Computer Networks: Nirmala Memorial Foundation College of Commerce and Science
Computer Networks: Nirmala Memorial Foundation College of Commerce and Science
Computer Networks: Nirmala Memorial Foundation College of Commerce and Science
Computer Networks
A computer network consists of two or more computing devices that
are connected in order to share the components of your network (its
resources) and the information you store there, as shown in Figure
1.1. The most basic computer network (which consists of just two
connected computers) can expand and become more usable when
additional computers join and add their resources to those being
shared. The first computer, yours, is commonly referred to as your
local computer. It is more likely to be used as a location where you do
work, a workstation, than as a storage or controlling location, a
server. As more and more computers are connected to a network and
share their resources, the network becomes a more powerful tool,
because employees using a network with more information and more
capability are able to accomplish more through those added
computers or additional resources. The real power of networking
computers becomes apparent if you envision your own network
growing and then connecting it with other distinct networks, enabling
communication and resource sharing across both networks. That is,
one network can be connected to another network and become a
more powerful tool because of the greater resources.
Page
Uses of Networking
Communication and Access to Information
The primary purpose of computer networking is to facilitate
communication. A network allows a user to instantly connect with
another user, or network, and send and receive data. It allows remote
Page
Page
2)
Page
Advantages
Some of the advantages of the centralized network computing
model are:
Centralized data management: In a centralized network computing
model, data is stored on the server. This increases the reliability of
data because all data modifications are stored at a central location.
High level of security: The centralized network computing model
is a highly secure network model. This is because network
security can be implemented and monitored centrally from the
server.
Cost effectiveness: High-end investment is required for
establishing a high-capacity and secure server. On the other
hand, clients require very low investment. This reduces the
overall cost of setting up a centralized network.
2) Distributed network
A distributed network is a type of computer network that is
spread over different networks. This provides a single data
communication network, which can be managed jointly or
separately by each network. Besides shared communication
within the network, a distributed network often also distributes
processing.
In distributed computing, processing and data are spread out
over multiple computers, usually over a network. Years ago -prior to low-cost computer power on the desktop -- computing
was organized in centralized "glass houses" (so-called because
the computers were often shown to visitors through picture
windows). Today, most enterprises locate applications and data
where they can operate most efficiently, to some mix of desktop
Page
Types of Networks
There are several different types of computer networks. Computer
networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they
occupy and the number of computers that are part of the network.
Networks can cover anything from a handful of devices within a
single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
Page
Page
Disadvantages of MAN
1)more cable required for a man connection from one place to
Nirmala Memorial Foundation college of Commerce and Science
Page
another
2)the large the network becomes difficult to mange
3)it is difficult to make the system secure from hackers and industrial
espionageeographical regions...
Advantages Of WAN
Covers a large geographical area so long distance businesses
can connect on the one network
Shares software and resources with connecting workstations
Messages can be sent very quickly to anyone else on the
network. These messages can have pictures, sounds, or data
included with them (called attachments).
Expensive things (such as printers or phone lines to the internet)
can be shared by all the computers on the network without
having to buy a different peripheral for each computer.
Everyone on the network can use the same data. This avoids
problems where some users may have older information than
others.
Nirmala Memorial Foundation college of Commerce and Science
Page
Network security
It consists of the provisions and policies adopted by a network
administrator to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible
resources. Network security involves the authorization of access to
data in a network, which is controlled by the network administrator.
Users choose or are assigned an ID and password or other
authenticating information that allows them access to information and
programs within their authority. Network security covers a variety of
computer networks, both public and private, that are used in
everyday jobs conducting transactions and communications among
businesses, government agencies and individuals. Networks can be
private, such as within a company, and others which might be open to
public access. Network security is involved in organizations,
enterprises, and other types of institutions. It does as its title explains:
It secures the network, as well as protecting and overseeing
operations being done. The most common and simple way of
Page 10
Network configuration
1 . Peer-to-Peer Networks
In a peer-to-peer network, there are no dedicated servers,
and there is no hierarchy among the computers. All the
computers are equal and therefore are known as peers. Each
computer functions as both a client and a server, and there is
no administrator responsible for the entire network. The user
at each computer determines what data on that computer is
shared on the network.
Page 11
Page 12
Network application
1. Email
Electronic mail, most commonly referred to as email or email since c 1993,[2] is a method of exchanging digital messages
from an author to one or more recipients. Modern email operates
across the Internet or other computer networks. Some early
email systems required that the author and the recipient both
be online at the same time, in common with instant messaging.
Today's email systems are based on a store-and-forward model.
Emailservers accept, forward, deliver, and store messages.
Neither the users nor their computers are required to be online
simultaneously; they need connect only briefly, typically to
a mail server, for as long as it takes to send or receive
messages. Historically, the term electronic mail was used
generically for any electronic document transmission. For
example, several writers in the early 1970s used the term to
describe fax document transmission.[3][4] As a result, it is difficult
to find the first citation for the use of the term with the more
specific meaning it has today.
An Internet email message consists of three components, the
message envelope, the message header, and the message body.
The message header contains control information, including,
minimally, an originator's email address and one or more
recipient addresses. Usually descriptive information is also
added, such as a subject header field and a message submission
date/time stamp.
Page 13
2. Voice mail
Voicemail (also known as voice mail, voice
message or voice bank) is a computer based system that
allows users and subscribers to exchange personal voice
messages; to select and deliver voice information; and to
process transactions relating to individuals, organizations,
products and services, using an ordinary telephone. The term is
also used more broadly to denote any system of conveying a
stored telecommunications voice messages, including using
an answering machine. Most cell phone services offer voice-mail
as a basic feature, many corporate PBXs include versatile
internal voice-messaging services
3. FTP
The File Transfer Protocol (FTP) is a standard network
protocol used to transfer computer files from one host to another
host over a TCP-based network, such as the Internet.
FTP is built on a client-server architecture and uses separate
control and data connections between the client and the server.
[1]
FTP users may authenticate themselves using aclear-text signin protocol, normally in the form of a username and password,
but can connect anonymously if the server is configured to allow
it. For secure transmission that protects the username and
password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS). SSH File Transfer
Protocol (SFTP) is sometimes also used instead, but is
technologically different.
4. WWW
The World Wide Web (www, W3) is an information
system of interlinked hypertext documents that are accessed
via the Internet and built on top of the Domain Name System.
[1]
It has also commonly become known simply as the Web.
Individual document pages on the World Wide Web are
called web pages and are accessed with a software
application running on the user's computer, commonly called
Page 14
Page 15
from one sender to many receivers and voice and video chat,
or may be a feature of a web conferencingservice.
Online chat in a less stringent definition may be primarily any
direct text-based or video-based (webcams), one-on-one chat
or one-to-many group chat (formally also known
as synchronous conferencing), using tools such as instant
messengers, Internet Relay Chat (IRC), talkers and
possibly MUDs. The expression online chat comes from the
word chat which means "informal conversation".
7. BBS
A bulletin board system, or BBS, is a computer
server running custom software that allows users to connect
to the system using a terminal program. Once logged in, the
user can perform functions such as uploading and
downloading software and data, reading news and bulletins,
and exchanging messages with other users through email,
publicmessage boards, and sometimes via direct chatting.
Many BBSes also offer on-line games, in which users can
compete with each other, and BBSes with multiple phone
lines often provide chat rooms, allowing users to interact with
each other. Bulletin board systems were in many ways a
precursor to the modern form of the World Wide Web, social
networksand other aspects of the Internet.
8. User groups
A computer user group (also known as a computer club)
is a group of people who enjoy
using microcomputers or personal computers and who meet
regularly to discuss the use of computers, share knowledge
and experience, hear from representatives of hardware
manufacturers and software publishers, and hold other
related activities. They may host special interest workgroups,
often focusing on one particular aspect of computing. A user
account can be a member of more than one group. The two
most common user groups are the standard user group and
the administrator group, but there are others. A user account
is often referred to by the user group it's in (for example, an
Page 16
Page 17