0% found this document useful (0 votes)
11 views

Chapter 2

Uploaded by

abebemako302
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Chapter 2

Uploaded by

abebemako302
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Chapter Two

Introduction to Computer Networks

Data Communication and Computer Networks


(SE 3051)
Computer Network and its Applications

 At its most elementary level, a computer network consists of two computers

connected to each other by a cable that allows them to share data.


 All computer networking, no matter how sophisticated, stems from that simple

system.
 Computer networking arose as an answer to the need to share data in a timely

fashion.
 Personal computers are powerful tools that can process and manipulate large

amounts of data quickly, but they do not allow users to share that data efficiently.
 Before networks, users needed either to print out documents or copy document

files to a disk for others to edit or use them.


2
Contd.
 If others made changes to the document, there was no easy way to merge the

changes.
o This was, and still is, known as "working in a stand-alone environment."

 Copying files onto floppy disks and giving them to others to copy onto their

computers was sometimes referred to as the "sneakernet." This early form of


computer networking is one that many of us have used and perhaps still use today

3
Contd.

 connecting together of computers and other devices is called a network, and

the concept of connected computers sharing resources is called networking.

4
Contd.
 Two computers are said to be interconnected if they are able to exchange

information

 Components of a compute networks

Hardware:
 Computer Media:
 Network card Cable
 Routers Microwave …
 Modem …

Software: Network Design:


 Network OS Logical layout
 Utilities … Physical layout …
5
Uses of Computer Networks

6
Contd.
1. Resource sharing
 the goal of network is to make all programs, equipment, and especially data

available to anyone on the network without regard to the physical location


of the resource and the user.

 An obvious and widespread example is having a group of office workers

share a common printer.

 None of the individuals really needs a private printer, and a high-volume

networked printer is often cheaper, faster, and easier to maintain than a


large collection of individual printers.

 Information sharing is more important than physical resource sharing


7
Contd.

2. Means of communication
 E-mail
 Videoconferencing
 Chatting
 E-commerce
 Game
 ….
3. Centralizing administration and support
 Database
 Banks
 ….

8
Network Types: Networks of Many Sizes

9
Network Types

 There are basically three categories of networks based on its size

and geographical coverage

1. Local Area Network (LAN)

2. Metropolitan Area Network (MAN)

3. Wide Area Network (WAN)

10
LAN
 A local area network (LAN) is the basic building block of any computer network.

 A LAN can range from simple (two computers connected by a cable) to complex

(hundreds of connected computers and peripherals throughout a major corporation).

 The distinguishing feature of a LAN is that it is confined to a limited geographic area.

 A local area network (LAN) is usually privately owned and links the devices in a single

office, building, or campus.

 Depending on the needs of an organization and the type of technology used, a LAN

can be as simple as two PCs and a printer in someone's home office; or it can extend
throughout a company and include audio and video peripherals.

 Currently, LAN size is limited to a few kilometers


11
Contd.

12
Contd.

 LANs are designed to allow resources to be shared between personal

computers or workstations. The resources to be shared can include hardware


(e.g., a printer), software (e.g., an application program), or data.

 In addition to size, LANs are distinguished from other types of networks by

their transmission media and topology.

 In general, a given LAN will use only one type of transmission medium.

 The most common LAN topologies are bus, ring, and star.

 Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range.

Today, however, speeds are normally 100 or 1000 Mbps.

13  Wireless LANs are the newest evolution in LAN technology.


WAN
 A wide area network (WAN) provides long-distance transmission of data, image, audio, and
video information over large geographic areas that may comprise a country, a continent, or
even the whole world.
 A WAN can be as complex as the backbones that connect the Internet or as simple as a
dial-up line that connects a home computer to the Internet.

 We normally refer to the first as a switched WAN and to the second as a point-to-point WAN.

 The switched WAN connects the end systems, which usually comprise a router

(internetworking connecting device) that connects to another LAN or WAN.

 The point-to-point WAN is normally a line leased from a telephone or cable TV provider that

connects a home computer or a small LAN to an Internet service provider (lSP). This type of
WAN is often used to provide Internet access.
14
Contd.

15
MAN

 A metropolitan area network (MAN) is a network with a size between a LAN and a

WAN.

 It normally covers the area inside a town or a city.

 It is designed for customers who need a high-speed connectivity, normally to the

Internet, and have endpoints spread over a city or part of city.

 A good example of a MAN is the part of the telephone company network that can

provide a high-speed DSL line to the customer (we will discuss DSL in later chapters) .

 Another example is the cable TV network that originally was designed for cable TV, but

today can also be used for high-speed data connection to the Internet.

16
Interconnection of Networks: Internetwork
 Today, it is very rare to see a LAN, a MAN, or a LAN in isolation; they are connected to

one another.

 When two or more networks are connected, they become an internetwork, or internet.

17
Network, internet, and Internet

 A network is a group of connected communicating devices such as computers

and printers.

 An internet (note the lowercase letter i) is two or more networks that can

communicate with each other.

 The most notable internet is called the Internet (uppercase letter I), a

collaboration of more than hundreds of thousands of interconnected networks.

 Private individuals as well as various organizations such as government

agencies, schools, research facilities, corporations, and libraries in more than


100 countries use the Internet.
18
Intranet and Extranet
 An organization may use an extranet to
provide secure and safe access to
individuals who work for a different
organizations, but require company data

 Intranet is a private connection of


LANs and WANs that belongs to
an organization, and is designed
to be accessible only by the
organization's members,
employees, or others with
authorization.
 Intranets are basically an internet
which is usually only accessible
from within the organization.
19
Internet structure: network of networks
 roughly hierarchical

 at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity, Sprint, AT&T),

national/international coverage

 treat each other as equals


Tier-1 providers
also interconnect at
Tier-1 Tier 1 ISP public network
providers NAP access points
interconnect (NAPs)
(peer)
privately Tier 1 ISP Tier 1 ISP

20
Contd.

 “Tier-2” ISPs: smaller (often regional) ISPs

 Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs

Tier-2 ISPs
also peer
o Tier-2 ISP pays Tier-2 ISP Tier-2 ISP privately with
tier-1 ISP for each other,
connectivity to Tier 1 ISP interconnect at
rest of Internet NAP NAP
o tier-2 ISP is
customer of tier-
1 provider Tier 1 ISP Tier 1 ISP Tier-2 ISP

Tier-2 ISP Tier-2 ISP

21
Contd.
 “Tier-3” ISPs and local ISPs

 last hop (“access”) network (closest to end systems)

local
Tier 3 local
ISP local local
ISP ISP
ISP ISP
Local and
Tier-2 ISP Tier-2 ISP
tier- 3 ISPs
are customers Tier 1 ISP
of higher tier NAP
ISPs
connecting
them to rest Tier 1 ISP Tier 1 ISP
Tier-2 ISP
of Internet local
Tier-2 ISP Tier-2 ISP
local local local ISP
22 ISP ISP ISP
Contd.
 a packet passes through many networks!

local
Tier 3 local
ISP local local
ISP ISP
ISP ISP
Tier-2 ISP Tier-2 ISP

Try a Tier 1 ISP


traceroute! NAP

Tier 1 ISP Tier 1 ISP


Tier-2 ISP
local
Tier-2 ISP Tier-2 ISP
local local local ISP
23 ISP ISP ISP
Contd.

24
Ethiopian Network Structure

25
Network Type Based on Connection

 A network is two or more devices connected through links.

 A link is a communications pathway that transfers data from one device to

another.

 For visualization purposes, it is simplest to imagine any link as a line drawn

between two points.

 For communication to occur, two devices must be connected in some way to

the same link at the same time.

 There are two possible types of connections: point-to-point and

multipoint.
26
1. Point-to-Point

 A point-to-point connection provides a dedicated link between two devices.

 The entire capacity of the link is reserved for transmission between those two devices.

 Most point-to-point connections use an actual length of wire or cable to connect the

two ends, but other options, such as microwave or satellite links, are also possible.

 When you change television channels by infrared remote control, you are

establishing a point-to-point connection between the remote control and the


television's control system.

27
2. Multipoint
 A multipoint (also called multidrop) connection is one in which more than two specific

devices share a single link.

 In a multipoint environment, the capacity of the channel is shared, either spatially or

temporally.

 If several devices can use the link simultaneously, it is a spatially shared connection.

 If users must take turns, it is a timeshared connection.

28
Network Topology

 The term topology refers to the way in which a network is laid out physically.

 Two or more devices connect to a link; two or more links form a topology.

 The topology of a network is the geometric representation of the relationship of all

the links and linking devices (usually called nodes) to one another.

 There are five basic topologies :

1. Star
2. Bus
3. Ring
4. Mesh
5. Hybrid
29
Star Topology

 In a star topology, each device has a dedicated point-to-point link only to a

central controller, usually called a hub/switch.

 The term dedicated means that the link carries traffic only between the two

devices it connects.

 The devices are not directly linked to one another.

 Unlike a mesh topology, a star topology does not allow direct traffic between

devices.

 The controller acts as an exchange: If one device wants to send data to

another, it sends the data to the controller, which then relays the data to the other
connected device
30
Contd.
 A star topology is less expensive than a mesh topology.

 In a star, each device needs only one link and one I/O port to connect it to any

number of others.
o This factor also makes it easy to install and reconfigure.

 Far less cabling needs to be housed, and additions, moves, and deletions

involve only one connection: between that device and the central device.

 Other advantages include robustness. If one link fails, only that link is

affected. All other links remain active. This factor also lends itself to easy fault
identification and fault isolation. As long as the central device is working,
it can be used to monitor link problems and bypass defective links.
31
Contd.

A SIMPLE STAR TOPOLOGY


A HIERARCHICAL STAR TOPOLOGY
32
Contd.

 One big disadvantage of a star topology is the dependency of the whole

topology on one single point, the central device(switch/hub).

 If the switch goes down, the whole system is dead.

 Although a star requires far less cable than a mesh, each node must be linked to

a central hub.

 For this reason, often more cabling is required in a star than in some other

topologies (such as ring or bus).

 The star topology is used in local-area networks (LANs).

 High-speed LANs often use a star topology with a central switch.


33
Bus Topology

 A bus topology, is multipoint connection: one long cable acts as a backbone to link all

the devices in a network

 Nodes are connected to the bus cable by drop lines and taps.

 A drop line is a connection running between the device and the main cable.

34
Contd.

 A tap is a connector that either splices into the main cable or punctures

the sheathing of a cable to create a contact with the metallic core.

 As a signal travels along the backbone, some of its energy is transformed

into heat.

 Therefore, it becomes weaker and weaker as it travels farther and farther.

 For this reason there is a limit on the number of taps a bus can support

and on the distance between those taps.


35
Advantages of Bus Topology.

 Advantages of a bus topology include ease of installation.

 Backbone cable can be laid along the most efficient path, then connected to the

nodes by drop lines of various lengths.


o In this way, a bus uses less cabling than mesh or star topologies.

 In a star, for example, four network devices in the same room require four

lengths of cable reaching all the way to the hub.

 In a bus, this redundancy is eliminated. Only the backbone cable stretches

through the entire facility.

 Each drop line has to reach only as far as the nearest point on the backbone.
36
Disadvantages of Bus Topology.
1. Difficult reconnection and fault isolation. A bus is usually designed to be optimally
efficient at installation. It can therefore be difficult to add new devices.
2. Signal reflection at the taps can cause degradation in quality. This degradation can be
controlled by limiting the number and spacing of devices connected to a given length
of cable.
o Adding new devices may therefore require modification or replacement of
the backbone.
 In addition, a fault or break in the bus cable stops all transmission, even between
devices on the same side of the problem.
 The damaged area reflects signals back in the direction of origin, creating
noise in both directions.
 Bus topology was one of the first topologies used in the design of early local area
networks.
37 o Ethernet LANs can use a bus topology, but they are less popular now.
Ring Topology

 In a ring topology, each device has a dedicated point-to-point connection with only the

two devices on either side of it.

 A signal is passed along the ring in one direction, from device to device, until it reaches

its destination.

 Each device in the ring incorporates a repeater.

 When a device receives a signal intended for another device, its repeater regenerates the

bits and passes them along.

 A ring is relatively easy to install and reconfigure.

 Each device is linked to only its immediate neighbors (either physically or logically).

38 o To add or delete a device requires changing only two connections.


Contd.

 The only constraints are media and traffic considerations (maximum ring length and
number of devices).
 In addition, fault isolation is simplified.
 Generally in a ring, a signal is circulating at all times.
39
Contd.

 In a simple ring, a break in the ring (such as a disabled station) can disable the

entire network.

 This weakness can be solved by using a dual ring or a switch capable of closing

off the break.

 Ring topology was prevalent when IBM introduced its local-area network Token

Ring.

 Today, the need for higher-speed LANs has made this topology less popular.

40
Mesh topology
 In a mesh topology, every device has a dedicated point-to-point link to every other

device.

 To find the number of physical links in a fully connected mesh network with n nodes,

we first consider that each node must be connected to every other node.

 Node 1 must be connected to n - I nodes, node 2 must be connected to n – 1 nodes, and

finally node n must be connected to n - 1 nodes.We need n(n - 1) physical links.

 However, if each physical link allows communication in both directions (duplex

mode), we can divide the number of links by 2. In other words, we can say that in a
mesh topology, we need n(n -1) /2 duplex-mode links.

 To accommodate that many links, every device on the network must have n – 1
41
input/output (I/O) ports to be connected to the other n - 1 stations.
Contd.
 A mesh offers several advantages over other network topologies.
 First, the use of dedicated links guarantees that each connection can carry its own data
load, thus eliminating the traffic problems that can occur when links must be shared
by multiple devices.
 Second, a mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
 Third, there is the advantage of privacy or security. When every message travels along
a dedicated line, only the intended recipient sees it. Physical boundaries prevent other
users from gaining access to messages.
 Finally, point-to-point links make fault identification and fault isolation easy.
 Traffic can be routed to avoid links with suspected problems. This facility enables the
network manager to discover the precise location of the fault and aids in finding its
42 cause and solution.
Contd.

 The main disadvantages of a mesh are related to the amount of cabling and the

number of I/O ports required.

 First, because every device must be connected to every other device, installation and

reconnection are difficult.

 Second, the sheer bulk of the wiring can be greater than the available space (in walls,

ceilings, or floors) can accommodate.

 Finally, the hardware required to connect each link (I/O ports and cable) can be

prohibitively expensive.

 For these reasons a mesh topology is usually implemented in a limited fashion, for

example, as a backbone connecting the main computers of a hybrid network that can
43 include several other topologies.
Contd.
 One practical example of a mesh topology is the connection of telephone
regional offices in which each regional office needs to be connected to
every other regional office

Mesh topology

44
Hybrid Topology
 A network can be hybrid. For example, we can have a main star topology

with each branch connecting several stations in a bus topology (star-bus


topology)

45
Network Models by Capability

1. Client/Server Model

 Microcomputer users, or clients, share services of a centralized computer


called a server.

46
Contd.
2. Peer-to-Peer Model

 Computers share equally with one another without having to rely on a

central server.

47
Client-server model

Fig. Two clients using a single server at a time


48
Client/Server
 A distinction exists between computers that make available network resources
(servers) and those computers that use the resources (clients or workstations).
Pros:
 Very secure

o Centralized servers easy to manage

o Physically centralized

o Secure OS Cons:
 Better performance  Require professional administration
 Centralized backups  More hardware intensive
 Reliability

o Simple job to do plus built in redundancy

49
Peer-to-Peer (p2p)
 Computers on the network communicate with each others as equals and each computer is
responsible for making its own resources available to other computers on the network.
Pros:
 Uses less expensive computer networks

 Easy to administer

 No NOS (network operating system) required

 More built-in redundancy

 Shared resources – some machine will have what you need

Cons:
 Individual user performance easily affected

 Not very secure

 Tragedy of the commons – no guarantee others will administer their resources properly
(almost guaranteed with over 10 machines)
50
 Hard to back up.
Client/Server vs. Peer-to-Peer: Advantages and Disadvantages

Client/Server Model Peer-to-Peer Model


Advantages:
Advantages:
o Uses less expensive networks.
o Very secure OS.
o Easy to configure
o Better performance.
o Contain both network operating system and
o Centralized servers, easy to
application software.
manage.
o Ideal for small business and home users (up
o Centralized backups.
to 10 computers).
o High reliability.
Disadvantages:
Disadvantages:
o Individual user performance easily affected.
o Expensive administration.
o Not very secure.
o More hardware intensive.
51 o Hard to back up.
Q

52

You might also like