0% found this document useful (0 votes)
22 views

Networking Conceptts

Uploaded by

Tarun Sharma
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Networking Conceptts

Uploaded by

Tarun Sharma
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CBSE Sample Papers

Networking Concepts
Computer networks have shrunk the world and brought people together. They have
extended the power of a computer beyond the expanse of a room. Advancements in
networking techniques, protocols and so on have made a profound impact in areas of
communication and learning. The size of computer networks may vary. The Internet is
an example of a computer network that spreads all across the world. The Internet is
also referred to as the worldwide network of computers and it is growing at a rapid rate.
A computer network
consists of two or more computers that are linked in order to share resources such as
printers, exchange files and allow communication.
Let us learn more about computer networks.

NEED FOR COMPUTER NETWORKS


Nowadays, computer networks are a vital part of any organisation. Some of the
advantages of computer networks are:

 Resource Sharing: All computers in a network can share resources such as


printers, fax machines, modems and scanners.
 File Sharing and Remote Database Access: A computer network allows sharing
of files and access to remote database. We can easily access the files stored on
various computers on a network. Also, networking allows many people to work
simultaneously on the data stored in a database.
 Ease of Communication: Computer networks allow people to communicate
through emails and instant messaging facilities. This makes the transmission of
information easier, more efficient and less expensive.

TYPES OF COMPUTER NETWORKS


The following are the types of networks based on the geographical area covered or
scale of the network.

 Personal Area Network (PAN):


A PAN is a computer network organised around a person. It is used for
communication between devices such as phones, personal digital assistants,
printers and laptops that are in close proximity. We can use these networks to
transfer files and photos between the various devices

 Local Area Network (LAN):


A LAN is a computer network that is limited to a local area such as a laboratory, a
school or an office building. Cables (wires) or low-power radiowaves (wireless) are
used for the connections in a LAN. A wireless LAN (or WLAN) is also sometimes
called LAWN (Local Area Wireless Network).

 Campus Area Network (CAN):


A CAN is a computer network that connects multiple local area networks (LAN) in
a limited geographical area. A CAN is smaller than a wide area network (WAN) or
metropolitan area network (MAN). It can be set up by a college, company and so
on.

 Metropolitan Area Network (MAN):


A MAN is a computer network that usually covers a larger area than a LAN. For
example, a network that connects two offices in a city, a neighbourhood area and
so on.
 Wide Area Network (WAN):
A WAN is a computer network that spans a wide geographical area. A WAN may
be spread across cities, countries and continents. A WAN is formed by connecting
LANs and MANs. Computers or networks across long distances are usually
connected with optical fibre cables, satellite radio links or microwave radio links.

NETWORK TOPOLOGIES
Topology refers to the layout pattern in which various computers are connected to one
another to form a network. The computers on a network are also referred to as nodes.
There are four main types of topologies. They are:

 Bus Topology: In bus topology, all the computers are connected to a single cable
called the bus (Fig. 1.6). The transmission of data from any computer travels
through the length of the bus in both the directions and can be received by all
other computers on the network. If the address of a computer is that of the
intended recipient, it accepts the data; otherwise, the data is rejected. The
advantage of the bus topology is that it is quite easy to set up. However, a network
cannot function if there are breaks in the bus.
 Ring Topology: In ring topology, each computer is connected to two other
computers so as to form a closed ring-like structure (Fig. 1.7). In this topology,
data is transmitted in one direction only. The disadvantage of the ring network is
that the breakdown of any one computer on a ring can disable the entire system or
network.
 Star Topology: In star topology, all the computers are connected to a central
computer or a central node (Fig. 1.8). The data to be exchanged between any two
computers passes through the central node. The central node controls all the
activities of the nodes. More computers can be easily added to the network. The
breakdown of computers, except the central node, does not affect the functioning
of the network. However, the failure of the central node disables the
communication across the entire network.

 Mesh Topology: In mesh topology, every computer is connected to every other


computer on the network. Full mesh topology (Fig. 1.9) is very expensive to
implement. Normally, partial mesh topology is implemented in which a computer is
connected to a few other computers in the network (Fig. 1.10).
TRANSMISSION MEDIA
Computers must be connected to each other to form a network. Computers can be
connected using wires/cables or they can be connected in a wireless manner.

Wired Transmission Media


There are various types of cables that can be used for setting up a network. Some of
them are discussed here.

 Twisted Pair Cable: It consists of a pair of insulated wires twisted together. The
use of two wires twisted around each other helps to reduce disturbances in the
signals.
The twisted pair cable is often used in two or more pairs, all within a single cable.
Twisted pair cabling comes in two varieties—shielded (Shielded Twisted Pair or
STP) and unshielded (Unshielded Twisted Pair or UTP). UTP cable is the most
commonly used cable in computer networking.
The twisted pair cable is often used in two or more pairs, all within a single cable.
Twisted pair cabling comes in two varieties—shielded (Shielded Twisted Pair or
STP) and unshielded (Unshielded Twisted Pair or UTP). UTP cable is the most
commonly used cable in computer networking.

 Coaxial Cable (coax): Coaxial cable is an electrical cable with a conductor at its
centre (Fig. 1.13). The inner conductor is surrounded by a tubular insulating layer.
The insulating layer is surrounded by a conductive layer called the shield, which is
finally covered with a thin insulating layer on the outside.
 Optical Fibre Cable: Optical fibre cable consists of a central glass core
surrounded by several layers of protective material (Fig. 1.14). It transmits data in
the form of light rather than electronic signals, thus eliminating the problem of
electrical interference. Fibre optic cable is expensive as compared to coaxial and
twisted pair cables but can transmit signals over much longer distances. It also
has the capability to carry data at a very high speed.

Wireless Transmission Media


In wireless networks, data is transmitted without wires. Some of the ways in which
wireless networks may be set up are as follows.

 Infrared: The infrared communication range of the devices communicating


through infrared waves is very limited. Infrared waves cannot penetrate walls or
other obstructions and so there should be no physical barrier between the
communicating devices. The communication between a TV set and a remote
control happens through infrared waves. Infrared mouse and keyboard are other
examples of devices that make use of infrared waves for data transmission.
 Microwave Transmission: Microwave communications are unidirectional. They
can be used for terrestrial communication (on ‘the surface of the earth) or for
satellite communication.
Microwave propagation is line-of-sight communication. So, when used for
terrestrial communication, the towers with antennas mounted on them need to be
in direct sight of each other. The antennas are usually located at substantial
heights above the ground level to extend the range between antennas and to be
able to transmit over obstacles. You must have noticed high towers with
microwave antennas in your city.
Microwaves can pass through the earth’s atmosphere easily and can be used to
transmit information between satellites and the earth’s base station

 Radiowave Transmission: Radiowave communications are omnidirectional,


which means that they travel in all directions from the source, so that the
transmitter and receiver do not have to be carefully aligned physically. Radio
waves are easy to generate, can travel long distances and penetrate through
buildings easily. So they are widely used for communication both indoors and
outdoors (Fig. 1.17). However, at all frequencies, radio waves are subject to
interference from motors and other electrical equipment.
 Bluetooth technology: is used for exchanging data over short distances using
radio waves. This technology uses low power, has a short range [30 feet
(approx.)] and medium transmission speed. Bluetooth technology can be used to
transfer songs or pictures between two mobile phones or a Bluetooth headset can
be used with a mobile phone.

 WiFi technology: also makes use of radio waves to transmit and receive data.
This technology requires more energy but enables the signal to go farther (300
feet approx.) with a faster rate of transmission. This technology is used to set up
networks in which a computer’s wireless adapter translates the data into a radio
signal and transmits it. A wireless router receives the signal, decodes it and sends
it to the Internet using a wired connection.
 WiMAX (Worldwide Interoperability for Microwave Access): Its technology is
similar to WiFi, but it operates at higher speeds and can cover greater distances
and greater number of users as compared to WiFi.

NETWORK DEVICES
Various devices are used for setting up a computer network. Let us discuss a few
devices that play a crucial role in a computer network.

 NIC (Network Interface Card): It is a hardware device that is attached to a


computer to enable it to communicate over the network (Fig. 1.21). The NIC has a
ROM chip that contains a unique number, which is the hardware address or the
Media Access Control (MAC) This hardware address uniquely identifies a
computer on the network.
 Modem (Modulator-demodulator): It is an electronic device that converts the
digital signals of a computer into an analog form so that they can travel over a
telephone line (Fig. 1.22). At the destination, the receiving modem converts the
analog signals back into their digital form so that the destination computer
understands them.

 Modems are used for connecting computers to the Internet. Modems are
connected to a computer and a telephone line.(Fig. 1.24).
 Hub: A hub is a device that is used to connect computers in a network (Fig. 1.23).
In a hub, when one computer sends data on the network, the hub simply forwards
the packets to all the other computers connected to it (Fig. 1.26). Each computer
is responsible for determining which packets are destined for it and which are to
be ignored.

 Switch: A switch is a device that is also used to connect computers in a network


(Fig. 1.27). However, a switch is a more intelligent device than a hub. Unlike a
hub, the switch sends the incoming data to the desired destination only. It records
the addresses of all the computers connected to it. So, when a packet is received,
the switch reads the information about the destination address to determine if the
destination device is connected to it or not. If the destination device is connected,
the switch forwards the packet only to that destination device. In this way, the
other computers do not have to read and deal with data that is not meant for them.
 Router: A router is a network device that connects two or more networks. It is
commonly used to connect a computer or a network to the Internet. Lines from
different networks are connected to a router. Wireless routers are also available. A
router examines the address of the packet coming on the line, uses the routing
information stored in it and forwards the packet to the next network. In this way, a
packet after going through multiple routers reaches its destination.

PROTOCOLS
Just the way we follow certain rules while communicating or travelling on the road,
similarly rules or protocols have to be followed for effective network communication.
Protocol is a set of rules used by computers on a network to communicate with each
other. Some examples of protocols are:

 HTTP (Hyper Text Transfer Protocol): It is a protocol used between a web


server and a web browser for transferring HTML pages.
 TCP/IP (Transmission Control Protocol/Internet Protocol): TCP is a protocol
that is used along with the IP to send data over the Internet. The information is
transmitted across the Internet in the form of bundles called TCP is responsible for
dividing the data into packets before they are sent and for reassembling the
packets when they arrive at the destination. IP is a set of specifications that
determines the best route for the packets across the Internet so that the packets
reach their destination address.
PACKET SWITCHING IN NETWORKS
Let us explain the process of packet switching in a LAN. Suppose data has to be sent
from Computer A to Computer B. The data at Computer A is split into small chunks,
called packets. A header is added to every packet. The address of sender i.e. Computer
A and address of receiver i.e. Computer B are put in the header. Then Computer A
sends the packets to the switch. The switch has in-built software that

reads the header of each packet, determines the port at which the receiver is connected
and forwards the packet on the corresponding cable (Fig. 1.29). Such a type of
communication in which small units of data (or packets) are routed through a network,
based on the destination address contained within each packet, is called packet
switching. When packets have to be sent to a computer on a different network, they
pass through a number of routers. Every packet is numbered. Packets may follow
different paths to reach the destination.
NETWORK SECURITY
A computer on a network can be accessed by many users. Security measures have to
be taken to protect networks from unauthorised access and to prevent data or
information theft.

Threats to Computer
Files can be shared between the computers on a network. This makes a computer
vulnerable to attacks by viruses, worms, Trojan horses and so on that can easily spread
because of the underlying network. Let us discuss some of the common threats to
computers.

 Virus: A computer virus spreads itself from one computer to another and
interferes with the normal operations of a computer. Viruses attach themselves to
any type of file and spread when these infected files are copied to other
computers. People unknowingly spread a computer virus by sharing infected files
or sending emails with viruses as attachments.
 Worm: A worm is a computer program that uses computer networks to send
copies of itself to other computers on a network. A virus requires human action
such as transferring of an infected file to spread itself. A worm can spread without
any human action too. It replicates itself without the knowledge of the user. Worms
can cause severe harm to a computer network such as blocking the network and
reducing the speed of the network.
 Trojan Horse: A computer program that appears to be a useful software but
actually causes damage once installed or executed onto your computer system is
known as a Trojan horse or a Trojan. After getting installed, it allows unauthorised
access to the computer. Trojan horses are very dangerous as they allow your
computer to be remotely controlled by someone else and can cause loss of
personal and confidential information.
Viruses, worms and Trojan horses may harm the data or affect the performance
and the speed of a computer.

 Data Theft: It is a very serious problem for computer networks. People break into
computer networks to either disrupt their functioning or to steal confidential
information. Hackers are the computer experts who can break into computer
systems and networks. There are two types of hackers—white hackers and black
hackers.
 White hackers: study and break into networks to find and fix security loopholes.
They offer their to corporations, public organisations and educational institutions to
make their networks more secure.
 Black hackers or crackers: have a criminal intention. Some examples are
cracking bank accounts in order to transfer money to their own accounts, stealing
confidential information and attacking the computer network of an organisation for
money.
Computer Security

 Antivirus Software: Every computer on a computer network must have an


antivirus software installed in it and it should be updated on a regular basis.
Antivirus software can be used to protect the computer from various types of
malware. Antivirus software can detect viruses, worms and so on, and warn you of
their presence in your computer. It can also deactivate and clean up the computer
of malicious software.
There are various types of antivirus software such as AVG, Avira, Norton and
McAfee

 Firewall: A firewall is used to prevent unauthorised access to a computer network.


A firewall can be implemented as a software, a hardware or a combination of
both. All data or messages entering or leaving a computer network pass through a
firewall (Fig. 1.33). A firewall examines each message and blocks those that do
not meet the specified security criteria.

You might also like