Uploaded by VEER SEJWAL

Networking Concepts Notes: Computer Networks, Topologies, Protocols

advertisement
CHAPTER 1 (NETWORKING CONCEPTS) NOTES
1. What is a Computer Network?
A computer network is a system of interconnected computers and devices that communicate with each other to
share resources, data, and applications.
Example: The Internet is the largest computer network in the world.
Key Points:
•
Enables communication between devices.
•
Helps in resource sharing (files, printers, etc.).
•
Requires networking hardware and software.
2. What is a Node?
A node is any device connected to a computer network, such as computers, printers, servers, or other networking
devices.
Example: A laptop connected to Wi-Fi is a node in a network.
Key Points:
•
Nodes communicate with each other.
•
Can be client or server.
3. What is a Server?
A server is a computer or system that provides resources, data, services, or programs to other computers (clients)
over a network.
Example: A web server hosts websites.
Key Points:
•
Provides services like file storage, emails, or applications.
•
Can be dedicated hardware or software.
4. Advantages of Computer Networking
•
Resource Sharing – Printers, files, and internet connections can be shared.
•
Improved Communication – Emails, messaging, and video conferencing.
•
Cost Efficiency – Reduces hardware and software costs.
•
Data Accessibility – Access data from different locations.
5. Disadvantages of Computer Networking
•
Security Issues – Risk of hacking, viruses, and data breaches.
•
Maintenance Costs – Requires regular updates and monitoring.
•
Dependency on Network – If the network fails, resources become inaccessible.
6. What is Video Conferencing?
Video conferencing is a technology that allows users to communicate via video and audio in real time over the
internet.
Example: Zoom, Google Meet, and Microsoft Teams.
Key Points:
•
Requires a webcam, microphone, and internet.
•
Used for remote meetings, online classes.
7. What is Intranet?
An intranet is a private network within an organization that allows employees to share information and resources.
Example: A company’s internal portal.
Key Points:
•
Restricted to organization members.
•
More secure than the internet.
8. What is Extranet?
An extranet is a private network that allows controlled access to external users like business partners.
Example: Supplier access to a company’s inventory system.
Key Points:
•
Extends intranet functionality to external users.
•
Requires authentication and security measures.
9. Difference between Intranet, Extranet, and Internet
Feature
Intranet
Extranet
Internet
Access Internal employees only Selected external users Open to the public
Security High
Usage
Moderate
Low
Internal communication Business collaboration Global information sharing
10. What is Bluetooth?
Bluetooth is a wireless technology that allows short-range communication between devices.
Example: Wireless headphones connecting to a smartphone.
Key Points:
•
Uses radio waves.
•
Limited range (typically up to 10 meters).
11. What is a Protocol?
A protocol is a set of rules that govern data communication over a network.
Example: TCP/IP, HTTP, FTP.
Key Points:
•
Ensures reliable communication.
•
Standardized rules for data transmission.
12. Networking Components
•
Network Card (NIC): Allows a computer to connect to a network.
•
Networking Cable: Physical medium for data transfer (Ethernet cable).
•
Modem: Converts digital signals to analog and vice versa.
•
Hub: Connects multiple devices but does not manage data flow.
•
Switch: Similar to a hub but directs data to the correct device.
•
Router: Directs data packets between networks.
13. Difference between Router, Switch, and Hub
Feature
Function
Router
Switch
Hub
Connects different networks Manages data flow Broadcasts data to all devices
Data Filtering Yes
Yes
No
Efficiency
Moderate
Low
High
14. Wireless Networking
•
Wireless Network Card: Connects a computer to Wi-Fi.
•
Access Points: Extend wireless coverage in a network.
•
Wi-Fi: Wireless technology for high-speed internet.
15. Types of Computer Networks
•
PAN (Personal Area Network): Smallest network for personal devices (Bluetooth, hotspot).
•
LAN (Local Area Network): Covers a small geographical area (Office, school network).
•
WAN (Wide Area Network): Covers large geographical areas (Internet).
16. Network Architecture
•
Client-Server Architecture: Centralized control, with servers managing data.
•
Peer-to-Peer Architecture: All devices share equal responsibility.
Difference:
Feature Client-Server Peer-to-Peer
Control Centralized
Decentralized
Cost
Lower
Higher
Security More secure Less secure
17. Network Topology
•
Physical Topology: Actual physical layout of the network.
•
Logical Topology: The way data flows in a network.
Types:
Topology Description
Bus
Single backbone cable, data travels in both directions.
Star
Devices connect to a central hub/switch.
Ring
Data flows in a circular path.
Tree
Combination of star and bus topology.
Mesh
Every node connects to every other node.
18. File Sharing & Security
•
Need for Sharing Drive: Allows multiple users to access files.
•
Accessing Shared Files: Navigate to the network location and open files.
•
Network Icon: Indicates network connection status.
•
Network Security: Protects network resources from threats.
•
Login Security: Uses authentication (username/password).
•
Rights Security: Controls user permissions.
Difference between Login and Rights Security:
Feature Login Security
Rights Security
Purpose Verifies identity
Assigns access permissions
Example Username & Password Read, Write, Execute rights
Case Studies with Questions for practices
Case Study 1: Implementing Intranet in an Organization XYZ Corp. decided to implement an intranet for internal
communication and resource sharing. Employees can access company policies, announcements, and shared files.
Questions:
1. What is an intranet?
2. How does an intranet benefit an organization?
3. How does it differ from the internet?
Answers:
1. A private network for internal organizational use.
2. Enhances communication, file sharing, and security.
3. The internet is public; an intranet is restricted to members.
Case Study 2: Security Issues in Networking
ABC Ltd. faced a major security breach when an unauthorized user accessed confidential data. The company had
weak password policies and no firewall protection.
Questions:
1. What network security measures could have prevented the breach?
2. What is the importance of login security?
3. What is the role of a firewall in network security?
Case Study 3: Video Conferencing in Education
Due to the COVID-19 pandemic, schools adopted online learning. Students and teachers used video conferencing
tools like Zoom and Google Meet to conduct classes.
Questions:
1. What is video conferencing?
2. What are the advantages of using video conferencing in education?
3. Name two popular video conferencing tools.
Case Study 4: Differentiating Network Topologies
A company is setting up a network for its office and is considering bus, star, and ring topologies. The IT department
must decide which topology best suits their needs.
Questions:
1. What are the advantages of using a star topology?
2. How does a bus topology differ from a ring topology?
3. Which topology is best for a small office and why?
Case Study 5: Understanding Client-Server Architecture
A bank uses a client-server network where all transactions are processed on a central server. Customers access their
accounts through client computers.
Questions:
1. What is client-server architecture?
2. How does a server differ from a client?
3. Why is client-server architecture beneficial for a bank?
differences between Ring Topology and Star Topology :
Feature
Ring Topology
Star Topology
Structure
All devices are connected in a circular
manner, forming a ring.
All devices are connected to a central hub or switch.
Data
Transmission
Data travels in one direction (unidirectional) Data is sent from the central hub/switch to the
or both directions (bidirectional) in a loop. intended device.
If one device or connection fails, the entire
Failure Impact
network may stop working.
If one device fails, the network continues to
function, but if the central hub fails, the whole
network is affected.
differences between Bus Topology and Tree Topology for Class 8 students:
Feature
Bus Topology
Tree Topology
Structure
All devices are connected to a single
central cable (backbone).
It has a hierarchical structure where multiple star
networks are connected to a central backbone cable.
Failure
Impact
If the central backbone cable fails, the
entire network stops working.
If a branch fails, only that part is affected, but if the
backbone cable fails, the whole network is affected.
Scalability
Difficult to expand as adding more
devices can slow down the network.
Easier to expand by adding more star networks to the
main cable.
differences between Mesh Topology, Star Topology, and Bus Topology for Class 8 students:
Feature
Mesh Topology
Star Topology
Bus Topology
Structure
Every device is connected to every other All devices are connected All devices are connected to a
device.
to a central hub or switch. single central cable (backbone).
Failure
Impact
If one connection fails, the network
continues to work because multiple
paths exist.
If the central hub fails, the If the backbone cable fails, the
entire network is affected. entire network stops working.
Cost and
Setup
Expensive and difficult to set up due to
many connections.
Moderate cost and easy to Low cost and easy to set up but
set up with fewer cables. limited scalability.
differences between LAN (Local Area Network), MAN (Metropolitan Area Network), and WAN (Wide Area
Network) for Class 8 students:
Feature
LAN (Local Area Network)
MAN (Metropolitan Area
Network)
WAN (Wide Area Network)
Coverage
Area
Covers a small area like a
home, school, or office
building.
Covers a larger area, typically a
city or a large campus.
Covers a vast area, such as a country
or even globally.
Speed
High speed with fast data
transfer rates.
Moderate speed, slower than
LAN but faster than WAN.
Slower speeds compared to LAN and
MAN due to long-distance
transmission.
Cost
Moderate cost, as it requires
Relatively low cost to set up
equipment for city-wide
and maintain.
coverage.
High cost to set up and maintain due
to large-scale infrastructure.
What is Point to Point Topology ?
Point-to-Point Topology is a type of network topology where two devices are directly connected to each other using
a single communication link. It is one of the simplest network configurations, often used to connect two locations or
devices that need to communicate with each other directly.
Key Points:
•
Direct Connection: Only two devices (like computers, routers, or switches) are connected in a point-to-point
setup.
•
No Intermediate Devices: There are no hubs, switches, or routers involved; just a single connection
between two devices.
•
Usage: It’s commonly used for dedicated connections like a leased line between two offices or devices that
need direct communication.
Example:
•
Connecting two computers via a crossover cable or setting up a dedicated link between two routers.
Advantages:
•
Simple Setup: Easy to install and configure.
•
Stable and Reliable: Since there are only two devices involved, there's less chance of network failure.
Disadvantages:
•
Limited Scalability: Only two devices can be connected, so it's not suitable for large networks.
For any query email to deeepeshsharma@dpsi.ac.in
Download