SlideShare a Scribd company logo
What is a Network?
Α network is simply defined as something that connects things together for a
specific purpose. The term network is used in a variety of contexts, including
telephone, television, computer, or even people networks. A computer
network connects two or more devices together to share a nearly limitless
range of information and services, including:
• Documents
• Email and messaging
• Websites
• Databases
• Music
• Printers and faxes
• Telephony and videoconferencing
Protocols are rules that govern how devices communicate and share
information across a network. Examples of protocols include:
• IP – Internet Protocol
• HTTP - Hyper Text Transfer Protocol
• SMTP – Simple Mail Transfer Protocol
Multiple protocols often work together to facilitate end-to-end network
communication, forming protocol suites or stacks.
Network reference models were developed to allow products from
different manufacturers to interoperate on a network. A network reference
model serves as a blueprint, detailing standards for how protocol
communication should occur.
The Open Systems Interconnect (OSI) and Department of Defense
(DoD) models are the most widely recognized reference models.
Basic Network Types
Network types are often defined by function or size. The two most common
categories of networks are:
• LANs (Local Area Networks)
• WANs (Wide Area Networks)
A LAN is generally a high-speed network that covers a small geographic
area, usually contained within a single building or campus. A LAN is
usually under the administrative control of a single organization. Ethernet is
the most common LAN technology.
A WAN can be defined one of two ways. The book definition of a WAN is a
network that spans large geographical locations, usually to connect multiple
LANs. This is a general definition, and not always accurate.
A more practical definition of a WAN is a network that traverses a public or
commercial carrier, using one of several WAN technologies. A WAN is often
under the administrative control of several organizations (or providers), and
does not necessarily need to span large geographical distances.
Basic Network Types (Continued)
A MAN (Metropolitan Area Network) is another category of network,
though the term is not prevalently used. A MAN is defined as a network that
connects LAN’s across a city-wide geographic area.
An internetwork is a general term describing multiple networks connected
together. The Internet is the largest and most well-known internetwork.
Some networks are categorized by their function, as opposed to their size.
A SAN (Storage Area Network) provides systems with high-speed, lossless
access to high-capacity storage devices.
A VPN (Virtual Private Network) allows for information to be securely
sent across a public or unsecure network, such as the Internet. Common uses
of a VPN are to connect branch offices or remote users to a main office.
Network Architectures
A host refers to any device that is connected to a network. A host can also
be defined as any device assigned a network address.
A host can serve one or more functions:
• A host can request data, often referred to as a client.
• A host can provide data, often referred to as a server.
• A host can both request and provide data, often referred to as a peer.
Because of these varying functions, multiple network architectures have
been developed, including:
• Peer-to-Peer
• Client/Server
• Mainframe/Terminal
In a basic peer-to-peer architecture, all hosts on the network can both
request and provide data and services. For example, two Windows XP
workstations configured to share files would be considered a peer-to-peer
network.
Network Architectures (continued)
Peer-to-peer networks are very simple to configure, yet this architecture
presents several challenges. Data is difficult to manage and back-up, as it is
spread across multiple devices. Security is equally problematic, as user
accounts and permissions much be configured individually on each host.
In a client/server architecture, hosts are assigned specific roles. Clients
request data and services stored on servers. An example of a client/server
network would be Windows XP workstations accessing files off of a
Windows 2003 server.
There are several advantages to the client/server architecture. Data and
services are now centrally located on one or more servers, consolidating the
management and security of that data. As a result, client/server networks can
scale far larger than peer-to-peer networks.
One key disadvantage of the client/server architecture is that the server can
present a single point of failure. This can be mitigated by adding
redundancy at the server layer.
Network Architectures (continued)
In a mainframe/terminal architecture, a single device (the mainframe)
stores all data and services for the network. This provides the same
advantages as a client/server architecture – centralized management and
security of data.
Additionally, the mainframe performs all processing functions for the dumb
terminals that connect to the mainframe. The dumb terminals perform no
processing whatsoever, but serve only as input and output devices into the
mainframe.
In simpler terms, the mainframe handles all thinking for the dumb terminals.
A dumb terminal typically consists of only a keyboard/mouse, a display, and
an interface card into the network.
The traditional mainframe architecture is less prevalent now than in the early
history of networking. However, the similar thin-client architecture has
gained rapid popularity.
Network Architectures (continued)
A thin-client can be implemented as either a hardware device, or software
running on top of another operating system (such as Windows or Linux).
Like dumb terminals, thin-clients require a centralized system to perform all
(or most) processing functions. User sessions are spawned and managed
completely within the server system.
Hardware thin-clients are generally inexpensive, with a small footprint and
low power consumption. For environments with a large number of client
devices, the thin-client architecture provides high scalability, with a lower
total cost of ownership.
The two most common thin-client protocols are:
• RDP (Remote Desktop Protocol) – developed by Microsoft
• ICA (Independent Computer Architecture) – developed by Citrix
THANK YOU

More Related Content

What's hot

Networks
NetworksNetworks
Networks
Edward Blurock
 
Basic of Networking
Basic of NetworkingBasic of Networking
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
Networking
NetworkingNetworking
Networking
pankajkumar3274
 
Tech Blast: Networks
Tech Blast: NetworksTech Blast: Networks
Tech Blast: Networks
Nebraska Library Commission
 
Networks
NetworksNetworks
Networks
Talha Mudassar
 
Firewall
FirewallFirewall
Firewall
Shamima Akther
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...
Kaushik Panta
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
Shamima Akther
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
Von Alvarez
 
Networkingconcepts (1)
Networkingconcepts (1)Networkingconcepts (1)
Networkingconcepts (1)
ranigodha
 
Networking
NetworkingNetworking
Networking
pankajkumar3274
 

What's hot (20)

Networks
NetworksNetworks
Networks
 
Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Networking
NetworkingNetworking
Networking
 
Tech Blast: Networks
Tech Blast: NetworksTech Blast: Networks
Tech Blast: Networks
 
Bis Chapter5
Bis Chapter5Bis Chapter5
Bis Chapter5
 
Networks
NetworksNetworks
Networks
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Firewall
FirewallFirewall
Firewall
 
1 networking
1 networking1 networking
1 networking
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Networkingconcepts (1)
Networkingconcepts (1)Networkingconcepts (1)
Networkingconcepts (1)
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
Networking
NetworkingNetworking
Networking
 
Hardware1
Hardware1Hardware1
Hardware1
 

Similar to Introduction to networks

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
Raja Waseem Akhtar
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
ammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
Rodel Morales
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
shubhangisonawane6
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
fasywan
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
DR. Ram Kumar Pathak
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
Gohil Anshu
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
Adebisi Tolulope
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
HonKencyTress
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 

Similar to Introduction to networks (20)

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Computer network
Computer networkComputer network
Computer network
 
Hardware1
Hardware1Hardware1
Hardware1
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 

More from Sagar Gor

Device software image verification
Device software image verificationDevice software image verification
Device software image verification
Sagar Gor
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
Sagar Gor
 
Firewalld
FirewalldFirewalld
Firewalld
Sagar Gor
 
logical addressing
logical addressinglogical addressing
logical addressing
Sagar Gor
 
hardware addressing
hardware addressinghardware addressing
hardware addressing
Sagar Gor
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
Sagar Gor
 

More from Sagar Gor (6)

Device software image verification
Device software image verificationDevice software image verification
Device software image verification
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
 
Firewalld
FirewalldFirewalld
Firewalld
 
logical addressing
logical addressinglogical addressing
logical addressing
 
hardware addressing
hardware addressinghardware addressing
hardware addressing
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Introduction to networks

  • 1.
  • 2. What is a Network? Α network is simply defined as something that connects things together for a specific purpose. The term network is used in a variety of contexts, including telephone, television, computer, or even people networks. A computer network connects two or more devices together to share a nearly limitless range of information and services, including: • Documents • Email and messaging • Websites • Databases • Music • Printers and faxes • Telephony and videoconferencing
  • 3. Protocols are rules that govern how devices communicate and share information across a network. Examples of protocols include: • IP – Internet Protocol • HTTP - Hyper Text Transfer Protocol • SMTP – Simple Mail Transfer Protocol Multiple protocols often work together to facilitate end-to-end network communication, forming protocol suites or stacks. Network reference models were developed to allow products from different manufacturers to interoperate on a network. A network reference model serves as a blueprint, detailing standards for how protocol communication should occur. The Open Systems Interconnect (OSI) and Department of Defense (DoD) models are the most widely recognized reference models.
  • 4. Basic Network Types Network types are often defined by function or size. The two most common categories of networks are: • LANs (Local Area Networks) • WANs (Wide Area Networks) A LAN is generally a high-speed network that covers a small geographic area, usually contained within a single building or campus. A LAN is usually under the administrative control of a single organization. Ethernet is the most common LAN technology. A WAN can be defined one of two ways. The book definition of a WAN is a network that spans large geographical locations, usually to connect multiple LANs. This is a general definition, and not always accurate. A more practical definition of a WAN is a network that traverses a public or commercial carrier, using one of several WAN technologies. A WAN is often under the administrative control of several organizations (or providers), and does not necessarily need to span large geographical distances.
  • 5. Basic Network Types (Continued) A MAN (Metropolitan Area Network) is another category of network, though the term is not prevalently used. A MAN is defined as a network that connects LAN’s across a city-wide geographic area. An internetwork is a general term describing multiple networks connected together. The Internet is the largest and most well-known internetwork. Some networks are categorized by their function, as opposed to their size. A SAN (Storage Area Network) provides systems with high-speed, lossless access to high-capacity storage devices. A VPN (Virtual Private Network) allows for information to be securely sent across a public or unsecure network, such as the Internet. Common uses of a VPN are to connect branch offices or remote users to a main office.
  • 6. Network Architectures A host refers to any device that is connected to a network. A host can also be defined as any device assigned a network address. A host can serve one or more functions: • A host can request data, often referred to as a client. • A host can provide data, often referred to as a server. • A host can both request and provide data, often referred to as a peer. Because of these varying functions, multiple network architectures have been developed, including: • Peer-to-Peer • Client/Server • Mainframe/Terminal In a basic peer-to-peer architecture, all hosts on the network can both request and provide data and services. For example, two Windows XP workstations configured to share files would be considered a peer-to-peer network.
  • 7. Network Architectures (continued) Peer-to-peer networks are very simple to configure, yet this architecture presents several challenges. Data is difficult to manage and back-up, as it is spread across multiple devices. Security is equally problematic, as user accounts and permissions much be configured individually on each host. In a client/server architecture, hosts are assigned specific roles. Clients request data and services stored on servers. An example of a client/server network would be Windows XP workstations accessing files off of a Windows 2003 server. There are several advantages to the client/server architecture. Data and services are now centrally located on one or more servers, consolidating the management and security of that data. As a result, client/server networks can scale far larger than peer-to-peer networks. One key disadvantage of the client/server architecture is that the server can present a single point of failure. This can be mitigated by adding redundancy at the server layer.
  • 8. Network Architectures (continued) In a mainframe/terminal architecture, a single device (the mainframe) stores all data and services for the network. This provides the same advantages as a client/server architecture – centralized management and security of data. Additionally, the mainframe performs all processing functions for the dumb terminals that connect to the mainframe. The dumb terminals perform no processing whatsoever, but serve only as input and output devices into the mainframe. In simpler terms, the mainframe handles all thinking for the dumb terminals. A dumb terminal typically consists of only a keyboard/mouse, a display, and an interface card into the network. The traditional mainframe architecture is less prevalent now than in the early history of networking. However, the similar thin-client architecture has gained rapid popularity.
  • 9. Network Architectures (continued) A thin-client can be implemented as either a hardware device, or software running on top of another operating system (such as Windows or Linux). Like dumb terminals, thin-clients require a centralized system to perform all (or most) processing functions. User sessions are spawned and managed completely within the server system. Hardware thin-clients are generally inexpensive, with a small footprint and low power consumption. For environments with a large number of client devices, the thin-client architecture provides high scalability, with a lower total cost of ownership. The two most common thin-client protocols are: • RDP (Remote Desktop Protocol) – developed by Microsoft • ICA (Independent Computer Architecture) – developed by Citrix