CSS Reviewer
CSS Reviewer
CSS Reviewer
Types of Network
COMPUTER NETWORKS
• is defined as the interconnection of two or more computers. It is done to enable the computers to
communicate and share available resources.
Applications:
Networking Characteristic
• Cost - Includes the cost of the network components, their installation, and their ongoing maintenance.
• Security - Includes the protection of the network components and the data they contain and/or the data
transmitted between them.
• Speed - Includes how fast data is transmitted between network end points (the data rate).
• Topology - Describes the physical cabling layout and the logical way data moves between components.
• Scalability - Defines how well the network can adapt to new growth, including new users, applications, and
network components.
• Reliability - Defines the reliability of the network components and the connectivity between them. Mean
time between failures (MTBF) is a measurement commonly used to indicate the likelihood of a component
failing.
• Availability - Measures the likelihood of the network being available to the users, where downtime occurs
when the network is not available because of an outage or scheduled maintenance. Availability is typically
measured in a percentage based on the number of minutes that exist in a year. Therefore, uptime would be
the number of minutes the network is available divided by the number of minutes in a year.
Sharing of Resources
Hardware: A network allows users to share many hardware devices such as printers, modems, fax machines, CD
ROM, players, etc.
Software: sharing software resources reduces the cost of software installation, saves space on hard disk.
• Increased speed
• Reduced cost
• Improved security
• Centralized software managements
• Electronic mail
• Flexible access
Disadvantage of Networks
NETWORK
• It is in between LAN & WAN technology that covers the entire city.
• It uses similar technology as LAN.
• It can be a single network such as cable TV network, or a measure of connecting a
number of LAN’s o a large network so that resources can be shared LAN to LAN as
well as device to device.
• In peer to peer network each computer is responsible for making its own resources
available to other computers on the network.
• Each computer is responsible for setting up and maintaining its own security for these
resources.
• Also, each computer is responsible for accessing the required network resources from
peer to peer relationships.
• Peer to peer network is useful for a small network containing less than 10 computers on
a single LAN.
• In peer to peer network each computer can function as both client and server.
• Peer to peer networks do not have a central control system. There are no servers in peer networks.
• Peer networks are amplified into home group.
Advantages: Disadvantages:
• In client-server network relationships, certain computers act as server and other act as
clients. A server is simply a computer, that available the network resources and provides
service to other computers when they request it. A client is the computer running a
program that requests the service from a server.
• Local area network (LAN) is based on client server network relationship.
• A client-server network is one in which all available network resources such as files,
directories, applications and shared devices, are centrally managed and hosted and then
are accessed by client.
• Client server network are defined by the presence of servers on a network that provide security and
administration of the network.
Advantages: Disadvantages:
Types of Servers
• File server - These servers provide the services for storing, retrieving and moving the data. A user can read,
write, exchange and manage the files with the help of file servers.
• Print server - is used for controlling and managing printing on the network. It also offers the fax service to the
network users.
• Application server - The expensive software and additional computing power can be shared by the computers in
a network with the help of application servers.
• Message server - It is used to co-ordinate the interaction between users, documents and applications. The data
can be used in the form of audio, video, binary, text or graphics.
• Database server - It is a type of application server. It allows the user to access the centralized strong database.
Lesson 2: Introduction to Networks
Networking Devices
• There are different types of electronic devices used in networking which are known as network devices or
network equipment In a computer network, network devices are mainly used for transmitting and receiving the
data quickly and securely in between computers, fax machines, printers, etc These devices may be intra network
or internetwork There are some devices that are installed on the device such as RJ 45 connector otherwise NIC
card, whereas some devices are part of the network namely switch, router, etc These devices are specific
devices, handles digital or electrical connections to perform their exclusive roles very efficiently
Network Devices
• The devices which are used for communication between different hardwares used in the computer network are
known as network devices. These devices are also known as physical devices, networking hardware, and
network equipment otherwise computer networking devices.
• In a computer network, each network device plays a key role based on their functionality, and also works for
different purposes at different segments.
• Network Hub
• Network Switch
• Modem
• Network Router
• Bridge
• Repeater
• Access Point (AP)
Networking Today
Peer to Peer
1.2 LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
• Devices
• Media
• Services
Components of a Network
End Devices
Some examples of end devices are:
Converged Networks
The Converging Network Planning for the Future
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need
to address in order to meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
Scalable Networks
Providing QoS
Examples of priority decisions for an organization might include:
• Time-sensitive communication - increase priority for services like telephony or video distribution.
• Non time-sensitive communication - decrease priority for web page retrieval or email.
• High importance to organization - increase priority for production control or business transaction data.
• Undesirable communication - decrease priority or block like peer to peer file sharing or live entertainment.
Providing Network Security
Bring Your Own Device (BYOD) - The concept of any device, to any content, in anyway is a major global trend that
requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD).
Cloud Computing
Cloud computing offers the following potential benefits:
• Organizational flexibility
• Agility and rapid deployment
• Reduced cost of infrastructure
• Refocus of IT resources
• Creation of new business models
Data Centers
A data center is a facility used to house computer systems and associated components including:
• Redundant data communications connections
• High-speed virtual servers (sometimes referred to as server farms or server clusters)
• Redundant storage systems (typically uses SAN technology)
• Redundant or backup power supplies
• Environmental controls (e.g., air conditioning, fire suppression)
• Security devices
It has been developed by ISO ‘International Organization of Standardization ‘, in the year 1984. It is a 7-layer
architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit
the data from one person to another across the globe.
Application Layer
Presentation Layer
Session Layer
• This layer is responsible for establishment of connection, maintenance of sessions, authentication and also
ensures security
1. Session establishment, maintenance and termination: The layer allows the two processes to establish, use
and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which are considered as synchronization
points into the data These synchronization point help to identify the error so that the data is re synchronized
properly, and ends of the messages are not cut prematurely and data loss is avoided.
3. Dialog Controller: The session layer allows two systems to start communication with each other in half
duplex or full duplex
Transport Layer
• provides services to application layer and takes services from network layer.
• The data in the transport layer is referred to as Segments.
• It is responsible for the End to End delivery of the complete message.
• Transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data
if an error is found.
• Transport Layer is also called the HEART of OSI MODEL.
Network Layer
• Works for the transmission of data from one host to the other located in different networks.
• It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of
routes available.
• The sender receiver’s IP address are placed in the header by network layer.
1. Routing: The network layer protocols determine which route is suitable from source to destination This
function of network layer is known as routing
2. Logical Addressing: In order to identify each device on internetwork uniquely, network layer defines an
addressing scheme. The sender receiver’s IP address are placed in the header by network layer Such an
address distinguishes each device uniquely and universally.
• Segments in Network layer is referred as Packet
• Network layer is implemented by networking devices such as routers
The packet received from Network layer is further divided into frames depending on the frame size of NIC(Network
Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header.
One of the major functions of the data link layer is to provide a physical MAC address so that requested information
can find its destination. Without a physical address, our pizza delivery man would not be able to complete his
delivery.
Physical Layer
1. Bit synchronization: The physical layer provides the synchronization of the bits by providing a clock. This
clock controls both sender and receiver thus providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes are arranged in a
network i.e. bus, star or mesh topology.
4. Transmission mode: Physical layer also defines the way in which the data flows between the two connected
devices. The various transmission modes possible are: Simplex, half duplex and full duplex.