Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
12 views

Computer Network 1

Uploaded by

luethakoylueth
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Computer Network 1

Uploaded by

luethakoylueth
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

JONGLEI CHRISTIAN

VOCATIONAL BOARDING
SCHOOL-JCVBS
INTRODUCTION TO COMPUTER NETWORK
& NETWORKING

Prepared and presented


By Chol Gabriel
Objectives
Data communication
definition of network
Types of network
OSI module
Session layer
Physical layer
Network devices
Computer Network
A network A network can be defined as
two or more computers connected
together in such a way that they can
share resources.

Networking is the term that describes the


processes involved in designing,
implementing, upgrading, managing and
otherwise working with networks and
network technologies.
Computer Network
It can also be define as a set of devices
(often referred to as nodes) connected by
communication links.
A link is a communications pathway that
transfers data from one device to
another.
A node can be a computer, printer, or
any other device capable of sending
and/or receiving data generated by other
nodes on the network.
Computer Network
The purpose of a network is to share
resources.
A resource may be:
• A file
• A folder
• A printer
• A disk drive
• Or just about anything else that exists
on a computer.
Advantages of Networking
Connectivity and Communication
Data Sharing
Hardware Sharing
Internet Access
Internet Access Sharing
Data Security and Management
Performance Enhancement and
Balancing
Entertainment
Disadvantages of Networking
Network Hardware, Software and Setup
Costs
Hardware and Software Management
and Administration Costs
Undesirable Sharing
Illegal or Undesirable Behavior
Data Security Concerns
Social issues of networking
1. Phishing attack
• is a type of social engineering attack
often used to steal user data, including
login credentials and credit card
numbers.
• It occurs when an attacker, impersonate
as a trusted entity, tricks a victim into
opening an email, instant message, or
text message.
Social issues of networking
2. Botnet Attack:
• can be used to perform distributed
denial-of-service attack steal data, send
spam, and allows the attacker to access
the device and its connection.
Computer networks
Data Communication:
When we communicate, we are sharing
information. This sharing can be local or
remote. Between individuals, local
communication usually occurs face to
face, while remote communication takes
place over distance.
Components of data communication

A data communications system has five


components.
Components of data communication
1. Message. The message is the
information (data) to be communicated.
Popular forms of information include
text, numbers, pictures, audio, and
video.
2. Sender. The sender is the device that
sends the data message. It can be a
computer, workstation, telephone
handset, video camera, and so on.
Cont’d
3. Receiver. The receiver is the device that
receives the message. It can be a
computer, workstation, telephone
handset, television, and so on.
4. Transmission medium. The
transmission medium is the physical
path by which a message travels from
sender to receiver. Some examples of
transmission media include twisted-pair
wire, coaxial cable, fiber-optic cable,
and radio waves
Cont’d
5. Protocol. A protocol is a set of rules
that govern data communications.
It represents an agreement between the
communicating devices. Without a
protocol, two devices may be connected
but not communicating, just as a person
speaking French cannot be understood by
a person who speaks only Japanese.
A protocol defines what is communicated,
how it is communicated, and when it is
communicated.
Effectiveness of data communication

• The effectiveness of a data


communications system depends on four
fundamental characteristics:
delivery,
accuracy,
timeliness,
and jitter.
Data representation
Data is represented as a bit pattern, a
sequence of bits.
Different sets of bit patterns have been
designed to represent text symbols. Each
set is called a code, and the process of
representing symbols is called coding.
Information today comes in different forms
such as
-text,
-numbers,
-images,
-audio,
-and video.
Types of Network
• The types of network are classified based
upon the size, the area it covers and its
physical architecture.
Each network differs in their
characteristics such as;
distance,
transmission speed,
cables
and cost.
Types of Network
The three primary network categories are;

LAN, (local Area Network)

WAN (wide area network)

and MAN. (metropolitan area Network)


Types of Network
1. Local Area Network:
• is a computer network covering a small
geographic area, like a home, office, or
group of buildings
• Group of interconnected computers
within a small area. (room, building,
campus)
• Two or more pc's can form a LAN to
share files, folders, printers, applications
and other devices.
Types of Network
Local Area Network

Client

Client
Types of Network
Wireless Local Area Network (WLAN)
• Wi-Fi stands for Wireless Fidelity.
• Wi-Fi was intended to be used for mobile
computing devices, such as Laptops in LANs,
• A person with a Wi-Fi device such as computer,
telephone or (PDA) can connect to the internet
when in nearness of an access point.
• The region covered by one or several access
points is called a hot spot.
• Hot spots can be range from a single room to
many square miles of overlapping hot spots.
Advantages of wireless
Allows LANs to be deployed without
cabling, potentially reducing costs of
network deployment and expansion.
Spaces where cables cannot be run,
such as outdoor areas and historical
buildings, can host wireless networks.
Wi-Fi silicon pricing continues to come
down, making Wi-Fi a very economical
networking option.
Advantages of wireless
Wi-Fi products are widely available in
the market. Different brands of access
points and client network interfaces are
interoperable at the basic level of service.
Wi-Fi networks support roaming, in
which a mobile client station such as a
laptop can move from one access point to
another as the user moves around in the
building areas.
disadvantages of wireless
Power consumption is fairly high,
making battery life and heat a concern.
Wired Equivalent Privacy or WEP has
been shown to be breakable even when
correctly configured.
Wi-Fi networks have limited range.
Wi-Fi networks can be monitored and
used to read and copy data (including
personal information) transmitted over
the network when encryption is not
enabled.
Types of Network
2. MAN (Metropolitan Area Network)
Design to extend over a large area.
Connecting number of LAN's to form larger
network, so that resources can be shared.
Networks can be up to 5 to 50 km.
Owned by organization or individual.
Data transfer rate is low compare to LAN.
Example: Organization with different
branches located in the city.
Types of Network
2. MAN (Metropolitan Area Network)
Types of Network
3. WAN (Wide Area Network)
Are country and worldwide network.
Contains multiple LAN's and MAN's.
Distinguished in terms of geographical
range.
Uses satellites and microwave relays.
Data transfer rate depends upon the ISP
provider and varies over the location.
Best example is the internet.
Types of Network
Wide Area Network
Other types
• PAN (Personal Area Network)
• Network organized by the individual user
for its personal use.
OSI module
OSI LAYERS
• These seven layers are group into;
1. Upper layer
• Application
• Presentation
• Session
2. Lower layer
• Transport
• Network
• Data link
• Physical
Session layer
.
Data flow
• Communication between two devices can
be
- simplex,
- half-duplex,
- or full-duplex.
Simplex
• In simplex mode, the communication is
unidirectional, Only one of the two
devices on a link can transmit; the other
can only receive (see Figure a).
• Keyboards and traditional monitors are
examples of simplex devices. The
keyboard can only introduce input; the
monitor can only accept output.
Simplex
.
Half duplex
• In half-duplex mode, each station can
both transmit and receive, but not at the
same time. When one device is sending,
the other can only receive
Full duplex
In full-duplex both stations can transmit
and receive simultaneously.
One common example of full-duplex
communication is the telephone
network. When two people are
communicating by a telephone line, both
can talk and listen at the same time.
Network criteria
A network must be able to meet a certain
number of criteria. The most important of
these are
Performance: Performance can be
measured in many ways, including
transit time and response time.
The performance of a network depends on
a number of factors, including the number
of users, the type of transmission medium,
the capabilities of the connected hardware,
and the efficiency of the software
Cont’d
Reliability: In addition to accuracy of
delivery, network reliability is measured
by the frequency of failure, the time it
takes a link to recover from a failure
and security: Network security issues
include protecting data from
unauthorized access, protecting data
from damage and development, and
implementing policies and procedures for
recovery from breaches and data losses.
Physical layer of OSI
• This is the first layer of OSI model. This layer is
concerned with transmitting
• raw bits over a communication channel.
• All computer networks rely upon point-
to-point and multipoint connections.
Types of connection
For communication to occur, two devices
must be connected in some way to the
same link at the same time. There are
two possible types of connections:

Point to point connection


Multi-point connection
Types of connection
point-to-point: A point-to-point
connection provides a dedicated link
between two devices.
The entire capacity of the link is reserved
for transmission between those two
devices.
Types of connection
Multipoint: A multipoint (also called
multi-drop) connection is one in which
more than two specific devices share a
single link.
Physical Topology
• However, the complete physical structure
of the transmission media is called
Physical topology
• A topology defines the physical and
logical arrangement of nodes, cables,
and that make up the network.
Network Topology
One or more devices connect to a link;
two or more links form a topology.
The topology of a network is the
geometric representation of the
relationship of all the links and linking
devices (usually called nodes) to one
another
Topology
Physical topologies describe how the
cables are run.
Logical topologies describe how the
network messages travel
There are four basic topologies possible:
mesh, star, bus, and ring
Bus Topology
A bus topology is multipoint. One long
cable acts as a backbone to link all the
devices in a network
Cont’d
Nodes are connected to the bus cable by a single
cable.
A bus is the simplest physical topology.
This topology uses the least amount of cabling,
but also covers the shortest amount of distance.
Each computer shares the same data and
address path.
With a logical bus topology, messages pass
through the trunk, and each workstation checks
to see if the message is addressed to itself. If the
address of the message matches the
workstation’s address, the network adapter
copies the message to the card’s on-board
memory.
Advantages of bus topology
ease of installation
It uses less cabling
redundancy is eliminated
Disadvantages of bus topology

It can be difficult to identify the problems if


the whole network goes down.
It can be hard to troubleshoot individual
device issues.
Bus topology is not great for large
networks.
Terminators are required for both ends of
the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network
fails or splits into two.
Ring topology
In a ring topology, each device has a
dedicated point-to-point connection with
only the two devices on either side of it.
Cont’d
A signal is passed along the ring in one
direction, from device to device, until it
reaches its destination.
Each device in the ring incorporates a
repeater. When a device receives a signal
intended for another device, its repeater
regenerates the bits and passes them
along.
Advantages of ring topology
Fault isolation is simplified
All data flows in one direction, reducing
the chance of packet collisions.
A network server is not needed to control
network connectivity between each
workstation.
Data can transfer between workstations
at high speeds.
Additional workstations can be added
without impacting performance of the
network.
Disadvantages of ring topology
The ring makes it difficult to add new
computers.
Unlike a star topology network, the ring
topology network will go down if one entity
is removed from the ring.
All data being transferred over the network
must pass through each workstation on
the network, which can make it slower than
a star topology
The hardware needed to connect each
workstation to the network is more
expensive than Ethernet cards and
hubs/switches.
Star topology
• In a star topology, each device has a
dedicated point-to-point link only to a
central controller, usually called a hub.
The devices are not directly linked to one
another.
Advantages of star topology
Centralized management of the network,
through the use of the central computer,
hub, or switch.
Easy to add another computer to the
network.
If one computer on the network fails, the
rest of the network continues to function
normally.
The star topology is used in local-area
networks (LANs), High-speed LANs often
use a star topology with a central hub
Disadvantages of star topology

Can have a higher cost to implement,


especially when using a switch or router
as the central network device.
The central network device determines
the performance and number of nodes
the network can handle.
If the central computer, hub, or switch
fails, the entire network goes down and
all computers are disconnected from the
network
Mesh Topology
A mesh topology is the one where every
node is connected to every other node in
the network.
Cont’d
• The Mesh Topology is the simplest
logical topology in terms of data flow, but
it is the most complex in terms of
physical design.
• The number of connections in this
network can be calculated using the
following formula
n(n-1)/2
• N is the number of computers in the
network):
Example
• For example, if you have five computers
in a mesh network, it will use 5 × (5 – 1)
÷ 2, which equals 10 cables. This
complexity is compounded when you add
another workstation.
• For example, your five-computer, 10-
cable network will jump to 15 cables just
by adding one more computer. Imagine
how the person doing the cabling would
feel if you told them you had to cable 50
computers in a mesh network—they’d
have to come up with 50 × (50 – 1) ÷ 2 =
1225 cables!
Example

Amour used 6320 cables to connect X


number of computers using mesh topology
in her home network, if one computer
takes 79 cables. How many cables will
Amuor used to connect the remaining
computers if she reduced the number of
computers by 30? 6mks
Advantages of mesh topology
Can handle high amounts of traffic,
because multiple devices can transmit
data simultaneously.
A failure of one device does not cause a
break in the network or transmission of
data.
Adding additional devices does not
disrupt data transmission between other
devices.
Disadvantages of mesh topology

The cost to implement is higher than


other network topologies, making it a
less desirable option.
Building and maintaining the topology is
difficult and time consuming.
The chance of redundant connections is
high, which adds to the high costs and
potential for reduced efficiency.
Network Interface Card (NIC)
• NIC provides the physical interface
between computer and cabling.

• It prepares data, sends data, and


controls the flow of data. It can also
receive and translate data into bytes for
the CPU to understand.
NIC
• The following factors should be taken
into consideration when choosing a NIC:
1.- Preparing data
2.- Sending and controlling data
3.- Configuration
4.- Drivers
5.- Compatibility
6.- Performance
Network connectivity devices

• Modem
• Repeaters
• Hubs
• Multiplexers
• Bridges
• Switches
• Routers
• Brouters
• Gateways
Modem

This term is a combination of two words


Mo and dem which are modulate and
demodulate
Modem act as a mediator between the
device and the internet.
It converts the incoming analogy signal
(demodulate) into digital signal.
It also converts the digital signal
(modulate) into analog signal
Modem

.
Modem (modulator/demodulator)

• Modems are also useful when the signal


from the transceiver is hot powerful
enough to travel a required distance
without significant loss of data,
• modems can be used to amplify signals.
Repeaters
• Data decays as it travels over a certain
distance, this is why we needs a
repeater.
• Repeater regenerate data/signals thus
allowing communication over greater
distances.
Repeaters
• Repeaters can only be used to regenerate
signals between similar network
sections.
• Repeaters are nothing more than
amplifiers and, as such, are very
inexpensive. They just amplify the signal
including any noise on a wire as well.
Hubs
• Hubs are multi-port repeaters used to
link several computers together.
Hubs
• They repeat any signal that comes in on
one port and copy it to the other ports (a
process that is also called broadcasting).

• Hubs are not intelligent because they do


not filter data.
Hubs
• There are two types of hubs: active and
passive.
• Passive hubs simply connect all ports
together electrically and are usually not
powered.
• Active hubs use electronics to amplify
and clean up the signal before it is
broadcast to the other ports.
Bridges
• Bridges are devices that sit between hub-
connected host/nodes.

• They only have two ports.


Bridges
• They know which nodes/hosts are
connected on each side
• Bridges will block data from crossing if it
was not intended to cross.
Bridges
.
Switch
• A network switch is a computer
networking device that connects several
computers like hubs.
• Switches are intelligent because the
transmit data only to the intended device
• They are capable of inspecting data
packets as they are received,
determining the source and destination
device of that packet, and forwarding it
appropriately.
• It keeps a record of devices address
called Mac address for each computer
connected to it.
Switch
.
Switch
• By delivering each message only to the
connected device it was intended for, a
network switch conserves network
bandwidth and offers generally better
performance than a hub.
• A vital difference between a hub and a
switch is that all the nodes connected to
a hub share the bandwidth among
themselves, while a device connected to a
switch port has the full bandwidth all to
itself.
Switch
• For example, if 10 nodes are
communicating using a hub on a 10-
Mbps network, then each node may only
get a portion of the 10 Mbps if other
nodes on the hub want to communicate
as well. .
• But with a switch, each node could
possibly communicate at the full 10
Mbps.
Advantages of switch
• Switches can perform the following
functions.
• Address learning.
• Filtering and forwarding
• Loop Avoidance
Router
• To connect to outside network, we will
need a router.
• Router is a device that route/transmit/
forward data from one network to another
based on their IP address.
• A router receive and inspect data IP
address to determine the destination.
• A router is the gateway of the network.
• Gateway is the IP address of a router.
Router
.
Routers
• A router only will accept and copy the
data for its network but repel and
forward the data meant for another
network.
• Routers are highly intelligent devices
that connect multiple network types and
determine the best path for sending
data.
• The advantage of using a router over a
bridge is that routers can determine the
best path that data can take to get to its
destination.
• Like bridges, they can segment large
networks and can filter out noise.
Routers
Summary
• Switches are intelligent while hubs are
not.
• Switches keep device addresses while
hubs only knows the device connected to
it.
• Hubs and switches are used to
exchange data within a local area
network.
• Hubs and switches do not exchange
data outside their local area network
because they do not reads IP addresses.
Summary
• Since hubs and switches are for LAN,
routers help connect to other network.
• Routers reads IP address and use
gateway to channel data to the intended
device.
• They also use firewall to prevent
unauthorized device from accessing
other deices.
THE END

You might also like