan. After getting installed, it allows
as a
10
unauthorised access to the computer. Trojan horses are very dangerous as they
allow your computer to be remotely controlled by someone else and can cause loss ol
personal and confidential information (Fg 1 2).
E-l
Fig 126 People can install Trojans onto your computer or send it via
e-mail attachments.
Viruses, worms and Trojan horses may harm the data or affect the performance and
the speed of a computer.
Data Theft: It is a very serious problem for
computer networks. People break into computer Quick Fact
networks to either disrupt their functioning or to Malware (malicious software)
steal confidential information. Hackers are the is a term used to describe all
computer experts who can break into computer types of unwanted software
systems and networks. There are two types of such as computer viruses
hackers-white hackers and black hackers. worms, Trojan horses and
spyware.
White hackers study and break into networks
to find and fix security loopholes. They offer their
services to corporations, public organisations and educational institutions to make
their networks more secure.
Black hackers or crackers have a criminal intention. Some examples are
cracking bank accounts in order to transfer money to their own accounts, stealing
confidential information and attacking the computer network of an organisation for
money.
LComputer Security
Antivirus Software: Every computer on a computer network must have an
antivirus software installed in it and it should be updated on a regular basis.
Antivirus software can be used to protect the computer from various types of
malware. Antivirus software can detect viruses, worms, etc., and warn you of their
presence in your computer. lt can als0 deactivate and clean up the computer of
malicious software.
11
There are various types of antivirus software such as AVG, Avira, Norton and
McAfee (Fe 127).
Ar
AVG
McAfee
AVIRA
Fig 127 Logos of some antivirus software
Firewall: A firewall is used to prevent unauthorised access to a
computer
network. A firewall can be implemented as a software, a hardware or a
of both. All data or messages combination
entering or leaving a computer network pass through
a firewall
(Fig 128).
A firewall examines each message and blocks those
that do not
meet the specified security criteria.
nternet
Undesirable
data
Firewall
Fig 1.28 Firewall (visual representation)
Recap Time
A computer network consists of two or more
computers that are linked
in order to share resources, such as printers, to exchange files and to allow
electronic communication.
Based on the geographical area covered, computer networks be
PAN, LAN, MAN and WAN.
can of four types
Topology refers to the layout pattern in which various computers are connected to one
another to form a network. For example, bus, star, ring and mesh are various types of
topologies being used to form networks.
12
a Protocol is a set of rules used by computers on the network to communicate with each
other.
Cables such as twisted pair, coaxial and fibre optic cables are examples of wired
network transmission media.
eRadio waves, microwaves and infrared waves are examples of wireless network
transmission media.
aBluetooth and Wi-Fi technologies make use of radio waves.
A Network Interface Card is a hardware device that stores the hardware address ofa
computer and enables it to communicate over the network.
a Modemis an electronic device that converts the digital signals of a computer into an
analog form and vice versa, so that the signals can travel over a telephone line.
Switch and hub are devices that connect computers in a network.
Hackers are the computer experts who break into computer systems and networks.
A computer virus is a computer program that can spread itself from one computer to
another and interferes with the normal operations of a computer.
A worm is a computer program that uses computer networks to send copies of itself to
other computers on the network.
A Trojan horse is a computer program that appears to be a useful software but actually
causes damage once installed or run on a computer.
An antivirus software can be used to protect the computer from different types of
malware such as viruses and worms. Some of the antivirus software are AVG, Avira,
Norton and McAfee.
A firewall is used to prevent unauthorised access to a computer network.
ANSWERS TO QUICK QUESTION
1. (a) LAN or Local Area Network (b) WAN or Wide Area Network
(c) Star (d) Modem
(e) Hub or Switch ( Optical fibre
g)Packets
13
Assessment Time
1Choose the correct answer.
(a)What is the importance of a computer network?
(i) It allows sharing of resources.
(i) It is an effective communication medium.
(iii) It lets users share files.
iv) All of the above.
(b) A network that
spans countries and continents is known as
) LAN. (i) MAN.
(i) WAN. (iv) PAN.
(c) A device used to
connect computers in a network is referred t0 as
(i) a firewall. i) CPU.
(iii) HTTTP. iv) a switch.
(d) A
topology in which every
computer is connected to every other computer is called
(1) ring topology. (ii) mesh topology.
(i) star topology. (iv) bus topology.
(e) It transmits data in the form of light rather than electronic
(i) Coaxial cable signals.
(i) Bluetooth
(ii) Optical fibre cable (iv) Twisted pair cable
() A computer network
organised around a person for communication between
such as phones and
personal devices
digital assistants is called
() PAN. i) LAN.
ii) MAN. (iv) WAN.
Fill in the blanks using the words given in the box.
MAN TCP/IP
Topology
Ring Bluetooth Firewall Infrared
Wi-Fi
Modulator-demodulator Protocol
(a) refers to the layout
connected to each other in
pattern in which the
computers are
network.
a
b) A. is formed when the computers
neighbourhood area.
are connected in a
(c) A. is used to prevent unauthorised access to a network.
(d) Modem stands for.
(e) is a set of rules used by
communicate with each other. computers on the network to
() and
waves. technologies make use of radio
waves are used for communication between a TV
remote control. set and its
14
the
(h) protocol is used to send data in the form of packets on
Internet.
() In. topology. each computer is connected to two other
computers so as to form a closed structure and the breakdown of any one computer
can disable the entire system.
Answer the following questions.
3 (a) Define the term 'computer network. What are its advantages
(b) State the types of computer networks based on the geographical area covered by
them.
(c) Write a note on twisted pair and coaxial cables.
(d) Give the advantages of optical fibre cables.
(e) What is a bus topology?
How is a hub different from a switch?
(g) Discuss some common threats to network security.
h) What is a firewall?
i) How is microwave transmission different from radiowave transmission
Activity Time
information about
1 Study the computer network used in your school computer lab and find
the following:
(a) the cable used for setting up the network
(b) the topology of the network
(c) the hub or the switch used in the network
eFind out the names oftwo companies that manufacture switches and modems.
A company has two offices in adjacent buildings. The computers in the two offices need to
be connected to one another for a very high speed connectivity
(a)What cable should be used to connect the computers in these two of+ices?
b) What type of network is formed when the computers in the two offices are connected
to form a network?
Teacher's Notes
E The teacher can discuss the evolution of networks with the students.
The teachercan show the transmission cables and other network devices being used in the
computer lab.
15

You might also like