UNIT-5
INTRODUCTION TO
NETWORK
WHAT IS COMPUTER NETWORK?
A computer network is a group of computers/devices(Nodes) that
use a set of common communication protocols over digital
interconnections for the purpose of sharing resources located on or
provided by the network nodes.
The nodes of a computer network may include personal computers,
servers, networking hardware, or other specialised or general-purpose
hosts.
The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on
physically wired, optical, and wireless technologies.
A communication protocol is a set of rules for exchanging
information over a network. physically
Networking
Computer network A collection of computing devices that are
connected in various ways in order to communicate and share resources
Usually, the connections between computers in a network are made
using physical wires or cables :
• some connections are wireless, using radio waves or infrared signals
• The generic term node or host refers to any device on a network.
• Data transfer rate The speed with which data is moved from one
place on a network to another.
• Data transfer rate is a key issue in computer networks.
Networking
Computer networks have opened up an entire frontier in the world
of computing called the client/server model.
Networking
• File server A computer that stores and manages files for multiple
users on a network
• Web server A computer dedicated to responding to requests (from
the browser client) for web pages
The Network Diagram
Wired Network PC Firewall The Internet
Fiber Optic Network Cable
Router
Switch
Server Other LANS
Wireless Network
NETWORK BENEFITS
The network provided to the users can be divided into two
categories:
i. Sharing
ii. Connectivity
The Advantages/Uses of Network
Simultaneous Access
There are moments in any business when several workers may need
to use the same data at the same time.
Shared Peripheral Devices
Personal Communications
Videoconferencing
Voice over Internet Protocol (VoIP):-VoIP transmits the sound of
voice over a computer network using the Internet Protocol (IP )
rather than sending the signal over traditional phone wires
The Advantages/Uses of Network
Easier Data Backup
Increased speed
Reduced cost
Improved security
Centralized software managements
Electronic mail
Flexible access
The Disadvantages/Uses of Network
High cost of installation
Requires time for administration
Failure of server
Cable faults
The Networking Devices(Nodes)
1. NIC Card
2. Repeater
3. Hub
4. Switch
5. Bridge
6. Router
7. Gateway
8. Firewall
1. Network Interface Card
NIC is used to physically connect host devices to
the network media.
A NIC is a printed circuit board that fits
into the expansion slot of a bus on a
computer motherboard.
It can also be a peripheral device. NICs are
sometimes called network adapters.
Each NIC is identified by a unique code
called a Media Access Control (MAC)
address.
This address is used to control data
communication for the host on the
network.
2. Repeaters
A repeater is a network device used
to regenerate a signal.
Repeaters regenerate analogue or
digital signals that are distorted by
transmission loss due to attenuation.
A repeater does not make an
intelligent decision concerning
forwarding packets
3. Hubs
Hubs concentrate on connections.
In other words, they take a group
of hosts and allow the network to
see them as a single unit. This is
done passively, without any other
effect on the data transmission.
Active hubs concentrate hosts and
also regenerate signals
4. Bridges
Bridges convert network data
formats and perform basic data
transmission management.
Bridges provide connections
between LANs.
They also check data to
determine if it should cross the
bridge. This makes each part of
the network more efficient
5. Switches
Switches add more intelligence to data transfer
management.
They can determine if data should remain on a LAN and
transfer data only to the connection that needs it.
Another difference between a bridge and switch is that a
switch does not convert data transmission formats.
6. Routers
Routers have all the capabilities
listed above.
Routers can regenerate signals,
concentrate multiple connections,
convert data transmission formats,
and manage data transfers.
They can also connect to a WAN,
which allows them to connect
LANs that are separated by great
distances.
7. Gateway
A gateway is a piece of networking
hardware used in
telecommunications for
telecommunications networks that
allows data to flow from one discrete
network to another.
Gateways are distinct from routers or
switches in that they communicate
using more than one protocol to
connect a bunch of networks
8. Firewall
A firewall is a network device or
software for controlling network
security and access rules.
Firewalls are inserted in connections
between secure internal networks and
potentially insecure external networks
such as the Internet.
Firewalls are typically configured to
reject access requests from
unrecognized sources while allowing
actions from recognized ones.
The vital role firewalls play in network
security grows in parallel with the
constant increase in cyber attacks
Types of Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
6. Storage-Area Network (SAN)
7. Virtual Private Network (VPN)
8. Client Server Network
9. Peer to Peer Network (P2P)
1. Personal Area Network
1. Personal Area Network (PAN) is a
computer network used for data
transmission amongst devices such as
computers, telephones, tablets and personal
digital assistants.
2. Also Known as HAN (Home Area
Network)
3. PANs can be used for communication
amongst the personal devices
themselves(interpersonal communication),
or for connecting to a higher level network
and the Internet (an uplink) where one
"master" device takes up the role as internet
router.
2. Local Area Network
1. Xerox Corporation worked in
collaboration with DEC and Intel to
create Ethernet, which is the most
pervasive LAN architecture used today.
2. Ethernet has evolved and has seen
significant improvements in regard to
speed and efficiency.
3. An upside of a LAN is fast data transfer
with data speed that can reach up to
10Gbps.
4. Other significant LAN technologies are
Fiber Distributed Data Interface (FDDI)
and token ring.
3. Campus Area Network
1. Larger than LANs, but
smaller than metropolitan
area networks these types
of networks are typically
seen in universities, large
K-12 school districts or
small businesses.
2. They can be spread across
several buildings that are
fairly close to each other so
users can share resources.
4. Metropolitan Area Network
1. A MAN is larger than a LAN but smaller than or equal in size to a WAN.
2. The size range anywhere from 5 to 50km in diameter.
3. MANs are typically owned and managed by a single entity.
4. This could be an ISP or telecommunications company that sells its services to
end-users in that metropolitan area.
5. For all intents and purposes, a MAN has the same characteristics as a WAN with
distance constraints.
5. Wide Area Network
1. A Wide Area Network exist over a large area
2. Data travels through telephone or cable lines
3. Usually requires a Modem
4. The world’s largest Wide Area Network in the Internet
6. Storage Area Network
1. SAN may be referred to as a Sub network or special purpose
network.
2. Its special purpose is to allow users on a larger network to
connect various data storage devices with clusters of data servers.
3. SANs can be accessed in the same fashion as a drive attached to a
server.
7. Virtual Private Network
1. VPN is a private network that can access
public networks remotely. VPN uses
encryption and security protocols to retain
privacy while it accesses outside resources.
2. When employed on a network, VPN enables
an end user to create a virtual tunnel to a
remote location. Typically, telecommuters
use VPN to log in to their company
networks from home.
• Authentication is provided to validate the identities of the two peers.
• Confidentiality provides encryption of the data to keep it private from
prying eyes.
• Integrity is used to ensure that the data sent between the two devices or
sites has not been tampered with.
8. Client/Server Network
1. In a client/server arrangement, network services are
located on a dedicated computer called a server.
2. The server responds to the requests of clients.
3. The server is a central computer that is
continuously available to respond to requests from
clients for file, print, application, and other
services.
4. Most network operating systems adopt the form of
a client/server relationship.
5. Typically, desktop computers function as clients,
and one or more computers with additional
processing power, memory, and specialized
software function as servers.
9. Peer to Peer Network
1. Usually very small networks
2. Each workstation has equivalent capabilities and
responsibilities
3. Does not require a switch or a hub.
4. These types of networks do not perform well under heavy data
loads.
THE OSI MODEL
Established in 1947, the International Standards Organization (ISO) is a
multinational body dedicated to worldwide agreement on international
standards.
An ISO is the Open Systems Interconnection (OSI) model is the standard
that covers all aspects of network communications from ISO. It was first
introduced in the late 1970s.
Layered Architecture
A layered model
Each layer performs a subset of the required communication functions
Each layer relies on the next lower layer to perform more primitive
functions
Each layer provides services to the next higher layer
Changes in one layer should not require changes in other layers
The processes on each machine at a given layer are called peer-to-peer
process
The interaction between layers in the OSI model
LAYERS IN THE OSI MODEL
Physical Layer
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Function
Physical characteristics of interfaces and media
Representation of bits
Data rate
Synchronization of bits
Line configuration (point-to-point or multipoint)
Physical topology (mesh, star, ring or bus)
Transmission mode ( simplex, half-duplex or duplex)
Data Link Layer
The data link layer is responsible for moving
frames from one hop (node) to the next.
Function
Framing
Physical addressing
Flow control
Error control
Access control
Network Layer
The network layer is responsible for the
delivery of individual packets from the source host to the
destination host.
Source-to-destination delivery
Responsible from the delivery of packets from the original
source to the final destination
Functions
Logical addressing
routing
Transport Layer
The transport layer is responsible for the delivery
of a message from one process to another.
Process-to- process delivery
Functions
Port addressing
Segmentation and reassembly
Connection control ( Connection-oriented or
connection-less)
Flow control
Error control
Session Layer
The session layer is responsible for dialog
control and synchronization.
It establishes, maintains and synchronize the interaction
between communicating system
Function
Dialog control
Synchronization (checkpoints)
Presentation Layer
The presentation layer is responsible for translation,
compression, and encryption.
Concerned with the syntax and semantics of the
information exchanged between two system
Functions
Translation ( EBCDIC-coded text file ASCII-
coded file)
Encryption and Decryption
Compression
Application Layer
The application layer is responsible for
providing services to the user.
Functions
Network virtual terminal (Remote log-in)
File transfer and access
Mail services
Directory services (Distributed Database)
Accessing the World Wide Web
OSI Model
Data unit Layer Function
7. Application Network process to application
User support
Data
layers 6. Presentation Data representation and encryption
5. Session Inter-host communication
User
Network Segment 4. Transport End-to-end connections and reliability
Packet 3. Network Path determination and logical addressing
Network
support Frame 2. Data Link Physical addressing
layers
Bit 1. Physical Media, signal and binary transmission
Transmission Path
The function of the media is to carry a flow of
information through a LAN.
Wired Media:- A widely adopted family that uses copper and
fiber media in local area network (LAN) technology are
collectively known as Ethernet
A.Copper Cable
a. Coaxial Cables
b. Shielded Twisted Pair(STP)
c. Unshielded Twisted Pair
Fibre Optic Cable
B.Wireless Media:- use the atmosphere, or space, as the
medium.
1. Copper Cable
The most common,
easiest, quickest, and
cheapest form of network
media to install.
The disadvantage of
sending data over copper
wire is that the further the
signal travels, the weaker
it becomes
a. Coaxial Cable
It can be run longer distances than Twisted pair
Cables.
• Speed: 10-100Mbps
• Cost: Inexpensive
• Media and connector size: Medium
• Maximum cable length: 500m
b. Shielded Twisted Pair(STP)
• Speed: 0-100Mbps
• Cost: Moderate
• Media and connector size: Medium to large
• Maximum cable length: 100m
c. Unshielded Twisted Pair
UTP is a four-pair wire medium used in a variety of networks.
Each of the eight copper wires in the UTP cable is covered by insulating
material
Speed: 10-100-1000 Mbps*
Cost: Least Expensive
Media and connector size: Small
Maximum cable length: 100m * (Depending on the quality/category of
cable)
UTP Implementation
EIA/TIA specifies an RJ-45 connector for UTP cable.
The letters RJ stand for registered jack
Fiber Optic Cable
Glass fiber carrying light pulses,
each pulse a bit.
Based on the Total Internal
Reflection of Light.
High-speed point-to-point
transmission 10-100’s Gbps
low error rate:
repeaters spaced far apart
immune to electromagnetic
noise
So, who owns the Internet?
Well, nobody does. No single person or company
owns the Internet or even controls it entirely. As a
wide-area network, it is made up of many smaller
networks. These smaller networks are often owned
and managed by a person or organization. The
Internet, then, is really defined by how connections
can be made between these networks.
Internet Connections
Internet backbone A set of high-speed networks that carry Internet traffic
These networks are provided by companies such as AT&T, GTE, and IBM
Internet service provider (ISP) A company that provides other companies or
individuals with access to the Internet
There are various technologies available that you can use to connect a home computer
to the Internet
A phone modem converts computer data into an analog audio signal for transfer
over a telephone line, and then a modem at the destination converts it back again
into data
A digital subscriber line (DSL) uses regular copper phone lines to transfer digital
data to and from the phone company’s central office
A cable modem uses the same line that your cable TV signals come in on to transfer
the data back and forth
Internet Connections
Broadband A connection in which transfer speeds
are faster than 128 bits per second
DSL connections and cable modems are
broadband connections
The speed for downloads (getting data from the
Internet to your home computer) may not be the
same as uploads (sending data from your home
computer to the Internet)
THANK YOU….