Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Computer Network
A computer network is a set of computers connected together for the purpose of sharing resources.
Computers on a network are called nodes. The most common resource shared today is connection to
the Internet. The Internet itself can be considered a computer network.
The connection between computers can be done via cabling, most commonly the Ethernet cable, or
wirelessly through radio waves. Connected computers can share resources, like access to the Internet,
printers, file servers, and others. A network is a multipurpose connection, which allows a single
computer to do more.
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by
their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices within a
single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Send a document to the printer in the office upstairs while you are sitting on the couch with
your laptop.
Upload a photo from your cell phone to your desktop computer.
Watch movies from an online streaming service to your TV.
If this sounds familiar to you, you likely have a PAN in your house without having called it by its name.
In terms of purpose, many networks can be considered general purpose, which means they are used for
everything from sending files to a printer to accessing the Internet. Some types of networks, however,
serve a very particular purpose. Some of the different networks based on their main purpose are:
A storage area network (SAN) is a secure high-speed data transfer network that provides access to
consolidated block-level storage. An SAN makes a network of storage devices accessible to multiple
servers. SAN devices appear to servers as attached drives, eliminating traditional network bottlenecks.
Introduced in the early 2000s, SANs were initially limited to enterprise class computing. Today, high-
speed disk costs have gradually dropped and SANs have become a mainstay for greater organizational
storage.
SAN implementation simplifies information life cycle management and plays a critical role in delivering a
consistent and secure data transfer infrastructure.
SAN solutions are available as two types:
Fiber Channel (FC): Storage and servers are connected via a high-speed network of
interconnected fiber channel switches. This is used for mission-critical applications where
uninterrupted data access is required.
Internet Small Computer System Interface (iSCSI) Protocol: This infrastructure gives the
flexibility of a low-cost IP network.
Storage Virtualization: Server capacity is no longer linked to single storage devices, as large and
consolidated storage pools are now available for software applications.
High-Speed Disk Technologies: An example is FC, which offers data retrieval speeds that exceed
5 Gbps. Storage-to-storage data transfer is also available via direct data transmission from the
source to the target device with minimal or no server intervention.
Centralized Backup: Servers view stored data on local disks, rather than multiple disk and server
connections. Advanced backup features, such as block level and incremental backups,
streamline IT system administrator responsibilities.
Dynamic Failover Protection: Provides continuous network operation, even if a server fails or
goes offline for maintenance, which enables built-in redundancy and automatic traffic rerouting.
SAN is offered by server manufacturers, such as IBM and HP. Server-independent SAN providers include
EMC and Network Appliance.
Enterprise Private Network
An enterprise private network is a computer network that helps enterprise companies with a number of
disparate offices connect those offices to each in a secure way over a network. An enterprise private
network is mainly set up to share computer resources.
In the U.S., private networks were started in the early 1970s by AT&T. The networks were mainly
operated over telecommunications networks. During 1990s as Internet technology evolved, a new type
of network called virtual private networks originated. This type of network was built over public
infrastructure, and the data was encrypted to protect it from eavesdroppers.
Nowadays, networks built by companies are still called enterprise private networks when privacy is
maintained through security procedures and tunneling protocols like Layer 2 Tunneling Protocol.
A virtual private network (VPN) is a private network that is built over a public infrastructure. Security
mechanisms, such as encryption, allow VPN users to securely access a network from different locations
via a public telecommunications network, most frequently the Internet.
In some cases, virtual area network (VAN) is a VPN synonym. VPN data security remains constant
through encrypted data and tunneling protocols. The key VPN advantage is that it is less expensive than
a private wide area network (WAN) buildout. As with any network, an organization's goal is to provide
cost-effective business communication.
In a remote-access VPN, an organization uses an outside enterprise service provider (ESP) to establish a
network access server (NAS). Remote users then receive VPN desktop software and connect to the NAS
via a toll-free number, which accesses the organization's network. In a site-to-site VPN, many sites use
secure data encryption to connect over a network (usually the Internet).
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Features of Bus Topology
1. It transmits data only in one direction.
2. Every device is connected to a single cable
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.
Ring Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbors for each device.
Mesh Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each
other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in an
office in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
1. Reliable as Error detecting and trouble shooting is easy.
2. Effective.
3. Scalable as size can be increased easily.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.
Network Management
Network management is a broad range of functions including activities, methods, procedures and the
use of tools to administrate, operate, and reliably maintain computer network systems.
Network Management does not include terminal equipment (PCs, workstations, printers, etc.). Rather, it
concerns the reliability, efficiency and capacity/capabilities of data transfer channels.
While there is no precise definition of the term due to it being such a broad concept, some of the main
areas are summarized below:
Network Administration: This involves tracking and inventorying the many network resources
such as monitoring transmission lines, hubs, switches, routers, and servers; it also involves
monitoring their performance and updating their associated software – especially network
management software, network operating systems, and distributed software applications used
by network users.
Network Operation: This involves smooth network functioning as designed and intended,
including close monitoring of activities to quickly and efficiently address and fix problems as
they occur and preferably even before users are aware of the problem.
Network Maintenance: This involves timely repair and necessary upgrades to all network
resources as well as preventive and corrective measures through close communication and
collaboration with network administrators. Example work includes replacing or upgrading
network equipment such as switches, routers and damaged transmission lines.
Network Provisioning: This involves configuring network resources to support the requirements
of a particular service; example services may be voice capabilities or increasing broadband
requirements to facilitate more users.
https://www.youtube.com/watch?v=0-sKUr80j9g
https://vimeo.com/61099823