Handout 1 - Introduction To Computer Networking
Handout 1 - Introduction To Computer Networking
1. Introduction
1.1 What is a computer network?
A computer network is a system in which a number of independent computers are
linked together to share data and peripherals, such as files and printers. In the modern
world, computer networks have become almost indispensable. All major businesses,
and governmental and educational institutions make use of computer networks to such
an extent that it is now difficult to imagine a world without them.
file sharing - Network file sharing between computers gives you more
flexibility than using floppy drives or Zip drives. Not only can you share
photos, music files, and documents, you can also use a home network to save
copies of all of your important data on a different computer. Backups are one of
the most critical yet overlooked tasks in home networking.
Page 1
Network configuration
All networks have certain components, functions and features in common, shown in
Figure 2. These include:
Servers - computers that provide shared resources for network users
Clients - computers that access shared resources provided by servers
Media - the wires that make the physical connections
Shared data - files provided to clients by servers across the network
Shared peripherals - additional hardware resources provided by servers
Page 2
2. Network Models
Peer-to-peer networks
Server-based networks
P2p networking type is most commonly used computer networks. This type of
network is very cost effective but supports lesser number of computers in network.
Ten to fifteen computers can be connected to each other using p2p networking model
without problem, more number of computers often create problems. All computers
possesses same status within the network and no computer control any other computer
but it self, this network does not have server to control and monitor. Security level is
not towards higher side and each work station it self is responsible for security. Using
p2p models files can be shared among computers. Files like, videos, audios, pictures,
spreadsheets and all digital media can be sent or received with in the network.
Printers, scanners and internet can be shared with in all computers. Below is the
picture showing three computers connected to each other with hub and switch. All
computers are connected to hub through Network adaptor card using Cable and hub or
switch is connected to internet to pass it on to connected computers.. You can see
there is no server involved in this diagram but all individual computers are connecting
to hub forming P2P network.
Page 3
Peer-To-Peer networks are designed for limited number computers, it will start
creating issues when exceed 15 number of computers
Organizational growth will outgrow p2p networks; it will not support growing
number of computers when increased above fifteen.
Regular training is required for computer users of p2p network. p2p network is
control by computers and computers are controlled by human, small mistake
by one of the user can hold the work for other users on same p2p network.
Choosing right kind of networking model is very important for organization. If you
are using lesser number of computer and do not see any need to increase the numbers
of computers to more than 15 then you are fine with peer to peer networking model,
but if you are bigger organization or seeing growth in network, client and server
model is designed for it.
The difference in p2p and client server model is that p2p does not have any device or
computer that controls computers on network whereas; client / server model has one
dedicated computer which is called server. It is called dedicated server. All computers
are connected to hub and hub is connected to dedicated server. Server is responsible
to perform according to the request sent to it by clients. For example server can act as
print server, if client request a print of document server will send print command to
printer and it will be printed. Same way all the files are stored on the server and not
on client computer, same client can retrieve data by using any other computer on the
same network. This concept is known as centralization, this enables server to keep
profile of users, data, and software etc completely in tacked and organized.
Page 4
Features of Server:
Servers are powerful machines when they are compared to normal desktop computers.
They are meant to provide strength to computing power within the entire network.
Controlling developed network can only be done by dedicated servers as they have
higher specifications to support network. Servers can have better processing speed
with multiple rocessors capability available. Server machine have higher RAM to load
and execute software with ease. They have more advance network cards installed for
faster data transfer. Hard drives are way bigger to store the data for entire clients.
Hardware can be plugged in and plugged out while server is on, this helps network
stable, and hardware like hard disk can be removed and attached accordingly.
3. Network Types
Depending on geographical span of coverage there are three types of network
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
A local area network (LAN) is the basic building block of any computer network. A
LAN can range from simple (two computers connected by a cable) to complex
(hundreds of connected computers and peripherals throughout a major corporation).
The distinguishing feature of a LAN is that it is confined to a limited geographic area.
Page 5
A wide area network (WAN), on the other hand, has no geographical limit. It can
connect computers and other devices on opposite sides of the world. A WAN is made
up of a number of interconnected LANs. Perhaps the ultimate WAN is the Internet.
LANs typically have much higher transmission rates than WANS. Most LANs are
able to transmit data at around 100Mbps (million bits per second), whereas WANs
generally transmit at less than 10Mbps. Another difference is the error rates in
transmission: the likely number of errors in data transmission is higher for a WAN
than for a LAN.
This distinction between LANs and WANs is made because of the locality principle.
The locality principle in computer networking states that computers are much more
likely to want to communicate with other computers that are geographically close,
than with those that are distant. For example, if you want to request a printout from
your PC, it makes much more sense to use the printer in the next room rather than one
that is hundreds of kilometres away. Because of the locality principle network
designers tend to use higher performance hardware within a LAN compared to the
connections between different LANs that form a WAN.
Page 6
4. Network Topologies
The term topology, or more specifically, network topology, refers to the arrangement
or physical layout of computers, cables, and other components on the network.
"Topology" is the standard term that most network professionals use when they refer
to the network's basic design. In addition to the term "topology," you will find several
other terms that are used to define a network's design:
Physical layout
Design
Diagram
Map
A network's topology affects its capabilities. The choice of one topology over another
will have an impact on the:
Type of equipment that the network needs
Capabilities of the network
Growth of the network
Way the network is managed
Developing a sense of how to use the different topologies is a key to understanding
the capabilities of the different types of networks.
Before computers can share resources or perform other communication tasks they
must be connected. Most networks use cable to connect one computer to another.
However, it is not as simple as just plugging a computer into a cable connecting to
other computers. Different types of cablecombined with different network cards,
network operating systems, and other componentsrequire different types of
arrangements. To work well, a network topology takes planning. For example, a
particular topology can determine not only the type of cable used but also how the
cabling runs through floors, ceilings, and walls. Topology can also determine how
computers communicate on the network. Different topologies require different
communication methods, and these methods have a great influence on the network.
There are four basic types of computer topology: bus, star, ring and mesh.
4.1.3 Terminator
To stop the signal from bouncing, a component called a terminator is placed at each
end of the cable to absorb free signals. Absorbing the signal clears the cable so that
other computers can send data.
In a bus topology, if a break in the cable occurs the two ends of the cable at the break
will not have terminators, so the signal will bounce, and all network activity will stop.
This is one of several possible reasons why a network will go "down." The computers
on the network will still be able to function as stand-alone computers; however, as
long as the segment is broken, they will not be able to communicate with each other
or otherwise access shared resources.
Advantages
Disadvantages
Compared to other
In the star topology, all computers and other network devices connect to a central
device called a hub or switch. Each connected device requires a single cable to be
connected to the hub, creating a point-to-point connection between the device and the
hub.
Page 9
Using a separate cable to connect to the hub allows the network to be expanded
without disruption to the network. A break in any single cable will not cause the entire
network to fail. Figure 1.5 provides an example of a star topology.
The star topology is the most widely implemented network design in use today, but it
is not without its shortcomings. Because all devices connect to a centralized hub, this
creates a single point of failure for the network. If the hub fails, any device connected
to it will not be able to access the network. Because of the number of cables required
and the need for network devices, the cost of a star network is often higher than other
topologies. Table 1.4 summarizes the advantages and disadvantages of the star
topology.
Table 1.4. Advantages and Disadvantages of the Star Topology
Advantages
Disadvantages
Star networks are easily expanded without Requires more cable than most of the
disruption to the network.
other topologies.
Cable failure affects only a single user.
Easy to troubleshoot and isolate problems. More difficult than other topologies to
implement.
The ring topology is actually a logical ring, meaning that the data travels in circular
fashion from one computer to another on the network. It is not a physical ring
topology. Figure 4 shows the logical layout of a ring network.
Logical design of the ring network.
Page 11
Advantages
Disadvantages
The star bus is a combination of the bus and star topologies. In a star-bus topology,
several star topology networks are linked together with linear bus trunks. Figure 9
shows a typical star-bus topology.
If one computer goes down, it will not affect the rest of the network. The other
computers can continue to communicate. If a hub goes down, all computers on that
hub are unable to communicate. If a hub is linked to other hubs, those connections
will be broken as well.
Page 13
Page 15
Network Configuration
Networks are classified into two principal groups based on how they share
information: peer-to-peer networks and server-based networks
In a peer-to-peer network, all computers are equal. They can either share their
resources or use resources on other computers
In a server-based network, one or more computers act as servers and provide
the resources to the network. The other computers are the clients and use the
resources provided by the server
Features of the two major network types are summarized as follows:
Comparison of Network Types
Consideration Peer-to-Peer Network
Size
Good for 10 or fewer
computers
Security
Security established by the
user of each computer
Administration Individual users responsible
for their own administration;
no full-time administrator
necessary
Server-Based Network
Limited only by server and
network hardware
Extensive and consistent
resource and user security
Centrally located for network
control; requires at least one
knowledgeable administrator
Network Topologies
Page 17