Professional Documents
Culture Documents
Networks
Networks
NETWORK FUNDAMENTALS
• SERVER
• CLIENT
NETWORK FUNDAMENTALS
• HUB
• SWITCH
• ROUTER
All of the network types described below have assisted in the globalization phenomenon of
the recent decades
The network types that will be described briefly are the following:
• Local Area Network (LAN)
• Wireless Local Area Network (WLAN)
• Virtual Local Area Network (VLAN)
• Wide Area Network (WAN)
• Storage Area Network (SAN)
• Internet
• Extranet
• Virtual Private Network (VPN)
• Personal Area Network (PAN)
• Peer-To-Peer (P2P)
LAN
• LAN is a computer network that
connects computer systems that
are within a limited geographical
area
• Computer systems
interconnected with a LAN
usually have high data-transfer
rates between them.
• A client-server mode of
operation is commonly used.
LAN
• LANs allow the sharing of
peripheral devices between the
connected computer networks.
Ex printers
• This eliminates the need to buy
certain peripheral devices for
every computer system used.
• Another benefit of forming a
LAN is that, apart from
peripheral devices, data can
also be shared.
Wireless Local Area Network (WLAN)
• A WLAN links two or more computer
systems within a limited geographical
area, similar to LAN.
• The difference from a LAN is that WLAN
devices are connected using some sort
of wireless connection method. The
most common technology to build
wireless LANs is Wi-Fi, which allows the
exchange of data between computer
systems using radio waves.
Virtual Local Area Network (VLAN)
• Imagine that a business has created a LAN and has connected all its
computer systems and departments together, Departments such as
accounting, human resources, sales and production have all been
interconnected and all of the computer systems, from any department,
can have access to any shared resources from any department. That may
not be desirable, since departments may not want or need to exchange
any data with other, and having access to each other’s shared resources
may confuse instead of help.
Virtual Local Area Network (VLAN)
• The solution to this problem would be to set up a LAN
for every department, so each department will have its
own isolated network that cannot be accessed from the
outside.
• These LANs could be connected together, connecting the
switch from every LAN to a central switch, so as to be
able to communicate between them whenever
necessary without having access to each other’s shared
resources.
• Instead of having to set up switches and cabling in order
to create separate LANs for every department, a VLAN
can be used to partition the initial LAN, where every
department is connected, into logical separate networks.
Each logical separate network cannot see the computer
systems or the shared resources of other such logical
separate networks, without specific set up that allows it
to see them.
Wide Area Network (WAN)
• WAN is a computer network that connects computer
systems that are within a large geographical area.
The most obvious example of a WAN is the Internet.
• A WAN allowing individuals, businesses and
governments to carry out their daily business regardless
of location.
• A WAN typically consists of LANs connected together
over a broad geographical area.
• A leased line is a bidirectional telephone line that has
been rented for private voice, data exchange or
telecommunication use
Storage area network (SAN)
• A SAN is a network that is created so that large storage devices can be
accessible from servers is a convenient and easy way.
Storage area network (SAN)
• There can be various servers connected to a network such as a
company’s LAN.
• There are three servers because they provide three
distinct services to the clients.
• One server is amail server, responsible for managing emails.
• The other server is an application server, responsible for
managing centralized applications that can be used by
clients.
• Third server is a database server that is responsible for
managing company data stored in a database
• These servers require storage space in order to store their data and
create backups to prevent data loss, if any storage space fails.
Storage area network (SAN)
This is where the storage area network is
• required. The SAN is a network that connects the servers to the
storage devices so that they
• have enough storage space to complete their tasks. In Figure 3.8 the
SAN is comprised of
• three storage devices connected with the three servers described
before using a switch and
• Ethernet cabling. Examples of storage devices are disk arrays and tape
libraries.
Intranet
• An intranet is a private network that belong to a particular organization that is used
to securely share company information and computing resources among employees.
• Its main purpose is to facilitate communication between individuals or work groups and to
improve data sharing.
• Intranet resources and services are not available to the world outside the company.
• Confidential information, database, links, forms, and applications can be made available to
the staff through the intranet. So, it is like a private internet or an internal website that is
operating within an organization to provide its employees access to its information and
records
Internet
• The Internet is a global WAN connecting millions of computer systems. Since it
is a WAN, the Internet connects a large number of smaller networks together,
thereby creating the largest WAN network used by billions of users worldwide.
• The Internet provides an extensive number of services to users , World Wide
Web(WWW), which consists of websites and webpages, as well as support for
email, file transfer and other services. As such the Internet is not the same as
the WWW but rather the WWW is a service of the Internet.
• Unlike other networks, the Internet is
decentralized by design. That means that its
resources are not centrally stored or controlled
by a single server.
• Each computer system that is connected to
the Internet is independent and can share
services with the global Internet community,
thus becoming, in essence, a server of its own.
Internet of Things (IoT).
• The Internet of things (IoT) describes physical objects (or groups of such objects) with
sensors, processing ability, software, and other technologies that connect and exchange
data with other devices and systems over the Internet or other communications networks.
• Examples such as lighting fixture, security systems,
cameras, and other home appliances.
• All "things" carry the necessary hardware and software and
are assigned an IP-address.
Extranet
• imagine a business that operates a network of computer systems for
its everyday operations. This private network is contained within the
business, whether it's a LAN or a WAN, and can only be accessed by
the personnel that have the required credentials (ex. username and
password).
• The specific business may wish to securely share part of its network
(and information) with suppliers, partners, customers or other
businesses without making its whole network available to them or the
public..
Extranet
• Extranet in simple terms provides a secure network for an
organization to share information with relevant people outside the
organization.
• It is part of an organization's intranet divided via a firewall.
• This part of the network that is extended to users outside the
company is termed as extranet.
• Extranets require security and privacy techniques so as the public or
outside users are not permitted to access any secure data.
• A firewall controls the access rights and allows access to the intranet
only to people who are authorized.
Virtual Private Network
• A VPN is a computer network that connects two or more computer
systems, similar to a LAN or a WLAN, but also allows clients from
remote locations to connect to the network and appear to be inside
the LAN as if they were physically present.
Virtual Private Network
• When you connect to a VPN, it is through a secure tunnel where your
data is encoded. This means that your data is transformed into an
unreadable code as it travels between your computer and the server
of the VPN.
• Your device is now seen as being on the same local network as your
VPN. So your IP address will actually be the IP address of one of your
VPN Provider’s servers.
• You may browse the internet as you please, safe in the knowledge
that the VPN acts as a barrier, protecting your personal information.
Virtual Private Network
Virtual Private Network
• The combination of the VPN server and the encryption tunnel blocks
your ISP, governments, hackers, and anyone else from spying on you
as you navigate the web
• A VPN connection establishes a secure connection between you and
the internet. Via the VPN, all your data traffic is routed through an
encrypted virtual tunnel. This disguises your IP address when you use
the internet, making its location invisible to everyone. A VPN
connection is also secure against external attacks.
Personal Area Network (PAN)
• PAN is a network that interconnects devices that are centered around an individual
person's workspace.
• It can be understood as a LAN that supports only one person, instead of a group of
people, and covers a very short range, a maximum of 10 meters.
• An example of a typical PAN would involve a mobile computer, a smartphone and a tablet
all interconnected and sharing data such as emails, calendars, photographs, etc.
• Devices on PANs can connect both wired (typically through USB) and wirelessly (typically
through Bluetooth) depending on the technologies used.
• A PAN using a wireless group of devices using
Bluetooth technology in order to interconnect is also
known as a piconet
Peer-To-Peer
• P2P is a network that does not utilize the client/server model where clients
request resources and servers provide them.
• Instead, a P2P network uses a distributed network architecture where all the
computer systems (called nodes or peers) in the network are decentralized and
are both clients and servers at the same time,
consuming and supplying resources from and
to the other computer systems connected
to the network.
Importance of standards in the construction of
networks
• If only one computer system manufacturer existed, offering one type
of computer system to be used everywhere, the communication
between computer systems would be easy. There would only be one
standard for communication and non other. However, this is not the
case in the world today. There are a number of computer system
manufacturers and a wide variety of different types of computers.
Although hardware in these computer systems differs, we may need
these different computer systems to communicate. To achieve this, a
specific standard has to be followed.
Importance of standards in the construction of
networks
• Definition : A standard is a set of specifications for hardware or
software, agreed upon by academic and industry contributors. A
standard makes it possible for many manufacturers to create products
that are compatible with one another
PRESENTATION LAYER
• Translation, Encryption/ Decryption, Compression:
• Provides data format information, data compression information and
Presentation data encryption information to the application
APPLICATION LAYER
• These applications produce the data, which has to be transferred
over the network.
• Wireless communication
1) Microwave Signals ( High bandwidth , no obstacles, less secure)
2) Infrared (Shorter distances , security )
3) Bluetooth
Use of metal conductors , fiber optic cables and
wireless transmission
Wired communication
1) Copper Cable (Metal Conductors) used in the computer network
2) Coaxial Cable (Tv Signals, Low installation cost )
3) Unshielded Twisted Pair Cable (UTP) (LAN , telephone network , interference, low
cost )