Download as pdf or txt
Download as pdf or txt
You are on page 1of 66

Chapter 3

Computer Networking and


the Internet
Computer Networks

• A computer network is a collection of


computers, printers, and other devices that are
linked together to interact with one another. A
computer network is seen in Figure 3.1.
• Computer networks may be divided into four
categories: range, functional connection,
network structure, and specialized function.
Figure 3.1: An example of a computer network
CLASSIFICATION OF NETWORK BY THEIR
GEOGRAPHY (according to range )

NETWORK

PAN LAN MAN WAN


PERSONAL AREA NETWORK(PAN)

A personal area network is a computer network


organized around an individual person.
It generally consists of a mobile computer, a cell
phone or personal digital assistant. PAN enables
the communication among these devices.
It can also be used for communication among
personal devices themselves for connecting to a
digital level network and internet.
The PANs can be constructed using wireless or
cables.
PERSONAL AREA NETWORK(PAN)
LOCAL AREA NETWORK(LAN)
 LAN is a network which is designed to operate over a
small physical area such as an office, factory or a group
of buildings.
 LAN’s are easy to design and troubleshoot
 Exchange of information and sharing of resources
becomes easy because of LAN.
 In LAN all machines are connected to a single cable.
 Different types of topologies such as star, tree, bus,
ring, etc Can be used
 It is usually a privately owned network.
LOCAL AREA NETWORK(LAN)
DIFFERENT WAYS FOR
CONNECTING DEVICES IN THE
SAME LAN
BUS TOPOLOGY

All computers and devices


connected to central cable or bus.

Consists of a main run of cable


with a terminator at each end.

Popular on LANs because they


are inexpensive and easy to
install.
RING TOPOLOGY

 Cable forms closed ring or loop, with all


computers and devices arranged along
ring.
 Data travels from device to device
around entire ring, in one direction.
 Primarily is used for LANs, but also is
used in WANs.
RING TOPOLOGY
STAR TOPOLOGY

All devices connect to a


central device, called
hub.

All data transferred


from one computer to
another passes through
hub.
MESH TOPOLOGY
 In the mesh topology each computer are connected with each
other by separate cable. Create point to point connection to
every device on network. If one cable fail data always has
alternative path to get to its destination.
 On a large scale, you can connect multiple LANs using mesh
topology.
Hybrid Topology
 Example: Main star topology with each branch connecting
several stations in a bus topology
 To share the advantages from various topologies
What are the Advantages
and Disadvantages Of The
Three Of Network
Topology?
BUS TOPOLOGY

DEFINITION ADVANTAGE DISADVANTAGE

•All computers •Easy to connect a •Entire network shuts


and devices computer or peripheral down if there is a
connected to to a linear bus. break in the main
central cable cable.
•Requires less cable
length than •Difficult to identify
a star topology. the problem if the
entire network shuts
down.
• Bandwidth
‘bottle neck’.
RING TOPOLOGY

ADVANTAGE
DEFINITION DISADVANTAGE
•Data is quickly
•Cable forms •Data packets must pass
transferred without a
closed ring or
‘bottle neck’. through every computer
loop, with all between the sender and
computers and •The transmission of
recipient therefore, this
devices arranged data is relatively
makes it slower.
along ring. simple as packets
travel in one direction •If any of the nodes fail
only. then the ring is broken
and data cannot be
transmitted successfully.
•It is difficult to
troubleshoot
the ring.
STAR TOPOLOGY

DEFINITION ADVANTAGE DISADVANTAGE


•Requires more cable
•All devices •Easy to install and length than a linear
connect to a wire. topology.
central device, •Security can be If the hub or
called hub. implemented concentrator fails,
in the hub/switch. nodes attached are
•Easy to detect faults disabled.
and to remove parts More expensive than
linear bus topologies
because of the cost of
the concentrators.
MESH TOPOLOGY

DEFINITION ADVANTAGE DISADVANTAGE


Require more cable
•In the mesh •Provide redundant then other topology .
topology each path between device..
computer are
The network can be
connected with
expanded without Complicated
each other by
disruption to current implementations.
separate cable..
user..
•Data is quickly
transferred without a
‘bottle neck’.
METROPOLITAN AREA NETWORK(MAN)

It is in between LAN & WAN technology that


covers the entire city.
It uses similar technology as LAN.
It can be a single network such as cable TV
network, or a measure of connecting a
number of LAN’s o a large network so that
resources can be shared LAN to LAN as well as
device to device.
METROPOLITAN AREA NETWORK(MAN)
WIDE AREA NETWORK(WAN)
WAN is a network that spans a very large
geographical area.
 The distinguished example for a WAN is the
Internet, which covers almost all the globe
now.
 The Internet as a WAN network consists of a
large number of networks.
 In fact, the Internet is a network of networks.
WIDE AREA NETWORK(WAN)
PAN LAN

MAN WAN
NETWORK CLASSIFICATION ACCORDING TO
FUNCTIONAL RELATIONSHIP

NETWORK

PEER TO PEER NETWORK CLIENT SERVER NETWORK


PEER To PEER NETWORK
• Peer-to-peer networks are more commonly
implemented where less than ten computers are
involved and where strict security is not necessary.
• All computers have the same status, hence the term
'peer', and they communicate with each other.
• Files, such as word-processing or spreadsheet
documents, can be shared across the network and all the
computers on the network can share devices, such as
printers or scanners, which are connected to any one
computer.
PEER To PEER NETWORK

Figure 3.6: Peer-to-peer functional relationship


between computers
ADVANTAGES & DISADVANTAGES OF
PEER TO PEER NETWORK
Advantages: Disadvantages:
 Use less expensive computer  Not very secure
hardware  No central point of
 Easy to administer storage or file archiving
 Easy setup & low cost  Hard to maintain version
control
CLIENT/SERVER NETWORK
• Client/server networks are more suitable for
larger networks.
• A central computer, or 'server', acts as the
storage location for files and applications shared
on the network.
• Usually the server is a higher than average
performance computer.
• The server also controls the network access of
the other computers referred to as the 'client'
computers.
CLIENT/SERVER NETWORK
ADVANTAGES AND DISADVANTAGES
OF CLIENT-SERVER NETWORK
Advantages:
 Very secure Disadvantages:
 Better performance  requires professional
administration
 Centralized backup
 More hardware-
 very reliable intensive
 More software
intensive
 Expensive software
Comparison between pear-to-pear and client-server networking
Peer-to-Peer Networks Client/Server Networks
Easy to set up More difficult to set up
Less expensive to install More expensive to install
A variety of operating systems can be
Can be implemented on a wide supported on the client computers, but the
range of operating systems server needs to run an operating system that
supports networking
More time consuming to maintain
Less time consuming to maintain the
the software being used (as
software being used (as most of the
computers must be managed
maintenance is managed from the server)
individually)

Very low levels of security High levels of security are supported, all of
supported or none at all. which are controlled from the server.

Ideal for networks with less than 10 No limit to the number of computers that can
computers be supported by the network
Requires a server running a server operating
Does not require a server
system
ADVANTAGES OF COMPUTER
NETWORKS
• Speed: Networks provide a very rapid method for sharing and transferring files.
Without a network, files are shared by copying them to floppy disks, then carrying
or sending the disks from one computer to another.
• Cost: The network version of most software programs are available at considerable
savings when compared to buying individually licensed copies.
• Centralized Software Management: One of the greatest benefits of installing a
network at a school is the fact that all of the software can be loaded on one
computer (the file server). This eliminates that need to spend time and energy
installing updates and tracking files on independent computers throughout the
building.
• Resource Sharing: Sharing resources is another area in which a network exceeds
stand-alone computers.
• Flexible Access: School networks allow students to access their files from
computers throughout the school. Students can begin an assignment in their
classroom, save part of it on a public access area of the network, go to the media
center after school to finish their work.
• Security: Files and programs on a network can be designated as "copy inhibit," so
that you do not have to worry about illegal copying of programs.
DISDAVATAGES OF NETWORKS
High cost of installation
Requires time for administration
Failure of server
Cable faults
NETWORKING SERVICES FOR
STUDENTS.
Learning labs
Flexibility of access
File sharing
The Internet
Internetwork
Internetwork (internet) : two or more networks
are connected by internetworking devices
The Internet: a specific worldwide network
INTERNET BROWSING THE WORLD
WIDE WEB (WWW)
Information providers and consumer: A
company needs its products and service to be
known for the public. A university needs that
learning programs, ways of admission, and
perquisites for admission to be known for the
interested students. Societies and organizations
need their information to be publically available.
These are possible information providers. A
student needs to examine designing has to think
about every one of the accessible designing
resources, how they contrast, what are the
essentials.
INTERNET BROWSING THE WORLD
WIDE WEB (WWW)
• WWW as a mean for communicating
information.
• WWW has several advantages:
We can get the most current data from the
WWW
We can get the data any time anyplace
The data is introduced utilizing text, designs,
recordings, movements, and so forth
The data is consistently there with the goal that
you can return to what you seen previously
INTERNET BROWSING THE WORLD
WIDE WEB (WWW)
• Protocols used in running the WWW
applications are .
 HTTP (Hypertext Transfer Protocol)
TCP/IP (Transmission Control Protocol/ Internet
Protocol)
FTP (File Transfer Protocol)
UDP (User Datagram Protocol)
 ICMP (Internet Control Message Protocol)
World Wide Web (WWW)
Protocols
Hyper Text Transfer Protocol (HTTP)
HTTP is the set of rules for transferring Web
pages from a server to a user's browser.
 HTTP stands for Hypertext Transfer Protocol. This
is the language your web browser uses to request
pages & graphics from the web server.
You can see that your web browser is using the
HTTP protocol when it is shown at the start of a
web address such as http://www.yahoo.com

12/15/2021 42
World Wide Web (WWW)
Protocols
FTP (File Transfer Protocol)
 File Transfer Protocol, is an Internet utility software used to
upload and download files.
 It gives access to directories or folders on remote computers and
allows software, data and text files to be transferred between
different kinds of computers.
 FTP is just a way of transferring data from one place to another
over the Internet. If is often used for downloading large files
from a web site.
 You do not really need to know anything about how it works, in
most cases you will click on a link within a web page, and your
web browser (such as Microsoft Internet Explorer) will take care
of the FTP transfer for you, all you have to decide is where to
store the file which you wish to download.
43
World Wide Web (WWW)
Protocols
FTP (File Transfer Protocol)

 to give flexibility and promote sharing of computer


programs, files and data
 to transfer data reliably and more efficiently over
network

Liang -Lincoln University


12/15/2021 44
World Wide Web (WWW)
Protocols
 TCP/IP (Transmission Control Protocol/ Internet Protocol)
 UDP (User Datagram Protocol)
• How computers transfer data from one device to another.
• it has several steps to ensure that data is correctly transmitted
between the two computers.
• Here’s one way it does that. If the system were to send the
whole message in one piece, and if it were to encounter a
problem, the whole message would have to be re-sent.
Instead, TCP/IP breaks each message into packets, and those
packets are then reassembled on the other end. In fact, each
packet could take a different route to the other computer, if
the first route is unavailable or congested.

Liang -Lincoln University


12/15/2021 45
INTERNET BROWSING THE WORLD
WIDE WEB (WWW)
• Getting information from the WWW.
 The internet browser program asks a Web
server for data addressed in HTML.
The information is moved from the server to the
browser according to specific set of standard rules
and format so that any browser can get
information from any server using the same set of
rules and formats. These rules and formats are
called a protocol.
In case of web page transfer, the protocol is
called Hyper Text Transfer Protocol (HTTP).
Hyper Text Markup Language (HTML).

 HTML is the language used by information providers to


represent their information.
 HTML is a markup language for describing web documents
(web pages).
 A markup language is a set of markup tags
 HTML documents are described by HTML tags <start>
</end>
 Each HTML tag describes different document content
<BODY BGCOLOR=red>
</BODY>

12/15/2021 47
Hyper Text Markup Language (HTML).
Hyperlink
 A hyperlink is a piece of text (or a graphic) on
a Web page, which when clicked on will
automatically:
 Take you to a different part of the same page
 Take you to a different page within the Web site

12/15/2021 48
URL (Uniform Resource Locator)

 The URL (Uniform Resource Locator) is just


another name for a web address.
The URL consists of the name of the protocol
(usually HTTP or FTP) followed by the address of
the computer you want to connect to, e.g. a URL
of “ftp://ftp.cdrom.com” would instruct your
web browser to use the FTP protocol to connect
to the computer called ftp.cdrom.com.
 No spaces and Case sensitive
Liang -Lincoln University
12/15/2021 49
URL (Uniform Resource Locator)
 Hostname
A name made up of words separated by dots that
uniquely identifies a computer on the Internet
 Domain name
The part of a hostname that specifies a specific
organization or group
 Top-level domain (TLD)
The last section of a domain name that specifies the
type of organization or its country of origin
 IP address
An address made up of four one-byte numeric values
separated by dots that uniquely identifies a computer
on the Internet

Liang -Lincoln University


12/15/2021 50
URL (Uniform Resource Locator)
Two things are given by the URL
1. Exact location of the document
2. The method or protocol by which to retrieve and display the document
Hostname
protocol pathname

http://www.chicagosymphony.org/civicconcerts/index.htm

Top-level
Domain name domain (TLD) filename

http => Hypertext Transfer Protocol


URL (Uniform Resource Locator)

Top-level domains, including some relatively new ones


Liang -Lincoln University
12/15/2021 52
INTERNET BROWSING THE WORLD
WIDE WEB (WWW)
• The web browser allows you to view web
pages.
• Some examples of internet browsers:
Internet Explorer from Microsoft
Chrome from Google
FireFox from Mozilla project
INTERNET BROWSING THE WORLD
WIDE WEB (WWW)
• Search engine are themselves web sites
that exists not for providing information
but to provide users with URL given the
keywords information needed for.
• Some Examples for web search engines:
Google
Bing Search
Yahoo! Search:
AltaVista
Cuil
Remote Login & File Transfer
Telnet:Telnet is the protocol used to establish a login
session on a remote computer on the network.
While many computers on the Internet require users
to have authorization, others are open to the public
and can be logged onto with telnet.
Telnet is not a method to transfer files from one
machine to another, but rather is a way to remotely-
connect to another system with privileges to run
specific programs on that system.

Liang -Lincoln University


12/15/2021 55
Remote Login & File Transfer
FTP: FTP is a file distribution service on the Internet.
Files are located on servers. Users access the server
for downloading files. On many servers, called
anonymous FTP servers, anyone can do FTP. All that
is required to login is a username (anonymous) and a
password (your e-mail address). To get an idea of the
many resources available via FTP, you can look at this
selected list of FTP servers.

Liang -Lincoln University


12/15/2021 56
Remote Login & File Transfer
Resources available to you via FTP include:
Freeware: When you download freeware, the
author continues to carry the copyright to the
software, but permits you to use the program free.
You can share freeware with others, as long as you
do not sell it.
Public Domain: When you download public
domain software, you can use it freely. The creator
carries no copyright, and has released it for anyone
to use. There are no limits on distribution or sale
and anyone can modify the program.
Liang -Lincoln University
12/15/2021 57
Remote Login & File Transfer
Resources available to you via FTP include:
Shareware: When you download shareware, the
author continues to carry the copyright to the
software, but you are permitted short-term use of
the program for evaluation purposes at the end of
evaluation period, you must either pay the
copyright holder for the program or destroy all
copies you've made of it.

Liang -Lincoln University


12/15/2021 58
E-Mail (Electronic Mail)
 E-mail or Electronic mail is a paperless method of sending
messages, notes or letters from one person to another or even
many people at the same time via Internet.
 E-mail is very fast compared to the normal post. E-mail messages
usually take only few seconds to arrive at their destination.

Liang -Lincoln University


12/15/2021 59
E-Mail (Electronic Mail)
 what are the mail client, mail server and mailbox.
 The mail client is an application that can contact to a mail
server to push messages to the mail server and pop messages
from the mail server.
 Examples for electronic mail client web sites are gmail.com
and outlook.com.

Liang -Lincoln University


12/15/2021 60
E-Mail (Electronic Mail)
 what are the mail client, mail server and mailbox.
 Mail servers: a mail server is a computer, or a group of
computers in a datacenter, that store, manage electronic mail
boxes, and can communicate electronic mail message with
other mail servers.
 For example, a university such as Tanta university can has
its own mail server. Each mail server must have an
address. Other mail server and services reaches to a mail
server to send it an email or for getting a mail from a
mailbox using that address. Let the Tanta university mail
server is assigned the url “tu.edu.eg”.

12/15/2021 61
E-Mail (Electronic Mail)
 what are the mail client, mail server and mailbox.
 Mailboxes: Electronic Mailboxes are created and hosted on a
mail server. Each mailbox is assigned an address that draw its
name from the mail server name and an indicating name for
the user using that mailbox.
 For example, an instructor named Hamed Hemeda at tanta
university may assigned the electronic mailbox with the
addres: Hamed.Hemeda@tu.edu.eg. This is called an
electronic mail address and is always on the form:
MailBoxName@MailServerName without any spaces. Each
mail address is assigned a user name, usually the text before
the @ symbol, and a password for the security of the
mailbox. Any user need to access the mailbox must provide
the server with the correct user name and password.
12/15/2021 62
E-Mail (Electronic Mail)
 Official and personal electronic mails:
 Some companies allows creating mailboxes on their mail
servers free of charge. Examples for such companies are
Google (---------@gmail.com) and Microsoft(-----------
@hotmail.com). Anyone can create a mailbox at google or at
Microsoft. Usually such mailboxes is used for personal
communications.
 Companies and universities often have their own mail server
that obey their own polices. A student at a university is
assigned a mailbox of the university mailserver. These
mailboxes (at the university and at the company) are examples
of the official mailboxes. They can be used officially. This means
that an employee can receive a task to do by the official email
and a student must treat messages arriving to him through the
official mail seriously.
12/15/2021 63
Internet newsgroups
 Once you have an e-mail, you may want to communicate with
others on the Internet who share your interests.
 Newsgroups are one way to do this; the other is through an
electronic discussion group.
 An electronic discussion group is a group of persons who have
common interest to discuss a particular topic via e-mail.
 There are several methods that network-users can use to
participate in electronic discussions; however, the basic
purpose is to bring together persons with similar interests to
share information, ideas, problems, solutions, and opinions.
Since an electronic discussion is conducted by e-mail, it is
commonly called a mailing list.

Liang -Lincoln University


12/15/2021 64
Internet newsgroups
 You can roughly separate the thousands of mailing lists
available on the Internet into the following groups:
 Moderated vs. Unmoderated Mailing Lists: Mailing lists
can be moderated or unmoderated.
 The distinction is whether messages are automatically
forwarded to all subscribers (unmoderated) or whether a
moderator (a human being) first screens and perhaps
combines similar messages before sending them to
subscribers (moderated) .

Liang -Lincoln University


12/15/2021 65
Internet newsgroups
 You can roughly separate the thousands of mailing lists
available on the Internet into the following groups:
 Open vs. Closed Lists: Electronic discussions can also be
"open" or "closed." Anyone can subscribe to an open
discussion, but a closed discussion is limited to a particular
group of persons, for example, those in a particular
professional field.

Liang -Lincoln University


12/15/2021 66

You might also like