COM111 Lecture
Schedule 7
Introduction
to Computer Networks, Network Topologies, Communication Protocol, Network
Devices
Computer Network
Computer network is a collection
of two or more computers, which are connected together to share information and
resources.
Computers are powerful
tools that can process and manipulate large amounts of data quickly, but they
do not allow users to share that data efficiently. Before networks, users either prints
documents or copy files from one disk to another. The changes made by another
user in the document cannot be merged and that type of working environment is
called stand alone environment.
When two computers are
linked by using cable, that allows sharing data, it is known as network
environment. The computers and other devices (printers) are connected through a
cable, called as network. Connecting two or more computers and sharing
resources is called networking.
Operating
system such as DOS is designed for single user to control one computer; Network
Operating System (NOS) is an interconnected system of computing devices that
provides shared and economical access to computer services. NOS coordinate the
activities of multiple computers across a network.
NOS are
broadly divided into
1. Client/Server networks
2. Peer – to –Peer (P2P)
networks.
Client/Server
Network
Each computer is
either a client or a server to complete a particular task. Centralised host
computer is known as server and the user’s individual workstation is known as
client. Client request a service from the server and the server response by
providing service. Server provides
access to resources, while the clients have access to the resources available
on server. Server software runs on a computer, for hosting the software and
supports its services. Client software runs on personal computers or
workstations. In Client/Server relationship, both client and server carry out
data processing in their ends.
P2P
Network
P2P network does not
rely on dedicated servers for communication; instead it uses direct connections
between clients. A pure P2P network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both clients
and servers to other nodes on the network. The number of nodes that can
function as both clients and servers on a P2P network is between 10 and 25. If
there are more nodes, then P2P machine can be used as dedicated servers. P2P
networks have been designed primarily for small to medium LANs. Many sharing
services such as Morpheus and Kaaza are used extensively to find files on the
network. Most of these file sharing services actually integrate both P2P and
client/server networking design. These file sharing applications are known as
hybrid networks.
Generations in P2P
Networks
P2P
file sharing networks can be classified according to their generations based on
Internet based file sharing networks.
First
Generations – this generation has centralised file list like Napster.
Centralized file is responsible for infringement of copyright or other illegal
activities, which might occur while transferring files.
Second
Generation – This generation had decentralized file list such as Gnutella and
Fast track. This is necessary for network creators, as a central authority will
be held liable for copyright infringement.
Third
Generation – This generation is an improvement upon previous generation. This
network has inbuilt features such as
efficiency, reliability and anonymity. Examples are freenet, GNUnet etc.
Difference between P2P and
Client/Server Network
Basics
|
P2P Network
|
Client/Server Network
|
Centralized
|
No central repository for files and applications
|
Resources and data security are controlled through
the server.
|
Maintenance
|
Low maintenance cost file
|
A large network requires extra staff to ensure
efficient operation
|
Installation
|
Can be easily installed
|
Requires experts for proper installation of the
network
|
Expensive
|
No need for a dedicated server, thus not much
expensive
|
Expensive, as it requires a dedicated server
|
Security
|
Lack of proper security policies is the biggest
drawback
|
Provides high level of security
|
Dependence
|
All nodes are independent of each other. Failure
occurring in one node does not affect the functioning of other nodes in the
network.
|
When server goes down, it affects the functioning of
entire network.
|
Types of
computer networks
A network can be as few several
personal computers on a small network or a large as internet, a worldwide
network of computers. The types are networks are
1. LAN(Local Area
Network)
2. MAN(Metropolitan Area
Network)
3. WAN (Wide Area
Network)
LAN
(Local Area Network)
LAN is a computer
network that covers only a small geographical area such as office, house or
building. LAN is connected to computers which have NOS installed. Computers
designed as server, which controls the network.
It contains software that can be shared by computers attached to
network. Other computers connected to the server are called workstations. The
work stations are not powerful as server. LAN cables are used to connect the
computers. LAN offers a bandwidth of 10-100 Mbps.
MAN
(Metropolitan Area Network)
MAN is a network of
computers spread over metropolitan area such as city and its suburbs. In MAN city bridges its LANs with series of
backbones, making one large network for the entire city. It may be a single
network such as cable television network or connecting number of LANs.
WAN
(Wide Area Network)
WAN is a system of
interconnecting many computers over a large geographical are such as cities,
states, countries or even whole world. This kind of network uses telephone
lines, satellite links and other range communications technologies to connect.
WAN offers many advantages to
business organizations. They are as follows
·
It
offers flexibility of location because not all the people using the same data
have to work at the same site
·
Communication
between branch offices can be improved using e-mail and file sharing.
·
It
facilitates a centralized company wide data backup system.
·
Companies
located in number of small, interrelated offices can store files centrally and
access each other’s information.
Network
topologies
Topology refers to the
way a network is laid out, either physically or logically. Topology is
considered as a network shape. The five basic topologies are
1. Bus topology
2. Ring topology
3. Star topology
4. Tree topology
5. Mesh topology
Bus
topology
Bus topology uses a
common bus or backbone to connect all devices with terminators at both ends.
The backbone acts shared communication medium and each node is attached to it
with an interface connector. When a message is to be transmitted on the network,
it is passed back and forth long the cable, past the stations and between the
two terminators from one end of the network to the other.
As the message passes
each station, the station checks the message’s destination address. If the
address in the message matches, the bus carries the message to the next station
receives the messages. If the addresses do not match, the bus carries the
message to next station and so on.
Advantages
of Bus Topology
1. Connecting a computer
or peripheral to linear bus is easy.
2. This topology requires
least amount of cabling to connect the computers and therefore, less expensive
than other cabling arrangement.
3. It is easy to extend a
bus since two cables can be joined into one longer cable with connector.
Disadvantages
of Bus Topology
1. Entire network shuts
down if there is a failure in the backbone.
2. Heavy traffic can slow
down a bus because computers on such networks do not coordinate with each other
to reserve time to transmit.
Ring
Topology
In ring topology, computers are
placed on a circle of cable without any terminated ends since there are no
unconnected ends. Every node has exactly two neighbours for communication
purposes. All messages travel through a ring in the same direction until it
reaches its destination. Each node in the ring incorporates a repeater.
Advantages
of Ring Topology
1. Ring topology is easy
to install and reconfigure.
2. Every computer is
given equal access to the ring. Hence no single computer can monopolize the
network.
Disadvantages
of Ring Topology
1. Failure in any cable
or node breaks the loop and can take down the entire network.
2. Maximum ring length
and number of nodes are limited.
Star
topology
In star topology, devices are not
directly linked to each other, but they are connected via a centralized network
component known as hub or concentrator. The hub acts as central controller and
if a node wants to send data to another node, it boosts up the message and
sends the message to the intended node. This topology commonly uses twisted
pair cables; however, coaxial cable or fibre optic cable can also be used.
Advantages
of Star topology
1. Star topology is easy
to install and wire
2. The network is not
disrupted even if the node fails or is removed from the network.
3. Fault detection and
removal of faulty parts is easier in the star topology.
Disadvantages
of Star topology
1. It requires a longer
length of cable.
2. If the hub fails,
nodes attached to it are disabled.
3. The cost of the hub
makes the network expensive as compared to bus and ring topologies.
Tree Topology
A tree topology combines the
characteristics of linear bus and star topologies. It consists of groups of star-configured
workstations connected to a bus backbone cable.
Not every node plugs directly to the central hub. The majority of nodes
connect to a secondary hub that, in turn, is connected to the central hub. Each secondary hub in this topology functions
as the originating point of a branch to which other nodes connect.
Advantages
of Tree Topology
The advantages of tree topology
are:
The distance to which a signal can
travel increase as the signal passes through a chain of hubs.
Tree topology allows isolating and
prioritizing communications from different nodes.
Tree topology allows for easy
expansion of an existing network which enables organizations to configure a
network to meet their needs.
Disadvantages
of Tree Topology
The disadvantages of tree topology are
If the backbone line breaks, the
entire segment goes down.
It is more difficult to configure
and wire than other topologies.
Mesh Topology
In
a mesh topology, every node has a dedicated point-to-point link to every other
node. Messages sent on a mesh network
can take any of several possible paths from source to destination.
Advantages
of Mesh Topology
The advantages of mesh topology are
The use of large number of links
eliminates network congestion.
If one link becomes unusable, it
does not disable the entire system.
Disadvantages
of Mesh Topology
The disadvantages of mesh
topology are
As every node is connected to the
other, installation and reconfiguration is very difficult
The amount of hardware required
in this type of topology makes it expensive to implement.
Communication
Protocol
A communication protocol is a set
of rules that coordinates the exchange of information. If one computer is
sending information to another and they both follow the same protocol, the
message gets through, regardless of what types of machines they are and on what
operating systems they are running.
OSI
Model
Open System Interconnection (OSI)
is standard reference model for communication between two end users in a
network. The basic reference model for open system interconnection, which
visualize network protocols as a seven layered model. The layers are physical,
data link, network, transport, session, presentation and application layers.
A
layer in the OSI model communicates with two other OSI layers, the layer
directly above it and the layer directly below it.
Physical Layer
The physical layer defined the
physical and electrical characteristics of the network. The layer acts as a
conduit between computers’s networking hardware and its networking software. It
handles the transfer of bits from one computer to another. This is where the
bits are actually converted into electrical signals that travel across the
physical circuit. Physical layer communication media include various types of
copper or fibre optic cable, as well as many different wireless Medias.
Data Link Layer
The function of data link layer
is to provide service interface to the network layer and is responsible for
error free transmission and preventing the slow receivers from being overflow
by the fast senders. To achieve this, the data link layer divides the packets
received from the network layer into manageable form known as frames. These
data frames are then transmitted sequentially to the receiver.
Network Layer
The network layer is responsible
for transporting traffic between devices that are not locally attached. Router
provides the routing services in the network. When a packet is received on a
router interface, the destination IP address is checked. If the packet is not
designated for the router, then the router will look up the destination network
address in the routing table. Once the exit interface is chosen the packet will
be sent to the interface to be framed and sent to the interface to be framed
and sent out on the local network.
Transport Layer
The basic function of the
transport layer is to handle error recognition and recovery of the data
packets. This layer establishes, maintains and terminates communications
between the sender and receiver. At the receiving end, transport layer rebuilds
packets into the original message and to ensure that the packets arrived
correctly, the receiving transport layer sends acknowledgements.
Session Layer
The session layer comes into play
primarily at the beginning and the end of the transmission. At the beginning of
the transmission, it lets the receiver know its intent to start transmission.
At the end of transmission, the session layer determines if the transmission
was successful.
Presentation Layer
The function of presentation
layer is to ensure that information sent from the application layer of one
system would be readably by the application layers of another system. This is
the place where application data is packed or unpacked and is made ready to use
by the running application.
Application Layer
The application layer is the
entrance point that program use to access the OSI model and utilize network
resources. This layer represents the services that directly support
applications. OSI layer is closest to the end-user
Network
Devices
NIC (Network Interface Card)
NIC is a hardware device that
connects clients, server and peripherals to the network through a port. Most
network interface come as a small circuit board that can be inserted onto one
of the computer motherboard’s slots. In modern computers NIC is a part of
circuit board (mother boards). Each networks \ interface as associated with a
unique address called its media access control
(MAC) address. The MAC address helps I sending information to its intended
destination.
NICs
are a major factor in determining the speed and performance of a network. It is
a good idea to use the fastest network card available for the type of workstation
one is using.
Repeater
A
repeater is the most basic device on a network.
Signals that carry information within a network can travel a fixed
distance before attenuation endangers the integrity of the data. A repeater installed on the link receives
signal, regenerates it, and sends the refreshed copy back to the link. Doing this means that the new signal is
clean, free from any background noise introduced while travelling down the
wire.
Repeaters
are most commonly used to extend a network cable. All network cable standards have maximum
cable length specification. If the
distance between two network devices is longer than this specification, a
repeater is needed to regenerate the signal.
Without the repeater, the signal will be too weak for the computes on
each end to reliably understand. A good
example of the use of repeaters would be in a LAN using a star topology with
unshielded twisted-pair cabling. The length
limit for unshielded twisted-pair cable is 100 m. The repeater amplifies all
the 100m limit.
Hub
A hub is a small box that
connects individual devices on a network so that they can communicate with one
another. The hub operates by gathering
the signals from individual’s network devices, optionally amplifying the
signals, and then sending them onto all other connected devices. Amplification f the signal ensures that
devices on the network receive reliable information. A hub can be thought of as the centre of a
bicycle wheel, where the spokes (individual computers) meet.
The terms repeater and hub are
used synonymously, but they are actually not the same. Although at its very basic level, a hub can
be thought of as a multi-port repeater.
Typically, hubs have anywhere from 4 to over 400 ports.
Bridge
A bridge is a device that allows division of a
large network into two or more smaller and efficient network. It monitors the information traffic on both
sides of the network so that it can pass packets of information to the correct
location. Most bridges can “listen” to the network and automatically figure out
the address of each computer on both sides of the bridge. It examines each packet as it enters though
one of the ports. A bridge first looks at
the MAC address of the sender and creates a mapping between the port and the
sender’s MAC address. It then looks at
the address of the recipient, comparing the MAC address to the list of all
learned MAC addresses. If the address is in the list, the bridge looks up the
port number and forwards the packet to the port where it thinks the recipient
is connected. If the recipient’s MAC
address is not in the list, the bridge then does a flood; it sends the signal
to all the ports except the one from where it was received. As a result, a bridge reduces the amount of
traffic on a LAN by dividing it into two segments.
Bridges can be used to connect
networks with different types of cabling or physical topologies. They must, however, be used between networks
with the same protocol. Since a bridge
examiners the packet to record the sender and lookups the recipient, there is
overhead in sending a packet through a bridge.
On a modern bridge, this overhead is miniscule and does not affect
network performance.
Switch
A switch is a multi-port bridge. It connects individual devices on a network
so that they can communicate with one another.
The behaviour of a switch is the same as that of a bridge. It is capable of inspecting the data packets
as they are received, determining the source and destination device of that
packet, and forwarding that packet appropriately. The difference is that most switches
implement these functions in hardware using a dedicated processor. This makes them much faster than traditional
software-based bridges.
Router
A router is an essential network
device for interconnecting two or more networks. Router’s sole aim is to trace
the best route for information to travel.
As network traffic changes during the day, routers can redirect
information to take less congested routes.
A router creates and/or maintains a table, called a routing table that
stores the best routes to certain network destinations. While bridges know the address of all
computers on each side of the network, routers know the addresses of computers,
bridges, and other routers on the network.
Routers can even ‘liston’ to the entire network to determine which
sections are the busiest-they can then redirect data around those section until
they clear up.
Gateway
A gateway is an internetworking
device, which joins networks operating on different protocols together. It is also known as protocol converter. A gateway accepts the packet formatted for
one protocol and converts the formatted packet into another protocol. It can be implemented completely in software,
hardware, or as a combination of both.
For example, a gateway can receive e-mail message in one format and
convert it into another format. One can
connect systems with different protocols, languages, and architecture using a
gateway.
No comments:
Post a Comment