BASIC NETWORKING
CONCEPTS
PRESENTED BY :
MS. AKANKSHA
NARKHEDE
WE WILL LEARN ABOUT
Definition of ComputerNetwork& its
examples
Advantages of Networking
Networking Components
Types of Networks
Network Architecture
Network Topologies
Network Security
DEFINTIONS &EXAMPLES OF
COMPUTER NETWORK
DEFINTIONS:
A computer network is defined as the interconnection
of two or more computers. It is done to enable the
computers to communicate and share available
resources.
A computer network enables two or more computers
to share data and peripheral devices. They communicate
with each other, as well as work independently.
EXAMPLES:
i.Network of roads ,railway lines , canals,etc.
ii.Communication network of telephone system which enable us to talk to
anyone , anywhere & anytime .
iii.Network of Banks/ATMs(Automated Teller Machines).
iv.Radio /Television network broadcasts programs live across the globe.
v.A network of malls , schools & hospitals , etcall over the country.
ADVANTAGES OF NETWORKING
File Sharing: Networks offer a quick and easy
way to share a file directly.
Resource Sharing: All computers in the
network can share resources such as
printers, fax machines, modem and scanners.
Communication: Those on the network
can communicate with each other via e-
mails,instantmessages,etc.
Flexible Access: Networks allows their users to
access files from computers throughout the
network.
ADVANTAGES OF NETWORKING
Sharing of Information: Computernetworks
enables us to share data and information with
the computers that are located geographically
large distance apart.
NETWORKING COMPONENTS
Network Card: ANetwork interface card(also
known as aNIC,network card, ornetwork
interface controller) is anelectronicdevice
that connects acomputerto acomputer
network. It is considered a piece ofcomputer
hardware. Nowadays, most computer
motherboards come with an inbuilt Network
Card.
NETWORKING COMPONENTS
Networking Cable: Networking cablesarenetworking
hardwareused to connect one network device to other
network devices or to connect two or more computers
to shareprinters,scanners etc. Different types of
network cables, such ascoaxial cable,optical fiber
cable, andtwisted paircables, are used depending on
the network'sphysical layer,topology, and size.
NETWORKING COMPONENTS
Modem: Amodemis ahardwaredevice that converts
data from a digital format, intended for communication
directly between devices with specialized wiring, into
one suitable for atransmission mediumsuch as
telephone lines or radio.Itconverts the digital signals of
a computer into analog signals to enable their
transmission via phone lines.
NETWORKING COMPONENTS
Hubs & Switches: Anetwork switch(also
calledswitching hubandbridging hub) isnetworking
hardwarethat connects devices on acomputer
network by usingpacket switching to receive and
forward data to the destination device.
TYPES OF NETWORKS
LOCAL AREANETWORK(LAN)
LAN is a network which is designed to operate over
a small physical area such as an office, factory or a
group ofbuildings.
LAN’s are easy to design andtroubleshoot
Exchange of information and sharing ofresources
becomes easy because ofLAN.
In LAN all machines are connected to asingle
cable.
Different types of topologies such as star, tree, bus,
ring, etc Can beused.
METROPOLITAN AREANETWORK(MAN)
It is in between LAN & WAN technology that covers
the entirecity.
It uses similar technology asLAN.
It can be a single network such as cable TV network,
or a measure of connectinga
number of LAN’s o a large network so that resources can
be shared LAN to LAN as well as device todevice.
WIDE AREANETWORK(WAN)
When network spans over a large distance or when the
computers to be connected to each other are at widely
separated locations a local area network cannot be
used. A wide area network(WAN) isinstalled.
The communication between different users of WAN
is established using leased telephone lines, satellite
links and similarchannels.
It is cheaper and more efficient to use the phone
network for thelink.
PERSONAL AREANETWORK(PAN)
A personal area network is a computer network organized
around an individualperson.
It generally consists of a mobile computer, a cell phone or
personal digital assistant. PAN enables the communication
among thesedevices.
It can also be used for communication among personal devices
themselves for connecting to a digital level network and
internet.ThePANs can be constructed using wireless or cables.
NETWORKING ARCHITECTURE
NETWORK
ARCHITECTURE
PEER TO PEER
NETWORK
CLIENT-SERVER
NETWORK
PEER TO PEERNETWORK
In peer to peer network each computer is
responsible for making its own resources
available to other computers on the network.
Each computer is responsible for setting up and
maintaining its own security for these
resources.
Also each computer is responsible for accessing
the required network resources from peer to
peerrelationships.
Peer topeernetworkis useful for a small
networkcontainingless than 10 computers on a
single LAN.
In peer to peer network each computer can
function as both client andserver.
Peer to peer networks do not have a central
controlsystem.
There are no servers in peernetworks.
ADVANTAGES & DISADVANTAGES
OF PEER TO PEERNETWORK
Not verysecure
No central point of
storage or file archiving
Additional load on
computer because of
resourcesharing
Hard tomaintain
versioncontrol
Advantages:
Use lessexpensive
computerhardware
Easy toadminister
No NOSrequired
More built in
redundancy
Easy setup & lowcost
Disadvantages:
CLIENT/SERVERNETWORK
In client-server network relationships, certain
computers act as server and other act as
clients. A serveris simply a computer, that
available the network resources and provides
service to other computers when they request
it. A clientis the computer running a
program that requests the service from a
server.
Local area network(LAN) is based on
client server network relationship.
A client-server network is one n which all
available network resources such as files,
directories, applications and shared
devices, are centrally managed and hosted
and then are accessed byclient.
Client serve network are defined by the
presence of servers on a network that provide
security and administration of the network.
NETWORK TOPOLOGIES
Networktopologyis the way a network is arranged,
including the physical or logical description of how
links and nodes are set up to relate to each other.
POINT TO POINT TOPOLOGY
In a point-to-point connection, a communication link is
established between two devices with one wire or air (in the
case of wireless). A simple example of point-to-point
connection is talking over telephone between two persons
where anyone else is not allowed to use the phone on
either side.
BUS TOPOLOGY
In a bus network, a common backbone is connected to all network
devices. The high capacity bus backbone (generally a single cable)
functions as a shared communications medium and it joins networks
and central devices.If any network device wants to communicate with
another network device within a bus network, the device sends a
broadcast message onto the backbone. All other devices will see the
broadcast message but only the desired recipient will accepts and
process the message.
STAR TOPOLOGY
Star topology is the most popular network topology that is used in many
business and home networks today. A star topology is established with a
central connection point called a hub node. The hub may be an actual
hub device or a network switch or a network router.Themain benefit of a
star network is that failure in any start network cable will only take down
one computer’s network access but not the entire LAN. However, if the
hub node fails, the entire network will be down in a start network.
RING TOPOLOGY
In a ring network, every network device is connected to two neighbor
devices with a point-to-point connection for communication purpose. All
devices in a ring network make a loop. If any cable or device is fail, the
loop will break and also break down the entire ring network. In the ring
network, messages travel through the loop in the same direction
(effectively either clockwise or counterclockwise).
TREE TOPOLOGY
The tree topology is also known as hierarchical topology. In a tree
topology, a central ‘root’ node (top level of the hierarchy) is connected to
one or more other nodes that are one level lower in the hierarchy with a
point-to-point physical link. The second level node may also have
connected to one or more other nodes that are one level down in the
hierarchy with another point-to-point link. The top level node i.eroot node
is the only node that has no other node above it in the hierarchy.
MESH TOPOLOGY
In a mesh network, every network device is connected to every other
network device with a point-to-point connection. This topology is mostly
used in WAN and wireless networks. The route concept is introduced by
mesh topology and this topology is used by routers to determine the best
path.Aseach device is connected to all other devices in a mesh network,
this topology is the most expensive and difficult to maintain.
NETWORK SECURITY
Network securityconsists of thepoliciesand practices adopted to
prevent and monitorunauthorizedaccess,misuse, modification, or
denial of acomputer networkand network-accessible resources.
Network security involves the authorization of access to data in a
network, which is controlled by the network administrator. Users
choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs
within their authority.
Network security covers a variety of computer networks, both public
and private, that are used in everyday jobs: conducting transactions
and communications among businesses, government agencies and
individuals.
NETWORK SECURITY
Networks can be private, such as within a company, and others
which might be open to public access.
Network security is involved in organizations, enterprises, and other
types of institutions. It does as its title explains: it secures the
network, as well as protecting and overseeing operations being
done. The most common and simple way of protecting a network
resource is by assigning it a unique name and a corresponding
password.