Unit 1
Unit 1
Unit 1
make your life as an educator run more smoothly. Current networking software provides
many advantages for the educational environment.
Program Security
Shared Files
Shared Printers
Shared Resources
This is one of the major advantages of networking computers. People can find and share
information and data because of networking. This is beneficial for large organizations to
maintain their data in an organized manner and facilitate access for desired people.
3. Sharing Hardware
4. Sharing Software
Users can share software within the network easily. Networkable versions of software are
available at considerable savings compared to individually licensed version of the same
software. Therefore large companies can reduce the cost of buying software by
networking their computers.
5. Security
Sensitive files and programs on a network can be password protected. Then those files
can only be accessed by the authorized users. This is another important advantage of
networking when there are concerns about security issues. Also each and every user has
their own set of privileges to prevent them accessing restricted files and programs.
6. Speed
Sharing and transferring files within networks is very rapid, depending on the type of
network. This will save time while maintaining the integrity of files.
Disadvantages of Networking
1. Breakdowns and Possible Loss of Resources
One major disadvantage of networking is the breakdown of the whole network due to an
issue of the server. Such breakdowns are frequent in networks causing losses of
thousands of dollars each year. Therefore once established it is vital to maintain it
properly to prevent such disastrous breakdowns. The worst scenario is such breakdowns
may lead to loss of important data of the server.
2. Expensive to Build
Building a network is a serious business in many occasions, especially for large scale
organizations. Cables and other hardware are very pricey to buy and replace.
3. Security Threats
Security threats are always problems with large networks. There are hackers who are
trying to steal valuable data of large companies for their own benefit. So it is necessary to
take utmost care to facilitate the required security measures.
4. Bandwidth Issues
In a network there are users who consume a lot more bandwidth than others. Because of
this some other people may experience difficulties.
Peer-to-peer network operating systems allow users to share resources and files located
on their computers and to access shared resources found on other computers. However,
they do not have a file server or a centralized management source (See fig. 1). In a peer-
to-peer network, all computers are considered equal; they all have the same abilities to
use the resources available on the network. Peer-to-peer networks are designed primarily
for small to medium local area networks. AppleShare and Windows for Workgroups are
examples of programs that can function as peer-to-peer network operating systems.
Client/server network operating systems allow the network to centralize functions and
applications in one or more dedicated file servers (See fig. 2). The file servers become the
heart of the system, providing access to resources and providing security. Individual
workstations (clients) have access to the resources available on the file servers. The
network operating system provides the mechanism to integrate all the components of the
network and allow multiple users to simultaneously share the same resources irrespective
of physical location. Novell Netware and Windows 2000 Server are examples of
client/server network operating systems.
• Centralized - Resources and data security are controlled through the server.
• Scalability - Any or all elements can be replaced individually as needs increase.
• Flexibility - New technology can be easily integrated into system.
• Interoperability - All components (client/network/server) work together.
• Accessibility - Server can be accessed remotely and across multiple platforms.
http://www.egyankosh.ac.in/
Client Server Architecture
Advantages
[edit] Disadvantages
• As the number of simultaneous client requests to a given server increases, the
server can become overloaded. Contrast that to a P2P network, where its
aggregated bandwidth actually increases as nodes are added, since the P2P
network's overall bandwidth can be roughly computed as the sum of the
bandwidths of every node in that network.
• The client–server paradigm lacks the robustness of a good P2P network.[citation needed]
Under client–server, should a critical server fail, clients’ requests cannot be
fulfilled. In P2P networks, resources are usually distributed among many nodes.
Even if one or more nodes depart and abandon a downloading file, for example,
the remaining nodes should still have the data needed to complete the download.
LAN TOPOLOGY fdlh Hkh usVodZ esa Present nodes dks different type
ls Connect fd;k tk ldrk gSaA Network esa different nodes dks ijLij Connect djus
ds Methods dks Topology dgrs gSaA
Network dks mlds vkdkj nwjh o cukoV ds vk/kkj ij fuEu Hkkxksa esa
ckaVk tk ldrk gSaA
BUS TOPOLOGY
- bl izdkj fd Topology esa ,d yEch dsoy ftlls fd nksuks end ij Terminator
tqM+k gksrk gSa ml dscy ls lHkh dEi;wVj dusDV gksrs gSaA
- Bus Topology Simplest gSa o Wide Area Network esa Widely Use fd tkrh
gSaA
- ;g ,d panive Topology gSa ftlesa at a time dsoy ,d dEi;wVj gh eSlst
lsUV dj ldrk gSaA
- No of nodes fd la[;k Bus Network fd LihM dks Effect djrh gSaA
- izR;sd uksM dk ,d Unique Electronic Address gksrk gSaA izR;sd uksM
nwljh uksM dks cl ds ek/;e ls Information Transmit djrh gSaA
- Information Packet ds :i esa Bus esa Hksth tkrh gSaA ;g Packet Bus dh
nksuksa fn’kkvksa esa xeu djrk gSaA packet mlh uksM ij accept fd;k
tkrk gSaA ftldk fd Address Packet ij gksrk gSaA
- ;fn iSdsV fdlh Hkh ,d uksM }kjk Accept ugha fd;k tkrk rks packet Bus
esa ?kweus ds LFkku ij Terminator ds ikl pyk tkrk gSaA og ml packet
dks Destroy dj nsrk gSaA
- ;g Topology eq[;r% Client/Server System esa ikbZ tkrh gSaA
Advantage
- bus Topology Simple, reliable and bls bULVky djuk o mi;ksx ysuk vklku
gSaA
- Network esa yxs fdlh ,d uksM ds [kjkc gksus ij 'ks"k Network djrk
jgrk gSaA
- Network esa fdlh Hkh uksM dks Easily Add o Remove fd;k tk ldrk gSaA
Disadvantage:- bl Topology esa Control Center esa ugha gksrk gSa vr% [kjkch
vkus ij mls <wa<uk dfBu gSa
- Bus dh length vf/kd gksus ij Repeater dk mi;ksx djuk iM+rk gSaA
- ,d ckj esa ,d gh Packet bus esa Transmit fd;k tk ldrk gSaA
- dscy esa [kjkch gksus ij iwjk usVodZ cUn gks tkrk gSaA
BUS NETWORK
Node4
Client Nodie
4
WS-D WS-A
IBM PC AT
Node2
4
Node3
4
[STAR NETWORK] WS-B
WS-C
SMTP
USER WEB WEB USER2
SERVER SERVER
- Only text based Information dks Hkstus ;k Limited Metter Hkstus ds fy,
SMTP dk mi;ksx gksrk gSaA
- lkjs Protocol Software Form esa gksrs gSaA usVodZ ds nksuks gksLV
dEi;wVj ds ikl SMTP Protocol gksrk gSaA
- SMTP ds vius dek.Ml gSa Sender and Receiver end bu dek.M dks mi;ksx
djrk gSaA
- SMTP Massage Hkstus ds fy, Only 7 bit ASCII Code dk iz;ksx djrk gSa
tks fd gj izdkj dh Information dks Sent djus ds fy, Sufficient ugha gSaA
- SMTP delivered Message ds LVkVZ esa ,d Log Information Add dj nsrk
gSa tks fd eSlst dgka tk,xk mlds Path dks Indicate djrk gSaA
- SMTP Protocol dk Use Messag Transfer djus ds fy, gksrk gSa From SMTP
Sender to SMTP Receiver Over a TCP Connection.
- SMTP oSls rks eSlst Hkstus ds fy, Reliable gSa ysfdu ;g eSlst ds
yksLV gksus ij mldh jhdojh dh dksbZ xkjUVh ugha gksrh gSaA End
to End dksbZ Acknowledge ugha fn;k tkrk gSa vFkkZr~ Message
Successfully delivered gks x;k gSa mldk Acknowledge Origiratcor dks
ugha feyrk gSaA
SMTP esa vkWijs’ku dks Perform djus ds fy, Series of Commands Consist gksrs
gSa vkSj Response. SMTP Sender and Receiver ds chp Exchange gksrk jgrk gSaA
lcls igys SMTP Sender TCP Connection Established djrk gSa mlds ckn Sender
Send djrk gSa dek.M dks jhlhoj dusD’ku ij izR;sd Command Single line of text
gksrk gSaA
SMTP Command
Name Command From Description
Helo Helo <SP> <down> <CRLF> Send Indetification
MAIL MAIL<SP> FROM <receiver Path> <CRLF Identify Orginator of mail
RCPT RCPT <SP> to <Forward Path> <CRLF> Identify Recipient of Mail
BATA DATA <SRLF> Transfer Message Text
QUIT QUIT <CRLF> Close TCP Connection
SMTP Replies
(1) Positive Completion Reply
(2) Positive Intermediate Reply
(3) Transient Negative Completion Reply
(4) Permanent Negative Completion Reply
SMTP Operation rhu Phases esa gksrk gSaA
(1) Connectio Setup
(2) Exchange of one or more Command Response Pair
(3) Connection Termination
SMTP Protocol ds lkFk dqN leL;k vk ldrh gSa tSls
(1) SMTP Implimentation ds Add Version 64 Kb ls T;knk eSlst gsUMy ugha
dj ldrkA
(2) ;fn Client and Server ds different time out gSa rks Unexpected Termination
dh lEHkkouk gSaA
Agent
Network Management
Protocol
HOST Manager
This is Response
(HTTP Transaction)
Header Headers
What is a Protocol?
A protocol is a set of rules that governs the communications between computers on a
network. In order for two computers to talk to each other, they must be speaking the same
language. Many different types of network protocols and standards are required to ensure
that your computer (no matter which operating system, network card, or application you
are using) can communicate with another computer located on the next desk or half-way
around the world. The OSI (Open Systems Interconnection) Reference Model defines
seven layers of networking protocols. The complexity of these layers is beyond the scope
of this tutorial; however, they can be simplified into four layers to help identify some of
the protocols with which you should be familiar (see fig 1).
Figure 1 illustrates how some of the major protocols would correlate to the OSI model in
order to communicate via the Internet. In this model, there are four layers, including:
Assuming you want to send an e-mail message to someone in Italy, we will examine the
layers "from the bottom up" -- beginning with Ethernet (physical/data link kayers).
The data link layer of the network addresses the way that data packets are sent from one
node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection). This is a system where each computer listens to the
cable before sending anything through the network. If the network is clear, the computer
will transmit. If some other node is already transmitting on the cable, the computer will
wait and try again when the line is clear. Sometimes, two computers attempt to transmit
at the same instant. When this happens a collision occurs. Each computer then backs off
and waits a random amount of time before attempting to retransmit. With this access
method, it is normal to have collisions. However, the delay caused by collisions and
retransmitting is very small and does not normally effect the speed of transmission on the
network.
Ethernet
The original Ethernet standard was developed in 1983 and had a maximum speed of 10
Mbps (phenomonal at the time). The Ethernet protocol allows for bus, star, or tree
topologies, depending on the type of cables used and other factors .
The current standard at the 10 Mbps level is 10BaseT. The "10" stands for the speed of
transmission (10 megabits per second); the "Base" stands for "baseband" meaning it has
full control of the wire on a single frequency; and the "T" stands for "twisted pair" cable.
Older standards, such as 10Base2 and 10Base5, used coaxial cable, but these standards
are seldom used in new installations. Fiber cable can also be used at this level in
10BaseFL.
Fast Ethernet
The Fast Ethernet protocol supports transmission up to 100 Mbps. Fast Ethernet requires
the use of different, more expensive network concentrators/hubs and network interface
cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet
standards include:
Gigabit Ethernet
Gigabit Ethernet standard is a protocol that has a transmission speed of 1 Gbps (1000
Mbps). It can be used with both fiber optic cabling and copper. The 1000BaseT, the
copper cable used for Gigabit Ethernet (see the Cabling section for more information).
LocalTalk
LocalTalk is a network protocol that was developed by Apple Computer, Inc. for
Macintosh computers many years ago. LocalTalk adapters and special twisted pair cable
can be used to connect a series of older computers through the serial port (current
Macintosh computers have Ethernet cards and/or wireless adapters installed). A primary
disadvantage of LocalTalk is speed. Its speed of transmission is only 230 Kbps.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The access method
used involves token-passing. In Token Ring, the computers are connected so that the
signal travels around the network from one computer to another in a logical ring. A single
electronic token moves around the ring from one computer to the next. If a computer does
not have information to transmit, it simply passes the token on to the next workstation. If
a computer wishes to transmit and receives an empty token, it attaches data to the token.
The token then proceeds around the ring until it comes to the computer for which the data
is meant. The Token Ring protocol requires a star-wired ring using twisted pair or fiber
optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the
increasing popularity of Ethernet, the use of Token Ring in school environments has
decreased dramatically.
When the data packets are sent over a network, they may or may not take the same route
-- it doesn't matter. At the receiving end, the data packets are re-assembled into the proper
order. After all packets are received, a message goes back to the originating network. If a
packet does not arrive, a message to "re-send" is sent back to the originating network.
TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX
protocol is used at the network layer (on networks such as Novell or Microsoft), then it is
paired with SPX at the transport layer.
• Ethernet
• Local Talk
• Token Ring
• FDDI
• ATM
Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an
access method called CSMA/CD (Carrier Sense Multiple
Access/Collision Detection). This is a system where each computer
listens to the cable before sending anything through the network. If
the network is clear, the computer will transmit. If some other node is
already transmitting on the cable, the computer will wait and try again
when the line is clear. Sometimes, two computers attempt to transmit
at the same instant. When this happens a collision occurs. Each
computer then backs off and waits a random amount of time before
attempting to retransmit. With this access method, it is normal to have
collisions. However, the delay caused by collisions and retransmitting
is very small and does not normally effect the speed of transmission
on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies.
Data can be transmitted over wireless access points, twisted pair,
coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
Local Talk
The Local Talk protocol allows for linear bus, star, or tree topologies
using twisted pair cable. A primary disadvantage of Local Talk is
speed. Its speed of transmission is only 230 Kbps.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing. In Token Ring, the
computers are connected so that the signal travels around the network
from one computer to another in a logical ring. A single electronic
token moves around the ring from one computer to the next. If a
computer does not have information to transmit, it simply passes the
token on to the next workstation. If a computer wishes to transmit and
receives an empty token, it attaches data to the token. The token then
proceeds around the ring until it comes to the computer for which the
data is meant. At this point, the data is captured by the receiving
computer. The Token Ring protocol requires a star-wired ring using
twisted pair or fiber optic cable. It can operate at transmission speeds
of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet,
the use of Token Ring in school environments has decreased.
FDDI
ATM