You are on page 1of 10
1p Applications and Security —s y: Wel CHAPTER Networking Fundamentals crease in the field of comput i reid Sad ters and in almost every walk of life has generated the need to use the same erent . of doi saat i ri or tarneat or it is by keeping the same data files at separate locations across the globe. sive 2 from one computer to multiple computers, which are present at the same Jocations. The continuous dat: 1 ordistant a transfer isa costly affair, which results in redundancy of data and increased orage costs: ication means sendit pa communi riding data electronically from one computer to another. It involves the linking of senate, whch allows the resources of one computer to be shared by the other computers located within the same complex can communicate through a cable. But the computers that are located jx faraway locations, use a telecommunication system for data communication. For example, in case of banking or communication facilites like telephone system or microwave relays are used to send data, With reservation system, from one place to another and receive the reply srelecommunication system, you can electronically mail a message ely. in Bill comPuTeR NETWORK computer network may be defined as a group of two or more compute? systems or peripheral devices that are connected together to exchange information and share resources with each other. TYPES OF NETWORKS Depending on their size, capabilities, and the geographical distance, computer networks can be classified as follows: Personal Area Network (PAN) ae ction covers a very small area, such a5 2 home or f} | This type of network connes artphones, printers, anoffice cabin, Desktop computers, laptops, tablets, sm sevirless headphones make up the nodes of this te of network, It uses | bluetooth, USB connections, or the increasingly popular Wi-Fi technology erally covers the range of less than 10 metres. for communication. It ge! Fig. 16.1: PAN local Area Network (LAN) UW is used in an office building or education@ ber oF paring the resources between 1e connected computers. type of 1 campus. Ethernet cables and WIFI are used to set Up network. ts range is up to 10 kms. The number of svstem> connected in LAN may vary from 2 to 1000. LAN is a useful the end users. Resources such as printers, technology that provides different ways of! file servers, scanners, and the internet C27 be easily shared amon the teaming. King <> Scanned with CamScanner Fig, 16.2: LAN Metropolitan Area Network (MAN) This type of network is geographically larger than LAN and covers a city. They are used by large organisations, hag ‘several branches over a city or local government bodies, like the Municipal Corporation, or police. This type of Networ uses microwave transmissions or fiber optic cables to link the different nodes of the network. Fig. 16.3: MAN Wide Area Network (WAN) This is the largest type of network. It spans across several cities, countries, or even the whole world. Since they use high speed technology, WANS are expensive networks. WANs are used by multinational organisations, airlines, government agencies, etc. They use routers to connect to the network. The devices used for transmission are fiber optic cables, microwaves, and satellites, ADVANTAGES OF COMPUTER NETWORKS Fig 164: WAN fers, scanners, or storage devices such as hard drives ie? Sharing of Hardware: Sharing of hardware devices, like in reducing the cost of the hardware. idual computers is more expensive than buying software that Sharing of Software: Purchasing software for in be installed on one central computer called server and allowing many users to access it. Sharing Files: By using a network, the users can easily share documents with each other. This feature promo 4 teamwork and increases productivity, Scanned with CamScanner 7 pata can be stored on a central computer or server with a backup system; uP e 10 data loss can occur, cs tat effective: Since hardware, software, and storage systems can be shared; this results cost! cost SOV 1 Effect of Breakdowns: A breakdown in the individual computers on the network ino i a affect the operation of the entire network. wl yes Paper and Time: Networks also reduce the need for generating multiple hard copies so gthesame document. People working in common workplace can share reports through of thenetwork, which saves both time and paper, pISADVANTAGES OF COMPUTER NETWORKS inal Costs: Although the running cost of a network is lower than that of the individual computers, but the initial cost of setting up a network is higher. Expensive devices, such asrodters, switches, hubs, network interface cards, and server can add up to the cos. Maintenance and Administratior {the network grows too large, various issues may crop spinthe day to-day operation of the computer network. To work efficiently and optimally, ‘requires high technical skills and know-how of its operations and administration, A person just having basic skills cannot do this job. Nalor Effect of Breakdowns: Ifa computer network's main server breaks down, the entire stem would become useless. Likewise, in case of problems with the shared resources, is hardware, software, or storage systems, all the computers on the network would also come to a standstill. Viruses: Unless special care is taken by using anti-virus programs, virus infection in one computer may spread to all the computers on the network. Security: There is a danger of hacking, especially in large networks. The security of the network, therefore, will have to be monitored and special software, ‘obe installed to prevent the breach of security I] network aRcHITECTURE like firewalls will have Network architecture is an overall design and layout of a computer network. Computer ‘networks are designed in two different ways: [earner | = a) (ae) PEER-TO-PEER NETWORK re mentans equal and therefore in @ peer-to-peer network, each computer or re “salto the other computers in terms of the resources that it can access and share. Al anos Each node in a computer network has a unique hardware address (MAC address), which enables it to communicate effectively within the network. A Media Access Control address (MAC address) is assigned by the manufacturer of the Network Interface Card (nic). Econ [As the information received at the hub is simply copied and transmitted to all the nodes on the network, hhubs are also known as “multiport repeaters". kiow the Fact Ima LAN, data transmits at 2 very fast rate as the number of computers linked is limited. In WAN, the data transmission rate 's slow since it involves the increased distance and number of servers and terminals Scanned with CamScanner ESO umers of resOUrceS It Feats ath V i "y work, each computer shares its rg, fhe other computers on the netivoy, computers in this type of network act both as the supplier as well a5 Cons as having the equivalent capability as shown in the Figure 26.5. In 2 P2P ne such as processing speed, disk storage, or hardware such as printers with t Fig. 16.5: Peer-to-Peer Network 7a a “a Fig. 16.8: Client Server Networ, CLIENT-SERVER NETWORK In a client-server network, there is 3 powerful central computer, which has more | resources than the other computers connected to the network. This central computer is known as the server and the other computers are known as clients Or nodes or workstations. The server is responsible for providing all the information and resources to the clients as per their request. The client sends request to the es the resources of the server but does not share its server for services and uti resources with any other computer. The server provides all the information and resources to the client as per its request. Client-Server networks typi consist of two parts. The front-end of the application is what the user sees and interacts interacts with the shared resources, such as databases, printers, or high-power processors. rectly. The backend pt Differences between Peer-to-Peer and Client-Server Networks PEER-TO-PEER ‘All computers are equal in capabilities as well as in the use of resources. In this type of network, each computer can request and also provide services to the other computers Each computer can store its own data. Since every computer is required to provide its resources for use by the others in the network, no perceptible effect will be noted when multiple users simultaneously operate their computers. ‘AP2P networkisless expensive and easier toimplement. ‘Security is 2 major concern with this type of network. Its usvally implemented for a smaller number of world computers located in a limited area. However, certain, 2P applications, like Napster and Bit Torrent are spread across the world. computers win KiPS CLIENT-SERVER ‘A specific computer, more powerful than the others, acts as the sener and provides resources to the other computers on the network. The server provides resources, whereas the client can requst resources from the server. ‘The data is stored in a centralised computer, ie, server. Ifallthe computers of the network request for services simultaneouy from the server, it will result in slowing down the server, Client-Server networks are usually more expensive and notso- to implement. It is easy to take measures to secure the system in a Client Sev! network. Specific computers can be allowed access to specific ae of the server. ‘AClient-Server application, like email is used world wide. Hower” many cases this type of network is implemented locally also, Su" in office buildings or educational campuses. _—d Scanned with CamScanner all yeTWORK COMPONENTS spasation sprits ror gwitcH seqworkswiteh sa device, which connects diferent computers the computers that make u ip the terminals of a network, some other - functioning. These are discussed as follows: eS ana aevices on 2 COMPUTE etwork. A switch receives data, luegers evoeeelseysselzezeze| Fig. 16.7: Switch vcesses tana then forwards it only tothe destination device ses packet-switching technique to transfer data on the network. REPEATER imply copies the i iealarrwie i ater simply copies the information arriving at its input and retransmit it from the output. This is required at Anrep wn the network si wher Signal is weakened or distorted over a long distance. This happens if the network passes times throug! retransmitted by the repeater as shown in the Figure 16.8, a havin, han area having strong electromagnetic fields. The weakened or distorted signals are regenerated and then Fig. 16.8: Functioning of a Repeater Fig. 16.9: Repeater HUB a switch. But unlike a switch, which transmits Ahub is a networking device similar to the received information to all the information to a particular device, a hub transt is why, a hub is known as a dumb switch. Hubs are devices that are connected to it. That i comparatively cheaper than the switches, ROUTER Fig. 16.10: Hub Arouter is a networking device, whi network with the networks. The hea the message is ich routes the information around the network. It is also used to connect one der of every packet of the information arriving at a router is checked for the destination and using the best route, forwarded to the next device as shown in the Figure 16.11. [ofwork Routerzzxample connections 16.11: Router wn Kips > Scanned with CamScanner i | BRIDGE : A bridge is a device that connects and passes packets between two | network segments that use the same communication protocols. A | bridge blocks off one segment of a network from another. It thus, acts 3s 2 filter. The bridge checks the arriving information and transmits it, | only, if required. Fig. 16.12: Bridge BIL iterner ‘global interconnection of computer networks around the worlds known as the internet. In other words, the te '5 8 network of networks. Communication over the internet is governed by a set of rules known as protocgi, commonly used protocols for data transfer over the internet are (Transmission Control Protocol/internet Pratocy (TCP/IP) and File Transfer Protocol (FTP). 2% pc a [ve ‘Transmission Control Protocol! a, Rise Protocol creme) Internet Fig. 16.13: Working of the internet WORLD WIDE WEB ‘The World Wide Web (WWW) commonly known as the Web, is a way of accessing information over the interett h Robert Cailliau, invented the word contains millions of documents called Web Pages. Sir Tim Berners Lee, along. wide web while working at CERN (European Council for Nuclear Research) in 1990, REQUIREMENTS TO CONNECT TO THE INTERNET Following are the basic requiements to connect to the internet: Se aia a Gs the free Whether a eto pie, obo ok ce smartphone. Modem: Modem stands for Modulator-Demodiulator. A modem is a hardware device that allows a computer to sed and receive data over a telephone line, cable, or satellite connection, in case of transmission over an analog telephone line, which was once the most popular way to access the intere the modem converts data between analog and digital formats in real time for a ‘two-way network commuricatit Nowadays, digital modems are much faster and often inbuilt in the computer, eliminating the need for having m* hardware, Scanned with CamScanner nt with an ISPs ISP stands for Internet Service Provider ss tis an oF 0 ah eee : fa internet via diakup (using modem), direct (hard wired) or wirel ganisation that provides service, to access t i less cor : must have an account with an i nection. Since ‘eo h an internet service provider. For example, BSN Peat elie arp A browser iS software that allows us to access the i eee internet. opera, and Safari are some ofthe available browse: rs. exons pes OF INTERNET CONNECTIONS grows Google Chrome, Mozilla Firefox, Internet rent types of conn fc ‘1 sreciferent t¥ jections for connecting to the it , f ternet are discussed as follows: connection: This type of connecti gale ane nection utilises the telephone lines but is not preferred these days as itis very allow: jo one wi at /ork at a time, One can either use the phone to call or connect to the internet. gal subscriber Line (DSL): Iti ; pital aha : ‘ also a type of connection that uses the telephone lines, but is capable of transferring amu . : gaat SL filter removes the high-frequency interference, thus enabling simultaneous use of the telephone and data transmission. ernet: This type i cable Inter i type of connection uses the cable TV lines and gives fast access to the internet, even higher than that of the DSL lines. The DSL and cable internet systems are known as broadband internet. A broadband connection slows you to use the phone to call and connect to the internet simultaneously. -e with the speed that is incomparable satellite Connection: It helps in providing the internet access almost anywhere 1-speed internet ‘connection. tothat of the broadband. Signals from the satellite allow a user, with a dish, to haves hig ile devices, nowadays the 3G or 4G (Generation) standards are used. 36, 4G, or 5G Systems: To use the internet on mobi in terms of These standards allow higher data transfer speed and capacity. 5G Is the latest generation of cell phones network coverage and speed. i); It is a popular technology through which computers ‘and mobile devices exchange data ation to the internet using a radio Wireless Fidelity (Wi- wirelessly over the network. Wireless internet connects 2 home of business organis link between the customer's location and the service provider's facility, Wi-Fi is generally used to provide the internet connection to remote places, where it difficult to use WiteS WiFi is also used within smaller areas, like a home, an 2 to provide wireless internet to all the users there, educational institute or a corporate offic isa global interconnection of computers, whereas a WiFi ‘two different things. The Internet in the Figure 16.13, besides it the data from one point to another locally. As can Be seen The internet and Wi-Fi are ‘Wii can also connect the computers to printers and other WiFi enabled way of using radio signals to trans! connecting the users to the internet wirelessly, devices without using the physical wires: less system that allows you ability for Microwave Access. Its a type of wirel router, WiMAX operates WIMAX: It stands for Worldwide Interoper st, While Wi-Fi is avail to access the internet rea, covering 2 radius around 70 Mbps, whet ot is a physical location fram where WiFi a lable up to a distance of around 100 feet from the g station. The speed of the ee ager o of around 50 km from the base transmi WiMAX connection is reas the maximum WiFi speed is around 2Gbps. sccess to the internet is available. A hotspot a Kins @>_ Scanned with CamScanner i hotsP Wi-Fi Hotspot: A Wi Learning ~~ rants, hotels, FallWAY tations, OF argo. ble to those witha passyy, | HY restau Could be public ora private one Pubic otspots are salable at HOU a tees hotels charge the clients for this amenity, whereas most of the other P ty | is only availa A private hotspot is usually used in homes or offices and the access | i requiring inter lets, and even desktop computers requiring internet acq,, homes, all your devices, like smartphones, laptops, tabl yetwork provider. es to the n use a single internet connection, for which you need to pay certain chare Fig, 16.14: Wii Enabled Network DATA TRANSFER ON THE INTERNET Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the internet. Have you eve data reach us? How are you able to access the information on the internet that is storedia wondered how does tl far-off servers? Let us try to understand this. Data travels across the internet in packets. The information in the packet enables a computer to understand howit assimilates with any other data, the origin or source of the data, and the data's final destination. This techniques called packet switching and widely used for optimising data transfer over a computer network. Let us understand ths technique of data transmission, When you senda message or ane-mailtoanother computer connected on the internet, the data in the message or e-malis fist broken down into smaldatapackets. Once the | packets are ready, the address of the sending and receiving computer is enclosed with the data packets. When the data vackets are received by a computer the data packets are again reassembled in a way that they take the form of the »riginal message. The data packets reach their destination ‘sing different routes. The process is somewhat similar to |_——__ 16.15: Packet Switching 2nding parcel to your friend using a courier service. Scanned with CamScanner ‘PSA ASSESSMENT TIME Gane correct option. e Ce Local At inno roe ea Networks are combined together, you get a ca b.wan 3m MAN e connected together to share ., computers 2 paraare b. Software sp stands for H meet Protocol b. Internet Problems ¢. International Protocol Money aewiee that makes the diital signals from a computer suitable for transmission ever the internet Is called a 4. Tensmitter b. Model ¢. Modem js, Te catlest YPE of internet connection Was the wa... . connection. 4. ceble Internet b. Broadband Internet «, Dial-up ‘the TCP/IP uses v=. Switching technique to transfer message through the internet. a. Message b. Circuit . Packet the blanks. infection on one computer in a computer network can quickly spread to all the other computers. 2. special software must be installed on a computer network to prevent the breach of . 43, The full form of TCP is 4, WiFi or is @ way of connecting to the internet wirelessly. 5A. is a physical location from where Wi-Fi access to the internet is available. 6A known as a dumb switch. EINE . security» Wireless Fidelity Hotspot Virus» Hub» Transmission Control Protocol ©. Write T for True and F for False. 1. When two or more computer systems or other devices are connected together to interchange data, then itis known as a network. 2 Backup is one of the disadvantages of a computer network. Modem and browser are the requirements to access the internet WIMAX stands for world-wide interaction for microwave access. Private hotspot is not used in offices and homes. The device that routes the information around the network is called a router. Scanned with CamScanner pr a D. Answer the following questions. What is Wireless Fidelity? 1 2. What is the difference between Repeater and Router? 3. Explain data transfer in packet switching. 4. Name the different types of internet connections. Explain any two. For Better Concept Clarity 1. Find out about the different internet service providers that operate around your educational institution, Which type of the internet connection is being used in your schoo! lab? Meet the head of your computer department and find out the reasons for the choice of the internet connection. 2. Divide the students into three groups and make some charts on network architecture and display the best chart in the class. 3. Prepare a presentation on the network components and switching techniques. anti win Kis £83 Scanned with CamScanner

You might also like