Computer Networks
Computer Networks
Distributors
A computer can be connected to another one via a serial
port but if we need to connect many computers to
produce a network, this serial connection will not work.
Network Card
Network card is a necessary component of a computer
without which a computer cannot be connected over a
network. It is also known as the network adapter or
Network Interface Card (NIC). Most branded computers
have network card pre-installed. Network cards are of two
types: Internal and External Network Cards.
Internal Network Cards
Motherboard has a slot for internal network card where it
is to be inserted. Internal network cards are of two types
in which the first type uses Peripheral Component
Interconnect (PCI) connection, while the second type
uses Industry Standard Architecture (ISA). Network
cables are required to provide network access.
Characteristics of MANs
● Geographical Coverage − MANs cover a larger
geographical as it combines multiple LANs across
different locations; for example - a network of a city.
● High-Speed Connectivity − MANs provide high-
speed data transmission between multiple LANs
within interconnected devices in the metropolitan
area.
● Public or Private Ownership − Municipal
governments and telecommunications firms can own
and operate MANs.
● Scalability − MANs are scalable networks, whenever
network needs to span, MANs can be expanded or
upgraded.
● Reliability and Redundancy − MANs use redundant
network components and backup solutions to reduce
network failure and down network. In case of
equipment failure or network disturbances, alternate
network paths, backup power sources, and failover
processes preserve network availability.
● Support for Various Technologies − MANs support
network technologies like Ethernet, fiber optics,
wireless communication, and microwave links.
● Service Provisioning − A MAN provides services to
its users like network access, data transfer, voice
communication, video conferencing, and cloud
services.
● Security Measures − MANs implement security
measures to protect network resources, data, and
communications from unauthorized access, cyber
threats, and other security risks.
Overall, MANs are well-suited to providing fast, reliable,
and scalable connectivity to users and organisations in
metropolitan regions, allowing for efficient
communication, collaboration, and access to network
resources.
3. Wide Area Network (WAN)
A network which combines multiple MANs and LANs is
known as Wide Area Network; a WAN network covers
wide geographical area typically covering multiple cities,
regions, countries, or even continents.
Example
A company may have its corporate headquarters and
manufacturing plant located in one city and marketing
office in another city. Each site needs resources, data and
programs locally, but it also needs to share data with
other sites. To accomplish this, the company can attach
devices that connect over public utilities to create a WAN.
Characteristics of WANs
● Large Geographical Coverage − WANs includes
cities, regions, and countries network and span it
over the time as per the requirements increases. This
covers worldwide geographical coverage.
● Interconnection of LANs − WANs interconnect
geographically dispersed LANs. Users in one area
can communicate with another whose location is
different as well as access resources located in other
locations.
● Use of Public and Private Telecommunication
Infrastructure − WANs use leased lines, fibre optic
cables, satellite links, and microwave links. The
WAN's infrastructure allows long-distance data
transfer.
● High Bandwidth and Long-Distance
Communication − WANs provide quick data transfer
and communication across vast distances with high-
bandwidth connectivity. WAN bandwidth and speed
depend on transmission medium and network
technology.
● Multiprotocol Support − To fulfil communication
needs, WANs enable multiple networking protocols
and technologies. It includes TCP/IP, MPLS, Frame
Relay, ATM etc.
● Centralized Management and Control − WANs use
centralised administration and control to optimise
performance, manage network resources, and
enforce security regulations across different
locations. Centralised management ensures network
efficiency and consistency.
● Security Considerations − Encryption, virtual private
networks (VPNs), firewalls, intrusion detection/
prevention systems (IDS/IPS), and access control
mechanisms are the security measures used by
WANs to protect data and network resources against
cyber threats and unauthorised access.
● Scalability and Flexibility − WANs are flexible and
scalable, allows network growth, traffic volume, and
new locations or users. WAN technologies can meet
changing business needs and technology
development.
NETWORK TOPOLOGIES
A Network Topology is the arrangement with which
computer systems or network devices are connected to
each other. Topologies may define both physical and
logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such
as computer, switches or routers, servers connected back
to back using a single piece of cable. Often, the receiving
end of one host is connected to sending end of the other
and vice-versa.
Bus Topology
In case of Bus topology, all devices share single
communication line or cable.Bus topology may have
problem while multiple hosts sending data at the same
time. Therefore, Bus topology either uses CSMA/CD
technology or recognizes one host as Bus Master to solve
the issue. It is one of the simple forms of networking
where a failure of a device does not affect the other
devices. But failure of the shared communication line can
make all other devices stop functioning.
Star Topology
All hosts in Star topology are connected to a central
device, known as hub device, using a point-to-point
connection. That is, there exists a point to point
connection between hosts and hub. The hub device can
be any of the following:
● Layer-1 device such as hub or repeater
● Layer-2 device such as switch or bridge
● Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If
hub fails, connectivity of all hosts to all other hosts fails.
Every communication between hosts, takes place through
only the hub.Star topology is not expensive as to connect
one more host, only one cable is required and
configuration is simple.
Ring Topology
In ring topology, each host machine connects to exactly
two other machines, creating a circular network structure.
When one host tries to communicate or send message to
a host which is not adjacent to it, the data travels through
all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one
more extra cable.
Tree Topology
Also known as Hierarchical Topology, this is the most
common form of network topology in use presently.This
topology imitates as extended Star topology and inherits
properties of bus topology.
This topology divides the network in to multiple levels/
layers of network. Mainly in LANs, a network is bifurcated
into three types of network devices. The lowermost is
access-layer where computers are attached. The middle
layer is known as distribution layer, which works as
mediator between upper layer and lower layer. The
highest layer is known as core layer, and is central point
of the network, i.e. root of the tree from which all nodes
fork.