Download presentation
Presentation is loading. Please wait.
Published byTanner Tiley Modified over 9 years ago
1
Networking Concepts Introductory Lecture By Mushhad Gilani
2
Books & study Material Text Book:- Data Communication and Networking, 4/e. Author: Behrouz A. Forouzan Reference Books/Material Larry L. Peterson and Bruce S. Davies [2000], Computer Networks A Systems Approach, Second Edition
3
Introduction Meaning: Networking consists of two or more than two computers connected to each other by a medium (cable) so that they can share a data. Definition: A group of computers and other devices connected together is called a network and the concept of connected computers sharing resources is called as “Network”.
4
Uses of Computer Networks Network for Companies Network for People. Social Issues
5
Network for Companies. Many Organizations have a substantial number of computers in operation, often located far apart The goal are Resources Sharing High reliability Saving money Scalability
6
Network for People. Starting in 1990s, computer networks began to start delivering services to private individuals at home. Below we describe some services. Access to remote information. Person to person communication
7
Social Issues On the other hand The widespread introduction of Networking will introduce new social, ethical, political problems.
8
1-1 DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable. Components Data Representation Data Flow Topics discussed in this section:
9
Figure 1.1 Five components of data communication Message Sender Receiver Medium Protocol
10
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
11
Figure 1.3 Types of connections: point-to-point and multipoint
12
Explanation: Networking arose from the need to share data in timely fashion. Computers in a network can share: a) Data (b) Messages (c) Graphics (d) Printers (e) Modems.
13
How Data Communication took Place
14
Types of Networks There are three different ways in which we classify the networks 1) Organizational Point of View 2) Geographical Point of View 3) Computing Point of View
15
Organizational Point of View From organizational point of view, networks are divided into two types Peer-to-Peer Server based
16
Peer-to-Peer These are also called Workgroups. A peer-to-peer network comprises of 10 or less users and is suitable for small-sized business organizations. In this model of networking the resources are randomly scattered on the network with every machine acting as a server as well as client
17
Server Based networks They are sometimes referred to as Domains. This is a centralized model of networking with resources placed on a dedicated machine called Server. There is no user limit as such, as it depends directly on your hardware resources and capacity to support users.
18
Geographical Point of View From geographical point of view, there are three types of networks. LAN WAN MAN/CAN
19
Classification of Geographical Networks by Scale
20
LAN or Local Area Network A LAN encompasses a small area such as a floor or a building with all the machines connected directly via the same medium generally.
21
Examples: LAN Two networks: (a) Bus (b) Ring
22
Local Area Network
24
WAN or Wide Area Network A WAN comprises of a very large physical area that covers countries and continents. Internet is one good example of a WAN. The machines in a WAN are connected through different mediums and protocols. Generally, the Dial-up- Networks are used for this purpose.
25
Wide Area Network
26
Internet MAP This map of the Internet appeared in the December 1998 Wired.
27
MAN (Metropolitan Area Network) or CAN (Campus Area Network) A MAN is almost similar to a WAN that a MAN only encompasses an area that is within a city. CAN is a campus area Network which is used with in a campus for the sharing of resources.
28
Example: MAN A metropolitan area network based on cable TV
29
Metropolitan Area Network
30
Internetwork (Internet)
31
Computing Point of View Networks are divided into two types from the point of view of computing. 1.Centralized Networks 2.Client-Server Networks
32
Centralized Networks The centralized networks rely totally on one dedicated machine called server for all the processing and computing and the clients or the terminals act as dumb entities. If the client requires a certain set of data, whole of the data set is transferred at the client end, which also is wastage of the network bandwidth.
33
Client-Server Networks In this model of networking, only the required set of data is returned to the client while both the server and the client take part in the processing or computing of the queries. This is a more efficient way of processing and is hence applied generally more than the centralized method, nowadays..
34
Topology A topology is the physical layout or design of the networks that specifies the cabling method as well as the arrangement of the computers. It also explains the access method used by the computers that represent that topology. It also explains the access method used by the computers that represent that topology.
35
Types of Topology There are following types of topologies, generally: Bus Topology Star Topology Ring Topology Mash Topology
36
Bus Topology The bus topology consists of a long linear cable also called trunk or linear trunk or backbone. In this type of topology, all the computers are connected to this main cable. Bus is a passive topology. The main features of the bus topology are discussed as under: Signal Bouncing This is a phenomena observed in this type of topology. In signal bouncing, the data signal travels across the cable medium from one end to another and if not absorbed at the other end, it will keep on bouncing back and forth across the medium and therefore will stop any further communication on the network. This is called signal bouncing.
37
Bus Topology
38
Terminator: In order to avoid signal bouncing, a device called terminator is used at one end of the medium that absorbs the signal and hence restricts it from affecting the overall network communication. It could be a grounding method as well with one end grounded into a wall socket. Signal Attenuation: After the data travels a long distance on the cable, it starts becoming weaker and weaker until it reaches a point where it cannot be received in the correct form. This process is called Signal Attenuation. Repeater: The solution to Signal Attenuation is a device called repeater that regenerates or amplifies the signal to make it strong enough to be received correctly at the destination end
39
Star Topology In star topology there is a central network traffic management device called hub/Switch. All the nodes (computers) are connected directly to the hub and are thereby interconnected with each other. Star topology does not allow direct traffic.
40
Star Topology
41
Tree Topology
42
ADVANTAGES Easily Expanded Easier to Troubleshoot Easier to Troubleshoot Multiple cable types Supported by hubs Multiple cable types Supported by hubs
43
DISADVANTAGES Hub failure Requires more Cable May require a device to re broad cast signals across the network
44
Ring Topology In ring topology the computers connected with each other via a single cable run constitute a logical ring. Ring is an active topology and also that every computer on the ring acts as a repeater i.e., it regenerates the signal and transmits it onto the cable. Token Passing A frame or sequence of data called token passes from one computer to another on the ring and makes the network communication possible in a way that only the computer with token has the opportunity to transmit data on the ring. Here is how the process works: (Token Travling on the ring.swf) Token Travling on the ring.swfToken Travling on the ring.swf
45
ADVANTAGES It provides an orderly network in which every device has access to the taken and can transmit It performs well under a heaven load. It performs well under a heaven load.
46
DISADVANTAGES Malfunctioning workstation and cables create problems for the entire network Changes made when adding or removing a device affect the entire network. Changes made when adding or removing a device affect the entire network.
47
Ring Topology
48
MESH The mesh topology provides the highest level of fault tolerance. It uses separate cables to connect each device to every other device on the network, providing a Straight Communication path. Dedicated point to point link.
49
Mesh Topology
50
Hybrid Topology
51
A hybrid topology: a star backbone with three bus networks
52
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
53
Figure 1.11 WANs: a switched WAN and a point-to-point WAN
54
Figure 1.12 A heterogeneous network made of four WANs and two LANs
55
Active Topology Vs Passive Topology The difference between active topology and the passive topology is that in an active topology the computers are themselves responsible for the successful transference of data while in a passive topology this is not the case. Example: In star or the bus topology, if a computer fails, this does not affect the whole network and the communications on the network still go on. While in case of a ring topology, if even a single computer goes down, the whole network comes to a state of being down as the token gets stuck into that computer and thereby stopping all the network communication
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.