You are on page 1of 16

BTEC HND in Computing Networking

SUBMITTED BY
FULL NAME:
COURSE:
SEMESTER:
SECTION:
YEAR OF ENROLLMENT:

SUBMITTED TO:
Teacher’s Full name:

1|Page
BTEC HND in Computing Networking

Contents
Computer Network:.........................................................................................................................4
Personal Area Network:...............................................................................................................4
Characteristic Of PAN:............................................................................................................4
Advantage Of PAN:.................................................................................................................4
Disadvantage Of PAN:............................................................................................................4
Local Area Network:...................................................................................................................5
Characteristics of LAN:...........................................................................................................5
Advantages of LAN:................................................................................................................5
Disadvantages of LAN:...........................................................................................................5
Wide Area Network:....................................................................................................................5
Characteristics of WAN:..........................................................................................................6
Advantages of WAN:..............................................................................................................6
Disadvantage Of WAN:...........................................................................................................6
Metropolitan Area Network:........................................................................................................6
Characteristics of MAN:..........................................................................................................6
Advantages of MAN:...............................................................................................................6
Disadvantages of MAN:..........................................................................................................6
Network Topology:..........................................................................................................................7
Bus Topology:.............................................................................................................................7
Advantage:...............................................................................................................................7
Disadvantage:..........................................................................................................................7
Ring Topology:............................................................................................................................7
Advantage:...............................................................................................................................7
Disadvantage:..........................................................................................................................8
Star Topology:.............................................................................................................................8
Advantage:...............................................................................................................................8
Disadvantage:..........................................................................................................................8
Tree Topology:............................................................................................................................8
Advantage:...............................................................................................................................8
Disadvantage:..........................................................................................................................8
Mesh Topology:...........................................................................................................................9

2|Page
BTEC HND in Computing Networking

Advantage:...............................................................................................................................9
Disadvantage:..........................................................................................................................9
Hybrid Topology:........................................................................................................................9
Advantage:...............................................................................................................................9
Disadvantage:..........................................................................................................................9
OSI model:.......................................................................................................................................9
Advantage:.................................................................................................................................10
Disadvantage:............................................................................................................................10
IEEE 802.x:....................................................................................................................................11
TCP/IP:..........................................................................................................................................11
Networking Device:.......................................................................................................................12
Modem:......................................................................................................................................12
Router:.......................................................................................................................................12
Switch:.......................................................................................................................................12
Network Interface Controller (NIC):.........................................................................................13
Hubs:..........................................................................................................................................13

3|Page
BTEC HND in Computing Networking

Computer Network:
A Computer Network may be a bunch of two or more interconnected
computer frameworks that utilize common association protocols for sharing different assets and
records. You'll be able to set up a computer organize association utilizing either cable or remote
media. Each arrangement includes equipment and a computer program that interfaces computers
and apparatuses. These are the types of a computer networks:

Personal Area Network:


PAN (Personal Area Network) may be a computer network shaped
around an individual. It for the most part comprises of a computer, portable, or individual
advanced collaborator. PAN can be utilized for setting up communication among these
individual gadgets for interfacing with a computerized organization and the web.
Characteristic Of PAN:
1) It is generally individual gadgets organize prepared inside a constrained area.
2) Allows you to handle the interconnection of IT gadgets within the encompassing of a
single user.
3) PAN incorporates portable gadgets, tablets, and laptops.
4) It can be wirelessly associated with the web called WPAN.
5) Appliances utilize for PAN: cordless mice, keyboards, and Bluetooth frameworks.
Advantage Of PAN:
1) PAN networks are moderately secure and safe.
2) It offers as it were short-range arrangements up to ten meters.
3) Strictly limited to a little area.
Disadvantage Of PAN:
1) It may set up a terrible connection to other systems at the same radio bands.
2) Distance limits.

4|Page
BTEC HND in Computing Networking

Local Area Network:


A Local Area Network (LAN) could be a gathering of computer and fringe
gadgets that are associated in a restricted zone such as school, laboratory, home, and office
building. It could be a widely valuable network for sharing assets like files, printers, diversions,
and other applications. The only sort of LAN network is to associate computers and a printer in
someone's domestic or office. In common, LAN will be used as one sort of transmission
medium. It could be a network that comprises less than 5000 interconnected gadgets over a few
buildings.
Characteristics of LAN:
1) It may be a private network, so an exterior administrative body never controls it.
2) LAN works at a moderately higher speed compared to other WAN systems.
3) There are different sorts of media get-to-control strategies like token ring and ethernet.
Advantages of LAN:
1) Computer assets like hard disks, DVD-ROM, and printers can share nearby range
systems.
2) This essentially decreases the taken a toll of equipment purchases.
3) You can utilize the same computer program over the network rather than obtaining the
authorized software for each client within the network.
4) Data of all organized clients can be put away on a single difficult disk of the server
computer.
5) You can effectively exchange information and messages over networked computers.
6) It will be simple to oversee information as it were one put, which makes information
more secure.
7) Local Area Network offers the office to share a single web association among all the
LAN clients.
Disadvantages of LAN:
1) LAN will without a doubt spare cost since of shared computer assets, but the introductory
cost of introducing Local Area Networks is very high.
2) The LAN admin can check the individual information records of each LAN client, so it
does not offer great privacy.
3) Unauthorized clients can get to the basic information of an organization in case LAN
admin isn't able to secure a centralized information repository.
4) Local Range Arrange requires a steady LAN organization as there are issues related to
program setup and equipment disappointments.
Wide Area Network:
WAN (Wide Area Network) is another imperative computer network that's
spread over an expansive geological region. A WAN network framework may be an association
of LAN that interfaces with other LANs utilizing phone lines and radio waves. It is for the most
part constrained to an endeavor or an organization.

5|Page
BTEC HND in Computing Networking

Characteristics of WAN:
1) The computer program records will be shared among all the clients; subsequently, all can
get to the most recent files.
2) Any organization can shape its worldwide coordinates organize utilizing WAN.
Advantages of WAN:
1) WAN makes a difference for you to cover a bigger topographical zone. Hence commerce
workplaces arranged at longer separations can effectively communicate.
2) Contains gadgets like versatile phones, tablets, computers, gaming supports, etc.
3) WAN associations work utilizing radio transmitters and collectors built into client
gadgets.
Disadvantage Of WAN:
1) The beginning setup cost of speculation is exceptionally high.
2) It is troublesome to preserve the WAN arrangement. You would like gifted specialists
and organize administrators.
3) There are more mistakes and issues since of the wide scope and the utilize of diverse
technologies.
4) It requires more time to resolve issues since the inclusion of numerous wired and remote
technologies.
5) Offers lower security compared to other sorts of systems in computers.
Metropolitan Area Network:
A Metropolitan Area Network or MAN is comprising of a
computer arrange over a complete city, college campus, or a little locale. This sort of network is
huge than a LAN, which is generally constrained to a single building or location. Depending
upon the sort of setup, this sort of network permits you to cover a region from a few miles to tens
of miles.
Characteristics of MAN:
1) It generally covers towns and cities in a most extreme 50 km range
2) Mostly utilized medium is optical strands, cables
3) Data rates are satisfactory for conveyed computing applications.
Advantages of MAN:
1) It offers quick communication utilizing high-speed carriers, like fiber optic cables.
2) It gives great back for a broad estimate arrange and more prominent get to WANs.
3) The double transport within the MAN organize gives back to transmit information in both
headings concurrently.
4) A MAN organizes for the most part incorporates a few ranges of a city or a whole city.
Disadvantages of MAN:
1) You would like more cable to set up MAN connection from one put to another.
2) In MAN arrange it is intense to create the framework secure from hackers

6|Page
BTEC HND in Computing Networking

Network Topology:
Network topology is the depiction of the course of action of hubs (e.g.
organizing switches and switches) and associations in a arrange, frequently spoken to as a graph.
No matter how indistinguishable two organizations are, no two systems are precisely alike. Be
that as it may, numerous organizations are depending on well-established organize topology
models. Network topologies diagram how gadgets are associated together and how information
is transmitted from one hub to another.
Types of Network Topology are:
Bus Topology:
Bus topology could be a network sort where each gadget is associated with a
single cable that runs from one conclusion of the network to the other. This sort of network
topology is frequently alluded to as line topology. In a bus topology, information is transmitted
in one heading as it were. In case the transport topology has two endpoints at that point it is
alluded to as a linear bus topology.
Advantage:
1) Easy installation
2) Fewer cables required than Mesh and star topology
3) Good for small businesses
4) Low cost
5) Easy to manage and expand
Disadvantage:
1) Backbone performance is critical
2) Easily congested on busy periods
3) Efficiency decreases rapidly with each added node
4) Data can only travel in one direction at any point in time
Ring Topology:
In networks with ring topology, computers are associated with each other in a
circular organization. Each gadget within the network will have two neighbors and no more or no
less. Ring topologies were commonly utilized within the past but you'd be hard-pressed to
discover an undertaking still utilizing them nowadays.
Advantage:
1) Low incidence of collision
2) Low cost Suitable for small businesses

7|Page
BTEC HND in Computing Networking

3) Dual ring option provides continuity through redundancy


Disadvantage:
1) One faulty node will bring the entire network down
2) Requires extensive preventative maintenance and monitoring
3) Performance declines rapidly with each additional node
4) Reorganizing the network requires a full system shutdown
Star Topology:
A star topology could be a topology where each hub within the network is
associated with one central switch. Each gadget within the network is specifically associated
with the switch and in a roundabout way associated with every other hub. The relationship
between these components is that the central network center may be a server and other gadgets
are treated as clients.
Advantage:
1) Easy to manage from one point – the switch
2) Easy to add and remove nodes
3) Durable Low cable usage
4) Good for small businesses
Disadvantage:
1) Requires specialist network hardware (the switch)
2) Makes the network reliant on the switch’s performance
3) A finite number of switch ports limits the network’s size

Tree Topology:
A tree topology network could be a structure that's formed like a tree with its
numerous branches. Tree topologies have a root hub that's associated with another hub pecking
order. The progression is parent-child where there's as it was one common association between
two associated hubs.
Advantage:
1) Blends bus and star topologies
2) Easy to manage
3) Easy to expand
4) Suitable for middle-sized businesses
Disadvantage:
1) The network is dependent on the health of the root node
2) Requires networking expertise
3) Involves a lot of cable
4) Larger implementations require monitoring software
5) Can get expensive

8|Page
BTEC HND in Computing Networking

Mesh Topology:
A mesh topology may be a point-to-point association where hubs are
interconnected. In this shape of topology, information is transmitted by means of two strategies:
routing and flooding. Routing is where hubs utilize directing rationale to work out the briefest
remove to the packet’s goal. In differentiate, flooding is where information is sent to all hubs
inside the arrange. Flooding doesn’t require any frame of directing rationale to work.
Advantage:
1) High speeds data transfers
2) Durable network that isn’t dependent on any one node
3) Very secure
4) Suitable for high-value networks for small to middle-sized networks
5) Easy to identify faulty equipment
Disadvantage:
1) Requires a very large amount of cable
2) Can be difficult to secrete all the cable
3) Takes a long time to set up
4) Requires meticulous planning
5) There is a limit to the number of cables each computer can accommodate
Hybrid Topology:
When a topology is composed of two or more diverse topologies it is alluded
to as a hybrid topology. Hybrid topologies are most commonly experienced in bigger endeavors
where personal offices have to arrange topologies that are distinctive from another topology
within the organization.
Advantage:
1) Very flexible Suitable for middle-sized and large organizations
2) Infinitely extendible
3) Adaptable to optimize equipment use
Disadvantage:
1) Requires professional management
2) Needs monitoring software
3) Equipment costs are high

OSI model:
The Open Systems Interconnection reference show, or OSI show, could be a
arrange demonstration created in 1983 by the organization of the worldwide guidelines. The OSI
show is part into 7 layers with each layer being assigned a distinctive angle of the show to
require care of. The following are the 7 layers of the OSI model:
1) Physical Layer:

9|Page
BTEC HND in Computing Networking

Usually the physical transmission of data between the two hubs through
anything association sort they might utilize e.g. Ethernet.
2) Data Link Layer:
This is often the information connect layer and it takes the crude bits that
have been exchanged through the physical layer, dealing with any errors along the way,
and changes over them into an information outline that can at that point be utilized by
another layer (arrange layer).
3) Network Layer:
Typically, the network layer and controls how an information parcel
works when being transmitted. E.G. the route it takes.
4) Transport Layer – This can be the transport layer and it takes information from the layer
over (the session layer) and parts it down into littler information bundles that can be
exchanged along with the arrange layer. At the other conclusion, it moreover guarantees
that all those smaller data parcels arrived correctly.
5) Session Layer:
Usually the session layer and handles the communications between the
machines, initializing, managing, and afterward ending any communications or trades
between the two endpoints.
6) Presentation Layer:
This is often the introduction layer and it takes care of the way
everything being transmitted is displayed.
7) Application Layer:
Usually the application layer. It is the most elevated / beat level layer
and it contains all the diverse conventions required by the distinctive application
administrations it gives.

Advantage:

1) It may be a non-specific model and acts as a guidance tool to create any arrange
model.
2) It may be a layered show.
3) Changes are one layer don't influence other layers, given that the interfacing
between the layers doesn't alter drastically.
4) It particularly isolates administrations, interfacing, and conventions.
5) Consequently, it is adaptable in nature.
6) Conventions in each layer can be supplanted exceptionally helpfully depending
upon the nature of the network.
7) It bolsters both connection-oriented administrations and connectionless services.
Disadvantage:

10 | P a g e
BTEC HND in Computing Networking

1) It is simply a hypothetical model that does not consider the accessibility of


fitting innovation. This limits its viable implementation.
2) The propelling timing of this model was improper. When OSI showed up, the
TCP/IP conventions were as of now actualized. So, the companies were at
first hesitant to utilize it.
3) The OSI model is exceptionally complex. The beginning execution was
awkward, moderate, and costly.
4) Though there are numerous layers, a few of the layers just like the session
layer and introduction layer have exceptionally little functionality when for all
intents and purposes deployed.
5) There could be a duplication of administrations in different layers.
Administrations like tending to, stream control, and mistake control are
advertised by different layers.

IEEE 802.x:
The IEEE, moreover known as the Institute of Electrical and Electronics
Engineers, created the IEEE 802 guidelines which bargain only with the primary two layers of
the OSI demonstrate. (Physical and data link) The IEEE 802 benchmarks part the information
connect layer of the OSI model into two sub-layers. These are the LLC or Logical Link Control
sublayer and the MAC or Medium Access Control sublayer. The physical layer bargains as it
were with the physical arrange interface controller, each of which has its claim one of a kind
MAC address.

TCP/IP:
It may be a set of network conventions that empower information to be transmitted
through the web, permitting conclusion to conclusion communication. TCP/IP has gotten to be
the standard of the web and is presently the foremost broadly utilized organize protocol. There
are 4 layers within the TCP/IP model and these are:
1) Network Interface Layer – Moreover known as the physical layer, this bargains with
conventions that work as it were on a link.
2) Internet Layer – Also alluded to as the network layer, this layer bargains with the
information packets conjointly interfaces systems so that the packets can pass over
organize boundaries.
3) Host to Host Layer – Moreover alluded to as the transport layer, this layer keeps up the
conclusion to conclusion connection.
4) Application Layer – This layer bargains with the conventions that work straightforwardly
with the applications.

11 | P a g e
BTEC HND in Computing Networking

TCP/IP bargains with all 7 layers of the OSI show in fair 4 of its claim layers.

Networking Device:
Hardware gadgets that are utilized to associate computers, printers,
fax machines, and other electronic gadgets to a network are called network devices. These
gadgets exchange information in a quick, secure, and rectify way over same or diverse networks.
Network devices may be inter-network or intra-network. A few gadgets are introduced on the
gadget, like NIC card or RJ45 connector, while a few are a portion of the arrange, like a router,
switch, etc. Let us investigate a few of these gadgets in more prominent detail.

Modem:
The modem may be a gadget that empowers a computer to send or get information over
the phone or cable lines. The information stored on the computer is advanced while a phone line
or cable wire can transmit as it were analog data. The primary work of the modem is to change
over the computerized signals into analog and vice versa. The modem may be a combination of
two gadgets − modulator and demodulator. The modulator changes over digital information into
analog information when the information is being sent by the computer. The demodulator
changes over analog information signals into advanced information when it is being gotten by
the computer.
Router:
A router may be a network layer equipment gadget that transmits information from one
LAN to another on the off chance that both systems back the same set of protocols. So, a router
is regularly associated with at slightest two LANs and the web service provider (ISP). It gets its
information within the frame of parcels, which are information outlines with their destination
address included. The router also strengthens the signals sometimes recently transmitting them.
That's why it is additionally called a repeater.
Switch:
The switch may be a network gadget that interfaces other gadgets to Ethernet systems
through turned pair cables. It employs a parcel exchanging procedure to get, store and forward
information parcels on the arrange. The switch keeps up a list of network addresses of all the
gadgets associated with it. On getting a packet, it checks the goal address and transmits the
bundle to the proper port. Sometimes recently sending, the packets are checked for collision and
other network errors. The information is transmitted in full-duplex mode.

12 | P a g e
BTEC HND in Computing Networking

Network Interface Controller (NIC):


The Network Interface Card or Network Interface
Controller (NIC) card plays an imperative part within the function of your computer because it is
the network connector. Your web association comes through the NIC card as does all other
arranges network. The NIC card could be a sort of PCI development card because it is stopped
into the motherboard’s PCI port.
Hubs:
A hub could be a gadget to which all gadgets sharing a physical network can be physically
associated to create a “Local Area Network” or “LAN”. Hubs do small more than empower the
electrical streams from a computer sending a parcel to pass to all other gadgets associated with it.
Since a center was the electronic proportionate of yelling in a room as essential, as the number of
gadgets expanded, the number of collisions expanded and LAN execution ground to a stop. In a
hub-centric environment, the message bundles being sent by each gadget that's associated with
the hub can be “seen” by each other gadget on the hub whether they are included within the
discussion or not. So, hubs can encourage message listening.
Bridge:
A network bridge gadget is fundamentally utilized in local area networks since they can
possibly surge and clog a huge network much obliged to their capacity to broadcast information
to all the nodes in case they don’t know the goal node’s MAC address. A bridge could be a sort
of computer arrange gadget that gives interconnection with other bridge networks that utilize the
same protocol. Bridge gadgets work at the information interface layer of the Open System
Interconnect (OSI) model, interfacing two diverse systems together and giving communication
between them.
Gateway:
Gateways ordinarily work at the Transport and Session layers of the OSI model. At the
Transport layer and over, there are various conventions and measures from diverse merchants;
gateways are utilized to bargain with them. Gateways give interpretation between networking
advances such as Open System Interconnection (OSI) and Transmission Control
Protocol/Internet Convention (TCP/IP). Since of this, gateways interface two or more
independent systems, each with it possess steering calculations, conventions, topology, space
title benefit, and network organization methods and approaches.
Access Points:
Whereas an access point (AP) can in fact include either a wired or remote
association, it commonly implies a remote gadget. An AP works at the moment OSI layer, the
Data Link layer, and it can work either as a bridge interfacing a standard wired arrange to remote
gadgets or as a switch passing information transmissions from one get to point to another.

13 | P a g e
BTEC HND in Computing Networking

Server:
Servers are large data storage and processing devices that exist either as hardware or as
virtual storehouses located on the web. Computers or software systems act as servers that hook
up with a network. A server may be any form of device that shares and saves information.
Servers can both store and process information within their own system or request it from
another. Servers began as small devices that simply transferred data to a more functional
computer then grew in size and talent to perform more complex functions. Now, virtual servers
exist within cloud computing platforms that are housed on the web.
Types of server:
Web Server:
An open-source web server is employed for accessing the globe wide web through
property right software. These servers connect stored information from an online website to your
own computer. Web servers store information for the net that's retrieved via "HTTP" code and
sent to your application. this can be one in all the foremost widely used sorts of servers.
Proxy Server:
Proxy servers act as a bridge between a host server and a client-server. A proxy
sends data from a web site to your computer IP address after it passes through the proxy's server.
This practice adds a layer of security since the knowledge is requested then transferred from the
source to the proxy server and never directly from a client to a different user. A proxy server can
filter various harmful internet entities.
Virtual Machine:
As their name suggests, virtual machines store and connect data strictly
through virtual space. to form a virtual machine, IT teams use a hypervisor, also referred to as a
virtual machine monitor (VMM), which is software which will run thousands of virtual machines
through only 1 piece of physical hardware. This method of server virtualization is widely used
for data transfer and storage because they're the foremost cost-effective sort of server to run.
File transfer protocol (FTP) server
FTP servers are accustomed relocate files from one computer
to a different. Uploaded files move from your computer to the server while downloaded files are
extracted from the server onto your device. File transfer protocol also refers to the tactic of
employing a server to attach one computer to a different so as to share data safely.
Application server
These servers connect clients to software applications through virtual server
connections. this enables users to bypass downloading data to their own hardware so as to access
applications. Application servers can effectively host large amounts of application data to several
users directly, making them ideal for businesses. Related: what's an online Application? How It
Works, Benefits and Examples

14 | P a g e
BTEC HND in Computing Networking

digital computer
A digital computer stores data files for multiple users. they permit for faster data
retrieval and saving or writing files to a computer. this is often a basic kind of server used
commonly by organizations where plenty of users need access to files that are more conveniently
and safely stored on a server than a private computer.
Database server
Database servers’ function as large storage spaces that organizations use and access to
run multiple programs to satisfy their needs. A database server can run independently of any
database architecture.
Mail server
A mail server stores and delivers mail for clients through email service platforms.
Because mail servers are founded to continually hook up with a network, individual users can
access their email without running any systems through their own devices.
Print server
A print server connects remotely to local computers to print through a network.
These servers give businesses the flexibility to use one printer to serve a whole department.
Some printers even include their own built-in server able to join a network once they're installed
in an office area.
domain name system (DNS) server
These servers transform readable computer domain names
into computer-oriented language IP addresses. The DNS server takes search data from a user and
finds the requested address to deliver to the client device.

Workstation:
A workstation (WS) could be a computer dedicated to a user or group of users
engaged in business or professional work. It includes one or more high-resolution displays and a
faster processor than a private computer (PC). A workstation also has greater multitasking
capability thanks to additional random-access memory (RAM), drives, and drive capacity. A
workstation may have higher-speed graphics adapters and more connected peripherals. The term
workstation also has been accustomed reference a PC or mainframe terminal on an area network
(LAN). These workstations may share network resources with one or more large client
computers and network servers.
These latter machines are sometimes cited as workstation-class PCs and include features such as:
1) Error-correcting code (EEC) memory support
2) Additional memory sockets for registered modules
3) Multiple processor sockets for more powerful CPUs
4) Multiple displays Reliable operating systems (OSs) with advanced features

15 | P a g e
BTEC HND in Computing Networking

High-performance graphics cards Currently, Sun Microsystems manufacturers the sole


workstations, which use x86-64 microprocessors and Windows, Mac OS X, Solaris 10,
and Linux-distributed operating systems.

16 | P a g e

You might also like