Ict Note - Unit IV
Ict Note - Unit IV
A computer network is defined as the interconnection of different computers and other shared
devices such as printers etc. for the purpose of resource sharing, information processing and
dissemination. Computers may connect to each other either via wired (guarded) or wireless
(unguarded) media. Each computing device on a network is called a node.
Network Protocol: This consists of set rules and guidelines that govern the manner in which
information is passed round on the network.
Administration
From an administrator’s point of view, a network can be private network which belongs to a
single autonomous system (Admin) and cannot be accessed outside its physical or logical
domain or a network can be public which is accessed by all.
Network Architecture
Computer networks can be discriminated into various types such as Client-Server, peer-to-
peer or hybrid, depending upon its architecture.
There can be one or more systems acting as Server(s) others being Client, the server
takes and processes request on behalf of Clients.
Two systems can be connected Point-to-Point, or in back-to-back fashion. They both
reside at the same level and called peers.
There can be hybrid network which involves network architecture of both the above
types.
Inter-Connectivity
Every single device can be connected to every other device on network, making the
network mesh.
All devices can be connected to a single medium but geographically disconnected,
created bus like structure.
Each device is connected to its left and right peers only, creating linear structure. All
devices connected together with a single device, creating star like structure.
All devices connected arbitrarily using all previous ways to connect each other, resulting
in a hybrid structure.
Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there
exists a point to point connection
between hosts and hub. The hub device
can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway
As in Bus topology, hub acts as single
point of failure. If hub fails, connectivity
of all hosts to all other hosts fails. Every
communication between hosts, takes
place through only the hub. Star
topology is not expensive as it only requires connecting one more host, only one cable is
required and configuration is simple.
Ring Topology
In ring topology, each host machine connects to
exactly two other machines, creating a circular
network structure. When one host tries to
communicate or send message to a host which is
not adjacent to it, the data travels through all
intermediate hosts. To connect one more host in
the existing structure, the administrator may need
only one more extra cable.
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts
in point-to-point connection with every other host or
may also have hosts which are in point-to-point
connection to few hosts only.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of bus
topology.
This topology divides the network in
to multiple levels/layers of network.
Mainly in LANs, a network is divided
into three types of network devices.
The lowermost is access-layer where
computers are attached. The middle
layer is known as distribution layer,
which works as mediator between
upper layer and lower layer. The
highest layer is known as core layer, and is central point of the network, i.e. root of the tree
from which all nodes fork.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only,
except the end hosts. Means, if the
end hosts in daisy chain are
connected then it represents Ring
topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments. Every intermediate host works as relay for its immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily
hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-
chain topologies. Most WANs are connected by
means of Dual-Ring topology and networks
connected to them are mostly Star topology
networks. Internet is the best example of largest
Hybrid topology
Geographical Span
Geographically a network can be seen in one of the following categories:
It may be spanned across your table, among Bluetooth enabled devices,. Ranging not
more than few meters.
It may be spanned across a whole building, including intermediate devices to connect all
floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
It may be one network covering the whole world.
Network Applications
Computer systems and peripherals are connected to form a network.They provide numerous
advantages:
Resource sharing such as printers and storage devices
Information sharing and exchange by using Web or Internet, e-Mails and FTP
Parallel computing
Communication by means of IP phones, Video conferencing, Instant messaging etc
Internet
The internet also known as the network of networks is the largest computer network in
existence on this planet. It can be defined as a network of networks consisting of global
network of computers that communicate using internet protocols (IP). It was created by US
department of defense, in 1969, under the name ARPANET (Advanced Research Project
Agency Network). The internet hugely connects all WANs and it can have connection to LANs
and Home networks. The internet enables its users to share and access enormous amount of
information worldwide, it uses World Wide Web (WWW), file transfer protocol (FTP), email
services, audio and video streaming etc at huge level.
Internet is widely deployed on World Wide Web services using HTML linked pages and is
accessible by client software known as Web Browsers, it works on Client-Server model, i.e.
when a user using a web browser (client) requests a page located on a Web Server anywhere
in the world, the Web Server responds with the proper HTML page. The communication delay
is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them are:
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Uses of Internet
1. Information dissemination
2. Product / service development
3. Transaction processing
4. Relation enhancing
5. Entertainment
6. Education
7. Religion etc.
Internet Terminologies
1. Web: it consist of interconnected systems of sites and places that can store information
in a multimedia form
2. HTML: the format used on the web. It means hypertext markup language
3. HTTP: hypertext transfer protocol
4. URL: Uniform (Universal) Resource locator, used to find a particular website
5. Web browser: software which enables us access the internet. E.g. Internet explorer,
Mozilla Firefox.
6. TCP/IP: the standardized set of rules that allow different computers on different
networks to communicate with each other efficiently
7. WAP: this is wireless application protocol that allows the use of mobile phones for a
wide range of inter actions with the web.
E-mail
An email is the electronic transmission of coded, graphics or textual information. It is a system
that intends to replace the movement of paper messages. It can be sent or received by several
people at different locations and within different time zones.
When the information is posted by the sender, it goes to a central computer which allocates
disk storage as mailbox to each user.
Both the sender and the receiver must require an email address that must be used to send or
receive email.
Advantages
1. Speed in information transmission
2. Cheaper than fax
3. Efficiency
4. Security.