Networking Conceptts
Networking Conceptts
Networking Concepts
Computer networks have shrunk the world and brought people together. They have
extended the power of a computer beyond the expanse of a room. Advancements in
networking techniques, protocols and so on have made a profound impact in areas of
communication and learning. The size of computer networks may vary. The Internet is
an example of a computer network that spreads all across the world. The Internet is
also referred to as the worldwide network of computers and it is growing at a rapid rate.
A computer network
consists of two or more computers that are linked in order to share resources such as
printers, exchange files and allow communication.
Let us learn more about computer networks.
NETWORK TOPOLOGIES
Topology refers to the layout pattern in which various computers are connected to one
another to form a network. The computers on a network are also referred to as nodes.
There are four main types of topologies. They are:
Bus Topology: In bus topology, all the computers are connected to a single cable
called the bus (Fig. 1.6). The transmission of data from any computer travels
through the length of the bus in both the directions and can be received by all
other computers on the network. If the address of a computer is that of the
intended recipient, it accepts the data; otherwise, the data is rejected. The
advantage of the bus topology is that it is quite easy to set up. However, a network
cannot function if there are breaks in the bus.
Ring Topology: In ring topology, each computer is connected to two other
computers so as to form a closed ring-like structure (Fig. 1.7). In this topology,
data is transmitted in one direction only. The disadvantage of the ring network is
that the breakdown of any one computer on a ring can disable the entire system or
network.
Star Topology: In star topology, all the computers are connected to a central
computer or a central node (Fig. 1.8). The data to be exchanged between any two
computers passes through the central node. The central node controls all the
activities of the nodes. More computers can be easily added to the network. The
breakdown of computers, except the central node, does not affect the functioning
of the network. However, the failure of the central node disables the
communication across the entire network.
Twisted Pair Cable: It consists of a pair of insulated wires twisted together. The
use of two wires twisted around each other helps to reduce disturbances in the
signals.
The twisted pair cable is often used in two or more pairs, all within a single cable.
Twisted pair cabling comes in two varieties—shielded (Shielded Twisted Pair or
STP) and unshielded (Unshielded Twisted Pair or UTP). UTP cable is the most
commonly used cable in computer networking.
The twisted pair cable is often used in two or more pairs, all within a single cable.
Twisted pair cabling comes in two varieties—shielded (Shielded Twisted Pair or
STP) and unshielded (Unshielded Twisted Pair or UTP). UTP cable is the most
commonly used cable in computer networking.
Coaxial Cable (coax): Coaxial cable is an electrical cable with a conductor at its
centre (Fig. 1.13). The inner conductor is surrounded by a tubular insulating layer.
The insulating layer is surrounded by a conductive layer called the shield, which is
finally covered with a thin insulating layer on the outside.
Optical Fibre Cable: Optical fibre cable consists of a central glass core
surrounded by several layers of protective material (Fig. 1.14). It transmits data in
the form of light rather than electronic signals, thus eliminating the problem of
electrical interference. Fibre optic cable is expensive as compared to coaxial and
twisted pair cables but can transmit signals over much longer distances. It also
has the capability to carry data at a very high speed.
WiFi technology: also makes use of radio waves to transmit and receive data.
This technology requires more energy but enables the signal to go farther (300
feet approx.) with a faster rate of transmission. This technology is used to set up
networks in which a computer’s wireless adapter translates the data into a radio
signal and transmits it. A wireless router receives the signal, decodes it and sends
it to the Internet using a wired connection.
WiMAX (Worldwide Interoperability for Microwave Access): Its technology is
similar to WiFi, but it operates at higher speeds and can cover greater distances
and greater number of users as compared to WiFi.
NETWORK DEVICES
Various devices are used for setting up a computer network. Let us discuss a few
devices that play a crucial role in a computer network.
Modems are used for connecting computers to the Internet. Modems are
connected to a computer and a telephone line.(Fig. 1.24).
Hub: A hub is a device that is used to connect computers in a network (Fig. 1.23).
In a hub, when one computer sends data on the network, the hub simply forwards
the packets to all the other computers connected to it (Fig. 1.26). Each computer
is responsible for determining which packets are destined for it and which are to
be ignored.
PROTOCOLS
Just the way we follow certain rules while communicating or travelling on the road,
similarly rules or protocols have to be followed for effective network communication.
Protocol is a set of rules used by computers on a network to communicate with each
other. Some examples of protocols are:
reads the header of each packet, determines the port at which the receiver is connected
and forwards the packet on the corresponding cable (Fig. 1.29). Such a type of
communication in which small units of data (or packets) are routed through a network,
based on the destination address contained within each packet, is called packet
switching. When packets have to be sent to a computer on a different network, they
pass through a number of routers. Every packet is numbered. Packets may follow
different paths to reach the destination.
NETWORK SECURITY
A computer on a network can be accessed by many users. Security measures have to
be taken to protect networks from unauthorised access and to prevent data or
information theft.
Threats to Computer
Files can be shared between the computers on a network. This makes a computer
vulnerable to attacks by viruses, worms, Trojan horses and so on that can easily spread
because of the underlying network. Let us discuss some of the common threats to
computers.
Virus: A computer virus spreads itself from one computer to another and
interferes with the normal operations of a computer. Viruses attach themselves to
any type of file and spread when these infected files are copied to other
computers. People unknowingly spread a computer virus by sharing infected files
or sending emails with viruses as attachments.
Worm: A worm is a computer program that uses computer networks to send
copies of itself to other computers on a network. A virus requires human action
such as transferring of an infected file to spread itself. A worm can spread without
any human action too. It replicates itself without the knowledge of the user. Worms
can cause severe harm to a computer network such as blocking the network and
reducing the speed of the network.
Trojan Horse: A computer program that appears to be a useful software but
actually causes damage once installed or executed onto your computer system is
known as a Trojan horse or a Trojan. After getting installed, it allows unauthorised
access to the computer. Trojan horses are very dangerous as they allow your
computer to be remotely controlled by someone else and can cause loss of
personal and confidential information.
Viruses, worms and Trojan horses may harm the data or affect the performance
and the speed of a computer.
Data Theft: It is a very serious problem for computer networks. People break into
computer networks to either disrupt their functioning or to steal confidential
information. Hackers are the computer experts who can break into computer
systems and networks. There are two types of hackers—white hackers and black
hackers.
White hackers: study and break into networks to find and fix security loopholes.
They offer their to corporations, public organisations and educational institutions to
make their networks more secure.
Black hackers or crackers: have a criminal intention. Some examples are
cracking bank accounts in order to transfer money to their own accounts, stealing
confidential information and attacking the computer network of an organisation for
money.
Computer Security