Computer Network

 

Computer:

Ø An electronic machine that can store, find and arrange information, calculate amounts and control other machines.

Ø A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.

 

Network:

Ø A network is a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources.

Ø A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

Ø A network is defined as the connection of at least two computer systems, either by a cable or a wireless connection. The simplest network is a combination of two computers connected by a cable. This type of network is called a peer-to-peer network. There is no hierarchy in this network; both participants have equal privileges. Each computer has access to the data of the other device and can share resources such as disk space, applications or peripheral devices (printers, etc.).

 

 

 

Computer Network:

Ø A computer network is a group of interconnected nodes1 or computing devices that exchange data and resources2 with each other. A network connection between these devices can be established using cable or wireless media. Once a connection is established, communication protocols3 -- such as TCP/IP4, Simple Mail Transfer Protocol5 and Hypertext Transfer Protocol6 -- are used to exchange data between the networked devices.

·       Nodes: Node is a physical device that is be part of a network infrastructure. Examples of network nodes include switches or routers, as well as data devices such as computers, printers, or servers. Each node must be unique on the network, so that the network can properly route the information to the correct device.

·       Resource: A resource is any hardware or software accessible by a computer, network, or another object connected to a computer. For example, a printer connected to a network is an example of a shared resource.

·       Protocol: a set of rules outlining how connected devices communicate across a network to exchange information easily and safely.

·       TCP/IP: TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of communication protocols that define the standards for transmitting data over computer networks, including the internet. The TCP/IP protocol is the foundation of the internet and enables devices to communicate with each other using a common language.

·       Simple Mail Transfer Protocol: SMTP is an application layer protocol. SMTP is used to send and receive email.

·       Hypertext Transfer Protocol: HTTP provides a standard between a web browser and a web server to establish communication. It is a set of rules for transferring data from one computer to another. Data such as text, images, and other multimedia files are shared on the World Wide Web. Whenever a web user opens their web browser, the user indirectly uses HTTP.

Ø A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

Ø A group of computers which are connected to each other and follow similar usage protocols for the purpose of sharing information and having communications provided by the networking nodes is called a Computer Network.

 

Types of Computer Networks:

There are five main types of Computer Networks:

LAN (Local Area Network) –

·       Systems connected in a small network like in a building or a small office

·       It is inexpensive

·       It uses Ethernet or Token-ring technology

·       Two or more personal computers can be connected through wires or cables acting as nodes

·       Transfer of data is fast and is highly score

PAN (Personal Area Network) –

·       The smallest computer network

·       Devices may be connected through Bluetooth or other infra-red enables devices

·       It has a connectivity range of upto 10 metres

·       It covers an area of upto 30 feet

·       Personal devices belonging to a single person can be connected to each other using PAN

MAN (Metropolitan Area Network) –

·       A network that can be connected within a city, for example, cable TV Connection.

·       It can be in the form of Ethernet, ATM, Token-ring and FDDI

·       It has a higher range.

·       This type of network can be used to connect citizens with the various Organizations.

WAN (Wide Area Network) –

·       A network which covers over a country or a larger range of people.

·       Telephonic lines are also connected through WAN.

·       Internet is the biggest WAN in the world.

·       Mostly used by Government Organizations to manage data and information.

VPN (Virtual Private Network):

·       A network which is constructed by using public wires to connect to a private network.

·       There are a number of systems which enable you to create networks using the Internet as a medium for transporting data.

·       These systems use encryptions and other security mechanisms to ensure only authorized users can access.

Internet:

Ø A complete network of globally linked computers, the Internet also enables the users to transfer information and communication. This makes use of the TCP/IP protocol suite while communicating. Available in both wired and wireless mode, the internet also includes a wide range of networks such as private, public, government, organization, etc. It supports multiple users and allows the transfer of a massive amount of data.

Ø Internet is used to connect the different networks of computers simultaneously. It is a public network therefore anyone can access the internet. On the internet, there are multiple users and it provides an unlimited of information to the users.

Intranet:

Ø A part of the network, but controlled and used by a private organization, Intranet has restrictions and can support only fewer users. Hence, only limited data can be shared over it. Intranet is usually operated on a client/server platform. This enables the organizations to share files, data, organize information, manage and share calendars, files, etc.

Ø Intranet is the type of internet that is used privately. It is a private network therefore anyone can’t access the intranet. On the intranet, there is a limited number of users and it provides a piece of limited information to its users.





Difference between Internet and Intranet

S.No.

Internet

Intranet

1.

Internet is used to connect different networks of computers simultaneously.

Intranet is owned by private firms.

2.

On the internet, there are multiple users.

On an intranet, there are limited users.

3.

Internet is unsafe.

Intranet is safe.

4.

On the internet, there is more number of visitors.

In the intranet, there is less number of visitors.

5.

Internet is a public network.

Intranet is a private network.

6.

Anyone can access the Internet.

In this, anyone can’t access the Intranet.

7.

The Internet provides unlimited information.

Intranet provides limited information.

8.

Using Social media on your phone or researching resources via Google. 

A company used to communicate internally with its employees and share information.

9.

The Internet is a global network that connects millions of devices and computers worldwide.

An intranet is a private network that connects devices and computers within an organization.

10.

It is open to everyone and allows access to public information, such as websites and online services.

An intranet is only accessible to authorized users within the organization.

11.

It is used for communication, sharing of information, e-commerce, education, entertainment, and other purposes.

An intranet is primarily used for internal communication, collaboration, and information sharing within an organization.

12.

Users can access the Internet from any location with an Internet connection and a compatible device.      

Access to an intranet is restricted to authorized users within the organization and is typically limited to specific devices and locations.

13.

Security measures, such as firewalls, encryption, and secure sockets layer (SSL) protocols, are used to protect against threats like hacking, viruses, and malware.

Intranets employ similar security measures to protect against unauthorized access and ensure the privacy and integrity of shared data.

14.

The Internet is a public network that is not owned by any particular organization or group.

Intranets are private networks that are owned and managed by the organization that uses them.

15.

Examples of Internet-based services include email, social media, search engines, and online shopping sites.

Examples of intranet-based services include internal communications, knowledge management systems, and collaboration tools.

 

Network Topology:

(Topology: Studies how spaces are organized and how they are structured in terms of position.)

Ø A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network.

Ø Network Topology is the schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection.

Ø Network topology refers to the manner in which the links and nodes of a network are arranged to relate to each other.

Ø Topologies are categorized as either physical network topology, which is the physical signal transmission medium, or logical network topology, which refers to the manner in which data travels through the network between devices.

Types of Network Topology:

1.    Bus Topology                                 4.      Tree Topology

2.    Star Topology                                 5.      Hybrid Topology

3.    Ring Topology                                6.      Mesh Topology



BUS Topology:

Ø Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear.

Ø The simplest type of topology is called a bus topology, in which network communication takes place over a single bus or channel. There are numerous taps and drop lines connected to the bus. Drop Lines are cables that connect the bus to the computer, and taps are connectors. In other words, each node is connected to a single transmission line.

Advantage/Benefits

Disadvantage/Drawbacks

Ø  Easy to install and use.

Ø  Other nodes won't be impacted if one node fails.

Ø  Less wiring is needed.

Ø  Economical to implement.

Ø  Useful in small networks.

Ø  Efficiency decreases as nodes increase (strength of signal decreases).

Ø  A bus failure will result in network failure.

Ø  The bus's limited length means that only a certain number of nodes can connect to it.

Ø  As messages are broadcast to all nodes, there are more security concerns and risks.

 

Features of Bus Topology

Ø It transmits data only in one direction.

Ø Every device is connected to a single cable.



Star Topology:

Ø In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node.

Ø A computer network topology known as a star topology connects each node to a central hub. The hub or switch acts as a bridge between the nodes. Any node making a service request or offering a service must first get in touch with the hub. The other connected devices function as clients in a star topology, while the hub and switch serve as a server.

Advantage/Benefits

Disadvantage/Drawbacks

Ø  It is very reliable – if one cable or device fails then all the others will still work

Ø  It is high-performing as no data collisions can occur

Ø  Less expensive because each device only needs one I/O port and wishes to be connected with hub with one link.

Ø  Easier to put in

Ø  Robust in nature

Ø  Easy fault detection because the link are often easily identified.

Ø  No disruptions to the network when connecting or removing devices.

Ø  Each device requires just one port i.e. to attach to the hub.

Ø  If N devices are connected to every other in star, then the amount of cables required to attach them is N. So, it’s easy to line up.

Ø   

Ø  Requires more cable than a linear bus .

Ø  If the connecting network device (network switch) fails, nodes attached are disabled and can’t participate in network communication.

Ø  More expensive than linear bus topology due to the value of the connecting devices (network switches)

Ø  If hub goes down everything goes down, none of the devices can work without hub.

Ø  Hub requires more resources and regular maintenance because it’s the central system of star.

Ø  Extra hardware is required (hubs or switches) which adds to cost

Ø  Performance is predicated on the one concentrator i.e. hub.

 

 

Features of Star Topology:

Ø It is very reliable – if one cable or device fails then all the others will still work

Ø It is high-performing as no data collisions can occur

Ø Less expensive because each device only need one I/O port and wishes to be connected with hub with one link.

Ø Easier to put in

Ø Robust in nature

Ø Easy fault detection because the link are often easily identified.

Ø No disruptions to the network when connecting or removing devices.

Ø Each device requires just one port i.e. to attach to the hub.

Ø If N devices are connected to every other in star, then the amount of cables required to attach them is N. So, it’s easy to line up.



 

Ring Topology:

Ø A ring topology is a network configuration in which each node is connected to two other nodes in the network, building a single continuous pathway for signals through the network. Ring topologies are often used in local area networks (LANs).

Ø A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.



A ring topology comprises 4 stations connected with each forming a ring. 

The most common access method of ring topology is token passing.

Ø  Token passing: It is a network access method in which a token is passed from one node to another node.

Ø  Token: It is a frame that circulates around the network.

 

Advantage/Benefits

Disadvantage/Drawbacks

Ø  The data transmission is high-speed.

Ø  The possibility of collision is minimum in this type of topology.

Ø  Cheap to install and expand.

Ø  It is less costly than a star topology.

Ø  The failure of a single node in the network can cause the entire network to fail.

Ø  Troubleshooting is difficult in this topology.

Ø  The addition of stations in between or the removal of stations can disturb the whole topology.

Ø  Less secure.

 

Tree Topology:

Ø This topology is the variation of the Star topology. This topology has a hierarchical flow of data.

Ø Tree topology is a type of network topology that resembles a tree. In a tree topology, there is one central node (the “trunk”), and each node is connected to the central node through a single path. Nodes can be thought of as branches coming off of the trunk. Tree topologies are often used to create large networks.

Advantage/Benefits

Disadvantage/Drawbacks

Ø  It can support a large number of nodes.

Ø  It can be easily expanded.

Ø  Additionally, tree topologies are highly scalable and can be easily reconfigured.

Ø   It can be difficult to troubleshoot issues in a tree topology as each node is connected to multiple other nodes. This can make it hard to identify where the issue is located.

Ø  Tree topology can be less reliable than other topologies such as star or mesh as there are more potential points of failure. If one node goes down, it can affect the entire network.

Ø  Tree topology can be more expensive to implement as it requires more cabling and equipment than other topologies.

 


Applications of Tree Topology:

Ø Tree topology is often used to connect multiple devices, such as printers and computers, in a home or small office. Tree topology is commonly used to create bus networks, where each device is connected to a central server.

Ø Tree topology can also be used to create star networks, where each device is connected to a central hub. Star networks are often used in large office buildings or campuses, where each device needs to be able to communicate with all other devices on the network.

 

Mesh Topology:

Ø A mesh topology is a type of computer network in which each node (computer or other device) is connected to every other node in the network. This type of network is often used in large organizations or companies because it can handle a large amount of data traffic and can be easily expanded.

Ø A mesh topology is therefore very fault tolerant – if one link fails, there are alternate routes that can be taken.

Advantage/Benefits

Disadvantage/Drawbacks

Ø  It is very fault tolerant. If one node in the network goes down, the rest of the nodes can still communicate with each other.

Ø  All nodes in a mesh network have a dedicated connection to every other node in the network. This means that there is no single point of failure and the network can continue to operate even if one node fails.

Ø   It can be expensive to implement because each node needs its own dedicated connection to every other node in the network. This can make mesh topology impractical for large networks.

Ø  Mesh topology can be complex to configure and manage.

 

 

 

Applications of Mesh Topology:

Ø Mesh topology is often used in large networks, where reliability and redundancy are important. Mesh topology can also be used in small networks, where it can offer some advantages over other topologies.

Ø One of the best parts of mesh topology is that it can be easily scaled. As the network grows, additional nodes can be added to the network without having to reconfigure the entire network.

Hybrid Topology:

Ø A hybrid topology is defined as a network topology that combines two or more different network topologies. A hybrid topology can be a combination of bus topology, ring topology and mesh topology. The selection of different types of network topologies combined together depends upon the number of computers, their location, and the required performance.

Ø The structure of hybrid topology is more complex but offers various advantages such as flexibility and fault tolerance.



Advantage/Benefits

Disadvantage/Drawbacks

Ø  Adding a new node or deleting the existing node is easy in hybrid topologies.

Ø  Hybrid topology is more secure, reliable, and scalable as compared to individual star, ring and mesh topology.

Ø  Error detection and troubleshooting is easier in hybrid topology.

Ø  When an organization has a large geographical area utilizing hybrid topology is considered as better option.

Ø  Traffic with large volume is handled easily by the hybrid topology.

Ø  The overall performance and speed is greater in hybrid topology.

Ø   The design and implementation of hybrid network topology is difficult.

Ø  More number of cables and other physical devices are required for hybrid topology.

Ø  The process of installation of hybrid topology is difficult.

Ø  The overall implementation, setup and process of hybrid topology is much more costlier.

 

 

 

Comments

Popular posts from this blog

Basics of Operating System

Input Output Devices