Chapter 1 - Networking Concept

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

lo/ol/24

CHAPTER

1 Networking Concepts
Learning Outcomes
The students will be able to:
learn the basic concept of computer network, its advantages and
disadvantages.
P know the different types of networking components, network
architecture, and topologies.
Pknow how to access a file from ashared drive.
understand network security.

Hi, kids! Have you


ever wondered Yes, Hema! What's the network
That's a LAN,
how computers are connecting computers and Local Area
connected to share
Is it through printers in your school's lab Network.
information? called?
networking?

Hari

Correct! The computers There are topologies, like bus,


and the printer are all where devices are connected Wow! There's
Please along asingle line; on the otherso much to learn
part of a LAN. Do you
elaborate.
know there are different hand, there is ring, where data about networking.
ways to set up networks? travels in a circular path. Let's explore more!

Hari
Hari
KB. KiBo Heme

Kips
> Networking
CA computer network can be defined as a group of computers and other peripheral devices that
are linked together for the purpose of sharing data and hardware resources) For example, if one
of the computers in a network has aprinter attached to it, then all the computers in that network
can access the printer and use it to print the documents.
The computers in a network can communicate with each other as well as work independently.
Each computer in a network is called a Node.
Computer A Hub Computer C

Computer D Printer
Figure 1.1: Computer Network
Advantages of Networking
Networking in computers brings efficiency, economy, and effectiveness in any organisation.
Some of the advantages of networking are discussed below:
Resource Sharing: In a computer network, allthe hardware and software resources are shared
among the users of the network.(The additional peripheral devices, such as printer, scanner,
modems, fax machines,etc., can be connected to one central computer and shared among others.
It saves the time spenton transferringa file from one machine to another using a storage device)
Reduction in Cost Thecost of hardware is considerably less in a computer networkjas all the
computers share the hardware resources. The software cost can also be saved by purchasing the
software and licences for the server, and distributing them to the clients.
Increases Storage Capacity: In a network, the users can store their files on remote
computers so
that they get more space to store their data.
Fast Data Transfert Networking provides the facility to
transfer soft copies from one computer
to the other at a high speed.)
Easy to Take Backup: It is difficult to maintain regular
backups on a
computers/You can set the server ina network to take regular backup ofnumber
data
of stand-alone

Reduces Data InconsistencyWhen multiple mismatched copies of a file are


automatically)
stored on different
Computers, it is called data inconsistency) Ina network, the deletion, modification,
of the file can be done at a single point only. This or updation
reduces data inconsistency and brings in more
efficiency.
Kips
Redúces Redundancy: Data redundancy means duplication of data at Quiok
multiple places) Acomputer network helps inreducing data redundancy Quiz
by providing a central server to store the data. Define node.

Ipereases Security: In a computer network, the users are assigned ids


and passwords for authentication to access the data and files.Only
the authorised users are allowed to access the hardware and software
resources.

> Disadvantages of Networking Let's Khow More


Intranet refers toa
There are few disadvantages of computer networks, which are as computer network
follows: restricted to an
organisation. Extranet
Additional Cost of Networking Equipment: A network's cost might refers to a computer
network that allows
get reduced by sharing the hardware resources. However, additional controlled access to an
information source available
cost of establishing the network gets incurred.
on the internet.

Management of Large Network: Managing alarge computer network


can be a challenging task. It requires expertise and special training.
Sefver Breakdown: If the server breaks down in a network, then all the
computers become isolated.
Security Issues: A computer network is always at the risk of getting Let'k Know More
attacked by external threats, such as unauthorised use of resources,
virus attacks, and alike.
Bluetooth is a wireless

> Networking Components technology used to


interconnect mobile
To establish wired networking in a group of computers, you require phones, computers, and
printers using short-range
some additional components that are as follows: wireless connection.

Wetwork Card
A
A network card is used to physically attach a
Còmputer to a network so that it can participate
in network communication.
Ethernet Network Card is the most commonly Let's Know More
Protocols are certain sets of
used network card. (Nowadays, most computer Network Card rules that determine how
data should be transferred
motherboards and laptops have an inbuilt Over networks, compressed,
presented on the screen,
network card.)) and so on.

Kips
Networking Cable
eight
Ethernet networks use twisted pair cable containing
Modern connector
a special orderand an RJ-45
wires. These wires are arranged in connector used with the telephone
(similar in design,but bigger than the cable, Networking Cable
of the
wire) is crimped at both the ends
Modem
enables youtoconnect your computer to the available internet
(Amodem
lines. It converts the digital
connection over the existing telephone transmission
signals to enable their
signals of a computer into analog receiving modem further converts
via phone lines.) Atthe destination, the Modem

signals into digital signals sothat the data can beunderstood


the analog
at the receiving end.)
Hub
to connect all the computers
A hub is a network device that is used
computer sends a request in a
in a network with each other. When a
The hub then transmits
network, it is first sent to the hub by the cable.
the network, which check
that request to all the other computers in
the message Hubs and Switches
whether the message belongs to them or not. If not, then
is dropped. This process is called broadcasting.
Switch
not broadcast the mnessage on the
A Switch works similar to a hub. However, a switch does
destination computer
entire network. It transmits the message from the source computer to the
provides a direct connection between
only byusing the physical address.This way,the switch
network increases.
the source and destination. As a result, the speed of the
Router
each other, for example, a
A router is a device that connects two different types of networks with
LAN With WAN, Apart from transmitting the messages on the network from a source computer
that message
to the destination computer) a router alsoprovides the best suitable route to deliver
It also increases the speed of the network.

> Wireless Networking 2812


waves to
Wireless networking is a means of communication that uses low powered radio
following
transmit the data between devices. To establish a wireless network, you require the
components:
Kips
10
that
Wineless Network Cards are used instead of the normal network cards
wireless
usedin wired networks. Mostlaptop computers come with inbuilt
are
network cards, Radio signals are used for transferring data; therefore, the
WI-Fi Router
Ethernet cable is not required.)
CAccess Points or Routers have awireless antenna, which increases the communication range
of the radio signals. They can also be used to join a wired network; thus, making the networka
combination of wired as well as wireless networks.)

DO YOU
KNOW
Wireless networking allows the networks to be deployed without cabling. Spaces, such as
outdoor areas, where cables cannot be laid can have wireless networks)
Wi-Fi stands for Wireless Fidelity. It represents Wireless Local Area Network. It was
developed for mobile, computer devices, but is now used in PCs, video game consoles,
smartphones, tablets to exchange data wirelessly over the computer networks.)

» Types of Networks
Depending on the geographical area covered by anetwork, various types of computer networks
are used worldwide, which are as follows:

Personal Area Network (PAN)


eterconeecting
PAN is a computer network that is mainly structure
LUMISLAa
created for an individual person) It is used for
communication among devices, such as laptops,
mobile phones, Personal Digital Assistants
(PDAs), or smartphones They generally cover a
range of less than 10 metres (about 30 feet).) Figure 1.2: Personal Area Network

Local Area Network (LAN)


(In Local Area Networks, two or more computers
and peripheral devices are connected within a LAN

Small area, such as a room, an office building


or campus.In LAN, computer terminals can
be physically connected with wires)(The data
transmission speed in LAN is very fast.)
Figure 1.3: Local Area Network

Kips
Metropolitan Area Network (MAN)
MAN isa larger network than LAN and is spread across a city. Main Busding)
MAN |Manutacturing)
Since it covers an entire city; it is called metropolitan. The most
common example of MAN is the city cable network or branches
of a local bank in a city. )
Shipping &Receving
Figure 1.4: Metropolitan Area Network
Wide Area Network (WAN)
LAN
Wide Area Network (WAN)
Typical Schematic
This kind of network connects two or ,more
Gateway
computers located at distant places. They Router
Communication
are linked by communication facilities, like Sub-System

telecommunication or satellite signals. The LÀN Network


Users
Switch
main characteristic of WAN is that it requires Other
WANS
a public telecommunication media to transfer LAN

data. The common examples of WÀN are the


internet and the ATM facility of abank) Autonomous
System Routers

> Network Topologies Figure 1.5: Wide Area Network

Network topology refers to the layout in which the various components of anetwork, like nodes,
links, peripherals, etc., are connected and communicated with each other. Atopology can be
either physical or logical. Physical topology is the physical layout of nodes, workstations, and
cables in the network;whereas, logical topology is the way how information flows between the
different components.
Network topologies
Poiu are categorised into the following basic types:
Point-to-Point
(Point-to-Point topology is the simplest form of network Point-to-Point
structure in which two nodes are directly connected with
each other. This type of network is more suitable for small
areas where computers are in close proximity.) Figure 1.6: Point-to-Point Topology

Bus Topology
(This topology uses a single communication line or one
main cable to which all the nodes are directly connected.
The main cable acts as a backbone for the network.
It transmits data only in one direction. In this type of
structure, one of the computers in the network acts as the Figure 1.7: Bus Topology

Kips
computer server, that provides data toall the clients. This topology is used in smallnetworks
where cable requirement is relatively small. One of the disadvantages of such type of network is
that ifthe main cable fails, the entire network becomes unusable.)
Star Topology
In star topology, each device is connected to a central
computer using a point-to-point connection. The
central server acts as a hub. The devices communicate
across the network by passing data through this hub.
Star topology is very popular because the setup cost
is low. It is easy to add a new device to the network
as only one cable is required and the configuration Central Hub
is simple. Moreover, the netwotk is robust; even if a
connection in the network fails, the other connections
remain intact. But if the central hub fails, the entire Figure 1.8: Star Topology
network goes down.

Ring Topology
In ring topology, all the nodes in the network are
connected in a circular manner. Each node connects
with exactly two other nodes, forming a single
continuous pathway for signals. When one node sends
message to the other node, which is not adjacent to
it, the data travels through all the intermediate nodes
until it reaches its final destination. Ring topologies
are used in both LAN and WAN setups. The main
disadvantage of this topology is that if one workstation
Figure 1.9: Ring Topology
goes down, the entire network gets affected.

Tree Topology Central Hub

Tree topology is one of the most common


Hub
network setups that consists of a group Hub Hub

of star-figured workstations connected to


Leaf
a linear bus backbone cable. In this, one Node
star network is connected to the other
star networks. In a tree network, a cable Leaf Node
Figure 1.10: Tree Topology

Kips
linked to the cent.
failure in one of the star networks will affect only the workstation that is
continue to function norm all.-.
computer of that star network; all the other workstations will
connected to it will sufo
However, if the central computer goes down, all the workstations
the network will continuo tx
either degraded performance or complete failure, but the rest of
function normally.

Mesh Topology
In mesh network topology, each node is connected to
every other node in the network. In this topology, every
node not only sends its own signals, but also relays data
from the other nodes. This type of topology can handle
a large volume of data traffic. It is commonly used
in wireless networks. In case one of the components
fail, there is always an alternative present so that the
transfer of data does not get affected.
Figure 1.11: Mesh Topology
>Network Security
Network Security means protecting data and resources
from any unauthorised access. It is the most important Internet

aspect in computer networking. Since many users are


accessing the same data, it is essential that steps be (Digital Subscriber
taken to ensure its proper security. The right to access or Line (DSL)
- Modem
modify any data should be given only to the authorised
people.
There are two general levels of network security. These Router/
are as follows: Gatewayl
FirewalI
Login Security: A user is given a unique login name
and password. Hub
Access Control: Based on the usernamne, the user is
given rights, like Read-Only Access, Read-Write Access,
or No Access at all. A combination of rights can also be
granted to the same user for different sets of data.
Computers
Figure 1.12: Network Security

14 KipS
RECAP
Now you know...
º Aconmputer network can be defined as a group of computers and other peripheral
linked together for sharing data and hardware devices that is
resources.
Networking in computers brings efficiency, economy, and effectiveness in an organisation.
A modem is used to connect a computer to the available
internet connection over the existing
telephone lines.
PAN, LAN,MAN, and WAN are the various types of
computer networks.
Network architecture is an overall design of a computer network that describes how a
computer
network is configured and what strategies are being used.
Network topology refers to the layout in which various components of a network, like nodes,
links, peripherals, etc., are connected and communicated with each other.
The different kinds of network topology are point-to-point topology, bus topology, star
ring topology, tree topology, and mesh topology. topolo8Y,
º Network security means protecting the data and resources from any unauthorised access.

Brain Developer
A. Fill in the blanks.
1. PAN. is a computer network created for an individual person.
2. Acomputer network enables two or more computers to share data and hardware..
..Les6.4.1CC.
O. In anetwork, modification or upgradation of the software or data is done at a...
only.
alngle paint
* Ihe computers that communicate with each other are called....od.C.
O Anetwork maintained without using wires is called a.u.l4.dLsa. network.

Hints Data Single Point Resources Nodes PAN Wireless

Kips 15
2. What are the components required for wireless networking?
B. State True or False.
have the same function.
1. Nodes and servers computer with a network.
2 Network cards are
used to physically attach a
network than LAN.
3. MAN is a larger traffic.
handle a large volume of data
4 Mesh topology can are connected in a circular manner. Give two advantages of star topology.
In star topology, all the nodes in the network 3
5.

C. Select the correct option.


commonly used network card? cEthernet Network Card
1. Which is the most b. Bluetooth
a. Wi-Fi computers, it is called data
copies of a file are stored on different 4. Distinguish between LAN and WAN.
2. When multiple mismatched

b. Consistency Redundancy
a Inconsistency
unauthorised access
3. Network means protecting data and resources from any
c. Resource Sharing
a. Information BSecurity
connected in a circular manner
4. In topology, all the nodes in the network are
b. Star c. Mesh 5. Differentiate between a hub and switch.
aKing
communication líne or one main cable?
5. Which network arnong the following requíres a single
a. Tree Topology b. Star Topology Bus Topology
/D. Competency-based questions,
1. Mr Hernant has set up his office with 50 computers. He wants to connect them and all the peripheral
devices within his office building with wires. Which type of network should he use?

2. Which type of network architecture is the most suitable when afew computers of similar power and
capacity are to be networked together?

E. Answer the following questions.


1. Define networking,

Kips
Kips

You might also like