Professional Documents
Culture Documents
A computer network is a group of computers that are connected to each other for the purpose of communication. A computer network allows sharing of resources and information among devices connected to the network. Types of networks Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.
Organization: A variety of scheduling software is available that makes it possible to arrange meetings without constantly checking everyone's schedules. This software usually includes other helpful features, such as shared address books and to-do lists.
Protocols !
A protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard. In the Internet, there are the TCP/IP protocols, consisting of: Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level. Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level. Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet
Network Architecture !
Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation. In computing, the network architecture is a characteristics of a computer network. The most prominent architecture today is evident in the framework of the Internet, which is based on the Internet Protocol Suite. In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.
Topologies !
Topology refers to the shape of a network, or the network's layout. Network topologies are categorized into the following basic types: bus ring star tree mesh Mesh Topology Devices are connected with many redundant interconnections between network nodes. In a true mesh topology every node has a connection to every other node in the network.
Star Topology All devices are connected to a central hub. Nodes communicate across the network by passing data through the hub
Bus Topology All devices are connected to a central cable, called the bus or backbone.
Ring Topology All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it.
Tree Topology A hybrid topology. Groups of star-configured networks are connected to a linear bus backbone.
IETF protocols can be encapsulated recursively, as demonstrated by tunneling protocols such as Generic Routing Encapsulation (GRE). While basic OSI documents do not consider tunneling, there is some concept of tunneling in yet another extension to the OSI architecture, specifically the transport layer gateways within the International Standardized Profile framework.[10] The associated OSI development effort, however, has been abandoned given the overwhelming adoption of TCP/IP protocols.
oken bus was standardized by IEEE standard 802.4. It is mainly used for industrial applications. Token bus was used by GM (General Motors) for their Manufacturing Automation Protocol (MAP) standardization effort. This is an application of the concepts used in token ring networks. The main difference is that the endpoints of the bus do not meet to form a physical ring. The IEEE 802.4 Working Group is disbanded. In order to guarantee the packet delay and transmission in Token bus protocol, a modified Token bus was proposed in Manufacturing Automation Systems and flexible manufacturing system (FMS).
Aloha !
ALOHAnet, also known as ALOHA, was a pioneering computer networking system developed at the University of Hawaii. It was first deployed in 1970, and while the network itself is no longer used, one of the core concepts in the network is the basis for the widely used Ethernet. One of the early computer networking designs, the ALOHA network was created at the University of Hawaii in 1970 under the leadership of Norman Abramson and others (including N. Gaarder and N. Weldon). The idea was to use low-cost amateur radio-like systems to create a computer network linking the far-flung campuses of the University. The original version of ALOHA used two distinct frequencies in a hub/star configuration, with the hub machine broadcasting packets to everyone on the "outbound" channel, and the various client machines sending data to the hub on the "inbound" channel. Data received was immediately re-sent, allowing clients to determine whether or not their data had been received properly. Any machine noticing corrupted data would wait a short time and then re-send the packet. This mechanism was also used to detect and correct for "collisions" created when two client machines both attempted to send a packet at the same time. The ALOHA protocol is an OSI layer 2 protocol for LAN networks with broadcast topology. The difference between Aloha and Ethernet on a shared medium is that Ethernet uses CSMA/CD, which broadcasts a jamming signal to notify all computers connected to the channel that a collision occurred, forcing computers on the network to reject their current packet or frame. The use of a jamming signal enables early release of the transmission medium where transmission delays dominate propagation delays, and is appropriate for many Ethernet variants. As Aloha was a wireless system, there were additional problems, such as the hidden node problem, which meant that protocols which work well on a small scale wired LAN would not always work. Even though the extent of the Hawaiian island network is about 400 km in diameter, propagation delays were almost certainly small in comparison with transmission delays, so the protocol used had to be one which was robust enough to cope.
CSMA Protocols !
Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus, or a band of the electromagnetic spectrum. "Carrier Sense" describes the fact that a transmitter listens for a carrier wave before trying to send. That is, it tries to detect the presence of an encoded signal from another station before attempting to transmit. If a carrier is sensed, the station waits for the transmission in progress to finish before initiating its own transmission.
"Multiple Access" describes the fact that multiple stations send and receive on the medium. Transmissions by one node are generally received by all other stations using the medium.
X.25 Network !
An X.25 network provides a means by which one X.25 DTE (a Terminal or Host of some kind) can exchange data with one or more other X.25 Host, on the other side of the network. Data is carried within individual packets - X.25 is often referred to as a Packet Switching Protocol. This makes it similar to a TCP/IP network - the difference is that IP networks employ a Connectionless protocol: each packet is routed according to the information within that packet (typically by using the Destination Address). By contrast, X.25 is a Connection-Oriented protocol: the routing information used by the network is carried only in the packets used to establish the connection; thereafter addressing information is not required. This does, however, mean that the X.25 network switching nodes need be aware of each connection, unlike IP routers. Layers in the X.25 Network Layer 1: Physical Layer Layer 2: Data Link Layer Layer 3: Network Layer Each of these layers is independent. The Physical layer includes the mechanical and electrical aspect of communications - in other words, cabling. The X.25 Data Link Layer provides the reliable link between the DTE and the DCE (or Network), and the X.25 Packet Layer Protocol (PLP) provides the information necessary to make and maintain a connection across the network.