Introduction of Networking
Networks are systems that are formed by links.
People use different types of networks every day:
eg
Mail delivery system
Telephone system
Public transportation system
Corporate computer network
The Internet
Computers can be linked by networks to share data and resources.
A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flow of information.
Resources shared across networks include:
Services, such as printing or scanning
Storage devices, such as hard drives or optical drives
Applications, such as databases
Different types of network media:
Copper cabling
Fiber-optic cabling
Wireless connection
Benefits of Networking
Fewer peripherals needed
Increased communication capabilities
Avoid file duplication and corruption
Lower cost licensing
Centralized administration
Conserve resources
Types of Networks
Data networks continue to evolve in complexity, use, and design. To communicate about networks, different types of networks are given different descriptive names. A computer network is identified by the following specific characteristics:
The type of media used to connect the devices
The type of networking devices used
How the resources are managed
How the network is organized
How the data is stored
The area it serves
Local Area Network (LAN)
Local Area Network (LAN) refers to a group of interconnected computers that is under the same administrative control. In the past, LANs were considered to be small networks that existed in a single physical location. Although LANs can be as small as a single local network installed in a home or small office, over time, the definition of LANs has evolved to include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.
All the local networks within a LAN are under one administrative control group that governs the security and access control policies that are in force on the network. In this context, the word “Local” in Local Area Network refers to local consistent control rather than being physically close to each other. Devices in a LAN may be physically close, but it is not a requirement
The local area network (LAN) allows you to share common resources:
Servers
Data
Applications
Printers, scanners, modems
The Centralised data management allows:
Security management
data storage planning
backup & restore
The Centralised data management allows:
Project
Delivery of pasive & active network equipment
Structural Cabling System installation
Test and certification
Passive equipment installation
Active network equipment installation, test and configuration
Support and management of passive and active equipment
Wide Area Network (WAN)
Wide Area Networks (WANs) are networks that connect LANs in geographically separated locations. A WAN covers a much larger area than a LAN. The most common example of a WAN is the Internet. The Internet is a large WAN that is comprised of millions of interconnected LANs. All of these networks are connected together using WAN connections, such as a phone company, cable company, or Internet Service Provider (ISP).
Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.
Wireless LAN (WLAN)
Traditionally, in a LAN, devices are connected together using copper cabling. In some environments, installing copper cabling may not be practical, desirable, or even possible. In these situations, wireless devices are used to transmit and receive data using radio waves. These networks are called wireless LANs, or WLANs.
In a WLAN, wireless devices connect to access points within a specified area. Access points are typically connected to the network using copper cabling.
WLAN coverage can be limited to the area of a room or can have greater range.
As with LANs, you can share resources such as files and printers, and access the Internet on a WLAN.
Peer-to-Peer Networking
In a peer-to-peer network, devices are connected directly to each other without any additional networking devices between them. Each device has equivalent capabilities and responsibilities. Individual users are responsible for their own resources and can decide which data and devices to share. There is no central point of control or administration in the network.
Peer-to-peer networks work best in environments with ten or fewer computers.
Peer-to-peer networks are relatively easy to install and operate.
In a peer-to-peer network, networked computers act as equal partners, or peers, to each other. Individual users control their own resources. They may decide to share certain files with other users and may require passwords before they allow others to access their resources. Since individual users make these decisions, that there is no central point of control or administration in the network
In addition, individual users must back up their own systems to be able to recover from data loss in case of failures
Peer-to-peer networks have several disadvantages:
There is no centralized network administration which makes it difficult to determine who controls resources on the network.
There is no centralized security. Each computer must use separate security measures for data protection.
The network becomes more complex and difficult to manage as the number of computers on the network increases.
There may be no centralized data storage. Separate data backups must be maintained. This responsibility falls on the individual users.
Peer-to-peer networks still exist inside larger networks today. Even on a large client network, users can still share resources directly with other users without using a network server. In your home, if you have more than one computer, you can set up a peer-to-peer network.
Note: We should perform a Practical
Client/Server Network
As networks grow larger, peer-to-peer relationships become increasingly difficult to coordinate. They do not scale well, since their efficiency decreases rapidly as the number of computers on the network increases. Since individual users control access to the resources on their computers, security may be difficult to maintain. Client/server networks address these limitations of the peer-to-peer arrangement.
In a client/server model, the client requests information or services from the server. The server provides the requested information or service to the client. Servers on a client/server network commonly perform some of the processing work for client machines; for example, sorting through a database before delivering only the records requested by the client.
In a client/server model, the servers are maintained by network administrators. Data backups and security measures are implemented by the network administrator. The network administrator also controls user access to the network resources. All of the data on the network is stored on a centralized file server. Shared printers on the network are managed by a centralized print server. Network users with the proper permissions can access both the data and shared printers. Each user must provide an authorized username and password to gain access to network resources that they are permitted to use.
For data protection, an administrator performs a routine backup of all the files on the servers. If a computer crashes, or data is lost, the administrator can easily recover the data from a recent backup.
Networks are systems that are formed by links.
People use different types of networks every day:
eg
Mail delivery system
Telephone system
Public transportation system
Corporate computer network
The Internet
Computers can be linked by networks to share data and resources.
A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flow of information.
Resources shared across networks include:
Services, such as printing or scanning
Storage devices, such as hard drives or optical drives
Applications, such as databases
Different types of network media:
Copper cabling
Fiber-optic cabling
Wireless connection
Benefits of Networking
Fewer peripherals needed
Increased communication capabilities
Avoid file duplication and corruption
Lower cost licensing
Centralized administration
Conserve resources
Types of Networks
Data networks continue to evolve in complexity, use, and design. To communicate about networks, different types of networks are given different descriptive names. A computer network is identified by the following specific characteristics:
The type of media used to connect the devices
The type of networking devices used
How the resources are managed
How the network is organized
How the data is stored
The area it serves
Local Area Network (LAN)
Local Area Network (LAN) refers to a group of interconnected computers that is under the same administrative control. In the past, LANs were considered to be small networks that existed in a single physical location. Although LANs can be as small as a single local network installed in a home or small office, over time, the definition of LANs has evolved to include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.
All the local networks within a LAN are under one administrative control group that governs the security and access control policies that are in force on the network. In this context, the word “Local” in Local Area Network refers to local consistent control rather than being physically close to each other. Devices in a LAN may be physically close, but it is not a requirement
The local area network (LAN) allows you to share common resources:
The Centralised data management allows:
The Centralised data management allows:
Wide Area Network (WAN)
Wide Area Networks (WANs) are networks that connect LANs in geographically separated locations. A WAN covers a much larger area than a LAN. The most common example of a WAN is the Internet. The Internet is a large WAN that is comprised of millions of interconnected LANs. All of these networks are connected together using WAN connections, such as a phone company, cable company, or Internet Service Provider (ISP).
Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.
Wireless LAN (WLAN)
Traditionally, in a LAN, devices are connected together using copper cabling. In some environments, installing copper cabling may not be practical, desirable, or even possible. In these situations, wireless devices are used to transmit and receive data using radio waves. These networks are called wireless LANs, or WLANs.
In a WLAN, wireless devices connect to access points within a specified area. Access points are typically connected to the network using copper cabling.
WLAN coverage can be limited to the area of a room or can have greater range.
As with LANs, you can share resources such as files and printers, and access the Internet on a WLAN.
Peer-to-Peer Networking
In a peer-to-peer network, devices are connected directly to each other without any additional networking devices between them. Each device has equivalent capabilities and responsibilities. Individual users are responsible for their own resources and can decide which data and devices to share. There is no central point of control or administration in the network.
Peer-to-peer networks work best in environments with ten or fewer computers.
Peer-to-peer networks are relatively easy to install and operate.
In a peer-to-peer network, networked computers act as equal partners, or peers, to each other. Individual users control their own resources. They may decide to share certain files with other users and may require passwords before they allow others to access their resources. Since individual users make these decisions, that there is no central point of control or administration in the network
In addition, individual users must back up their own systems to be able to recover from data loss in case of failures
Peer-to-peer networks have several disadvantages:
There is no centralized network administration which makes it difficult to determine who controls resources on the network.
There is no centralized security. Each computer must use separate security measures for data protection.
The network becomes more complex and difficult to manage as the number of computers on the network increases.
There may be no centralized data storage. Separate data backups must be maintained. This responsibility falls on the individual users.
Peer-to-peer networks still exist inside larger networks today. Even on a large client network, users can still share resources directly with other users without using a network server. In your home, if you have more than one computer, you can set up a peer-to-peer network.
Note: We should perform a Practical
Client/Server Network
As networks grow larger, peer-to-peer relationships become increasingly difficult to coordinate. They do not scale well, since their efficiency decreases rapidly as the number of computers on the network increases. Since individual users control access to the resources on their computers, security may be difficult to maintain. Client/server networks address these limitations of the peer-to-peer arrangement.
In a client/server model, the client requests information or services from the server. The server provides the requested information or service to the client. Servers on a client/server network commonly perform some of the processing work for client machines; for example, sorting through a database before delivering only the records requested by the client.
In a client/server model, the servers are maintained by network administrators. Data backups and security measures are implemented by the network administrator. The network administrator also controls user access to the network resources. All of the data on the network is stored on a centralized file server. Shared printers on the network are managed by a centralized print server. Network users with the proper permissions can access both the data and shared printers. Each user must provide an authorized username and password to gain access to network resources that they are permitted to use.
For data protection, an administrator performs a routine backup of all the files on the servers. If a computer crashes, or data is lost, the administrator can easily recover the data from a recent backup.
No comments:
Post a Comment