0% found this document useful (0 votes)
44 views19 pages

Computer Network Types & Topologies

Uploaded by

Matthew Keenor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views19 pages

Computer Network Types & Topologies

Uploaded by

Matthew Keenor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Name: Matthew Keenor Unit: 22

SID: 692614 Assignment Title: Software


development models and tools

Edits are in red

Unit 19
Investigating computer networks
Matthew Keenor
692614
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Table of Contents
Introduction.................................................................................................................................................2
Network Types.............................................................................................................................................2
Personal Area Network (PAN)..................................................................................................................2
Local Area Network (LAN) and Wireless Local Area Network (WLAN).....................................................2
Campus Area Network (CAN)...................................................................................................................2
Metroplitan Area Network (MAN)...........................................................................................................2
Wide Area Network (WAN)......................................................................................................................3
Storage Area Network (SAN)...................................................................................................................3
Network Forms............................................................................................................................................3
Internet....................................................................................................................................................3
Intranet....................................................................................................................................................3
Extranet...................................................................................................................................................4
Network Topologies.....................................................................................................................................4
Bus Topology...........................................................................................................................................4
Ring Topology..........................................................................................................................................5
Star Topology...........................................................................................................................................5
Mesh Topology........................................................................................................................................6
Hardware Devices........................................................................................................................................7
Network Interface Card (NIC)..................................................................................................................7
Hub..........................................................................................................................................................8
Switch......................................................................................................................................................9
Router....................................................................................................................................................11
Firewall..................................................................................................................................................12
Wireless Access Point (WAP).................................................................................................................12
Software Components...............................................................................................................................13
Networking Software Sytems................................................................................................................13
Performance Monitors..........................................................................................................................13
Events and Logs Viewer.........................................................................................................................14
Packet Sniffers.......................................................................................................................................15
Database and File Mangement Applications.........................................................................................16
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Network Protocols.....................................................................................................................................16
Directory Services......................................................................................................................................16
File and Print Services................................................................................................................................16

Introduction
This booklet has been created to help customers of Blue Penguin
Networking solutions understand how networks share information and
communicate.

Network Types
There are many types of networks, and they are dependent on the
user’s location and the area that the network Is intended to cover.
These are covered below.
Personal Area Network (PAN)
A PAN is a network that covers the immediate area around the device.
As an example, all devices on the same desk as your PC. This is used for
things like Bluetooth.
Local Area Network (LAN) and Wireless Local Area Network (WLAN)
LAN covers a broad range, up to about the size of a single building. This
is usually used for home purposes. A WLAN is the same as a LAN but
does not use wires. In this case, it would be the same as a home Wi-Fi
signal.
Campus Area Network (CAN)
A CAN covers a group of buildings in proximity. This used in places like a
college or University campus where there are many computers in the
different buildings that should still have the same access to the
network.
Metroplitan Area Network (MAN)
A MAN covers an entire city, or multiple cities. This is used when a
company has multiple buildings based in different cities.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Wide Area Network (WAN)


A WAN is used to connect any device anywhere to another device that
could be anywhere. The main example of this would be the World Wide
Web or better known as the Internet.
Storage Area Network (SAN)
Finally, a Storage Area network is a special network that only a select
few can upload files to. This is because it’s intended to be a place where
files are stored for others to download.

Network Forms
There are three main Network forms. These are Internet, Intranet and
Extranet. These are covered in the following section. These refer to
what you are connecting to.
Internet
The Internet is a global connection link. This is a worldwide connection
that allows for any device in the world to link with another on public
servers. These servers can include domains like Google or Yahoo that
can connect you to other things on the internet to forum pages like
Fandom.net that allow users to communicate.
Intranet
The Intranet is like the Internet but is for a private connection. These
might be private connections used within companies or organizations
that a company would not want the average internet user passing by
connecting to, so this form is used keep things within a company or
organization. For example, we would not want a passerby connecting to
the CAVC network if they were not a part of the college. An example of
this would include Office 365, as this is a system that is commonly used
within an organization to exchange information among employees.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Extranet
The Extranet is an extension of an Intranet connection with the ability
for those to connect to a more limited part of the network, so they only
have access to the information but aren’t allowed to edit it. Going back
to the CAVC example, there could be a guest connection for guests to
access a signal to take a tour of the building and have some information
on how to apply. Or, in a business aspect, it can be used to share
resources, create colllaboration and allow communication between
stakeholders, partners and stakeholders.

Network Topologies
There are 4 main topologies to build a network with. They are Bus,
Ring, Star and Mesh. I will cover them now, and their advantages and
disadvantages.
Bus Topology

Figure 1: A Bus Topology diagram

A bus network has a single communication line, called the backbone,


running through the system, with every device on the network
connected to it. Data is transferred through the line and received by the
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

devices. If the data is not received by any device, then the data is
deleted at the terminators to stop the system from crashing. This is
good because it is cheap to set up with very little specialty equipment
required. However, if the backbone fails then the whole server fails and
there is the problem of data collisions on the network, due to there
being only a single communication line.

Ring Topology

Figure 2: A Ring topology network

The Ring Topology has an inward and outward connection. Data passes
through each station and to the next one along in the system until it
reaches its destination. This is advantageous because it means there
are very few data collisions and a new computer added to the network
won’t affect it. However, if a computer is switched off then the whole
network is down, and if a new computer needs to be added to the
system, then the server has to be down for a while, while it is set up.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Star Topology

Figure 3: A Diagram of the Star Topology

The Star Topology has all devices on the network connected to a single
access point, called the switch. This allows all devices to communicate
easily on the network. This is a strong network, because of its scalability
and the ability to keep the network running if many machines are
down. However, this network can require a lot of cabling and because it
has to connect to the Switch there is a single point of failure.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Mesh Topology

Figure 4: A diagram of a Mesh Topology

A Mesh Topology is where each device on the network is connected to


each other, meaning that there is a unique connection between each
machine. This is very fast, with little room for data collisions. There are
also no redundancies within the system. However, this is expensive and
there is a lot of maintenance required.

Hardware Devices
Next, I will cover multiple hardware devices. Some of these will include
the Hub, the Switch, the Router and the Wireless Access Point.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Network Interface Card (NIC)

Figure 5: A Diagram showing the connections of a NIC

The Network Interface Card, often shortened to NIC, is a component of


a computer that allows access to the internet by transmitting Wi-Fi or
Ethernet signals. All computers, printers and similar devices must have
a NIC to access the internet.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Hub

Figure 6: A diagram of how the hub functions

A hub connects all internet connections to each other, that are using
Ethernet cables. They allow for multiple connections, but because of
this they can broadcast data to all connected devices, causing network
congestion and inefficiencies in the server. Due to this, they are often
nicknamed ‘Dumb Switches’.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Switch

Figure 7: A diagram of a Switch

A switch is a device that works similarly to a Hub, but instead uses a


LAN connection to transfer data over an Ethernet connection. Because
of this, the data is sent to only where it needs to be by reading data
packets and MAC addresses which significantly reduces traffic on a
network.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Router

Figure 8: A Router diagram

A router is a network device that connects different devices on


different networks and helps control and direct data between them.
They route data by using IP Addresses, which is essentially the
foundation of the internet.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Firewall

Figure 9: A diagram of how a firewall protects private computer systems

A firewall is a security device that monitors all different traffic that


attempts to enter private networks and filters out potentially harmful
viruses or files to the system. These are essential for network security.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Wireless Access Point (WAP)

Figure 10: A diagram comparing Wireless and Wired networks

A wireless access point allows connectivity to a wired connection


without physically being connected to that network by a cable. This is
used not just in an enterprise position but in the home environment
too.

Software Components
Software components refers to the digital installtions on a network,
server or computing machine that can also help the system function,
like the physical components would. I will cover them now in the next
session.
Networking Software Sytems
Networking Software refers to the Operating Systems of a software.
This is things like Window and Linux which give a graphical interface to
the users which easily allows for Network functionality.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Performance Monitors

Figure 11: The Windows Performance monitor

A Performance Monitor is an essential tool to monitor a network. They


can track the speed of communications between users and can help
identify issues such as latency and check the network's overall health.
By collecting this data, admins of the network are able to understand
how to easily streamline the network.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Events and Logs Viewer

Figure 12: The Event Viewer in the Windows operating system

Event Logs also play a crucial role in security. These allow to monitor
who exactly does what on a network at any given time. Administrators
can look for any anomalies or unusual things in the system, such as
unrecognized sign-ins or sign-ins at strange hours when employees
shouldn’t be on the network if they think there is something wrong.
This ensures that there is reliability on the network.
Packet Sniffers
Packet Sniffers are an invaluable tool. They are a diagnostics tool that
captures data packets and inspects network traffic. This can help
identify weaknesses in the system. Cyber Criminals and Hackers use
Sniffers to try and find a way to crack into systems, so administrators
use them to identify weaknesses before criminals can find them. An
example of this software would be Wireshark.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Database and File Mangement Applications


Applications like MySQL are examples of Database management
software. These software types help facilitate documents and data in
networking environments and provide organized storage, retrieval and
critical information sharing. This can promote collaboration and
enhance security by streamlining workflows.

Network Protocols
Next, I will cover Network Protocols. These are essentially languages,
not in the coding sense, but to allow computers to communicate
information. There are two main ones, OSI and TCP/IP and both are
described next.
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

The OSI Model


The OSI Model is more of a theoretical plan that is followed to
understand how communication works between clients. The top three
layers are concerned with figuring out how to communicate between
applications and the lower four layers transmit raw data.

.
Figure 13: A simplification of the OSI model
Name: Matthew Keenor Unit: 22
SID: 692614 Assignment Title: Software
development models and tools

Figure 14: The OSI Model in depth.

The Application layer

Directory Services

File and Print Services

You might also like