SlideShare una empresa de Scribd logo
1 de 33
TOPOLOGY
NETWORK
STAR
RING
BUS
PEER TO PEER
CLIENT-SERVER
PYSHICAL / WIRELESS
TWISTED PAIR, COAXIAL, FIBRE OPTIC
INFRARED, RADIOWAVE, SATELLITE
NIC
HUB
ROUTER
MODEM
ACCESS
POINT
LAN
MAN
WAN
INTRANET
EXTRANET
INTERNET
TCP/IP
NETWORK OPERATING SYSTEM
CLIENT SOFTWARE
ARCHITECTURE TYPES
TECHNOLOGY
PROTOCOL
SOFTWARE
MEDIUM
DEVICES
192.168.1.3
Mukesh Chinta, Asst Prof, CSE
2
Classification of Networks
There is no generally accepted taxonomy into which all computer networks fit,
but two dimensions stand out as important:
Transmission Technology and Scale.
Mukesh Chinta, Asst Prof, CSE
3
4
Based on Transmission Technology
 Broadcast Networks: All stations share a single communication
channel
 Point-to-Point Networks: Pairs of hosts (or routers) are directly
connected
 Typically, local area networks (LANs) are broadcast and wide area
networks (WANs) are point-to-point
Broadcast Network Point-to-Point Network
Mukesh Chinta, Asst Prof, CSE
Links
(a)
(b)
point-to-point
multiple-access
Geographical coverage and scalability are limited.
Each node needs one interface for each link.
Mukesh Chinta, Asst Prof, CSE
5
Broadcast Networks
 A Single communication link is shared by all the machines
on that network
 When a message is transmitted, it can be received &
processed by every machine on that network. This is
called broadcasting
 The address field within the message specifies the
intended recipient. Only if its for the host, it process the
message or it ignores it.
 Two popular topologies of broadcast LAN are Bus and
Ring
6
A variant of broadcasting called multicasting in which
transmission is done to a subset of machines.
Advantages
 Network is easy to build- Only one cable is needed
 Cost of construction is cheaper when compared to other
networks
Disadvantages
 Not very scalable and flexible
 An Arbitration mechanism is needed to resolve conflicts
Broadcast Networks
Mukesh Chinta, Asst Prof,
CSE
7
Point-to-Point Networks
 Consists of many connections between individual pair of nodes.
 Often multiple routes of different lengths are possible
 Point-to-point transmission with one sender and one receiver is
sometimes called unicasting
 End devices that wish to communicate are called stations and
the switching devices are called nodes.
Mukesh Chinta, Asst Prof, CSE
8
Advantages
 Greater aggregate bandwidth- can have more than one
sender
 Can add capacity incrementally- add more links/switches
 Better fault tolerance
 Lower Latency- No arbitration needed to send
Disadvantages
 More expensive as it requires lots of transmission lines
and switching elements to connect remote hosts
Point-to-Point Networks
Mukesh Chinta, Asst Prof, CSE9
Switched Networks
Circuit Switched
■ ■ ■
Packet Switched
store-and-forward
Mukesh Chinta, Asst Prof,
CSE
10
Sharing a Link
L2
L3
R2
R3
L1 R1
Switch 1 Switch 2
multiplex demultiplex
Mukesh Chinta, Asst Prof,
CSE
11
Networks Based on Scale
Classification
of network
Local Area
Network
(LAN)
Metropolitan
Area Network
(MAN)
Wide Area
Network
(WAN)
 The main differentiation among these classifications is their area
of coverage.
LAN, MAN and WAN compared Mukesh Chinta, Asst Prof,
CSE
12
LOCAL AREA NETWORK {LAN}
A LAN is a private network that connects computers and devices in a limited
geographically area such as a home, school computer laboratory, office building.
LAN’s are used to share resources and to exchange information.
LAN’s are restricted in size having a bounded worst-case transmission time, which
simplifies networks management
Traditional LAN’s run
at 10-100Mbps
Common Topologies
used are bus, ring and
star
High data rates with
less errorsMukesh Chinta, Asst Prof,
CSE
13
Headphone
PDA
PrinterMouse
Laptop
Smartphone
LOCAL AREA NETWORK {LAN}
Types of
LAN
Personal Area
Network
(PAN)
House Area
Network
(HAN)
A Personal area network (PAN) is a computer network used for communication
among computer and different information technological devices close to one
person. Common Technologies used are Bluetooth and Infrared. Range is ~10m
A House area network (HAN) is a type of local area network that develops from
the need to facilitate communication and interoperability among digital devices
present inside or within the close vicinity of a home.
14
 Covers a larger geographical area than is a LAN, ranging from
several blocks of buildings to entire cities.
 It may be a single network as a cable TV network or it may be means
of connecting a number of LANs into a larger network so that
resources may be shared.
 MAN is wholly owned and operated by a private company or may be
a service provided by a public company
A metropolitan area network based on cable TV
METROPOLITAN AREA NETWORK {MAN}
Mukesh Chinta, Asst Prof,
CSE
15
The main reason for distinguishing MANs as a special category is
that a standard has been adopted for them. It is DQDB
(Distributed Queue Dual Bus) or IEEE 802.6.
METROPOLITAN AREA NETWORK {MAN}
 Using DQDB, networks can be up to 20 miles (30 km) long and operate at
speeds of 34 to 155 Mbits/s.
 It consists of two unidirectional buses (cables) to which all the computers are
connected. Each bus has a head-end, which initiates transmission activity.
Traffic destined for a computer to the right of the sender uses the upper bus
and to the left uses the lower one. Mukesh Chinta, Asst Prof,
CSE
16
 Wide area networks are the oldest type of data communications
network that provide relatively slow-speed, long-distance transmission
of data, voice and video information over relatively large and widely
dispersed geographical areas, such as country or entire continent.
 WAN spans a large geographical area: a country or a continent
 It contains a collection of machines intended for running user
programs called hosts. The hosts are connected by a communication
subnet, or just subnet for short.
 In most WAN’s, the subnet consists of two distinct components:
transmission lines and switching elements. Transmission lines move
bits between machines. Switching elements (Routers) are specialized
computers that connect three or more transmission lines. When data
arrive on an incoming line, the switching element must choose an
outgoing line on which to forward them.
WIDE AREA NETWORK {WAN}
Mukesh Chinta, Asst Prof,
CSE
17
WIDE AREA NETWORK {WAN}
When a packet is sent from one router to another via one or more intermediate
routers, the packet is received at each intermediate router in its entirety, stored there
until the required output line is free, and then forwarded. A subnet organized
according to this principle is called a store-and-forward or packet-switched
subnet. Routing decisions are made locally according to a routing algorithm.
Mukesh Chinta, Asst Prof,
CSE
18
Mukesh Chinta, Asst Prof,
CSE
19
A Quick Comparison
Mukesh Chinta, Asst Prof, CSE20
Internetwork {Internet}
 It is a Global network of computers which may be server or client that
exchanges information.
 It can be defined as a "network of networks" which can be linked
through copper wires, wireless connections, and other technologies.
 This is the world-wide network of computers accessible to anyone who
knows their Internet Protocol (IP) address
 Such interconnection of networks requires that different, and frequently
incompatible networks, be connected, sometimes by means of machines
called gateways to make the connection and provide the necessary
translation, both in terms of hardware and software.
Mukesh Chinta, Asst Prof, CSE21
 The term Intranet is derived from two words: ‘Intra’ which means
within and ‘net’ which means group of interconnected computers.
 It is a private computer network that uses Internet protocols and
network connectivity to securely share any part of an organization's
information or operational systems with its employees.
 In short, an intranet is private network, similar to the Internet and
using the same protocols and technology, contained within an
enterprise or not-for-profit organization.
Intranet
Mukesh Chinta, Asst Prof, CSE22
Extranet
 is an intranet for outside authorized users using same internet technologies.
The outside users are trusted partners of the organization who have access to
information of their interest & concern.
 extends the intranet concept to provide a network that connects a company’s
network to the networks of its business partners, selected customers, or
suppliers.
Mukesh Chinta, Asst Prof, CSE
23
Relationship between Intranet &
Extranet
24
Client-Server Vs Peer-to-peer
 A network server is a computer designed to process requests and deliver
data to other (client) computers over a local network or the Internet.
A Client is a computer that retrieves information from or uses resources
provided by a server or main computer.
 A peer-to-peer network is a network where the computers act as both
workstations and servers. It is great for small, simple, and inexpensive
networks. In a strict peer-to-peer networking setup, every computer is an
equal, a peer in the network. Each machine can have resources that are shared
with any other machine.
Mukesh Chinta, Asst Prof, CSE25
Mukesh Chinta, Asst Prof,
CSE
26
Network topology
 A topology is a way of “laying out” the network.
Topologies can be either physical or logical.
 A topology describes the configuration of a network
and influences the networks cost and performance.
Various topologies are possible for broadcast LAN’s.
 Physical topologies describe how the cables are run.
 Logical topologies describe how the network
messages travel
Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Mukesh Chinta, Asst Prof,
CSE
27
Bus Topology
 Bus networks use a common backbone to connect all devices. A single cable,
(the backbone) functions as a shared communication medium that devices
attach or tap into with an interface connector.
 The bus topology is the simplest and most common method of
interconnecting computers. The two ends of the transmission line never
touch to form a complete loop. A bus topology is also known as multidrop or
linear bus or a horizontal bus.
 A device wanting to communicate with another device on the network sends
a broadcast message onto the wire that all other devices see, but only the
intended recipient actually accepts and processes the message.
Mukesh Chinta, Asst Prof,
CSE
28
Ring Topology
 In a ring network (sometimes called a loop), every device has exactly two
neighbors for communication purposes.
 All messages travel through a ring in the same direction (either "clockwise" or
"counter clockwise"). All the stations are interconnected in tandem (series) to
form a closed loop or circle.
 All the stations are interconnected in tandem (series) to form a closed loop or
circle. Transmissions are unidirectional and must propagate through all the
stations in the loop.
Mukesh Chinta, Asst Prof,
CSE
29
 A star topology is designed with each node (file server,
workstations, and peripherals) connected directly to a central
network hub, switch, or concentrator. Data on a star network
passes through the hub, switch, or concentrator before
continuing to its destination.
 The hub, switch, or concentrator manages and controls all
functions of the network. It also acts as a repeater for the data
flow.
Star Topology
Mukesh Chinta, Asst Prof, CSE
30
 The mesh topology incorporates a unique network design in
which each computer on the network connects to every other,
creating a point-to-point connection between every device on
the network.
 Unlike each of the previous topologies, messages sent on a
mesh network can take any of several possible paths from
source to destination.
 A disadvantage is that, a mesh network with n nodes must have
n(n-1)/2 links and each node must have n-1 I/O ports (links).
Mesh Topology
Mukesh Chinta, Asst Prof, CSE
31
Hybrid Topology
This topology (sometimes called mixed topology) is simply
combining two or more of the traditional topologies to form a larger,
more complex topology. Main aim is being able to share the
advantages of different topologies.
Mukesh Chinta, Asst Prof,
CSE
32
Mukesh Chinta, Asst Prof,
CSE
33

Más contenido relacionado

La actualidad más candente

Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingAnjan Mahanta
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)Pritom Chaki
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesRita Gokani
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networkingnhumar
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.satyamjipatel
 
Types of network
Types of networkTypes of network
Types of networkishjari
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Modems
ModemsModems
ModemsBits
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network DeviceRubal Sagwal
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPTDhivya T
 

La actualidad más candente (20)

Network protocals
Network protocalsNetwork protocals
Network protocals
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Types of network
Types of networkTypes of network
Types of network
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Modems
ModemsModems
Modems
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 

Destacado

Transmission impairments
Transmission impairmentsTransmission impairments
Transmission impairmentsOnline
 
Transmission impairments
Transmission impairmentsTransmission impairments
Transmission impairmentsavocado1111
 
Multiplexing, fdma,tdma,cdma
Multiplexing, fdma,tdma,cdmaMultiplexing, fdma,tdma,cdma
Multiplexing, fdma,tdma,cdmanimay1
 
Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Ryan Melville
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona gsx1
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks Nazren Wak
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologiesPriyanka Nain
 
2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagramsCarlos Coronel Sotillo
 
C,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallC,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallMelany Calle
 
Toyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringToyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringmrxeoto
 
Manual electrico de toyota corolla 2012
Manual electrico de toyota corolla   2012Manual electrico de toyota corolla   2012
Manual electrico de toyota corolla 2012Melany Calle
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...RAHUL PANDEY
 

Destacado (20)

3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Transmission impairments
Transmission impairmentsTransmission impairments
Transmission impairments
 
Transmission impairments
Transmission impairmentsTransmission impairments
Transmission impairments
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
Ch 03
Ch 03Ch 03
Ch 03
 
Multiplexing, fdma,tdma,cdma
Multiplexing, fdma,tdma,cdmaMultiplexing, fdma,tdma,cdma
Multiplexing, fdma,tdma,cdma
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams
 
C,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallC,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overall
 
Toyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringToyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiring
 
Manual electrico de toyota corolla 2012
Manual electrico de toyota corolla   2012Manual electrico de toyota corolla   2012
Manual electrico de toyota corolla 2012
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Electric cars
Electric carsElectric cars
Electric cars
 
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
 

Similar a Networks classification

What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptxCOMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptxHalimaTarin
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
NetworkingfundamentalsSithu PM
 
Computer network theory
Computer network theoryComputer network theory
Computer network theorysheikhparvez4
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks AfsanaAkterRubi
 

Similar a Networks classification (20)

Network hardware
Network hardwareNetwork hardware
Network hardware
 
Lan wan
Lan wanLan wan
Lan wan
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
What is networking
What is networkingWhat is networking
What is networking
 
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptxCOMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
A computer network
A computer networkA computer network
A computer network
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Notes on Class 2
Notes on Class 2Notes on Class 2
Notes on Class 2
 
Networking fundamentals (1)
Networking fundamentals (1)Networking fundamentals (1)
Networking fundamentals (1)
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
Networks
Networks   Networks
Networks
 
Computer network
Computer networkComputer network
Computer network
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 

Más de Mukesh Chinta

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingMukesh Chinta
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsMukesh Chinta
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Mukesh Chinta
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Mukesh Chinta
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Mukesh Chinta
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1Mukesh Chinta
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1Mukesh Chinta
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2Mukesh Chinta
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Mukesh Chinta
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Mukesh Chinta
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process ConceptsMukesh Chinta
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structuresMukesh Chinta
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 

Más de Mukesh Chinta (20)

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security Concepts
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN Concepts
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN Configuration
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP Routing
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing Concepts
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 

Último

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Último (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

Networks classification

  • 1.
  • 2. TOPOLOGY NETWORK STAR RING BUS PEER TO PEER CLIENT-SERVER PYSHICAL / WIRELESS TWISTED PAIR, COAXIAL, FIBRE OPTIC INFRARED, RADIOWAVE, SATELLITE NIC HUB ROUTER MODEM ACCESS POINT LAN MAN WAN INTRANET EXTRANET INTERNET TCP/IP NETWORK OPERATING SYSTEM CLIENT SOFTWARE ARCHITECTURE TYPES TECHNOLOGY PROTOCOL SOFTWARE MEDIUM DEVICES 192.168.1.3 Mukesh Chinta, Asst Prof, CSE 2
  • 3. Classification of Networks There is no generally accepted taxonomy into which all computer networks fit, but two dimensions stand out as important: Transmission Technology and Scale. Mukesh Chinta, Asst Prof, CSE 3
  • 4. 4 Based on Transmission Technology  Broadcast Networks: All stations share a single communication channel  Point-to-Point Networks: Pairs of hosts (or routers) are directly connected  Typically, local area networks (LANs) are broadcast and wide area networks (WANs) are point-to-point Broadcast Network Point-to-Point Network Mukesh Chinta, Asst Prof, CSE
  • 5. Links (a) (b) point-to-point multiple-access Geographical coverage and scalability are limited. Each node needs one interface for each link. Mukesh Chinta, Asst Prof, CSE 5
  • 6. Broadcast Networks  A Single communication link is shared by all the machines on that network  When a message is transmitted, it can be received & processed by every machine on that network. This is called broadcasting  The address field within the message specifies the intended recipient. Only if its for the host, it process the message or it ignores it.  Two popular topologies of broadcast LAN are Bus and Ring 6
  • 7. A variant of broadcasting called multicasting in which transmission is done to a subset of machines. Advantages  Network is easy to build- Only one cable is needed  Cost of construction is cheaper when compared to other networks Disadvantages  Not very scalable and flexible  An Arbitration mechanism is needed to resolve conflicts Broadcast Networks Mukesh Chinta, Asst Prof, CSE 7
  • 8. Point-to-Point Networks  Consists of many connections between individual pair of nodes.  Often multiple routes of different lengths are possible  Point-to-point transmission with one sender and one receiver is sometimes called unicasting  End devices that wish to communicate are called stations and the switching devices are called nodes. Mukesh Chinta, Asst Prof, CSE 8
  • 9. Advantages  Greater aggregate bandwidth- can have more than one sender  Can add capacity incrementally- add more links/switches  Better fault tolerance  Lower Latency- No arbitration needed to send Disadvantages  More expensive as it requires lots of transmission lines and switching elements to connect remote hosts Point-to-Point Networks Mukesh Chinta, Asst Prof, CSE9
  • 10. Switched Networks Circuit Switched ■ ■ ■ Packet Switched store-and-forward Mukesh Chinta, Asst Prof, CSE 10
  • 11. Sharing a Link L2 L3 R2 R3 L1 R1 Switch 1 Switch 2 multiplex demultiplex Mukesh Chinta, Asst Prof, CSE 11
  • 12. Networks Based on Scale Classification of network Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)  The main differentiation among these classifications is their area of coverage. LAN, MAN and WAN compared Mukesh Chinta, Asst Prof, CSE 12
  • 13. LOCAL AREA NETWORK {LAN} A LAN is a private network that connects computers and devices in a limited geographically area such as a home, school computer laboratory, office building. LAN’s are used to share resources and to exchange information. LAN’s are restricted in size having a bounded worst-case transmission time, which simplifies networks management Traditional LAN’s run at 10-100Mbps Common Topologies used are bus, ring and star High data rates with less errorsMukesh Chinta, Asst Prof, CSE 13
  • 14. Headphone PDA PrinterMouse Laptop Smartphone LOCAL AREA NETWORK {LAN} Types of LAN Personal Area Network (PAN) House Area Network (HAN) A Personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Common Technologies used are Bluetooth and Infrared. Range is ~10m A House area network (HAN) is a type of local area network that develops from the need to facilitate communication and interoperability among digital devices present inside or within the close vicinity of a home. 14
  • 15.  Covers a larger geographical area than is a LAN, ranging from several blocks of buildings to entire cities.  It may be a single network as a cable TV network or it may be means of connecting a number of LANs into a larger network so that resources may be shared.  MAN is wholly owned and operated by a private company or may be a service provided by a public company A metropolitan area network based on cable TV METROPOLITAN AREA NETWORK {MAN} Mukesh Chinta, Asst Prof, CSE 15
  • 16. The main reason for distinguishing MANs as a special category is that a standard has been adopted for them. It is DQDB (Distributed Queue Dual Bus) or IEEE 802.6. METROPOLITAN AREA NETWORK {MAN}  Using DQDB, networks can be up to 20 miles (30 km) long and operate at speeds of 34 to 155 Mbits/s.  It consists of two unidirectional buses (cables) to which all the computers are connected. Each bus has a head-end, which initiates transmission activity. Traffic destined for a computer to the right of the sender uses the upper bus and to the left uses the lower one. Mukesh Chinta, Asst Prof, CSE 16
  • 17.  Wide area networks are the oldest type of data communications network that provide relatively slow-speed, long-distance transmission of data, voice and video information over relatively large and widely dispersed geographical areas, such as country or entire continent.  WAN spans a large geographical area: a country or a continent  It contains a collection of machines intended for running user programs called hosts. The hosts are connected by a communication subnet, or just subnet for short.  In most WAN’s, the subnet consists of two distinct components: transmission lines and switching elements. Transmission lines move bits between machines. Switching elements (Routers) are specialized computers that connect three or more transmission lines. When data arrive on an incoming line, the switching element must choose an outgoing line on which to forward them. WIDE AREA NETWORK {WAN} Mukesh Chinta, Asst Prof, CSE 17
  • 18. WIDE AREA NETWORK {WAN} When a packet is sent from one router to another via one or more intermediate routers, the packet is received at each intermediate router in its entirety, stored there until the required output line is free, and then forwarded. A subnet organized according to this principle is called a store-and-forward or packet-switched subnet. Routing decisions are made locally according to a routing algorithm. Mukesh Chinta, Asst Prof, CSE 18
  • 19. Mukesh Chinta, Asst Prof, CSE 19
  • 20. A Quick Comparison Mukesh Chinta, Asst Prof, CSE20
  • 21. Internetwork {Internet}  It is a Global network of computers which may be server or client that exchanges information.  It can be defined as a "network of networks" which can be linked through copper wires, wireless connections, and other technologies.  This is the world-wide network of computers accessible to anyone who knows their Internet Protocol (IP) address  Such interconnection of networks requires that different, and frequently incompatible networks, be connected, sometimes by means of machines called gateways to make the connection and provide the necessary translation, both in terms of hardware and software. Mukesh Chinta, Asst Prof, CSE21
  • 22.  The term Intranet is derived from two words: ‘Intra’ which means within and ‘net’ which means group of interconnected computers.  It is a private computer network that uses Internet protocols and network connectivity to securely share any part of an organization's information or operational systems with its employees.  In short, an intranet is private network, similar to the Internet and using the same protocols and technology, contained within an enterprise or not-for-profit organization. Intranet Mukesh Chinta, Asst Prof, CSE22
  • 23. Extranet  is an intranet for outside authorized users using same internet technologies. The outside users are trusted partners of the organization who have access to information of their interest & concern.  extends the intranet concept to provide a network that connects a company’s network to the networks of its business partners, selected customers, or suppliers. Mukesh Chinta, Asst Prof, CSE 23
  • 25. Client-Server Vs Peer-to-peer  A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet. A Client is a computer that retrieves information from or uses resources provided by a server or main computer.  A peer-to-peer network is a network where the computers act as both workstations and servers. It is great for small, simple, and inexpensive networks. In a strict peer-to-peer networking setup, every computer is an equal, a peer in the network. Each machine can have resources that are shared with any other machine. Mukesh Chinta, Asst Prof, CSE25
  • 26. Mukesh Chinta, Asst Prof, CSE 26
  • 27. Network topology  A topology is a way of “laying out” the network. Topologies can be either physical or logical.  A topology describes the configuration of a network and influences the networks cost and performance. Various topologies are possible for broadcast LAN’s.  Physical topologies describe how the cables are run.  Logical topologies describe how the network messages travel Bus (can be both logical and physical) Star (physical only) Ring (can be both logical and physical) Mesh (can be both logical and physical) Mukesh Chinta, Asst Prof, CSE 27
  • 28. Bus Topology  Bus networks use a common backbone to connect all devices. A single cable, (the backbone) functions as a shared communication medium that devices attach or tap into with an interface connector.  The bus topology is the simplest and most common method of interconnecting computers. The two ends of the transmission line never touch to form a complete loop. A bus topology is also known as multidrop or linear bus or a horizontal bus.  A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Mukesh Chinta, Asst Prof, CSE 28
  • 29. Ring Topology  In a ring network (sometimes called a loop), every device has exactly two neighbors for communication purposes.  All messages travel through a ring in the same direction (either "clockwise" or "counter clockwise"). All the stations are interconnected in tandem (series) to form a closed loop or circle.  All the stations are interconnected in tandem (series) to form a closed loop or circle. Transmissions are unidirectional and must propagate through all the stations in the loop. Mukesh Chinta, Asst Prof, CSE 29
  • 30.  A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator. Data on a star network passes through the hub, switch, or concentrator before continuing to its destination.  The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. Star Topology Mukesh Chinta, Asst Prof, CSE 30
  • 31.  The mesh topology incorporates a unique network design in which each computer on the network connects to every other, creating a point-to-point connection between every device on the network.  Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination.  A disadvantage is that, a mesh network with n nodes must have n(n-1)/2 links and each node must have n-1 I/O ports (links). Mesh Topology Mukesh Chinta, Asst Prof, CSE 31
  • 32. Hybrid Topology This topology (sometimes called mixed topology) is simply combining two or more of the traditional topologies to form a larger, more complex topology. Main aim is being able to share the advantages of different topologies. Mukesh Chinta, Asst Prof, CSE 32
  • 33. Mukesh Chinta, Asst Prof, CSE 33