A network is a combination of more than one devices which connect from some medium (wire , wireless) called channel line configuration refer physical communication channel access method . Three types of access method are follows..
- Point to Point
- Multi Point
Point to Point
Communication line is not shared in point to point line configuration. A separate link used to connect each device in network. Advantage of point to point line configure is no congestion. Highly and sophisticate security implementation is possible.
The entire capacity of the channel is reserved for transmission between those two devices. Most point-to-point line configurations use an actual length of wire or cable to connect the two ends, but other options, such as microwave or satellite links, are also possible.
Multipoint (Multidrop line configuration) Communication link is shared between all connected nodes from the network. Two types of multipoint line configuration are follows
Spatial Sharing: If several devices can share the link simultaneously, its called Spatially shared line configuration
Temporal (Time) Sharing: If users must take turns using the link , then its called Temporally shared or Time Shared Line Configuration
Modes of channel operation
Mode of channel operation define accessing mode of the medium for send and receive data. Types and examples of different types of modes are follows
Data in simplex channel is always moves in one direction. Simplex is suitable for many kind of application where reply is necessary because it is not possible to send back error or control signals to the transmit end.
A Half duplex channel can send and receive data but not the same time. When data is being send receiving is not possible. It is like single railway line where train comes and dispatches both not the same time. In addition, it is possible to perform error detection and request the sender to retransmit information that arrived corrupted. Internet surfing is also an example of half duplex A user request any resource to server by sending request and server reply by send resource to user back but both task cannot be perform simultaneously.
Full – duplex
Data can send and received simultaneously. It’s like two ways highway where cars can travels both directions on same time.
Mobile Phone, Packet switch network
Local area network (LAN)
A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
Metropolitan area network (MAN)
A metropolitan area network (MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN.The limits of Metropolitan cities are determined by local municipal corporations and we cannot define them. Hence, the bigger the Metropolitan city the bigger the MAN,smaller a metro city smaller the MAN.
Wide area network (WAN)
A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.
Campus Area Network
A campus network, campus area network, corporate area network or CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned by the campus tenant / owner: an enterprise, university, government etc.
Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for communication among computerized devices,including telephones and personal digital assistants. PANs can be used for communication among the personal devices themselves(intra personal communication), or for connecting to a higher level network and the Internet (an up link). A wireless personal area network (WPAN) is a PAN carried over wireless network technologies such as IrDA, Wireless USB, Bluetooth, Z-Wave, ZigBee, oreven Body Area Network. The reach of a WPAN varies from a few centimeters to a few meters. A PAN may also be carried over wired computer buses such as USB and FireWire.
Desk Area Network (DAN)
The Desk Area Network (DAN) is a multimedia workstation based around an ATM interconnect (as shown in the above diagram). All communication between peripherals and even between the CPU and its main memory is achieved by sending ATM cells through aswitch fabric. A prototype implementation based on the Fairisle switch fabric has been built and is being used to investigate the
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks.
An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes, the term refers only to the organization's internal website, but may be a more extensive part of the organization's information technology infrastructure, and may be composed of multiple local area networks. The objective is to organize each individual's desktop with minimal cost, time and effort to be more productive, cost efficient, timely, and competitive.
Physical and logical arrangement of devices within a network.
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network.Essentially, it is the topological structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their typologies maybe identical.A good example is a local area network (LAN): Any given node in the LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network. Conversely, mapping the data flow between the components determines the logical topology of the network.
A network setup where each computer and network device is interconnected with one another, allowing for most transmissions to be distributed, even if one of the connections go down. This topology is not commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this topology is commonly used for wireless networks. Below is a visual example of a simple computer setup on a network using a mesh topology.
Advantages of Mesh topology
- Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.
- Even if one of the components fails there is always an alternative present. So data transfer doesn't get affected.
- Expansion and modification in topology can be done without disrupting other nodes.
Disadvantages of Mesh topology
- There are high chances of redundancy in many of the network connections.
- Overall cost of this network is way too high as compared to other network typologies.
- Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.
Alternatively referred to as a star network, a star topology is one of the most common network setups where each of the devices and computers on a network connect to a central hub. A major disadvantage of this network topology is that if the central hub fails, all computers connected to that hub would be disconnected. Below is a visual example of a simple computer setup on a network using the star topology?
A bus topology is a type of network setup where each computer and network device is connected to a single cable or backbone. Below, is a visual example of a simple computer setup on a network using the bus topology.
A signal from the source is broadcast and it travels to all workstations connected to bus cable. Although the message is broadcast but only the intended recipient, whose MAC address or IP address matches, accepts it. If the MAC /IP address of machine doesn't match with the intended address, machine discards the signal.
A terminator is added at ends of the central cable, to prevent bouncing of signals. A barrel connector can be used to extend it. Below I have given a basic diagram of a bus topology and then have discussed advantages and disadvantages of Bus Network Topology
Advantages (benefits) of Linear Bus Topology
- It is easy to set-up and extend bus network.
- Bus topology costs very less.
- Linear Bus network is mostly used in small networks. Good for LAN.
Disadvantages (Drawbacks) of Linear Bus Topology
- There is a limit on central cable length and number of nodes that can be connected.
- Dependency on central cable in this topology has its disadvantages.If the main cable (i.e. bus ) encounters some problem, whole network breaks down.
- Proper termination is required to dump signals. Use of terminators is must.
- It is difficult to detect and troubleshoot fault at individual station.
- Maintenance costs can get higher with time.
- Efficiency of Bus network reduces, as the number of devices connected to it increases.
- It is not suitable for networks with heavy traffic.
- Security is very low because all the computers receive the sent signal from the source.
In a Ring topology,each device has a dedicated point to point line configuration only with the two devices either side of it.A signal is passed along the ring in one direction, from device to device,until it reaches its destination . Each device in the ring incorporate a repeater the bits and passes them along
The ring topology may prove optimum when system requirements are modest and workstations are at scattered points. If the workstations are reasonably close to the vertices of a convex polygon (such as the pentagon shown in the illustration), the cost can be lower than that of any other topology when cable routes are chosen to minimize the total length of cable needed.
A break in the cable of a ring network may result in degraded data speed between pairs of workstations for which the data path is increased as a result of the break. If two breaks occur and they are not both in the same section of cable, some workstations will be cut off from some of the others. When system reliability is a critical concern, a bus network or star network may prove superior to a ring network. If redundancy is required, the mesh network topology may be preferable.
Alternatively referred to as a star bus topology, tree topology is one of the most common network setups that is similar to a bus topology and a star topology. A tree topology connects one star network to other star networks. Below is a visual example of a tree topology, with a simple computer set up on a network using the star topology, connected to another network using the star topology.
Advantages of Tree Topology
1. It is an extension of Star and bus Topologies, so in networks where these topologies can't be implemented individually for reasons related to scalability, tree topology is the best alternative.
2. Expansion of Network is possible and easy.
3. Here, we divide the whole network into segments (star networks), which can be easily managed and maintained.
4. Error detection and correction is easy.
5. Each segment is provided with dedicated point-to-point wiring to the central hub.
6. If one segment is damaged, other segments are not affected.
Disadvantages of Tree Topology
1. Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks whole network is crippled.
2. As more and more nodes and segments are added, the maintenance becomes difficult.
3. Scalability of the network depends on the type of cable used.
Transmission media refer a link or medium which is use to transfer data from one device to other in a network.
A type of cable that consists of two independently insulated wires twisted around one another. The use of two wires twisted together helps to reduce cross talk and electromagnetic induction. While twisted-pair cable is used by older telephone networks and is the least expensive type of local-area network (LAN) cable, most networks contain some twisted-pair cabling at some point along the network. Other types of cables used for LANs include coaxial cables and fiber optic cables.
Unshielded Twisted Pair cable
UTP stands for Unshielded Twisted Pair cable. UTP cable is a 100 ohm copper cable that consists of 2 to 1800 unshielded twisted pairs surrounded by an outer jacket. They have no metallic shield. This makes the cable small in diameter but unprotected against electrical interference. The twist helps to improve its immunity to electrical noise and EMI.
Cable Lengths and Transmission Speeds
|Interface or Device||Max Speed Mb/S||Cable Type||Max Cable Length|
|Cable, Twisted Pair and Coax|
|Cat 1(old telephone standard)||obsolete||twisted pair|
|Cat 2||4||twisted pair|
|Cat 3(minimum for data networks)||10||twisted pair||300 ft|
|Cat 4||16||twisted pair||300 ft|
|Cat 5(most data today, shielded twisted pair = 155mbps)||100||twisted pair||300 ft|
|Cat 5 Enhanced||100/1000||twisted pair||300ft|
|Cat 6(Patch cables for data, braided shield, two pair)||twisted pair|
|Cat 8(Flat cable, two twisted pair, under carpet standard)||twisted pair|
|Cat 9(Plenum cable, two twisted pair)||twisted pair|
|Fiber Optic(8.3micro=single, 62.5-100micro=multi)||100 to 2000||Fiber||6000ft|
Shielded Twisted Pair cable
Often abbreviated STP, a type of copper telephone wiring in which each of the two copper wires that are twisted together are coated with an insulating coating that functions as a ground for the wires. The extra covering in shielded twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets.
- Cheaper and far easier to splice
- Less susceptible to electrical interference caused by nearby equipment or wires.
- In turn are less likely to cause interference themselves. 4. Because it is electrically "cleaner", STP wire can carry data at a faster speed.
- STP wire is that it is physically larger and more expensive than twisted pair wire.
- STP is more difficult to connect to a terminating block.
A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire. The shield minimizes electrical and radio frequency interference.
Coaxial cabling is the primary type of cabling used by the cable television industry and is also widely used for computer networks, such as Ethernet. Although more expensive than standard telephone wire, it is much less susceptible to interference and can carry much more data.
1.sufficient frequency range to support multiple channel, which allows for much greater throughput.
2.lower error rates. because the inner conductor is in a Faraday shield, noise immunity is improved, and coax has a lower error rates and therefore slightly better 3.performance than twisted pair.
3.greater spacing between amplifiers coax's cable shielding reduces noise and crosstalk, which means amplifiers can be spaced farther apart than with twisted pair.
1. More expensive to install compare to twisted pair cable.
2. the thicker the cable, the more difficult to work with.
A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.
Fiber optics has several advantages over traditional metal communications lines
- Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data.
- Fiber optic cables are less susceptible than metal cables to interference.
- Fiber optic cables are much thinner and lighter than metal wires.
- Data can be transmitted digitally (the natural form for computer data) rather than analogically.
The main disadvantage of fiber optics is that the cables are expensive to install. In addition, they are more fragile than wire and are difficult to splice.
Fiber optics is a particularly popular technology for local-area networks. In addition, telephone companies are steadily replacing traditional telephone lines with fiber optic cables. In the future, almost all communications will employ fiber optics.
- system performance
- greatly increased bandwidth and capacity
- lower signal attenuation (loss)
- immunity to electrical noise
- immune to noise (electromagnetic interference and radio frequency interference)
- less restrictive in harsh environments
- overall system economy
- fiber optic component are expensive
- fiber optic transmitters and receivers are still relatively expensive compared to electrical interfaces
- the lack of standardization in
- the industry has also limited the acceptance of fiber optics.
Radio waves are part of a larger group of waves classified all together as electromagnetic radiation. This large group of waves is broken down into smaller groups based upon their frequencies and wavelengths. Two examples of electromagnetic radiation (other than radio waves) are
Radios and Televisions are two examples.
ISDN ( integrated services digital network)
Abbreviation of integrated services digital network, an international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires. ISDN supports data transfer rates of 64 Kbps (64,000 bits per second).
Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Once all the packets forming a message arrive at the destination, they are recompiled into the original message. Most modern Wide Area Network (WAN) protocols, including TCP/IP, X.25, and Frame Relay, are based on packet-switching technologies. In contrast, normal telephone service is based on a circuit-switching technology, in which a dedicated line is allocated for transmission between two parties. Circuit-switching is ideal when data must be transmitted quickly and must arrive in the same order in which it's sent. This is the case with most real-time data, such as live audio and video. Packet switching is more efficient and robust for data that can withstand some delays in transmission, such as e-mail messages and Web pages.
A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The most ubiquitous circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. The other common communications method is packet switching, which divides messages into packets and sends each packet individually. The Internet is based on a packet-switching protocol, TCP/IP. Circuit-switching systems are ideal for communications that require data to be transmitted in real-time. Packet-switching networks are more efficient if some amount of delay is acceptable. Circuit-switching networks are sometimes called connection-oriented networks. Note, however, that although packet switching is essentially connection less, a packet switching network can be made connection-oriented by using a higher-level protocol. TCP, for example, makes IP networks connection-oriented.
In telecommunications and computer networks, multiplexing (also known as muxing) is a method by which multiple analogue message signals or digital data streams are combined into one signal over a shared medium. The aim is to share an expensive resource. For example, in telecommunications, several telephone calls may be carried using one wire. Multiplexing originated in telegraphy in the 1870s, and is now widely applied in communications. In telephony, George Owen Squier is credited with the development of telephone carrier multiplexing in 1910.
The multiplexed signal is transmitted over a communication channel, which may be a physical transmission medium. The multiplexing divides the capacity of the high-level communication channel into several low-level logical channels, one for each
message signal or data stream to be transferred. A reverse process, known as demultiplexing, can extract the original channels on the receiver side. A device that performs the multiplexing is called a multiplexer (MUX), and a device that performs the reverse process is called a demultiplexer (DEMUX).
Inverse multiplexing (IMUX) has the opposite aim as multiplexing, namely to break one data stream into several streams, transfer them simultaneously over several communication channels, and recreate the original data stream.
A protocol is a system of rules that define how something is to be done. In computer terminology, a protocol is usually an agreed-upon or standardized method for transmitting dataand/or establishing communications between different devices. Just as two humans need to have a common language between them before they can begin to share ideas and information, so must computers have a common way of sending information between them. The Internet is often used as an example of a successful protocols-based
system in which the implementation of key qualities of protocols, such as error correction and message formatting, are utilized and respected across a wide variety of hardware and software.
A uniform resource locator, abbreviated URL, also known as web address, is a specific character string that constitutes a reference to a resource. In most web browsers, the URL of a web page is displayed on top inside an address bar. An example of a typical URL would be"http://en.example.org/wiki/Main_Page". A URL is technically a type of uniform resource identifier (URI), but in many technical documents and verbal discussions, URL is often used as a synonym for URI, and this is not considered a problem.
Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying data grams across network boundaries. Its routing function enables inter networking, and essentially establishes the Internet.
Short for HyperText Markup Language, the authoring language used to createdocuments on the World Wide Web. HTML is similar to SGML, although it is not a strict subset. HTML defines the structure and layout of a Web document by using a variety oftags and attributes. The correct structure for an HTML document starts with <HTML><HEAD>(enter here what document is about)<BODY> and ends with </BODY></HTML>. All the information you'd like to include in your Web page fits in between the <BODY> and </BODY> tags. There are hundreds of other tags used to format and layout the information in a Web page. Tags are also used to specify hypertext links. These allow Web developers to direct users to other Web pages with only a click of the mouse on either an image or word(s). For a more complete list of tags, check out some of the URLs below.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use.
Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.
IP, as the primary protocol in the Internet layer of the Internet protocol suite, has the task of delivering packets from the source host to the destination host solely based on the IP addresses. For this purpose, IP defines datagram structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information.
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet.
A client is a piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network. The term applies to programs or devices that are part of a client–server model.
A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide, or help to provide, anetwork service. Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. In many cases, a computer can provide several services and have several servers running.
Electronic mail, most commonly referred to as email or e-mail since approximately 1993,is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages.
Advantages of emails
1. Emails are easy to use. You can organize your daily correspondence, send and receive electronic messages and save them on computers.
2. Emails are fast. They are delivered at once around the world. No other form of written communication is as fast as an email.
3. The language used in emails is simple and informal.
4. When you reply to an email you can attach the original message so that when you answer therecipient knows what you are talking about. This is important if you get hundreds of emails a day.
5. It is possible to send automated emails with a certain text. In such a way it is possible to tell the sender that you are on vacation. These emails are called auto responders.
6. Emails do not use paper. They are environment friendly and save a lot of trees from being cut down.
7. Emails can also have pictures in them. You can send birthday cards or newsletters as emails.
8. Products can be advertised with emails. Companies can reach a lot of people and inform them in a short time.
Disadvantages of emails
1. Emails may carry viruses. These are small programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world.
2. Many people send unwanted emails to others. These are called spam mails. It takes a lot of time to filter out the unwanted emails from those that are really important.
3. Emails cannot really be used for official business documents. They may be lost and you cannot sign them.
4.Your mailbox may get flooded with emails after a certain time so you have to empty it from time to time.
A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video or other piece of content.Hyperlinks present in resources enable users easily to navigate their browsers to related resources
Example :. Google Chrome, Mozilla Firefox, Safari, Opera, Internet Explorer, Netscape Browser
A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server The main purpose of cookies is to identify users and possibly prepare customized Web pages for them. When you enter a Web siteusing cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your Web browser which stores it for later use. The next time you go to the same Web site, your browser will send the cookie to the Web server. The server can use this information to present you with custom Web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.
A web search engine is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to assearch engine results pages (SERPs). The information may be a specialist in web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler. Example : Google,Yahoo,Bing,AltaVista
Social Networking Service
A social networking service is a platform to build social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, pictures, posts, activities, events, and interests with people in their network.