You are on page 1of 19
work is an interconnection “Tiputers that are able to 7 ‘Advani The computers linked Lo 1 share resources such as Y Network Topologies wage files, and also Protocols HTTP, TOPI. FTP, POP, onically. The computers ¥ oe ee e network may be personal Internet Terms ge main frames. Computer Y- Cloud Competing. : 1 Shared Drives core of communication. I Web: power of aco mputer beyond 4 ee 4 room. The Intemet is an iiwide network of computers thats growing ata rapid rate. the computer network fas three components. cation which may be like, to access & cation over rhe sender sends a request fOr et neces the printer. rhe receiver receives the request by the ‘sender and then services the ‘sender and receiver are communication: The: of data. The medium can 1 that is required for the amediur munication | fibres, comm satellites, or radio links. connected via wires, optical VANTAGES OF COMPUTER NETWORKS organisation. They have various ter networks are @ Vital Pt Nowadays, comput ges, Some of them are sources such Rest All the ¢ e nn ancrwork ean stare * 1 the computes jog of resources results > as printers, fax machines, ns and scanmers: f nes, modems and ae physical Toeation of ces, leads to €38Y ndvantay availability of the resource to different USER optimal use oF te resout the resource or the user, Italso enhanees maintenance and saves cost. ne puter network allows the g ily access the files present on soggai ne which may be wasted if a file fy gu i communicate through g { pictures can be sent via email, Thi and cost effective manner. Chatting. ~ people re faiiies which also make communication gga ters on a network can be used to take back upg hore i @ requirement of always-on Compute ai vork can take over in case of failure of oné conta TYPES OF COMPUTER NETWORKS h y be located in a room, building, City, country OF any the world, Depend rious types of compute omputer jetwork that spans a local area such as a laboratory ol and an office building Networ \ A MAN isa Info Hub largerarea than @ Wiretess LAN (sa computer which high’ computer network that usually covers LAN. For example, a network that connects two offic in a city, a neighbourhood area, etc rea Network (WAN): A WAN is a computer eographical area. A WAN one computer has become p ‘ease of its inst to the increa network that spans a wide may be spread across cities, countries or continents. A WAN is formed by connecting various LANs and MANS. The Internet is the largest WAN Personal Area Network: A PAN is a computer network organised around a person. It is used for communication between devices such as phones, personal digital assistants, printers and: are in close proximity. You can use these networks to transfer files, photos, between various devices umpus Area Network (CAN): A CAN is a computer network that spans For example, « network that connects a college campus and office bil type of MAN on a smaller area MAN a. nope RK TOPOLOGIES fers to the layout pattern in which the various compilters are connected to one forma network. The computers on a network are also referred to as nodes. The way ves ones the network depends onthe topology, There ¢ five main types of topologies — Ring, Star, Tree and Mesh. i Bus Topology 3 sus topology, all the computers are conneeted 19) fa single central cable called the bus (8.2), The transmission of data from any computer travels through the length of a bus in both the directions and can be received by all ther computers on the network Tf the ,ddress of a computer is that of the intel recipient, it accepts the data; otherwise, the data is rejected. Bus topology is quite easy f© set up. However, the network cannot function if there are breaks in the bus. Sometimes terminators are required to prevent loss OF data at both ends. It is costly and increases the network cost, ~ sy) os oi 10 form a closed logy none direction only. The i network is that the Fig. 83 Ring topology Star Topology In star topology, all the computers are a a central computer, ora central node (Fig, 8.) tye data sent between any two computers passes tral node. The central node contol al ty the c activities ofthe nodes. More computers canbe gay added to the network. The breakdown of the companers except the cental node, doesnt ae the functioning of the network. However, failure of the central node disables the communication gros Star topology Bus ropol the entire network j Tree Topology In tree topology, groups of star-configured workstations are connected toa linear bus backbone cable (Fig. 8.5). Thus, this topology combines characteristics of bus and star topologies. Tree topologies allow for the expansion of an existing network and enable users fo configure a network to meet their needs. It is particularly suitable when the network is widely spread and vastly divided into several branches, Similar to the bus topology, the tree topology crashes if there is a break in the central bus ‘Mesh Topology (2) is very expensive in which a computer is connected to fe Rin Topo esd = 1 i din mesh topology are very fast and have dedicated conmeciiond) ™ 1 ters on a computer network {0 COR iy corns same rules or protocols are able £6 eyajame pet. cnt operating systems. Some examples OF protocols gat tocol) —Itis a protocol used between a Wel geayam transferring HTML pages: ef Internet Protocol—TCP is a protocal hho IP to send data over the Internet. The information ig the form of little bundles called packets, IPis a gate pest route for the packet cross the Internet so thay ts destination address, TCP is responsible for breaking the data ” okets before they are sent and for assembling the packets When they aniyg ocol)—It is a protocol used to transfer and man ulate files on Protocol)—It is an Internet protocol used to retrieve e-mails by ‘ote servers, POP3 is used by client for e-mail installed onto the users mputer, The user uses a program such as Microsoft Outlook or Outlook Express, nternet Messa Access Protocol)—It is an Internet protocol used by elient r web-based e-mail to access mail on server. The e-mail appears na web browser's indow. The e-mail is not stored on the user’s computer. Hotmail, yahoo and gmail provide free e-mail accounts, SMTP (Simple Mail Transfer Protocol)—It is a TCP/IP protocol used in sending and receiving e-mails, It is a delivery protocol and is usually used with one of the other two protocols, POP3 or IMAP. NETWORK DEVICES larious devices are used for setting up a computer network. Let us discuss a few deviees that lay a crucial role in a computer network NIC (Network Interface Card) WIC (Fig. 8.7) is a hardware device that is attached to a iter to cnable it to communicate over the network. The ; 34 ROM chip that contains a unique number which is a> address or Media Access Control (MAC) address, s address uniquely identifies a computer on Fig, 8.7 Network Interface Card a i ee ta on Bo SUES ee y ‘i ‘onverts the analog signals back xm = the destination computer understands s the working mechanism of a modem. eee TAL SIQNA ANALOG SIONAL es Nara ven e Receiver s, 8.9 Transmission of signals through modem ised for connecting computers to the Intemet. Modems are connected 10 @ + telephone line. Figure 8.10 shows the connection of a modem svith a computer one line CPU of computer a > “Info Hub , s Modems can be external or intemal. Externc} roams generally contain inaicacrs which WelP Tr undersianding the functioning of the modem Mls on external node con be moved from one ‘computer to another 1m kechrical bass, hubs can be ctegorised nto passive hubs, teliget MEDS, one swtehing hubs ing modem Tub (typically Link or Out) (Fig. 8. 11) that is used to vomputers in a network. Hubs oe ped 0 connie ene LAN. A hub » ultipte ports. Small hubs network 4 105 anger hubs contain 8: 12> 16, and even 24 ports hub, when one data on the network the 4 1e packets 10 all the other computes gt eee forwards the P' mie oy rer is responsible for determining rit and ignoring he others. is a device puters. L computer sends simply rected to it, Each compe ch packets are destined for nds the addresses of all the computer cl tb Swit nen a packet is received, the switch reads t _ tination address to determine if the destina onnected, the switch forward other computers on the network do not have to read any on device is Connesiy s the packet only tothe not meant for them, ous networks. A router connects networks that yge media, The router moves the packets based on their tp cent technolo, mine the shortest or fastest way in the network end forwards the packet accordingly, 4 The router checks the address of the packet it receives, uses routing information jg packet may travel via multiple routers before reaching the destination. ‘cept a packet formatted for one protocol andconver formatted for another protocol before forwarding it. Generally, gateway is by software installed within a router. Gateway Convert from one protocol to other. SNA to TCPAP etc. Fig 8.14 Gateway The purpose of the Intranet is to share j accessed by users authorised by The pure AP otc nc en t oo and Huddle are a ay, be ct Jresses on the World W 0 a a pg owed ny ee sxample, hypertext pages, images \ URL has the following format; protocol: Mecerahepat. aca specify add panies who provide services in Intemet connection to connect to | (Lie GB Ps also have the option of providing website hosting and development, He RL eps cs wary Trowsers do not require it to be mentioned, nd domain name registration. aii alia mma eas System, Ie either be regional (confined to is used by the browser to find the Internet } . (MINE ore state-owned Internet Service Providers, Some private SPs include ‘tel, Aire, Hthway, (eo, MTS, Reionce, ) hort form of Internet Protocol (IP) s a computer OF and TPvé are the two IP addressing standards in us Pv: ong, It is writen as four numbers separated ‘by periods in the example, 1.161-10.235is TPv4 address, PvS address are It uniquely identifie a TCPAP network, I « four bytes (32 bits) I es (128 bits) lor smain Name Server) «the numerie IP address of compuisr °° the Intemet. ve is a string of words fo wr convenience of the useh fOr example, googiecam and yaion COM. tie a computer having & database hat stores the IP addresses a" their domain the domain name, DNS translates it into its corresponding IP address, Internet. For example, DNS translates google.com t0 the IP address ain name is used f mes. When a user Uses ss the computer on the computer that houses Google Web Server rer) or the software (the \ web server can be refecten 12 #5 either the Mane a ee ates go the clients © ‘host that helps to deliver content of a web server is t0 deliver webpages on a ; ge Re oan centralised applications: computer application) The primary function websites, store data oF responds either with the Content OF g the server respond: on ee HTP ar Leh 4 Bae and ne Feceive and store ontine forms and uploaded ies ge iF unable all server, are files (HIG AONE gy printers (Print server} br S s (ma err lane, Bee's Web Louie end TBM s Sas Gay ie Nets Saver, Microsoft's Internet Information Services, SaRiiagy “A Jigsaw Web Server sam used for accessing websites or information ona neta, Tetra te view webpages on the Internet that coma APS Aa Fig 8.18 jose an option. Ve choose File upload option. An Open dialog box spears (Fig. 8.19). Select the file you want fo upload rea file in Google Drive, | ‘can also right clck on the | Select the share option. ick Open button. - of file getting upload and completion is (Fig, 8.20). The file gets uploaded. mesa played. file, click on Share button on top (Fiz: 8.21). A screen Shag 1 Enter the email address of the person with whom yoy if file. Click Send Button. aan 23).The other person will be able to see the shared file whey jy login into their Google account Fig. 8.2 File and share button Fig, 8.23 File shared » You can use blog software to create your blog and share with others, Others ‘blog and also like your blog. ferconnection point in a rotocol th vised for data exchange between se pre-agrecd signals Codes and signals from a compe pus analog 210d Signals which can be transmitted OVEE ® 2 S ‘elephone line and vice versa sop 0 vies hit aloWR Hea eee 1s Switen: a device wed for connecting hone ines by converting dial = eompuers 88 x onsiats oF 1¥O OF MOTE -3 Pos — : ag = Delhi se Mumbai Kolkata «the topologies in each ofthe thee les show ye of performance aod sai? Wich 100100) three topologies is the best in t 3 vulnerable? ved you place a hub and swift in CaS of these three topologies?

You might also like