Topic-4&5
Computer Network:
Introduction to Networks
Components of Network
Classification/ Types of networks
Network Topologies
Advantages & Disadvantages
Computer Networks
Computer network
connects two or
more autonomous
computers.
The computers can
be geographically
located anywhere.
Use of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)
Applications
E-mail
Searchable Data
(Web Sites)
E-Commerce
News Groups
Internet Telephony
(VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
Advantages and Disadvantages of
Network
Advantages
Speed
Cost
Centralized Software
Management
Resource Sharing
Electronic Mail
Flexible Access
Workgroup Computing
(Simultaneous)
Disadvantages
Server Faults
Network Faults
Hackers
Centralized decision
Degradation in performance
Network Management can be difficult
Security issues
Types of Networks
Based on Topology
Star Topology
Bus Topology
Ring Topology
Mesh Topology
Combination Topology
Based on Architecture
Client-Server
Peer-to-Peer
Based on Size
LAN
WAN
MAN
PAN
Intranet and Extranet
VPNs
Network Topology
Defines the way in
which computers,
printers, and other
devices are
connected.
Describes the layout
of the wire and
devices as well as
the paths used by
data transmissions.
Star & Tree Topology
The star topology is the most
commonly used architecture in
Ethernet LANs.
Oldest form
Larger networks use the extended
star topology also called tree
topology.
Bus Topology
Commonly referred
to as a linear bus, all
the devices on a bus
topology are
connected by one
single cable.
Ring Topology
A frame travels around the
ring, stopping at each node. If
a node wants to transmit
data, it adds the data as well
as the destination address to
the frame.
The frame then continues
around the ring until it finds
the destination node, which
takes the data out of the
frame.
Single ring All the devices on
the network share a single
Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect LANs and
for mission critical
networks like those
used by banks and
financial institutions.
Expensive and difficult.
Client-Server
Concept of Websites
Peer-to-Peer
There in no central Server
All Nodes are connected to every other
node in the Network
LAN, MAN, WAN,PAN, Intranet, Extranet,
VPN
Network in small geographical Area (Room, Building
or a Campus) is called LAN (Local Area Network)
Network in a City is call MAN (Metropolitan Area
Network)
Network spread geographically (Country or across
Globe) is called WAN (Wide Area Network)
PAN is network of Personal Devices like cell phones,
portable printer, laptop etc
Intranet and Extranet are like Internet dedicated to
an Organization
VPN is like internet dedicated to organization that
enables access from anywhere using internet. Data
is encrypted for the security
Network Components
Networking Media
Networking Devices
Nodes/ Connecting Devices (Computers,
Printers, Servers etc)
Networking Software
Applications
Networking Media
Networking media
can be defined
simply as the means
by which signals
(data) are sent from
one computer to
another (either by
cable or wireless
means).
Networking Devices
Modem
Hub
Switches
Routers
Gateway
Bridges
Repeaters
Computers: Clients and
Servers
In a client/server network
arrangement, network
services are located in a
dedicated computer whose
only function is to respond
to the requests of clients.
The server contains the file,
print, application, security,
and other services in a
central computer that is
continuously available to
respond to client requests.
Networking Protocol: TCP/IP
Security Issues
Malicious Program:
Virus
Worms
Trojan Horse
Denial-of-Service
Phishing: Getting sensitive information by
masquerading
Spoofing: Masquerades as others
Defamation
Stalking
E-mail Bombing
Data Diddling
Salami Attack
Logic Bombs
Others: Intellectual Property Crime, Forgery