Professional Documents
Culture Documents
ON
NETWORKING
Name Name
Director (faculty)
Date: name
(GL)
2 Cont…
Acknowledgement
3 Cont…
Table Of Contents
What is Computer Network?........................................................................... 5
Overview of a Network .................................................................................... 6
Communication processors ........................................................................... 7
Communication media .................................................................................... 9
Telecommunication software ....................................................................... 11
Types of networks ......................................................................................... 14
LOCAL AREA NETWORK (LAN):-................................................................. 15
History of LAN: .............................................................................................. 16
LAN TRANSMISSION METHODS:................................................................. 20
METROPOLITAN AREA NETWORK (MAN):................................................. 21
WIDE AREA NETWORK (WAN):.................................................................... 21
WAN TECHNOLOGIES: ................................................................................. 22
WIRELESS NETWORKING:........................................................................... 23
NETWORK ARCHITECTURE:........................................................................ 24
NETWORK PROTOCOLS: ............................................................................. 25
NETWORK DEVICES: .................................................................................... 26
Software ......................................................................................................... 28
INTERNET: ..................................................................................................... 30
History of internet : ....................................................................................... 31
INTRANET & EXTRANETS: ........................................................................... 32
METHODS OF INTERNET CONNECTIVITY: ................................................. 33
BENEFITS OF A COMPUTER NETWORK: ................................................... 34
4 Cont…
What is Computer Network?
5 Cont…
Overview of a Network
Terminals: Terminals include video display terminals and other end user
workstations. Any input/output device that uses a network to transmit or receive data is
a terminal. This includes microcomputers, telephones, fax machines etc.
6 Cont…
computer may serve as a host computer for a large Organization’s
network, assisted by minicomputers acting as network servers for smaller networks
consisting of end user microcomputer workstations.
No matter how large and complex the real world networks may appear to be these five
basic categories of components must be at work to support a network.
Communication processors
7 Cont…
1. Modems: Modems are the most common type of communications processors.
They convert the digital singals from a computer or transmission terminal at one
end of a communications link into analog signals, which can be transmitted over
ordinary telephone lines. A modem at the other end of the communication line
converts the transmitted data back into digital form at the receiving terminal. The
process is known as modulation and demodulation, and the world modem is a
combined abbreviation of these two words. Modems come in several forms
including small stand-alone units. Plug in circuit boards, and microelectronic
modem chips.
8 Cont…
order, and transmits them along a broadband channel at very high speeds to the
receiver.
4. front end processros: A front end processor is located at the site of the CPU or
the host computer and its purpose is to relieve the central computer free for
processing applications programs. Here we can see that communication
processing and data processing equipments are nearly alike. Indeed front-end
processors are Computers they have some identical circuitry and perform many of
the operations that data processing equipment performs. The only difference
between the two kinds of equipments is in their purpose.
Communication media
Channels also called communication lines or links are the means by which data is
transmitted between the sending and receiving devices in a network. A channel makes
use of a variety of media. These include twisted-pair wire, coaxial cables and fiber
optic cables, all of which physically link the devices in a network. Channels also
included microwave systems, communications satellite systems and cellular radio, all of
which use microwave and other radio waves to transmit and receive data.
1. Twisted-pair wire:- This is the oldest and still most common transmission line
and consists of copper wires twisted into pairs. These lines are used in established
9 Cont…
communications networks throughout the world for both voice and data
transmission.
3. Fibre optic cables:- Fibre optic cables consisting of one or more hair thin
filaments of glass fiber wrapped in a protective jackets. They can conduct light
pulses generated by lasers at transmission rates as high as 2 billion bits per
second. This is about ten times greater than coaxial cables and 200 times better
than provide substantial size and weight reduction as well as increased speed and
greater carrying capacity. A half inch diameter fiber optic cable can carry up to
50,000 channels, compared to about 5,500 channels for a standard coaxial cable.
10 Cont…
mountain peaks. Microwave transmission consists of high frequency radio waves
that travel in straight lines through the air rather than through wires.
Telecommunication software
11 Cont…
Functions of Telecommunication software:- Telecommunication software
packages provide a variety of communication support services. The number and type of
terminals, Computers, and communication processors and communications activities
involved determine the capabilities of the programs required. The telecommunication
software provides several major functions such as:
Acess control:- This function establishes the connection between terminals and
computers in a network. The software works with a communications processor
(such as a modem) to connect and disconnect communication links and
established parameters such as transmission speed, mode, and direction. This
function may also involve automatic telephone dialing and redialing, logging on
and off with appropriate account numbers and security code, and automatic
answering of telephone calls from another Computer.
12 Cont…
network and forms waiting lines (queues) of transmission requests. It also logs
statistics of network activities and resource usage and detects and corrects errors.
13 Cont…
Types of networks
There are many different types of networks. However from an end user’s point of view
there are two basic types :-
Local Area Networks (LANs) :- The Computers are geographically close
together (that is, in the building).
Wide Area Networks (WANs) :- The Computers are farther apart and are
connected by telephone lines or radio waves
Protocol :- The protocol defines a common set of rules and signals that computers on
the network use to communicate. One of the most popular protocols for LANs is called
Ethernet. Another popular LAN protocol for PCs is the IBM token-ring network.
14 Cont…
CLASSIFICATION:-
A Local Area Network or LAN is a group of computers in a localized area. The term-
localized area can refer to a small room, twenty feet by ten feet, or to a factory spanning
several acres. Another widely accepted definition states that a LAN is a computer
network confined to a building or a cluster of buildings. A LAN is a network that is
installed for the exclusive use of a particular office or a factory of an organization. You
will rarely come across two or more organizations in an office complex sharing a LAN.
LANs are restricted in size.
Most LANs connect workstations and personal computers. Each node
(individual computer) in a LAN has its own CPU with which it executes programs, but
it is also able to access data and devices anywhere on the LAN. This means that many
users can share expensive devices, such as laser printers, as well as data. Users can also
use the LAN to communicate with each other, by sending e-mail or engaging in chat
sessions.
15 Cont…
There are many different types of LANs – token-ring networks, Ethernets, and
ARC nets being the most common for PCs. Most Apple Macintosh networks are based
on Apple’s AppleTalk network system, which is built into Macintosh computers.
LANs are capable of transmitting data at very fast rates, much faster than data
can be transmitted over a telephone line; but the distances are limited, and there is also a
limit on the number of computers that can be attached to a single LAN.
History of LAN:
In the 1980s, there were large room-sized mainframe computers that had special
terminal displays and keyboards. An example of a mainframe was the IBM S/370 or
IBM System/3, which was commonly running a traditional business application like
payroll or inventory. These “dumb terminals” were of a single fixed function and often
required special wiring required months of programming. Very little off-the-shelf
software was available and most programs were custom-written, often tailored to
accommodate the proprietary terminals.
With the arrival of the 1970s came the mini-computer, which made use of a
standard terminal interface and a slow, but cheap, ASCII serial connection. While the
terminals were dropping in size and price, they still relied completely on the mini-
computer for any intelligence. Unfortunately, the cabling for the mainframe terminals
was different from the cabling for the mini-computers.
The personal computer came on the scene in 1980 with the Apple II and then
into the business world with the IBM PC in 1981. Wildly popular software programs,
often referred to as “killer apps” were VisiCalc and WordStar. Sharing of these
16 Cont…
spreadsheet and document files was accomplished by taking the diskette from machine
to machine, a process jokingly referred to as “sneaker-net.” Not only was this method
inefficient, it created version control problems. When there were several copies of a file
floating around, it was difficult to establish which one was the official version when
updates occurred.
Wide Area Networks were still in place for the mini and mainframes, and the
new PCs could emulate those older WAN protocols for sharing files. The PC could
emulate a fixed function terminal and be able to run VisiCalc as well. It was the best of
both worlds. However, there was still no central repository for files.
Eventually, Novell and Microsoft independently came up with the idea of
LANs to connect the PCs together. Because disks and printers were so expensive at that
time, the original intent of a LAN was to allow users to share disk and printer resources.
As a result, the first LANs were designed simply to avoid transportation of newly
created files via diskettes from one computer to another. Later, PC LANs improved to
the point where they were no longer dependent on mainframe and mini computers. As
LANs continue to desktop, they share more kinds of resources and more kinds of data.
LAN TOPOLOGIES:
Topology is a term that refers the shape of the network and the layout of cabling from a
bird’s eye view, much as a floor plan identifies the layout of offices and hallways in a
building. Common topologies include star, ring and bus.
17 Cont…
Theoretically, any kind of cable medium could be wired together to create an infinite
variety of network layouts. But, in fact, certain implementations of topology have
become more popular while other implementations have simply never caught on.
Consider some of the most common types of LAN topology.
As we seen earlier, topology is the geometric arrangement of the Computers in a
network. Common topologies include star, ring and bus.
Star Network: The Star network is frequently used to connect one or more
small computers or peripheral devices to a large host computer or CPU. Many
organizations use the star network or a variation of it in a time-sharing system, in which
several users are able to share a central processor.
In a time sharing setup, each terminal receives a fixed amount of the central
CPU’s time, called a time slice. If you are sitting at a terminal and cannot complete your
task during the time slice, the computer will come back to you to allow you to do so.
Actually, because the CPU operates so much faster than terminals, you will probably
not even notice that the CPU is away.
If the user wants to send a document or message to a user at another computer,
the message is routed through the central communications controller. Another common
use of the star network is to connect several microcomputers to a mainframe computer
that allows access to an organization’s database.
Ring Network: The ring network is a local area network whose topology is
a ring-can be as simple as a circle or point-to-point connections of computers at
dispersed locations, with no central host computer or, communications controller. That
18 Cont…
is, all of the nodes are connected in a closed loop. Messages travel around the ring, with
each node reading those messages addressed to it. One of the advantages of ring
networks is that they can span larger distances than other types of networks, such as bus
network, because each node regenerates messages as they pass through it.
Bus Network: Bus network are similar to ring networks except that the ends
are not connected. All communications are carried on a common cable or bus and are
available to each device on the network.
Mesh Topology: The Mesh topology is a variation of the bus, in which all
devices are connected to one another in a daisy-chain fashion, as opposed to connecting
in sequence to a single network cable. Each node is capable of transmitting, receiving,
and routing data to other nodes on the network.
Tree Topology: The Tree topology is essentially a hybrid of the bus and star
layouts. The basic topology is similar to that of a bus, with nodes connected in sequence
to a linear central cable. But tree networks may have “branches” that contain multiple
workstations that are connected point-to-point in a star-like pattern. Signals from a
transmitting node travel the length of the medium and are received by all other nodes.
LAN APPLICATIONS:
Software applications are programs designed for the end user (spreadsheets, games,
graphics). Sharing of application is one of the most important reasons for installing
LANs. Specialized applications include:
19 Cont…
Vertical applications are specific to a particular industry (medical,
government, education, etc.).
Strategic applications are vital to business operations, including Oracle, SAP,
and Lotus Notes.
Vestigial applications refer to critical business applications that pre-date the
LAN, such as MINX.
20 Cont…
METROPOLITAN AREA NETWORK (MAN):
A MAN covers an area larger than LAN, but it uses the LAN technology to connect the
computers. It covers an area of a state or a city and includes tow or more LANs. For
example, an organization may have two offices in different parts of the city. The
computers in each of these offices can be connected through cables and will form a
LAN. Connecting the two LANs will result in a MAN. There are three important
features, which discriminate MANs from LANs or WANs:
The network size falls intermediate between LANs and WANs. A MAN
typically covers an area of between 5 and 50 km diameter. Many MANs cover an area
equivalent to the size of a city, although in some cases MANs may be as small as a
group of buildings or as large as the North of Scotland.
A MAN often acts as a high-speed network to allow sharing of regional
resources (similar to a large LAN). It is also frequently used to provide a shred
connection to other networks using a link to a WAN.
21 Cont…
WAN TECHNOLOGIES:
A WAN is a data communications network that covers a relatively broad graphics area
and that often uses transmission facilities provided by common carriers, such as
telephone companies.
22 Cont…
WIRELESS NETWORKING:
Wireless LANs frequently augment rather than replace wired LAN networks often
providing the few meters of connectivity between a backbone network and the mobile
user. The following list describes some of the many applications made possible through
the power and flexibility of wireless LANs:
Doctors and nurses in hospitals are more productive because hand held or
notebook computers with wireless LAN capability deliver patient information
instantly.
Consulting or accounting audit engagement teams or small workgroups increase
productivity with quick network setup.
Training sites at corporations and students at universities use wireless
connectivity to facilitate access to information, information exchanges, and
learning.
23 Cont…
Networks managers installing networked Computers in older buildings find that
wireless LANs are a cost-effective network infrastructure solution.
Retail store owners use wireless networks to simply frequent network
reconfiguration.
Trade show and branch office workers minimize setup requirement by installing
preconfigured wireless LANs needing no local MIS support.
Warehouse worker use wireless LANs to exchange information with central
database and increase their productivity.
Network managers implement wireless LANs to provide backup for mission
critical applications running on wired networks.
Senior executives in conference rooms make quicker decision because they have
real time information at their fingertips.
NETWORK ARCHITECTURE:
24 Cont…
architecture, on the other hand, is one whose design in proprietary, making it difficult to
connect the system to other systems.
NETWORK PROTOCOLS:
A protocol is an agreed-upon format for transmitting data between two devices. The
protocol determines the following:
1. The type of error checking to be used.
2. Data compression method, if any.
3. How the sending device will indicate that it has finished sending a message.
4. How the receiving device will indicate that it has received a message.
25 Cont…
There are a variety of standard protocols from which programmers can choose. Each has
its own particular advantage and disadvantages; for example, some are simpler than the
others, some are more reliable, and some are faster.
From a user’s point of view, the only interesting aspect about protocols is that your
computer or device must support the right ones if you want to communicate with other
computers. The protocol can be implemented either in hardware or in software. Some of
the popular protocols are TCP/IP, HTTP, FTP, SMTP, POP, Token-ring, Ethernet,
Kermit, MNP, etc.
NETWORK DEVICES:
Hub, Switch, and Router: Most network equipment manufactures offer hub,
switch, or router as their main products. This is because these are the devices needed to
set up an Ethernet network in today’s UTP cabling and star topology environment.
While most people has heard about them, there are still many who don’t fully
26 Cont…
understand the differences between these devices. To understand their functions, it is
necessary to look into the OSI model.
Switches are a fundamental part of most networks. They make it possible for
several users to send information over a network at the same time without slowing each
other down. Just like routers allow different networks to communicate with each other,
switches allow different nodes of a network to communicate directly with one another in
a smooth and efficient manner.
Repeaters: Repeaters work at the physical level. They are not intelligent
workers, which means that they do not perform switching or routing functions. A
repeater’s main task is to boost the signal it receives from one segment of a network for
transmission on a different segment. Generally, a repeater is used to extend a segment of
a network.
27 Cont…
user will not log into the firewall or give passwords to get through. This type of firewall
will not be transparent when it refuses a user request!
Software
In addition to hardware’s importance in construction a network, software plays a crucial
role in the network’s function.
This section is not meant to cover network operating system in depth, nor are the
operating systems covered here are the only systems available. Many networks consist
of a variety of different Computers and operating systems. The task of a network
operating system is to give all of these various components the tools they need to
communicate directly with other host and resources on the network.
Novell:
Netware 5 compatibility, IP and IPX protocol integration, most current version of NDS,
IP and Z.E.N. works ready client software, a three user demonstration copy of Netware
5 , the Z.E.N. works starter pack, five user version of Oracle8, supports network access
for remote employees, Netscape FastTrack Server for NetWare, Netscape
Communicator, Multi-protocol Router(v3.2), Perl (v5.1) and NetBasic (v6) scripting
tools, integrated with all reliability updates, year 2000 compatible.
28 Cont…
TCP/IP
Unlike a packaged network operating system, the TCP/IP protocol suite is the standard
protocol suite that allows internet access. Sometimes this collection of protocols is
called a TCP/IP stack. All internet compatible NOS’s include a TCP/IP suite.
TCP/IP software is normally included with UNIX installations. Most versions of the
UNIX operating system (including the different distribution on Linux) have everything
needed to use a UNIX Computer as a network server or client.
Windows NT / 2000
Windows NT 4.0 provides traditional network services, web, ftp, DNS, POP mail and
gopher servers. NT supports files haring for DOS, Windows, UNIX and Macintosh and
includes TCP/IP protocols and NetBEUI protocols.
Optionally, Backoffice a server suite, includes NT server, firewall, cache, database,
internet mail, small business, legacy integration, intranet, remote authentication, and
secure business servers, network resource prioritization and usage statistics tools, and a
web editing package.
Windows NT Server 4.0 requires either an Intel 486/33 or higher CPU, and 125 MB
hard drive space, or a RISC processor compatible with NT and 160 MB of space.
Additionally, 16 MB of memory, a CD-ROM and VGA video are required.
29 Cont…
INTERNET:
The Internet is made up of millions of computers linked together around the world in
such a way that information can be sent from any computer to any other 24 hours a day.
These computers can be in homes, schools, universities, government departments, or
business small and large. They can be any type of computer and be single personal
computers or workstations on a school or a company network. The Internet is often
described as ‘a network of networks’ because all the smaller networks of organizations
are linked together into the one giant network called the Internet. All computers are
pretty much equal once connected to the internet, the only difference will be the speed
of the connection which is dependent on your Internet Service Provider and your own
modem.
The Internet is a loose amalgam of thousands of computer networks reaching
millions of people all over the world. Although its original purpose was to provide
researchers with access to expensive hardware resources, the Internet has demonstrated
such speed and effectiveness as a communications medium that it has transcended the
original mission. It has, in recent years, grown so large and powerful that it is now an
information and communication tool you cannot afford to ignore.
Today the Internet is being used by all sorts of people and organizations
newspapers, publishers, TV stations, celebrities, teachers, librarians, hobbyists, and
business people for a variety of purposes, from communicating with one another to
accessing valuable services and resources. You can hardly pick up a newspaper or
magazine without reading about how the Internet is playing a part in someone’s life a
project or discovery.
30 Cont…
History of internet :
The internet universe was created by an unassuming bang in 1969 with the birth of
ARPANET, an experimental project of the U.S. Department of Defense Advanced
Research Projects Agency (DARPA). It is a humble mission, to explore experimental
networking technologies the would link researchers with remote resources such as larg
computer systems and database. The success of ARPANET helped cultivate numerous
other networking initiatives, which grew up intertwinded, 25 years later, these have
evolved into an ever expanding, complex organism comprising tens of millions of
people and tens of thousands of networks.
The internet is habited by millions of regular folks “non-techies” who use it daily to
communicate and search for information in 1992. it’s important to understand the
significance of the internet’s growth and popularity. In one sense it could be compared
to the proliferation of fax machines in the late 1980’s. Similarly stand-alone computers
are useful, but their potential is limited by isolated applications – word processors and
spreadsheets, for example -- and the amount of money you have to spend on disk drives
and CD-ROMS. A mere direct full time or dial-up connection to the worldwide internet
gives you access to more info-goods, services, and people than you’ll ever find on your
own isolated computer or local-area network.
31 Cont…
How large is the internet? According to the internet society (ISOC), a professional
organization of internet developers, influencers and users as of spring 1994, the internet
reaches 69 countries directly and 146 via email gateways, and consisted of 23,659
networks and 2.217 million Computers.
Users can put the information on the web pages on the intranet, and all
interested parties can access the information, read it and download it without wasting
the paper to copy it, or time to make copies and circulate them.
32 Cont…
The difference between intranets and extranets is that an intranet is meant for
the use within an organization, whereas in an extranet, an external user connects to the
organization’s intranet through the Internet gateway and would be able to use the
intranet as if he is a physical user on the network. These days it is called as Virtual
Private Network. Using VPN client software, an extranet user connects to the company
intranet through a secured connection through the Internet.
There are several methods of connecting to Internet for the home and small network
users. However, the most popular methods are following:
Dial-up
Internet Connection Sharing
Dial-up:
In a dial-up connection, you can connect to Internet using the telephone line and
modem. All Windows operating systems support the feature of dial-up connection. You
need to just configure modem and dial-up connection in your operating system.
33 Cont…
Internet Connection Sharing:
In a home network, a computer having Internet connection can share its connection
services with other computers using the Internet connection sharing ICS Feature. The
computer providing the services of Internet connection is called connection-sharing
computer.
Computer Networks do not just form a network of computers. They also form
a network of people. An office with diverse departments and employees working on
various jobs can be made to function as a single unit by creating a network. Here are
some of the benefits of the computer network.
1. Resource Sharing: Using a network, you can share expensive resources like
laser printers, modem, graphic devices, and data storage units. This enables several
users to access these resources simultaneously. You can store software and programs at
a Resource sharing allow organizations to purchase sophisticated and faster equipment.
2. Data Sharing: Computer networks enable data sharing that is faster and more
efficient than using devices such as floppies and compact disks.
34 Cont…
3. Communication: Another use of a network is that it can help you make the
computer perform like an office intercom. You can use the computer to flash messages
on the screen of other computers in the office. This would save employees the time
spent in going to someone in another department or on another floor to deliver a
message or a memo. This also reduces the need for face-to-face meetings and circulation
of memos among employees.
35 Cont…
Biliography:
Search engine:
Yahoo
Google
AltaVista
36 Cont…