0% found this document useful (0 votes)
9 views

Network Basics (6)

Uploaded by

hoichoiahmed5
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Network Basics (6)

Uploaded by

hoichoiahmed5
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 68

ICT in Business

Network
.

Basics
Learning Objectives
In this chapter you will learn
about:
 Basic Concept of Network
 The Advantages of Using Network
 Types of Network
 How Networks are Structured
 Different Types of Network Topologies
 Different types of Network Linking
Devices
 Different types of Network Protocols
Network Definition
 A network is a set of technologies- including
hardware, software, and media- that can be
used to connect computers together, enabling
them to communicate, exchange information,
and share resources in real time
 Networks allow many users to access shared
data and programs almost instantly
 Networks open up new ways to communicate,
such as e-mail and instant messaging.
 By allowing users to share expensive
hardware resources such as printers,
networks reduce the cost of running an
organization.
The Advantages of Using a
Network
Allows Simultaneous Access to
Critical Programs and Data.
Allows People to Share Peripheral
Devices, Such as Printers and
Scanners.
Facilitates Personal
Communication with Email and
Instant Messaging.
Makes the Backup Process Easier.
The Advantages of Using a
Network
Allows Simultaneous Access to Critical Programs
and Data.
• Files can be stored on a central location called a "file server" that
can be shared and made available to each and every user in an
organization.
• The organization can store a single copy of a data file on the server
that users can access whenever they want.
• Then, if one user makes a change to the file, other users will see
the change when they use the file, and no one needs to figure out
who has the latest copy of the data.
• Software can also be shared through the network
• Software is costly for two reasons. First, software can be costly,
especially when dozens or hundreds of copies are required. Second,
installing and configuring a software on several computers takes a
lot of time and effort, and maintaining multiple program
installations is an ongoing cost.
• Without having to install separate software for each user, these
issues can be overcome through site licensing and network
versions.
The Advantages of Using a
Network
 Site License
Under a site license, a business buys a
single copy (or a few copies) of an
application and then pays the developer for
a license to copy the application onto a
specified number of computers.
 Network Version
In a network version, only one copy of the
application is stored on the server. When
workers need to use a program, they simply
load it from the server into the RAM of their
own desktop computers.
The Advantages of Using a
Network
Allows People to Share Peripheral
Devices, Such as Printers and Scanners.
 Organizations can save money by using network-connected
peripheral devices like printers, scanners, and copiers
 The ability to share peripheral devices (especially expensive
ones such as high- volume laser printers, which can cost
thousands of dollars) is one of the best reasons for small
businesses to set up a network.
 Aside from the cost of purchasing multiple printers, the
organization must also pay for printer maintenance and
supplies, which ultimately increases the organization's overall
cost
 When several people can share a printer on a network, printing
becomes less expensive and easier to manage.
 There are two common ways to share a printer. A printer can
connect directly to the network or it can be attached to a print
server, which is a computer that manages one or more printers.
The Advantages of Using a
Network
Facilitates Personal Communication with Email
and Instant Messaging.
 A computer network facilitates interpersonal
communications, allowing users to communicate
efficiently and easily via various means like email,
instant messaging, and teleconferencing.
 Instant messaging can now allow users to talk in real
time and send files to other people wherever they are
in the world
 Teleconferencing means connecting two or more
participants from different locations electronically to
hold discussions and meetings.
 The three most common types of teleconference are
conference calls (voice only), videoconferences (voice
and video), and web-based conferences
The Advantages of Using a
Network
 Conference Call
A conference call is simply a phone call with
more than two participants.
 Video Conferencing

Video conferencing is a technology that allows


users in different locations to hold real-time
face-to-face meetings, often at little to no cost.
 Web Conferencing

Web conferencing enables the real-time


sharing of computer screens, individual
applications or web-based content among two
or more computers or mobile devices.
The Advantages of Using a
Network
Makes the Backup Process Easier.
 When one PC's information is corrupted or
inaccessible for various reasons, another
duplicate of similar information is
accessible on another workstation for
future usage
 In this case data backup is necessary.
 The network ensures smooth working and
further handling without interruption by
backing up all the data that is stored on
the shared removable media or cloud
storage.
Types of Network
The common types of computer
networks are;
 Personal Area Network (PAN)
 Home Area Network (HAN)
 Local Area Network (LAN)
 Campus Area Network (CAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)
 Virtual Private Network (VPN)
 Intranet & Extranet
Personal Area Network
(PAN)
 PAN (Personal Area Network) is a computer
network formed around a person.
 It generally consists of a computer, mobile,
or Personal Digital Assistant (PDA). PAN can
be used for establishing communication
among these personal devices through
Bluetooth or infrared.
 PAN has connectivity range up to 10 meters.
 PAN may include wireless computer
keyboard and mouse, Bluetooth enabled
headphones, wireless printers and TV
remotes
Home Area Network (HAN)
A HAN is like a PAN, but even bigger.
 As the name suggests, a HAN is a very
small network that usually covers a single
home.
 This facilitates communication among the
digital devices within a home which are
connected to the home network.
 Any device that is connected to this
network will be able to share resources, for
example the internet, smart appliances,
printers, smart meters and even some
security systems.
Local Area Network (LAN)
 A local area network (LAN) is a data communication
system consisting of several devices such as computers
and printers.
 A LAN can consist of just two or three PCs connected
together to share resources, or it can include hundreds
of computers of different kinds
 Any network that exists within a single building, or
even a group of adjacent buildings, is considered a
LAN.
 It is often helpful to connect separate LANs together so
they can communicate and exchange data. In a large
company, for example, two departments located on the
same floor of a building may have their own separate
LANs, but if the departments need to share data, then
they can create a link between the two LANs.
Campus Area Network (CAN)
A Campus Area Network is made
up of an interconnection of LANs
within a specific geographical
area.
For example, a university campus
can be linked with a variety of
campus buildings to connect all
the academic departments.
Metropolitan Area Network
(MAN)
A metropolitan area network (MAN) is similar
to a local area network (LAN) but spans an
entire city, or some other municipal or
organizational territory.
 MANs are formed by connecting multiple
LANs. Thus, MANs are larger than LANs.
 MANs are typically extremely efficient and
can provide fast communication via high-
speed carriers, such as fiber optic cables.
 Television cable is an example of a MAN.
 It is also used in communication between
the banks in a city.
Wide Area Network (WAN)
A Wide Area Network is a network that
extends over a large geographical area
such as states or countries.
 A Wide Area Network is not limited to a
single location, but it spans over a large
geographical area through a telephone
line, fiber optic cable or satellite links.
 The internet is one of the biggest WAN in
the world.
 A Wide Area Network is widely used in the
field of Business, government, and
education.
Virtual Private Network
(VPN)
 A virtual private network (VPN) gives you online
privacy and anonymity by creating a private
network from a public internet connection.
 VPNs mask your internet protocol (IP) address
so your online actions are virtually untraceable.
 VPNs are primarily used for remote access to a
private network.
 For example, employees at a branch office
could use a VPN to connect to the main office’s
internal network. Alternatively, a remote
worker, who may be working from home, could
need to connect to their company’s internet or
restricted applications.
Intranet & Extranet
 An intranet functions as a company’s private
communication network. It’s a private website
for employees with company news,
information, documents, and business process
tools that are critical for completing work.
 Whereas an extranet is a private network too.
It allows business partners, suppliers, and
other authorized parties to communicate. The
extranet is accessible to designated people
from outside the company. It can be shared by
more than one organization, such as a business
that allows its vendors to access the company
extranet for product and billing purposes.
How Network is Structured
Based on network design, a
computer network can be divided
into the following two types:
Server-Based Network
Peer-to-Peer Network
Server-Based Network
 A Server-Based network can also be termed as a Client-
Server network.
 In a client server network, there are clients and servers.
 A client can be a device or a program. It helps the end users
to access the web. Some examples of clients are desktop,
laptops, smartphones, web browsers, etc.
 A server is a device or a program that responds to the
clients with the services. It provides files, databases, web
pages, shared resources according to its type.
 In this network, a client requests services from the server.
The server listens to the client requests and responds to
them by providing the required service.
 There is various kind of servers depending upon their use,
they can be a web server (which servers HTTP requests),
Database servers (which runs DBMS), File server (which
provides files to clients), Mail server, print server, Game
server, Application server, and so on.
Server-Based Network
Server-Based Network
Advantages Disadvantages
 It facilitates a Centralized  Dependency is more
storage system.

on a centralized
Centralization makes
administration easy. server.
 Data can be easily backed  If the server's data is
in such networks. corrupted, all nodes
 Server-based networks will be affected.
are scalable networks,  A network
meaning they are easily
expandable. administrator is
 Data sharing speed is required.
high.  The cost of the server
 Servers can serve multiple and network software
clients at a time is very high.
Peer-to-Peer Network
 The Peer-to-Peer network is also called P2P or
computer-to-computer network.
 In a peer to peer network, there is no specific
client or a server.
 A device can send and receive data directly with
each other.
 Each node can either be a client or a server. It can
request or provide services accordingly. A node is
also called a peer.
 In networking, a node is either a connection point,
a redistribution point, or a communication
endpoint. Nodes are devices or data points on a
large network, devices such a PC, phone, or
printer are considers nodes.
Peer-to-Peer Network
 In peer to peer network, a node joins the network
and start providing services and request for
services from other nodes.
 There are two methods to identify which node
provides which service.
 A node registers the service it provides into a
centralized lookup service. When any node
requires obtaining a service, it checks the
centralized lookup to find which node provides
which facilities. Then, the service providing node
and service requesting node communicate with
each other.
 In the other method, a node that requires
specific services can send a broadcast message
to all other nodes requesting a service. Then, the
Peer-to-Peer Network
Peer-to-Peer Network
Advantages Disadvantage
 Easy to implement and
manage. s
 Nodes or workstations are  Storage is
independent of one another.
Also, no access permissions decentralized, and also
are needed. not so efficiently
 The network is reliable in managed.
nature. If a peer fails, it will  No data backup
not affect the working of
others. options are available in
 There is no need for any peer-to-peer networks.
professional software in such  These kinds of
kind of networks. networks are not so
 The cost of implementation
secure.
of such networks is very less.
Network Topology
 Topology defines the structure of the network of
how all the components are interconnected to
each other.
 It is the logical layout of the cables and devices
that connect the nodes of the network.
 Network designers consider several factors when
deciding which topology or combination of
topologies to use: the type of computers and
cabling (if any) in place, the distance between
computers, the speed at which data must travel
around the network, and the cost of setting up
the network.
 Data moves though the network in a structure
called packets. Packets are pieces of a message
broken down into small units by the sending PC
Network Topology
A network's topology and related
technologies are important for two reasons.
 First, a correctly designed network, using
the most appropriate topology for the
organization's needs, will move data
packers as efficiently as possible.
 Second, the network's topology plays a role
in preventing collisions, which is what
happens when multiple nodes try to
transmit data at the same time. Their
packets can collide and destroy each other.
Types of Network Topology

The various network


topologies are:
Bus Topology
Star Topology
Tree Topology
Ring Topology
Mesh Topology
Hybrid Topology
Bus Topology
Bus Topology
 The bus topology is designed
in such a way that all the
network device are
connected through a single
cable known as a backbone
cable.
 Each node is either
connected to the backbone
cable by drop cable or
directly connected to the
backbone cable.
 The configuration of a bus
topology is quite simpler as
compared to other
topologies.
Bus Topology
Advantages Disadvantages
 It is the easiest network  Bus topology is not great for

topology for connecting large networks.


 Identification of problem
peripherals or computers in a
becomes difficult if whole
linear fashion. network goes down.
 It works very efficient well  Troubleshooting of individual
when there is a small network. device issues is very hard.
  Additional devices slow network
It is easy to connect or remove
devices in this network without down.
 Need of terminators are
affecting any other device.
required at both ends of main
 Very cost-effective as cable.
compared to other network  If a main cable is damaged,
topology . whole network fails or splits
 Easy to expand by joining the into two.
 This network topology is very
two cables together.
slow as compared to other
topologies.
Star Topology
Star Topology
 A star may be a topology in which
all nodes are individually
connected to a central connection
point, sort of a hub or a switch.
 A star takes more cable than e.g. a
bus, but the benefit is that if a
cable fails, just one node is going
to be brought down.
 Each device within the network is
connected to a central device
called hub.
 If one device wants to send data to
another device, it’s to first send the
info to hub then the hub transmits
that data to the designated device.
Star Topology
Advantages Disadvantages
  Requires more cable than
If one cable or device
fails then all the others a linear bus.
 More expensive than
will still work
 It is high-performing as linear bus topology due to
the value of the
no data collisions can
connecting devices
occur (network switches)
 Robust in nature  If hub goes down
 Easy fault detection everything goes down,
because the link are none of the devices can
often easily identified. work without hub.
 No disruptions to the  Hub requires more
network when resources and regular
connecting or removing maintenance because it’s
devices. the central system of star.
 Extra hardware is required
Tree Topology
Tree Topology
 In computer networks,
a tree topology is also
known as a star bus
topology.
 It incorporates
elements of both
a bus topology. and
a star topology.
 The pattern of
connection resembles
a tree in which all
branches are
connected to one root.
Tree Topology
Disadvantages
Advantages
  This network is very
This topology provides a
hierarchical as well as difficult to configure as
central data arrangement compared to the other
of the nodes. network topologies.
 This is very flexible and  Due to the presence of
also has better scalability. large number of nodes,
 The other nodes in a the network performance
network are not affected, if of tree topology becomes
one of their nodes get a bit slowly.
damaged or not working.  Requires large number of
 Nodes can be added by cables compared to star
simply adding a hub and ring topology.
 Tree topology provides easy  The backbone appears as
maintenance and easy fault the failure point of the
identification can be done. entire segment of the
network.
 If bulk of nodes are added
Ring Topology
Ring Topology
 Ring topology is like a bus
topology, but with connected
ends.
 The node that receives the
message from the previous
computer will retransmit to the
next node.
 The data flows in one direction,
i.e., it is unidirectional.
 The data flows in a single loop
continuously known as an
endless loop.
 It has no terminated ends, i.e.,
each node is connected to
other node and having no
termination point.
 The data in a ring topology
flow in a clockwise direction.
Ring Topology
Advantages Disadvantages
 In this topology, data flows in  It is Expensive.
one direction which reduces
the chance of packet  Difficult to troubleshoot
collisions. the ring.
 In this topology additional  In order for all the
workstations can be added ;
without impacting computer to
performance of the network. communicate with
 Equal access to the each other, all
resources. computer must be
 Speed to transfer the data is turned on.
very high in this type of 
topology. Total dependence in on
 Easy to manage. one cable.
 Ring network is extremely  They were not scalable.
orderly organized.
Mesh Topology
Mesh Topology
 Mesh technology is an
arrangement of the network
in which computers are
interconnected with each
other through various
redundant connections.
 There are multiple paths from
one computer to another
computer.
 It does not contain the switch,
hub or any central computer
which acts as a central point
of communication.
 The Internet is an example of
the mesh topology.
Mesh Topology
Advantages Disadvantages
 Failure during a single device  It’s costly as compared
won’t break the network.
 Fault identification is
to the opposite network
straightforward. topologies
 This topology provides  Installation is extremely
multiple paths to succeed in difficult in the mesh.
the destination and tons of
 Power requirement is
redundancy.
 It provides high privacy and higher as all the nodes
security. will need to remain
 Data transmission is more active all the time and
consistent because failure share the load.
doesn’t disrupt its processes. 

Complex process.
Adding new devices won’t
disrupt data transmissions.  Maintenance needs are
 This topology has robust challenging with a mesh.
features to beat any situation.
Hybrid Topology
Hybrid Topology
 The combination of various
different topologies is known
as Hybrid topology.
 A Hybrid topology is a
connection between different
links and nodes to transfer the
data.
 When two or more different
topologies are combined
together is termed as Hybrid
topology and if similar
topologies are connected with
each other will not result in
Hybrid topology. For example, if
there exist a ring topology in
one branch of ABC bank and
bus topology in another branch
of ABC bank, connecting these
two topologies will result in
Hybrid topology.
Hybrid Topology
Advantages Disadvantages
 This type of topology  It is a type of
combines the benefits of
different types of expensive network.
topologies in one topology.  Design of a hybrid
 Can be modified as per
requirement.
network is very
 It is extremely flexible. complex.
 It is very reliable.  Requires a lot of
 It is easily scalable cables in
 Error detecting and installation process.
trouble shooting is easy.
 Installation is a
 It is used for create large
network. difficult process.
Network Linking Devices
Repeater
A repeater is a network device that retransmits a received
signal with more power and to an extended geographical or
topological network boundary than the original signal could.
A repeater is implemented in computer networks to expand
the coverage area of the network, re-propagate a weak or
broken signal, and/or service remote nodes. Repeaters
amplify the received or input signal to a higher frequency
domain so that it is reusable, scalable, and available.
Network Linking Devices
 Hub
A hub is a type of networking device that
connects devices on a computer network
together. The hub is used as a central
connective device in the star topology.
Computers are connected to each other
through hubs. After receiving the signal
delivered to the hub, it broadcasts it to
all computers linked to it.
 Switch
A network switch is a type of networking
device that connects devices on a
computer network together. The work of
the switch and hub is almost the same.
However, after receiving the signal sent
to the hub, it sends the signal to all the
computers at the same time. That is, it
broadcasts the signal, but after receiving
the signal sent to the switch, it only
sends it to the target computer. This is
why switches are called "intelligent
Network Linking Devices
 Router
The router can be compared to a
postman. The router must keep track of
all network segment updates, just as the
postman must identify all possible routes
for delivering the recipient's paper. The
router delivers data packets from the
source computer to the destination
computer. The router uses the shortest
distance route to deliver the data packets
to the destination. Routers are more
expensive than other networking devices
like hubs, bridges and switches.
 Bridge
A bridge is a network device that
connects multiple LANs (local area
networks) together to form a larger LAN.
The process of aggregating networks is
called network bridging. A bridge
connects the different components so
that they appear as parts of a single
network. The main function of this is to
examine the incoming traffic and
Network Protocols
 A network protocol is an established set of rules
that determine how data is transmitted between
different devices in the same network.
 Essentially, it allows connected devices to
communicate with each other, regardless of any
differences in their internal processes, structure or
design.
 Network protocols are the reason you can easily
communicate with people all over the world, and
thus play a critical role in modern digital
communications.
 The common protocols are;
OSI Model
TCP/IP Model
WWW
OSI Model
 The OSI Model
(Open Systems
Interconnection
Model) was
published in 1984
by the International
Organization for
Standardization
(ISO).
 In the OSI reference
model, the
communications
between a
computing systems
are split into seven
different abstraction
Physical Layer
The physical layer is responsible
for the physical cable or wireless
connection between network
nodes.
It defines the connector, the
electrical cable or wireless
technology connecting the
devices, and is responsible for
transmission of the raw data,
which is simply a series of 0s and
1s, while taking care of bit rate
Data Link Layer
 The data link layer establishes and
terminates a connection between two
physically-connected nodes on a network.
 It breaks up packets into frames and sends
them from source to destination.
 This layer is composed of two parts—
Logical Link Control (LLC), which identifies
network protocols, performs error checking
and synchronizes frames, and Media
Access Control (MAC) which uses MAC
addresses to connect devices and define
permissions to transmit and receive data.
Network Layer
 The network layer has two main functions.
 One is breaking up segments into network
packets, and reassembling the packets on
the receiving end.
 The other is routing packets by
discovering the best path across a
physical network.
 The network layer uses network addresses
(typically Internet Protocol addresses) to
route packets to a destination node.
Transport Layer
 The transport layer takes data transferred in
the session layer and breaks it into
“segments” on the transmitting end.
 It is responsible for reassembling the
segments on the receiving end, turning it
back into data that can be used by the
session layer.
 The transport layer carries out flow control,
sending data at a rate that matches the
connection speed of the receiving device, and
error control, checking if data was received
incorrectly and if not, requesting it again.
Session Layer
 The session layer creates communication
channels, called sessions, between
devices.
 It is responsible for opening sessions,
ensuring they remain open and functional
while data is being transferred, and closing
them when communication ends.
 The session layer can also set checkpoints
during a data transfer—if the session is
interrupted, devices can resume data
transfer from the last checkpoint.
Presentation Layer
The presentation layer prepares
data for the application layer.
It defines how two devices should
encode, encrypt, and compress
data so it is received correctly on
the other end.
The presentation layer takes any
data transmitted by the
application layer and prepares it
for transmission over the session
Application Layer
 The application layer is used by end-user
software such as web browsers and email
clients.
 It provides protocols that allow software to
send and receive information and present
meaningful data to users.
 A few examples of application layer
protocols are the Hypertext Transfer
Protocol (HTTP), File Transfer Protocol
(FTP), Post Office Protocol (POP), Simple
Mail Transfer Protocol (SMTP), and Domain
Name System (DNS).
TCP/IP Model
TCP/IP Model
 TCP/IP, in full Transmission Control
Protocol/Internet Protocol, standard Internet
communications protocols that allow digital
computers to communicate over long distances.
 The Internet is a packet-switched network, in
which information is broken down into small
packets, sent individually over many different
routes at the same time, and then reassembled
at the receiving end.
 TCP is the component that collects and
reassembles the packets of data, while IP is
responsible for making sure the packets are sent
to the right destination.
TCP/IP Model Layers
The four layers of the TCP/IP model are as follows:
 Network Interface Layer:
This layer defines how data should be sent, handles
the physical act of sending and receiving data, and
is responsible for transmitting data between
applications or devices on a network. It is the
combination of the physical and data link layers of
the Open Systems Interconnection (OSI) model.
 Internet Layer:
The internet layer is responsible for sending
packets from a network and controlling their
movement across a network to ensure they reach
their destination.
TCP/IP Model Layers
 Transport Layer:
The transport layer is responsible for providing a
solid and reliable data connection between the
original application or device and its intended
destination.
 Application Layer:
The application layer refers to programs that
need TCP/IP to help them communicate with each
other. This is the level that users typically
interact with, such as email systems and
messaging platforms. It combines the session,
presentation, and application layers of the OSI
model.
World Wide
Web (WWW)
 The World Wide Web (WWW), commonly known as
the Web, is an information system where
documents and other web resources are identified
by Uniform Resource Locators (URLs), such
as https://example.com/, which may be interlinked
by hyperlinks and are accessible over the Internet.
 The resources of the Web are transferred via
the Hypertext Transfer Protocol (HTTP), may be
accessed by users through a software
application called a web browser, and are published
by a software application called a web server.
 English scientist Tim Berners-Lee invented the
World Wide Web in 1989.

You might also like