Vous êtes sur la page 1sur 17

Computer Network

A computer network is a group of two or more computers connected to each electronically. This means
that the computers can "talk" to each other and that every computer in the network can send
information to the others. Usually, this means that the speed of the connection is fast - faster than a
normal connection to the Internet. In fact, two computers connected over the Internet is not considered a
computer network.
Local Area Network (LAN)

A local area network (LAN) is a computer network covering a small physical area, like a home,
office, or small group of buildings, such as a school, or an airport. The defining characteristics of
LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer rates,
smaller geographic range, and lack of a need for leased telecommunication lines.
Metropolitan Area Network (MAN)

A cable backbone used to interconnect local area networks at various sites (corporate offices and
factories, for example) in a given region, generally a city. Optical fiber is well-suited to the transmission of
both data and voice over such a network. In terms of geographic breadth, MANs are larger than LANs,
but smaller than WANs. MANs are usually characterized by very high-speed connections using fiber
optic cable or other digital media.
Wide Area Network (WAN)

Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose
communications links cross metropolitan, regional, or national boundaries [1]). Contrast with personal
area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area
networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area
(e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet.
WANs [a] are used to connect LANs and other types of networks together, so that users and computers in
one location can communicate with users and computers in other locations. Many WANs are built for one
particular organization and are private. Others, built by Internet service providers, provide connections
from an organization's LAN to the Internet. WANs are often built using leased lines. At each end of the
leased line, a router connects to the LAN on one side and a hub within the WAN on the other. Leased lines
can be very expensive. Instead of using leased lines, WANs can also be built using less costly circuit
switching or packet switching methods. Network protocols including TCP/IP deliver transport and
addressing functions. Protocols including Packet over SONET/SDH, MPLS, ATM and Frame relay are
often used by service providers to deliver the links that are used in WANs. X.25 was an important early
WAN protocol, and is often considered to be the "grandfather" of Frame Relay as many of the
underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame Relay.
Academic research into wide area networks can be broken down into three areas: Mathematical models,
network emulation and network simulation.
Performance improvements are sometimes delivered via WAFS or WAN optimization.
Peer to Peer

A peer-to-peer (or P2P) computer network uses diverse connectivity between participants in a network and
the cumulative bandwidth of network participants rather than conventional centralized resources where a
relatively low number of servers provide the core value to a service or application. P2P networks are
typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many
purposes. Sharing content files (see file sharing) containing audio, video, data or anything in digital
format is very common, and real time data, such as telephony traffic, is also passed using P2P technology.

A pure P2P network does have the notion of clients or servers but only equal peer nodes that
simultaneously function as both "clients" and "servers" to the other nodes on the network. This model of
network arrangement differs from the client-server model where communication is usually to and from a
central server. A typical example of a file transfer that is not P2P is an FTP server where the client and
server programs are quite distinct: the clients initiate the download/uploads, and the servers react to and
satisfy these requests.
In contrast to the above discussed pure P2P network, an example of a distributed discussion system that
also adopts a client-server model is the Usenet news server system, in which news servers communicate
with one another to propagate Usenet news articles over the entire Usenet network. Particularly in the
earlier days of Usenet, UUCP was used to extend even beyond the Internet. However, the news server
system acted in a client-server form when individual users accessed a local news server to read and post
articles. The same consideration applies to SMTP email in the sense that the core email relaying network
of Mail transfer agents follows a P2P model while the periphery of e-mail clients and their direct
connections is client-server. Tim Berners-Lee's vision for the World Wide Web, as evidenced by his
WorldWideWeb editor/browser, was close to a P2P network in that it assumed each user of the web would
be an active editor and contributor creating and linking content to form an interlinked "web" of links.
This contrasts to the more broadcasting-like structure of the web as it has developed over the years.
Client to Server
A class of Software Architecture where processing is distributed among one or more information
requesters (clients) and one or more information providers (servers), as well as in the interfaces (network,
protocols, middle ware) between them. Client/Server Architectures include both two-tier, where clients
talk directly to servers, and three-tier, where a third software component provides interface services
between the clients and the servers. Three-tier architectures are further categorized by the type of middle
ware employed. Multi-tier is used to describe architectures with multiple layers or types of middle ware.
Client/Server architectures are in contrast to a mainframe architecture where the processing is self-
contained.
Ring Topology
The ring topology connects the nodes of the network in a circular chain in
which each node is connected to the next. The final node in the chain con-nects to the first to complete the
ring, as shown in Figure 7.15. With this methodology, each node examines data that is sent through the
ring. If the data is not addressed to the node examining it, that node passes it along to the next node in the
ring. The ring topology has a substantial advantage over the bus topology. There's no danger of collisions
because data always flows in one direction. One drawback to the ring, however, is that if a connection is
broken, the entire network goes down.

Advantage of Ring Topology


The data being transmitted between two nodes passes through all the intermediate nodes. A central
server is not required for the management of this topology.

Disadvantages of Ring Topology


The failure of a single node of the network can cause the entire network to fail.
The movement or changes made to network nodes affects the performance of the entire network.
Star Topology

A star network places a hub in the center of the network nodes. Groups of data are routed through the
central hub to their destinations. This scheme has an advantage in that the hub monitors traffic and
prevents collisions, and a broken connection does not affect the rest of the network. If you lose the hub,
however, the entire network goes down. Figure 7.14 shows the star topology.

Advantages of Star Topology


Due to its centralized nature, the topology offers simplicity of operation.
It also achieves an isolation of each device in the network.

Disadvantage of Star Topology


The network operation depends on the functioning of the central hub. Hence, the failure of the central
hub leads to the failure of the entire network.
Bus Topology

A bus network, like the bus of a computer itself, is a single conduit to which I the network nodes and
peripheral devices are attached (see Figure 7.13). Nodes on one type of bus network, Ethernet, transmit
data at any time, of any data being sent by other nodes. If one set of data happens to collide with another
set of data transmitted by other nodes--that is, if two nodes try to send data at the same time--each node
waits a small, random amount of time and then attempts to retransmit the data.

Although the bus topol-ogy is one of the most common, it has inherent disadvantages. Keeping data
transmissions from colliding requires extra circuitry and software, and a broken connec-tion can bring
down (or "crash") all or part of the network, rendering it inoper-able so that users cannot share data and
peripherals until the con-nection is repaired.

Advantages of Bus Topology


It is easy to handle and implement.
It is best suited for small networks.

Disadvantages of Bus Topology


The cable length is limited. This limits the number of stations that can be connected.
This network topology can perform well only for a limited number of nodes.
Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-
configured workstations connected to a linear bus backbone cable (See fig. 4). Tree topologies allow for
the expansion of an existing network, and enable schools to configure a network to meet their needs.
Advantages of a Tree Topology
• Point-to-point wiring for individual segments.
• Supported by several hardware and software venders.

Disadvantages of a Tree Topology


• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
Mesh topology
A type of network setup where each of the computers and network devices are interconnected with one
another, allowing for most transmissions to be distributed, even if one of the connections go down. This
type of topology is not commonly used for most computer networks as it is difficult and expensive to have
redundant connection to every computer. However, this type of topology is commonly used for wireless
networks. Below is a visual example of a simple computer setup on a network using a mesh topology.

Advantage of Mesh Topology


The arrangement of the network nodes is such that it is possible to transmit data from one node to many
other nodes at the same time.

Disadvantage of Mesh Topology


The arrangement wherein every network node is connected to every other node of the network, many of
the connections serve no major purpose. This leads to the redundancy of many of the network
connections.
UTP CATEGORY 5

Category 5 cable is constructed using eight 24 AWG insulated conductors (four pairs), enclosed by a
thermoplastic jacket. Each of the four conductor pairs is twisted together at a slightly balanced high-
speed communications circuit and to reject electrical interference or "noise" from sources such as power
wiring, fluorescent and HID ballasts, motors, and so on.

Coaxial cable RG 58
1) Structure: Internal Conductor: Stranded tinned copper 42/0.12 (TC) I

Nsulation: Solid PE 2.95mm

Out conductor (shield):


1. Aluminum mylar
2. Braiding tinned copper wire-96 (TC)
Jacket: Flame retardant gray PVC Nom O. D. 5.00mmIt is used

2) Application: For video fields, communication system and signal control system. It isused for electronic
circuit put-up, decoration signal transmittance, video andaudio apparatus connection, TV signal
transmittance for video monitoring circuits, video conferencing. It is widely used in the wiring system
with higher requirements for transmittance rate in video field, as well as for thin-cable
Ethernet(10BASE-2, home, classroom, lab and other small sites whose network contain only a small
number of PCS) and maximum distance between net sections ins 185 meters
Registered Jack – 45 OR (RJ 45)
Short for Registered Jack-45, an eight-wire connector used commonly to connect computers onto a local-
area networks (LAN), especially Ethernets. RJ-45 connectors look similar to the ubiquitous RJ-11
connectors used for connecting telephone equipment, but they are somewhat wider.

Bayonet Neill-Concelman (BNC)


the Bayonet Neill-Concelman connector, the BNC connector is one of several radio frequency connectors
on the market today. The name of the connector is derived from a combination of two things: 1) the
connecting technology employed; and 2) the names of the two inventors of the device. Paul Neill of Bell
Labs and Carl Concelman sought to develop a connector that would employ a bayonet mount mechanism
for locking. Building on the research of Octavio M. Salati, the two men perfected an earlier design and
created this small connector that has been used for a number of applications over the last several decades.
BNC "T" Connector
75 ohm BNC "T" Connector; Male-Female-Male. This is the 2nd least commonly used model of "T"
Connectors. It has two male ends (gold tip pins and locking collars) and one female end (gold receiver).

Router
A router (pronounced /'rautər/ in the USA and Canada, pronounced /'ru:tə/ in the UK and Ireland, or either
pronunciation in Australia) is a networking device whose software and hardware are usually tailored to
the tasks of routing and forwarding information. For example, on the Internet, information is directed to
various paths by routers.
Routers connect two or more logical subnets, which do not necessarily map one-to-one to the physical
interfaces of the router.[1] The term "layer 3 switch" often is used interchangeably with router, but switch
is a general term without a rigorous technical definition. In marketing usage, it is generally optimized for
Ethernet LAN interfaces and may not have other physical interface types. In comparison, a network hub
does not do any routing, instead every packet it receives on one network line gets forwarded to all the
other network lines.
Ethernet hub
A network hub or repeater hub is a device for connecting multiple twisted pair or fiber optic Ethernet
devices together and thus making them act as a single network segment. Hubs work at the physical layer
(layer 1) of the OSI model. The device is thus a form of multiport repeater. Repeater hubs also participate
in collision detection, forwarding a jam signal to all ports if it detects a collision.
Hubs also often come with a BNC and/or AUI connector to allow connection to legacy 10BASE2 or
10BASE5 network segments. The availability of low-priced network switches has largely rendered hubs
obsolete but they are still seen in older installations and more specialized applications.

LAN CARD
A Local Area Network (LAN) card is used to provide wireless Internet access to computer users in home or
roaming networks. It works by exchanging signals with a router, which transmits the signals over a
physically wired line. The LAN card became ubiquitous in Western society in the early part of the twenty
first century, when the cards became affordable due to wireless networks springing up everywhere, from
coffee shops to airports.
Netgear WG302 ProSafe Wireless Access Point
The Netgear WG302 ProSafe Wireless Access Point sets the standard for next-generation high
performance, secure, manageable, reliable wireless local area networks (WLANs). This powerful device
provides the ultimate in continuous industry-standard 54 Mbps access to corporate network resources, e-
mail, and the Internet for a wireless workforce. Fully compatible with IEEE 802.11g (2.4 GHz), the
Netgear WG302 ProSafe Wireless Access Point also can be set for dynamic 108 Mbps 802.11g.** In
addition, the Netgear WG302 ProSafe Wireless Access Point is backward compatible to preserve your
802.11b-based investments, providing a migration path to higher performance networking. Wireless
Distribution System (WDS) supplies wireless point-to-point bridging, point-to-multipoint bridging, and
repeater functionality for deployment over large areas. Advanced security features include up to 152-bit
Wireless Encryption Protocol (WEP) data encryption, Wi-Fi Protected Access (WPA)***, 802.1x and
Virtual Private Network (VPN) pass-through support, and Medium Access Control (MAC) address
filtering. NETGEAR ProSafe Wireless Access Point is rated for plenum air spaces.
DSL MODEM
ADSL modem or DSL modem is a device used to connect a single computer or router to a DSL phone line,
in order to use an ADSL service. Like other modems it is a type of transceiver. It is also called a DSL
Transceiver or ATU-R. The acronym NTBBA (network termination broad band adapter, network
termination broad band access) is also common in some countries.
Some ADSL modems also manage the connection and sharing of the ADSL service with a group of machines:
in this case, the unit is termed a DSL router or residential gateway. DSL routers have a functional block which
performs framing, while other functional blocks perform Asynchronous Transfer Mode Segmentation and
Reassembly, IEEE 802.1D bridging and/or IP routing. Typical user interfaces are Ethernet and USB. Although
an ADSL modem working as a bridge does not need an IP address, it may have one assigned for management
purposes.

Vous aimerez peut-être aussi