You are on page 1of 20

ITech Computer Training Institute for COC Examination

What is Computer Network?

COMPUTER NETWORK

Two or more computers connected together through a communication media form a computer
network.

The computers are connected in a network to exchange information and data. The computers
connected in a network can also use resources of other computers.

Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server: Powerful computers that provides services to the other computers on the network.

2. Client: Computer that uses the services that a server provides. The client is less powerful than
server.

3. Media: A physical connection between the devices on a network.

4. Network Adopter:

 Network adopter or network interface card (NIC) is a circuit board with the components
necessary for sending and receiving data.
 It is plugged into one of the available slots on the Pc and transmission cable is attached to
the connector on the NIC.

5. Resources: Anything available to a client on the network is considered a resource .Printers,


data, fax devices and other network devices and information are resources.

6. User: Any person that uses a client to access resources on the network.

8. Protocols:

 These are written rules used for communications.


 They are the languages that computers use to Advantages of Computer Network

 Networks allow data transmission among far areas also within local areas.

 Networks allow different users share the processing characteristics of different


computers.

 Network allows users to share common set of data files and software stored in a main
system.

 Network allows users to share common hardware resources such as printers, fax
machines, modem etc.

Prepared By: ITech Computer Training InstitutePage 1


ITech Computer Training Institute for COC Examination

 The cost of computing is reduced to each user as compared to the development and
maintain of each single computer system.

Network Topology and Types of Network Topology

NETWORK TOPOLOGY

What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other
peripherals. Physical topology should not be confused with logical topology which is the method
used to pass information between workstations. Logical topology was discussed in the Protocol
chapter.

Main Types of Physical Topologies

The following sections discuss the physical topologies used in networks and other related topics.

 Linear Bus
 Star
 Tree (Expanded Star)
 Considerations When Choosing a Topology

Linear Bus

A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1).
All nodes (file server, workstations, and peripherals) are connected to the linear cable.

Fig. 1. Linear Bus topology

1. BUS TOPOLOGY

STRUCTURE of Bus Topology:

In the bus topology, the computers are connected through a common communication media. A
special type of central wire is used as communication media. This central wire is called Bus. The
Prepared By: ITech Computer Training InstitutePage 2
ITech Computer Training Institute for COC Examination

computer are attached through the bus the ends of the bus are closed with the terminator .The
terminators are used to absorb signals. Bus topology use coaxial cables sections are connected to
the B. N. C connectors. B.N.C connectors are often use to connect the computer through the
main cable. These connectors can connect through two section of cable with the bus extending in
both directions. The end device on the bus have the terminals on one connectors of T

WORKING OF BUS TOPOLOGY:

The computers that send data also attach address of the destination computer with the data. All
computers connected to the bus receive the data but only that computer accept it whose address
matches the address attached with data.

In this topology only one computer at a time can send a data therefore the speed of network
reduces as the number of computers attached to the bus increases.

Advantages of a Linear Bus Topology

 Easy to connect a computer or peripheral to a linear bus.


 Requires less cable length than a star topology.
 Easy to install and configure
 Inexpensive
 Easily extended

Disadvantages of a Linear Bus Topology

 Entire network shuts down if there is a break in the main cable.


 Terminators are required at both ends of the backbone cable.
 Difficult to identify the problem if the entire network shuts down.
 Not meant to be used as a stand-alone solution in a large building.
 Performance decreases
 Weak signals
 Difficult troubleshooting

Bus Topology

Prepared By: ITech Computer Training InstitutePage 3


ITech Computer Training Institute for COC Examination

Star

 A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch, or concentrator (See fig. 2).

 Data on a star network passes through the hub, switch, or concentrator before continuing
to its destination.

 The hub, switch, or concentrator manages and controls all functions of the network.

 It also acts as a repeater for the data flow.

 This configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.

Fig. 2. Star topology

Advantages of a Star Topology

 Easy to install and wire.


 No disruptions to the network when connecting or removing devices.
 Easy to detect faults and to remove parts.
 Easily expended and modified
 Easy to troubleshoot
 Multiple cable types supported by hub

Disadvantages of Star Topology

 If hub fails then entire network will fail.


 Require more cables
 May require a device to rebroadcast signals across the network
Prepared By: ITech Computer Training InstitutePage 4
ITech Computer Training Institute for COC Examination

 Requires more cable length than a linear topology.


 If the hub, switch, or concentrator fails, nodes attached are disabled.
 More expensive than linear bus topologies because of the cost of the hubs, etc.

Tree or Expanded Star

A tree topology combines characteristics of linear bus and star topologies. It consists of groups
of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree
topologies allow for the expansion of an existing network, and enable schools to configure a
network to meet their needs.

Fig. 3. Tree topology

Advantages of a Tree Topology

 Point-to-point wiring for individual segments.


 Supported by several hardware and software venders.

Disadvantages of a Tree Topology

 Overall length of each segment is limited by the type of cabling used.


 If the backbone line breaks, the entire segment goes down.
 More difficult to configure and wire than other topologies.

Considerations When Choosing a Topology

Prepared By: ITech Computer Training InstitutePage 5


ITech Computer Training Institute for COC Examination

 Money. A linear bus network may be the least expensive way to install a network; you
do not have to purchase concentrators.
 Length of cable needed. The linear bus network uses shorter lengths of cable.
 Future growth. With a star topology, expanding a network is easily done by adding
another concentrator.
 Cable type. The most common cable in schools is unshielded twisted pair, which is most
often used with star topologies.

Summary Chart
Physical Common
Common Cable
Topology Protocol

Twisted Pair
Linear Bus Coaxial Ethernet
Fiber

Twisted Pair
Star Ethernet
Fiber

Twisted Pair
Tree Coaxial Ethernet
Fiber

Two or more computers connected together through communication media form a computer
network.

The arrangement of computers in a network is called Network Topology.

It is a physical layout of connected computer.

ADVANTAGES of RING TOPOLOGY:

A. It provides an orderly network in which every device has access to the token and can
transmit.

B. It performs well under a heavy load.

DISADVANTAGES of RING TOPOLOGY

A. Failure of one computer can affect the whole network.

B. Difficult to troubleshoot.

C. Change mode with adding or removing a device effect the entire network.

Prepared By: ITech Computer Training InstitutePage 6


ITech Computer Training Institute for COC Examination

Ring Topology

MESH TOPOLOGY

STRUCTURE of MESH TOPOLOGY

A mesh network or mesh topology uses separate cable to connect each device to every other
device on the network, providing a straight communication path as shown in the figure below.

WORKING of MESH TOPOLOGY

For sending messages, check the cable connected into two devices. A message is send directly
from sender to receiver because each one has individual and separate connection.

ADVANTAGES of MESH TOPOLOGY:

a. Enhance for error tolerance provided by redundant links.

b. Easy to troubleshoot.

DISADVANTAGES of MESH TOPOLOGY:

a. Difficult to install and maintain.

b. Expensive.

MESH TOPOLOGY

Considerations When Choosing a Topology

 Money. A linear bus network may be the least expensive way to install a network; you do
not have to purchase concentrators.
 Length of cable needed. The linear bus network uses shorter lengths of cable.

Prepared By: ITech Computer Training InstitutePage 7


ITech Computer Training Institute for COC Examination

 Future growth. With a star topology, expanding a network is easily done by adding
another concentrator.
 Cable type. The most common cable in schools is unshielded twisted pair, which is most
often used with star topologies.

What is Networking Hardware?

Networking hardware includes all computers, peripherals, interface cards and other equipment
needed to perform data-processing and communications within the network. CLICK on the terms
below to learn more about those pieces of networking hardware.

 Workstations
 Hubs
 Bridges
 Firewalls
 Routers
 FileServers
 Repeaters

This needs to be a sprite

This section provides information on the following components:

 Network Servers
 Workstations
 Network Interface Cards
 Switches
 Repeaters
 Bridges
 Routers
 Firewalls
Prepared By: ITech Computer Training InstitutePage 8
ITech Computer Training Institute for COC Examination

File/Network Servers

One or more network servers is a part of nearly every local area network.

These are very fast computers with a large amount of RAM and storage space, along with a one
or more fast network interface card(s).

The network operating system provides tools to share server resources and information with
network users.

A sophisticated permissions-handling system is included, so that access to sensitive information


can be carefully tailored to the needs of the users.

For small networks, a single network server may provide access control, file sharing, printer
sharing, email, database, and other services.

The network server may be responding to requests from many network users simultaneously. For
example, it may be asked to load a word processor program to one workstation, receive a
database file from another workstation, and store an e-mail message during the same time period.
This requires a computer that can store and quickly share large amounts of information. When
configuring such a server, budget is usually the controlling factor. The following guidelines
should be followed:

 Fastest processor(s)
 Large amount of RAM
 multiple large, fast hard drives
 Extra expansion slots
 Fast network interface card(s)

Workstations

Computers that humans use are broadly categorized as workstations. A typical workstation is a
computer that is configured with a network interface card, networking software, and the
appropriate cables. Workstations do not necessarily need large storage hard drives, because files
can be saved on the file server. Almost any computer can serve as a network workstation.

Laptops/Mobile Devices

Laptops and other mobile devices are becoming more and more common. These devices
typically have modest internal storage, but enough power to serve as a workstation for users on
the go. These machines nearly always have a wireless adapter to allow quick network
connections without cumbersome cabling. In a school environment with good wireless coverage,
a mobile device user can move about the campus freely, and remain continuously connected to
the network.

Prepared By: ITech Computer Training InstitutePage 9


ITech Computer Training Institute for COC Examination

Network Interface Cards

The network interface card (NIC) provides the physical connection between the network and the
computer workstation. Most NICs are internal, and they are included in the purchase of most
computers. Network interface cards are a major factor in determining the speed and performance
of a network. It is a good idea to use the fastest network card available for the type of
workstation you are using.

The most common network interface connections are Ethernet cards and wireless adapters.

Ethernet Cards

Ethernet cards are usually included with a computer, although additional ethernet cards can be
purchased and installed on most computers,. Ethernet cards can contain connections for either
coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial cable, the
connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some
Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or
fiber optics cable to an Ethernet card. When this method is used there is always an external
transceiver attached to the workstation. Only the RJ-45 connector is found on most modern
ethernet cards (See the Cabling section for more information on connectors.)

Fig. 1. Ethernet card.

Switches

An ethernet switch is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each
workstation to a central switch/hub. Most switches are active, that is they electrically amplify the
signal as it moves from one device to another. The predecessor of the switch was the hub, which
broadcasted all inbound packets out all ports of the device, creating huge amounts of
unnecessary network traffic. Modern switches build a port map of all IP address which respond
on each port, and only broadcasts on all ports when it doesn't have a packet's target IP address
already in its port map. Switches are:

 Usually configured with 8, 12, or 24 RJ-45 ports


 Often used in a star or tree topology

Prepared By: ITech Computer Training InstitutePage 10


ITech Computer Training Institute for COC Examination

 Available as "managed" or "unmanaged", with the later less expensive, but adequate for
smaller networks
 direct replacements for hubs, immediately reducing network traffic in most networks
 Usually installed in a standardized metal rack that also may store network servers,
bridges, or routers

Repeaters

Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal
with a device called a repeater. The repeater electrically amplifies the signal it receives and
rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a
concentrator. They are used when the total length of your network cable exceeds the standards
set for the type of cable being used.

A good example of the use of repeaters would be in a local area network using a star topology
with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100
meters. The most common configuration is for each workstation to be connected by twisted-pair
cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass
through it allowing for the total length of cable on the network to exceed the 100 meter limit.

Bridges

A bridge is a device that allows you to segment a large network into two smaller, more efficient
networks. If you are adding to an older wiring scheme and want the new network to be up-to-
date, a bridge can connect the two.

A bridge monitors the information traffic on both sides of the network so that it can pass packets
of information to the correct location. Most bridges can "listen" to the network and automatically
figure out the address of each computer on both sides of the bridge. The bridge can inspect each
message and, if necessary, broadcast it on the other side of the network.

The bridge manages the traffic to maintain optimum performance on both sides of the network.
You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps
information flowing on both sides of the network, but it does not allow unnecessary traffic
through. Bridges can be used to connect different types of cabling, or physical topologies. They
must, however, be used between networks with the same protocol.

Routers

Routers are the traffic directors of the global internet. All routers maintain complex routing
tables which allow them to determine appropriate paths for packets destined for any address.
Routers communicate with each other, and forward network packets out of or into a network.
Here's an example:

If you have a school LAN that you want to connect to the Internet, you will need to purchase a
router. In this case, the router serves as the forwarder between the information on your LAN and
the Internet. It also determines the best route to send the data over the Internet.

Prepared By: ITech Computer Training InstitutePage 11


ITech Computer Training Institute for COC Examination

Firewalls

A firewall is a networking device that is installed at the entrance to a LAN when connecting a
networks together, particularly when connecting a private network to a public network, such as
the internet. The firewall uses rules to filter traffic into and out of the private network, to protect
the private network users and data from malevolent hackers.

Firewalls are either hardware or software, depending on their intended use. A firewall used to
protect a network is a hardware device that should be installed in the network between the router
and the network. Almost all hardware firewalls will have at least two ports, labeled "Trusted"
and "Untrusted". These terms imply the true nature of the firewall's responsibility to the private
network. The public network is connected to the untrusted network port, and the private network
is connected to the trusted port.

Firewall rules are usually simple, consisting of a verb, either allow or deny, the direction of the
traffic, either inbound or outbound, and an address or other network traffic identifier. Firewall
rules are cumulative, so general rules may be specified, and exceptions added as necessary.
Some examples are:

 Allow outbound all (all private network users can do anything on the public network)
 Deny inbound all (default setting to prevent all traffic from the public or untrusted port,
to the private port)
 Allow inbound port 80 (allow internet web traffic to come into network to find web
servers)
 Allow inbound port 80 destined to 170.200.201.25 (allow inbound web traffic to a
specific web server on your private network)
 Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a specific IP address or
range of addresses)

Software firewalls are commonly included in modern workstation and server operating systems.
They operate in a similar way as hardware firewalls, except that they filter traffic in and out of
the machine itself. These software firewalls are typically unnoticed by machine users, and only
need attention occasionally when an internet-connected application don't work as expected. The
software firewall should always be considered a "suspect" in such cases. The problem is easily
resolved, by setting an exception rule in the firewall for the software that is attempting to
communicate.

What is a Network Operating System?

Unlike operating systems, such as Windows, that are designed for single users to control one
computer, network operating systems (NOS) coordinate the activities of multiple computers
across a network. The network operating system acts as a director to keep the network running
smoothly.

The two major types of network operating systems are:

 Peer-to-Peer

Prepared By: ITech Computer Training InstitutePage 12


ITech Computer Training Institute for COC Examination

 Client/Server

Nearly all modern networks are a combination of both. The networking design can be considered
independent of the servers and workstations that will share it.

Peer-to-Peer

Peer-to-peer network operating systems allow users to share resources and files located on their
computers and to access shared resources found on other computers. However, they do not have
a file server or a centralized management source (See fig. 1). In a peer-to-peer network, all
computers are considered equal; they all have the same abilities to use the resources available on
the network. Peer-to-peer networks are designed primarily for small to medium local area
networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and
Windows, can function as peer-to-peer network operating systems.

Fig. 1. Peer-to-peer network

Advantages of a peer-to-peer network:

 Less initial expense - No need for a dedicated server.


 Setup - An operating system (such as Windows XP) already in place may only need to be
reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

 Decentralized - No central repository for files and applications.


 Security - Does not provide the security available on a client/server network.

Client/Server

Client/server network operating systems allow the network to centralize functions and
applications in one or more dedicated file servers (See fig. 2). The file servers become the heart
of the system, providing access to resources and providing security. Individual workstations
Prepared By: ITech Computer Training InstitutePage 13
ITech Computer Training Institute for COC Examination

(clients) have access to the resources available on the file servers. The network operating system
provides the mechanism to integrate all the components of the network and allow multiple users
to simultaneously share the same resources irrespective of physical location. UNIX/Linux and
the Microsoft family of Windows Servers are examples of client/server network operating
systems.

Fig. 2. Client/server network

Advantages of a client/server network:

 Centralized - Resources and data security are controlled through the server.
 Scalability - Any or all elements can be replaced individually as needs increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple platforms.

Disadvantages of a client/server network:

 Expense - Requires initial investment in dedicated server.


 Maintenance - Large networks will require a staff to ensure efficient operation.
 Dependence - When server goes down, operations will cease across the network.

What is a Protocol?

A protocol is a set of rules that governs the communications between computers on a network. In
order for two computers to talk to each other, they must be speaking the same language.

Many different types of network protocols and standards are required to ensure that your
computer (no matter which operating system, network card, or application you are using) can
communicate with another computer located on the next desk or half-way around the world.

Prepared By: ITech Computer Training InstitutePage 14


ITech Computer Training Institute for COC Examination

The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking
protocols.

The complexity of these layers is beyond the scope of this tutorial; however, they can be
simplified into four layers to help identify some of the protocols with which you should be
familiar (see fig 1).

OSI Layer Name Common Protocols

7 Application HTTP | FTP | SMTP | DNS | Telnet

6 Presentation

5 Session

4 Transport TCP | SPX

3 Network IP | IPX

2 Data Link
Ethernet
1 Physical

What is the OSI Model?

OSI MODEL

OSI stand for open system interconnection.

 It is networking reference model.


 It was proposed in 1984 by ISO (international standard organization).
 It is the most widely accepted model for providing network communication identity .
 OSI model provide a useful structure for defining and describing various process of
networking.
 OSI model organizing communication process into seven buyers.
 Each there has a specific independent function in a set of protocols are defined for each
layer.

The seven layers of OSI model are given as .

1) Application layer

2) Presentation layer

3) Session layer

4) Transport layer

5) Network layer

Prepared By: ITech Computer Training InstitutePage 15


ITech Computer Training Institute for COC Examination

6) Data link layer

7) Physical layer

PHYSICAL LAYER

The first layer of OSI model is a physical layer.

Physical layer deals with sending and receiving of bits from one computer to another. It deals
with the physical connection through the network and with transmission and receiving of
signals .in this layer protocols for physical an electrical detail such as

1) Transmit bits

2) Specifies requirements for how transmission occurs

3) Insure compatible data transmission with other devices

most commonly use standard of this layer are I.E.E.E 802.3, I.E.E.E 802.4,I.E.E.E 802.5 and
A.N.S.I , F.D.D I

DATA LINK LAYER

The second layer of OSI model is the data link layer.

The link layer deals with flow of data or a signal link layer from once device to another. Layer
provides for the errors free transfer of data has arrived.

Properly and softly at the destination.

The most commonly used protocols at this layer are those specified at I.E.E.E 802.3, I.E.E.E
802.4,I.E.E.E 802.5 and A.N.S.I , F.D.D.I

DATA LINK CONCERN WITH :

1) Packets data into forms .

2) Transmit data frequency

3) Process the acknowledgment from the receiver.

Data link is divided to the into two sub layers.

a) L.L.C (logical link control)

b) M.A.C(medical access control)

Prepared By: ITech Computer Training InstitutePage 16


ITech Computer Training Institute for COC Examination

A) This sub layer established and maintains links with the communication devices.

The standard protocols use for L.L.C are I.E.E.E 802.3

PPP:

The PPP protocols use for communication across the point to point link. It is use in wan.

MAC:

 This sub layer controls the way by which multiple devices share the same communication
medium.
 It specifies how different terminals or work.
 Station share the same communication media channel.

NETWORK LAYER

The third layer of O.S.I model is network layer. This layer is responsible for routing information
from network device to another.

In larger network there maybe intermediate networks between any two communicating networks.
This network layer makes it possible to rate data to destination computer across many
intermediate devices. The network layer find a logical path between this source computer and
there destination computer in the network.

The main functions of this layer are:-

1) To make routing decision.

2) To convert data into packets

3) To hold all communication between the network

The following network protocols are used for network layer

1) I.P specification of D.O.D.

2) I.S.D.N

3) S.N.A if I.B.M

TRANSPORT LAYER

The fourth layer of O.S.I models transport layer. It provides a transport service between the
session layer and the network layer. The large manage from the session layer converted in to
small packets of data are sent to the destination computers. The packets are again restoring into

Prepared By: ITech Computer Training InstitutePage 17


ITech Computer Training Institute for COC Examination

the mange at the destination computer. This task is preformed at the transport layer of O.S.I
model the main responsibilities of this layer are.

1) Bricks up and restore data.

2) Provide end the end reliability.

3) Uses connection oriented transmission of data.

SESSION LAYER

The fifth layer of PO.S.I model is session layer. The session layer allows software on different
computers to share a connection. This connection is called a session. The main functions of the
session layer are

1). Allows user to established connection between devices.

2) Manages dialogue.

PRESENTATION LAYER

 It is the sixth layer of O.S.I model .this layer translates data between the formats, the
networks requires and the formats require that the computer accept.
 Different computers have different ports for representing data inside the computer. The
presentation layer manages different type of coding scheme during the transmission of
data.
 It concerns the coding speed used inside the computer to the network code.

The responsibility of this layer are

1) Establishes format of data exchange.

2) Handles characters set in numeric translations

3) Perform data compression.

APPLICATION LAEYR

The last layer of O.S.I model is application layer .it deals with the end user application program.
It provides services such as data base access, e-mail file transfer.

It also allows the application program to communicate with the application program or the more
computers.

The main functions of application are.

1) Server as interface between user interfaces and the network.

Prepared By: ITech Computer Training InstitutePage 18


ITech Computer Training Institute for COC Examination

2) Allow user application to interact with the network

Cable arrangement for RJ45 Cat5 (Straight/Network cable)


1) Use Cat5 cable (the cable contain 8 slim cables with 8 different colors)
2) Use RJ45 Plug (both side of cable must do the same way)
3) Colors of cables arrangement are as below.
A. B

a) White orange
a) White orange
b) Orange
b) Orange
c) White Green
c) White Green
d) Blue
d) Blue e) White Blue
e) White Blue f) Green
f) Green g) White Brown
g) White Brown h) Brown
h) Brown

4) Grab the Crimp tool to crimp the cable which is already insert into RJ45 plug

RJ45 Pin # Wire Color Wire Diagram Signal*

1 White/Orange Transmit+

2 Orange Transmit-

3 White/Green Receive+

4 Blue Unused

5 White/Blue Unused

6 Green Receive-

7 White/Brown Unused

8 Brown Unu

Prepared By: ITech Computer Training InstitutePage 19


ITech Computer Training Institute for COC Examination

Cross Over Cable Arrangement

An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices
together directly. Normal straight through or patch cables were used to connect from a host
network interface controller (a computer or similar device) to a network switch, hub or router.

A cable with connections that "cross over" was used to connect two devices of the same type:
two hosts or two switches to each other.

Crossover Cable Diagram

To create a crossover cable with cat-5 cable follow the same instructions as above for CAT-5
wiring except when you get to step #2, use the below crossover cable diagram:

Prepared By: ITech Computer Training InstitutePage 20

You might also like