SlideShare a Scribd company logo
1 of 33
COMPUTER NETWORK
HALIMA ZANNATI TARIN
ID- 2023-1-70-054
SECTION-01
FALL-23
COURSE OUTLINE
Computer Network Introduction, Motivation, Classification: LAN, MAN, WAN
Network Topology
Definition, Classification: BUS, TREE, STAR, RING, MESH,
HYBRID
Background of Network When there was no network
Motivation Resource Sharing
Resource
Hardware
Software
Data/Information
DEFINITION
 When a number of computers or
devices are interconnected in a single
communication system
 Growth of number & power of
computers is driving need for
interconnection
 Also seeing rapid integration of voice,
data, image & video technologies
Network Components
A network consists of the following
components:
 Computers/other devices (mobile, tab…)
 Network interface cards
 Peripheral devices
 Networking media
 Network devices
CLASSIFICATION
Depending upon the area coverage:
Local Area Network (LAN)
Metropolitan Area network (MAN)
Wide Area Network (WAN)
LAN
 smaller scope
 Building or small campus
 usually owned by same organization
as attached devices
 data rates much higher
 switched LANs, eg Ethernet
 wireless LANs
LAN
LANs make it possible for businesses that
use computer technology to locally share files and printers
efficiently, and make internal communications possible.
A good example of this technology is
“Computer Lab”.
They tie data, local communications, and
computing equipment together.
LAN
Some common LAN technologies are:
 Ethernet
 Token Ring
 FDDI
MAN
Metropolitan Area Network
A MAN is a network that spans a
metropolitan area such as a city or suburban
area.
A MAN usually consists of two or more LANs
in a common geographic area.
For example, a bank with multiple branches
may utilize a MAN.
MAN
Middle ground between LAN and WAN
private or public network
high speed
large area
Typically, a service provider is used to
connect two or more LAN sites using private
communication lines or optical services.
A MAN can also be created using wireless
bridge technology by beaming signals across
public areas.
MAN
WAN
Network of the networks (Internet)
 Span a large geographical area
 Rely in part on common carrier circuits
 Alternative technologies used include:
 circuit switching
 packet switching
 frame relay
 Asynchronous Transfer Mode (ATM)
WAN
WANs are designed to do the following:
Operate over a large geographically separated
areas
Allow users to have real-time communication
capabilities with other users
Provide full-time remote resources connected to
local services
Provide e-mail, World Wide Web, file transfer, and
e-commerce services
WAN
Some common WAN technologies are:
Modems
Integrated Services Digital Network (ISDN)
Digital Subscriber Line (DSL)
Frame Relay
US (T) and Europe (E) Carrier Series – T1, E1, T3, E3
Synchronous Optical Network (SONET)
STORAGEAREA NETWORK
 A SAN is a dedicated, high-performance network used to
move data between servers and storage resources.
 Because it is a separate, dedicated network,
 it avoids any traffic conflict between clients and servers.
 SAN technology allows high-speed server- to-storage,
storage-to-storage, or server-to- server connectivity
STORAGEAREA NETWORK
This method uses a separate network infrastructure that relieves any problems
associated with existing network connectivity.
SANs offer the following features:
 Performance – SANs enable concurrent access of disk or tape arrays by two or
more servers at high speeds, providing enhanced system performance.
 Availability – SANs have disaster tolerance built in, because data can be
mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.
 Scalability – Like a LAN/WAN, it can use a variety of technologies. This allows
easy relocation of backup data, operations, file migration, and data replication
between systems.
Virtual Private Network (VPN)
 A VPN is a private network that is constructed within
a public network infrastructure such as the global
Internet.
 Using VPN, a telecommuter can access the network
of the company headquarters through the Internet
by building a secure tunnel between the
telecommuter’s PC and a VPN router in the
headquarters.
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Benefits of VPN:
A VPN is a service that offers secure, reliable connectivity over a shared
public network infrastructure such as the Internet.
VPNs maintain the same security and management policies as a private
network.
They are the most cost-effective method of establishing a point-to-
point connection between remote users and an enterprise customer's
network.
Intranet
 One common configuration of a LAN is an Intranet.
 Intranet Web servers differ from public Web servers in that the public
must have the proper permissions and passwords to access the
Intranet of an organization.
 Intranets are designed to permit access by users who have access
privileges to the internal LAN of the organization.
 Within an Intranet, Web servers are installed in the network.
 Browser technology is used as the common front end to access
information such as financial data or graphical, text-based data stored
on those servers.
Intranet & Extranet
Network Topology
The geometric structure of the interconnections among the
participating computers and devices in the network.
Classification
BUS
Tree
Star
Mesh
Ring
Hybrid
BUS
Architecture:
Each machine is connected to a single
cable called drop cable through some kind of
connector Tap.
Each computer or server is connected to
the single common shared bus cable, called
the backbone of the bus topology network.
A terminator is required at each end of the
bus cable to prevent the signal from
bouncing back and forth on the bus cable.
BUS
 used with multipoint medium
 transmission propagates throughout medium
bi- directionally
 heard by all stations
 full duplex connection between station and
tap
 allows for transmission and reception
 need to regulate transmission
to avoid collisions and hogging
 terminator absorbs frames at end of medium
TREE
 The tree topology is a generalization of the bus
topology.
 The transmission medium is a branching cable with no
closed loops.
 The tree layout begins at a point known as the
headend or root.
 One or more cables start at the headend, and each of
these may have branches.
 The branches in turn may have additional branches to
allow quite complex layouts.
 Again, a transmission from any station propagates
throughout the medium and can be received by all
other stations.
Ring
 A closed loop of repeaters joined by point to point links,
called the backbone.
 Receive data on one link & retransmit on another
o links unidirectional
o stations attach to repeaters
 Data in frames
circulate past all stations
destination recognizes address and copies frame
frame circulates back to source where it is removed
media access control determines when a station can
insert frame
STAR
 In the star LAN topology, each station is directly connected to a common central
node.
 Typically, each station attaches to a central node via two point- to-point links,
one for transmission and one for reception.
 In general, there are two alternatives for the operation of
the central node.
 One approach is for the central node to operate in a broadcast fashion.
o A transmission of a frame from one station to the node is retransmitted on all of the
outgoing links.
o In this case, although the arrangement is physically a star, it is logically a bus: A
transmission from any station is received by all other stations, and only one station at a
time may successfully transmit.
o In this case, the central element is referred to as a hub.
STAR
 Another approach is for the
central node to act as a
frame-switching device.
 An incoming frame is
buffered in the node and
then retransmitted on an
outgoing link to the
destination station.
MESH
All the nodes are directly connected to all other nodes.
 Highly reliable with alternative paths between any
pair of hosts
 Very good for short distance communication
 The physical fully connected mesh topology is
generally too
 costly and complex for practical networks
 Not feasible for long haul communication.
 Fully connected mesh topology
 The number of connections in a full mesh = n(n - 1) / 2
Thank You

More Related Content

Similar to COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx

Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
itpresentation-160222172239.pdf
itpresentation-160222172239.pdfitpresentation-160222172239.pdf
itpresentation-160222172239.pdfIbrahimRashidBayoh
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptxKamran Waghani
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx14941
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking SrikantaSahu10
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its TopologyAyushi Gupta
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction fullaneebkmct
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
 

Similar to COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx (20)

Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
itpresentation-160222172239.pdf
itpresentation-160222172239.pdfitpresentation-160222172239.pdf
itpresentation-160222172239.pdf
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptx
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Networking
NetworkingNetworking
Networking
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Network 7c mankez
Network 7c mankezNetwork 7c mankez
Network 7c mankez
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its Topology
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
COMPUTER TAPALOGY
COMPUTER TAPALOGYCOMPUTER TAPALOGY
COMPUTER TAPALOGY
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 

Recently uploaded

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Recently uploaded (20)

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx

  • 1. COMPUTER NETWORK HALIMA ZANNATI TARIN ID- 2023-1-70-054 SECTION-01 FALL-23
  • 2. COURSE OUTLINE Computer Network Introduction, Motivation, Classification: LAN, MAN, WAN Network Topology Definition, Classification: BUS, TREE, STAR, RING, MESH, HYBRID Background of Network When there was no network Motivation Resource Sharing Resource Hardware Software Data/Information
  • 3. DEFINITION  When a number of computers or devices are interconnected in a single communication system  Growth of number & power of computers is driving need for interconnection  Also seeing rapid integration of voice, data, image & video technologies
  • 4. Network Components A network consists of the following components:  Computers/other devices (mobile, tab…)  Network interface cards  Peripheral devices  Networking media  Network devices
  • 5. CLASSIFICATION Depending upon the area coverage: Local Area Network (LAN) Metropolitan Area network (MAN) Wide Area Network (WAN)
  • 6. LAN  smaller scope  Building or small campus  usually owned by same organization as attached devices  data rates much higher  switched LANs, eg Ethernet  wireless LANs
  • 7. LAN LANs make it possible for businesses that use computer technology to locally share files and printers efficiently, and make internal communications possible. A good example of this technology is “Computer Lab”. They tie data, local communications, and computing equipment together.
  • 8. LAN Some common LAN technologies are:  Ethernet  Token Ring  FDDI
  • 9. MAN Metropolitan Area Network A MAN is a network that spans a metropolitan area such as a city or suburban area. A MAN usually consists of two or more LANs in a common geographic area. For example, a bank with multiple branches may utilize a MAN.
  • 10. MAN Middle ground between LAN and WAN private or public network high speed large area Typically, a service provider is used to connect two or more LAN sites using private communication lines or optical services. A MAN can also be created using wireless bridge technology by beaming signals across public areas.
  • 11. MAN
  • 12. WAN Network of the networks (Internet)  Span a large geographical area  Rely in part on common carrier circuits  Alternative technologies used include:  circuit switching  packet switching  frame relay  Asynchronous Transfer Mode (ATM)
  • 13. WAN WANs are designed to do the following: Operate over a large geographically separated areas Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide e-mail, World Wide Web, file transfer, and e-commerce services
  • 14. WAN Some common WAN technologies are: Modems Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Frame Relay US (T) and Europe (E) Carrier Series – T1, E1, T3, E3 Synchronous Optical Network (SONET)
  • 15.
  • 16. STORAGEAREA NETWORK  A SAN is a dedicated, high-performance network used to move data between servers and storage resources.  Because it is a separate, dedicated network,  it avoids any traffic conflict between clients and servers.  SAN technology allows high-speed server- to-storage, storage-to-storage, or server-to- server connectivity
  • 17. STORAGEAREA NETWORK This method uses a separate network infrastructure that relieves any problems associated with existing network connectivity. SANs offer the following features:  Performance – SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds, providing enhanced system performance.  Availability – SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.  Scalability – Like a LAN/WAN, it can use a variety of technologies. This allows easy relocation of backup data, operations, file migration, and data replication between systems.
  • 18. Virtual Private Network (VPN)  A VPN is a private network that is constructed within a public network infrastructure such as the global Internet.  Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters.
  • 20. Virtual Private Network (VPN) Benefits of VPN: A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. VPNs maintain the same security and management policies as a private network. They are the most cost-effective method of establishing a point-to- point connection between remote users and an enterprise customer's network.
  • 21. Intranet  One common configuration of a LAN is an Intranet.  Intranet Web servers differ from public Web servers in that the public must have the proper permissions and passwords to access the Intranet of an organization.  Intranets are designed to permit access by users who have access privileges to the internal LAN of the organization.  Within an Intranet, Web servers are installed in the network.  Browser technology is used as the common front end to access information such as financial data or graphical, text-based data stored on those servers.
  • 23. Network Topology The geometric structure of the interconnections among the participating computers and devices in the network.
  • 25. BUS Architecture: Each machine is connected to a single cable called drop cable through some kind of connector Tap. Each computer or server is connected to the single common shared bus cable, called the backbone of the bus topology network. A terminator is required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable.
  • 26. BUS  used with multipoint medium  transmission propagates throughout medium bi- directionally  heard by all stations  full duplex connection between station and tap  allows for transmission and reception  need to regulate transmission to avoid collisions and hogging  terminator absorbs frames at end of medium
  • 27. TREE  The tree topology is a generalization of the bus topology.  The transmission medium is a branching cable with no closed loops.  The tree layout begins at a point known as the headend or root.  One or more cables start at the headend, and each of these may have branches.  The branches in turn may have additional branches to allow quite complex layouts.  Again, a transmission from any station propagates throughout the medium and can be received by all other stations.
  • 28. Ring  A closed loop of repeaters joined by point to point links, called the backbone.  Receive data on one link & retransmit on another o links unidirectional o stations attach to repeaters  Data in frames circulate past all stations destination recognizes address and copies frame frame circulates back to source where it is removed media access control determines when a station can insert frame
  • 29. STAR  In the star LAN topology, each station is directly connected to a common central node.  Typically, each station attaches to a central node via two point- to-point links, one for transmission and one for reception.  In general, there are two alternatives for the operation of the central node.  One approach is for the central node to operate in a broadcast fashion. o A transmission of a frame from one station to the node is retransmitted on all of the outgoing links. o In this case, although the arrangement is physically a star, it is logically a bus: A transmission from any station is received by all other stations, and only one station at a time may successfully transmit. o In this case, the central element is referred to as a hub.
  • 30. STAR  Another approach is for the central node to act as a frame-switching device.  An incoming frame is buffered in the node and then retransmitted on an outgoing link to the destination station.
  • 31. MESH All the nodes are directly connected to all other nodes.  Highly reliable with alternative paths between any pair of hosts  Very good for short distance communication  The physical fully connected mesh topology is generally too  costly and complex for practical networks  Not feasible for long haul communication.  Fully connected mesh topology  The number of connections in a full mesh = n(n - 1) / 2
  • 32.