Networking Concepts.pdf

438 views 30 slides Jan 23, 2023
Slide 1
Slide 1 of 30
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30

About This Presentation

Network COmm


Slide Content

BASIC NETWORKING
CONCEPTS
PRESENTED BY :
MS. AKANKSHA
NARKHEDE

WE WILL LEARN ABOUT
Definition of ComputerNetwork& its
examples
Advantages of Networking
Networking Components
Types of Networks
Network Architecture
Network Topologies
Network Security

DEFINTIONS &EXAMPLES OF
COMPUTER NETWORK
DEFINTIONS:
A computer network is defined as the interconnection
of two or more computers. It is done to enable the
computers to communicate and share available
resources.
A computer network enables two or more computers
to share data and peripheral devices. They communicate
with each other, as well as work independently.

EXAMPLES:
i.Network of roads ,railway lines , canals,etc.
ii.Communication network of telephone system which enable us to talk to
anyone , anywhere & anytime .
iii.Network of Banks/ATMs(Automated Teller Machines).
iv.Radio /Television network broadcasts programs live across the globe.
v.A network of malls , schools & hospitals , etcall over the country.

ADVANTAGES OF NETWORKING
File Sharing: Networks offer a quick and easy
way to share a file directly.
Resource Sharing: All computers in the
network can share resources such as
printers, fax machines, modem and scanners.
Communication: Those on the network
can communicate with each other via e-
mails,instantmessages,etc.
Flexible Access: Networks allows their users to
access files from computers throughout the
network.

ADVANTAGES OF NETWORKING
Sharing of Information: Computernetworks
enables us to share data and information with
the computers that are located geographically
large distance apart.

NETWORKING COMPONENTS
Network Card: ANetwork interface card(also
known as aNIC,network card, ornetwork
interface controller) is anelectronicdevice
that connects acomputerto acomputer
network. It is considered a piece ofcomputer
hardware. Nowadays, most computer
motherboards come with an inbuilt Network
Card.

NETWORKING COMPONENTS
Networking Cable: Networking cablesarenetworking
hardwareused to connect one network device to other
network devices or to connect two or more computers
to shareprinters,scanners etc. Different types of
network cables, such ascoaxial cable,optical fiber
cable, andtwisted paircables, are used depending on
the network'sphysical layer,topology, and size.

NETWORKING COMPONENTS
Modem: Amodemis ahardwaredevice that converts
data from a digital format, intended for communication
directly between devices with specialized wiring, into
one suitable for atransmission mediumsuch as
telephone lines or radio.Itconverts the digital signals of
a computer into analog signals to enable their
transmission via phone lines.

NETWORKING COMPONENTS
Hubs & Switches: Anetwork switch(also
calledswitching hubandbridging hub) isnetworking
hardwarethat connects devices on acomputer
network by usingpacket switching to receive and
forward data to the destination device.

TYPES OF NETWORKS

LOCAL AREANETWORK(LAN)
LAN is a network which is designed to operate over
a small physical area such as an office, factory or a
group ofbuildings.
LAN’s are easy to design andtroubleshoot
Exchange of information and sharing ofresources
becomes easy because ofLAN.
In LAN all machines are connected to asingle
cable.
Different types of topologies such as star, tree, bus,
ring, etc Can beused.

METROPOLITAN AREANETWORK(MAN)
It is in between LAN & WAN technology that covers
the entirecity.
It uses similar technology asLAN.
It can be a single network such as cable TV network,
or a measure of connectinga
number of LAN’s o a large network so that resources can
be shared LAN to LAN as well as device todevice.

WIDE AREANETWORK(WAN)
When network spans over a large distance or when the
computers to be connected to each other are at widely
separated locations a local area network cannot be
used. A wide area network(WAN) isinstalled.
The communication between different users of WAN
is established using leased telephone lines, satellite
links and similarchannels.
It is cheaper and more efficient to use the phone
network for thelink.

PERSONAL AREANETWORK(PAN)
A personal area network is a computer network organized
around an individualperson.
It generally consists of a mobile computer, a cell phone or
personal digital assistant. PAN enables the communication
among thesedevices.
It can also be used for communication among personal devices
themselves for connecting to a digital level network and
internet.ThePANs can be constructed using wireless or cables.

NETWORKING ARCHITECTURE
NETWORK
ARCHITECTURE
PEER TO PEER
NETWORK
CLIENT-SERVER
NETWORK

PEER TO PEERNETWORK
In peer to peer network each computer is
responsible for making its own resources
available to other computers on the network.
Each computer is responsible for setting up and
maintaining its own security for these
resources.
Also each computer is responsible for accessing
the required network resources from peer to
peerrelationships.
Peer topeernetworkis useful for a small
networkcontainingless than 10 computers on a
single LAN.
In peer to peer network each computer can
function as both client andserver.
Peer to peer networks do not have a central
controlsystem.
There are no servers in peernetworks.

ADVANTAGES & DISADVANTAGES
OF PEER TO PEERNETWORK
Not verysecure
No central point of
storage or file archiving
Additional load on
computer because of
resourcesharing
Hard tomaintain
versioncontrol
Advantages:
Use lessexpensive
computerhardware
Easy toadminister
No NOSrequired
More built in
redundancy
Easy setup & lowcost
Disadvantages:

CLIENT/SERVERNETWORK
In client-server network relationships, certain
computers act as server and other act as
clients. A serveris simply a computer, that
available the network resources and provides
service to other computers when they request
it. A clientis the computer running a
program that requests the service from a
server.
Local area network(LAN) is based on
client server network relationship.
A client-server network is one n which all
available network resources such as files,
directories, applications and shared
devices, are centrally managed and hosted
and then are accessed byclient.
Client serve network are defined by the
presence of servers on a network that provide
security and administration of the network.

Advantages:
Verysecure
Betterperformance
Centralizedbackup
veryreliable
Disadvantages:
requiresprofessional
administration
Morehardware-
intensive
Moresoftware
intensive
Expensive dedicated
software
ADVANTAGES & DISADVANTAES
OF CLIENT-SERVER NETWORK

NETWORK TOPOLOGIES
Networktopologyis the way a network is arranged,
including the physical or logical description of how
links and nodes are set up to relate to each other.

POINT TO POINT TOPOLOGY
In a point-to-point connection, a communication link is
established between two devices with one wire or air (in the
case of wireless). A simple example of point-to-point
connection is talking over telephone between two persons
where anyone else is not allowed to use the phone on
either side.

BUS TOPOLOGY
In a bus network, a common backbone is connected to all network
devices. The high capacity bus backbone (generally a single cable)
functions as a shared communications medium and it joins networks
and central devices.If any network device wants to communicate with
another network device within a bus network, the device sends a
broadcast message onto the backbone. All other devices will see the
broadcast message but only the desired recipient will accepts and
process the message.

STAR TOPOLOGY
Star topology is the most popular network topology that is used in many
business and home networks today. A star topology is established with a
central connection point called a hub node. The hub may be an actual
hub device or a network switch or a network router.Themain benefit of a
star network is that failure in any start network cable will only take down
one computer’s network access but not the entire LAN. However, if the
hub node fails, the entire network will be down in a start network.

RING TOPOLOGY
In a ring network, every network device is connected to two neighbor
devices with a point-to-point connection for communication purpose. All
devices in a ring network make a loop. If any cable or device is fail, the
loop will break and also break down the entire ring network. In the ring
network, messages travel through the loop in the same direction
(effectively either clockwise or counterclockwise).

TREE TOPOLOGY
The tree topology is also known as hierarchical topology. In a tree
topology, a central ‘root’ node (top level of the hierarchy) is connected to
one or more other nodes that are one level lower in the hierarchy with a
point-to-point physical link. The second level node may also have
connected to one or more other nodes that are one level down in the
hierarchy with another point-to-point link. The top level node i.eroot node
is the only node that has no other node above it in the hierarchy.

MESH TOPOLOGY
In a mesh network, every network device is connected to every other
network device with a point-to-point connection. This topology is mostly
used in WAN and wireless networks. The route concept is introduced by
mesh topology and this topology is used by routers to determine the best
path.Aseach device is connected to all other devices in a mesh network,
this topology is the most expensive and difficult to maintain.

NETWORK SECURITY
Network securityconsists of thepoliciesand practices adopted to
prevent and monitorunauthorizedaccess,misuse, modification, or
denial of acomputer networkand network-accessible resources.
Network security involves the authorization of access to data in a
network, which is controlled by the network administrator. Users
choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs
within their authority.
Network security covers a variety of computer networks, both public
and private, that are used in everyday jobs: conducting transactions
and communications among businesses, government agencies and
individuals.

NETWORK SECURITY
Networks can be private, such as within a company, and others
which might be open to public access.
Network security is involved in organizations, enterprises, and other
types of institutions. It does as its title explains: it secures the
network, as well as protecting and overseeing operations being
done. The most common and simple way of protecting a network
resource is by assigning it a unique name and a corresponding
password.
Tags