SlideShare a Scribd company logo
1 of 64
Basics of Computer Network
S.P. Siddique Ibrahim
AP/CSE
Kumaraguru College ofTechnology
1Computer Network by Siddique06/28/16
Data Communication
â€ĸ Communicate-sharing the information(local or
Remote)
â€ĸ Local-usually occurs face to face
â€ĸ Remote-take place over distance.
â€ĸ Telecommunication-includes telephone,
telegraphy and television means
communication at a distance.
â€ĸ The data-refers to information presented in
whatever form is agreed upon by the parties
creating and using the data.
2Computer Network by Siddique06/28/16
Data Communication
â€ĸ Are exchange of data between two devices via
some transmission medium such as a wired
cable (or) Wireless.
â€ĸ To exchange of digital information from two
digital devices is called data communication.
3Computer Network by Siddique06/28/16
Character tics
â€ĸ Delivery- the system must deliver to correct
destination.
â€ĸ Accuracy- Data that have been altered in
transmission and left uncorrected are
unusable.
â€ĸ Timeliness(Real time transmission)-Late are
useless.
â€ĸ Jitter-Uneven receive of packet
4Computer Network by Siddique06/28/16
Communication model(Components)or
Requirement of Data communication
â€ĸ Two devices
â€ĸ Message-The message is the information to
be communicated. Popular forms
text,pic,images,video, audio,number.
â€ĸ Protocol(A-Set of rules that govern data
communication)
â€ĸ Sender and Receiver(computer,
workstation,mobile)
â€ĸ Transmission medium- physical path by which
a message travels from sender to receiver. 5Computer Network by Siddique06/28/16
1.6
Figure 1.1 Components of a data communication system
Computer Network by Siddique06/28/16
Data RepresentationData Representation
ī‚—Information today in different forms like
text,number, images, audio and video.
ī‚—Text:
ī‚—In data communication, text is represented as a
bit pattern.
ī‚—Unicode-32bits
ī‚—ASCII-first 127 characters in Unicode
1.7Computer Network by Siddique06/28/16
ī‚—Number:
ī‚—Number also represented in bit patterns
ī‚—ASCII not used to represent Number.
ī‚—Number directly converted into binary to
simplify mathematical operations.
1.8Computer Network by Siddique06/28/16
ImagesImages
ī‚—Also represented in bit pattern.
ī‚—Image is composed of matrix of pixels, each
pixel is a small dot.
ī‚—The size of the images depends on resolution.
(can be divided into 1000 or 10000)
ī‚—After divide into pixel each will assigned a bit
pattern
1.9Computer Network by Siddique06/28/16
ī‚—Black and white-1-bit pattern is enough.
ī‚—Not black and white-increase the bit pattern
like 00-black, 01-gray, 11-white.
ī‚—Audio:
ī‚—Sound or music-Analog(continuous not
discrete)
ī‚—Video:
ī‚—Movie or broadcasting of a picture.
1.
10Computer Network by Siddique06/28/16
1.
11
Figure 1.2 Data flow plex, and full-duplex)
Computer Network by Siddique06/28/16
What is Network
â€ĸ A network is a series of points or nodes
interconnected by communication paths.
Networks can interconnect with other
networks and contain subnetworks.
â€ĸ Networking is the convenient way of making
information accessible to anyone, anytime &
anywhere.
â€ĸ Set of technologies that connects computers.
Allows communication and collaboration
between users 12Computer Network by Siddique06/28/16
ī‚—A system of interconnected computers
and computerized peripherals such as
printers is called computer network.This
interconnection among computers
facilitates information sharing among
them. Computers may connect to each
other by either wired or wireless media.
13Computer Network by Siddique06/28/16
What is Network
â€ĸ A network is a group of two or more computer systems linked
together. There are many types of computer networks, including
the following:
â€ĸ local-area networks (LANs): The computers are
geographically close together (that is, in the same
building).wide-area networks (WANs): The computers are
farther apart and are connected by telephone lines or radio
waves.campus-area networks (CANs): The computers are
within a limited geographic area, such as a campus or military
base.metropolitan-area networks MANs): A data network
designed for a town or city.home-area networks (HANs): A
network contained within a user's home that connects a person's
digital devices.
14Computer Network by Siddique06/28/16
BenefitsBenefits
1. Allows File Sharing
2. Provides Convenient Resource sharing
3. Flexible to be used
4. Common control
5. Easy communication
6. Internet
7. Promoted gaming
06/28/16 Computer Network by Siddique 15
Social Networking
â€ĸ the use of dedicated websites and
applications to interact with other users, or to
find people with similar interests to one's
own.
â€ĸ A social structure made of nodes that are
generally individuals or organizations. A
social network represents relationships and
flows between people, groups, organizations,
animals, computers or other
information/knowledge processing entities. 16Computer Network by Siddique06/28/16
Use of Network
â€ĸ Interact with others to exchange information
and develop professional(Linkedin) or social
contacts(Facebook).
â€ĸ A group or system of interconnected people or
things.
17Computer Network by Siddique06/28/16
The Uses of a NetworkThe Uses of a Network
ī‚—Simultaneous access to data
â—Ļ Data files are shared
ī‚– Access can be limited
â—Ļ Shared files stored on a server
â—Ļ Software can be shared
ī‚– Site licenses
ī‚– Network versions
ī‚– Application servers
9A-18 Computer Network by Siddique06/28/16
The Uses of a NetworkThe Uses of a Network
ī‚—Shared peripheral device
â—Ļ Printers and faxes are common shares
â—Ļ Reduces the cost per user
â—Ļ Devices can be connected to the network
â—Ļ Print servers control network printing
ī‚– Manage the print queue
9A-19 Computer Network by Siddique06/28/16
Sharing DataSharing Data
9A-20
File server contains documentsFile server contains documents
used by other computers.used by other computers.
Computer Network by Siddique06/28/16
The Uses of a NetworkThe Uses of a Network
ī‚—Personal communication
â—Ļ Email
ī‚– Instantaneous communication
â—Ļ Conferencing
ī‚– Tele conferencing
ī‚– Videoconferencing
ī‚– Audio-conferencing
ī‚– Data-conferencing
â—Ļ Voice over IP
ī‚– Phone communication over network wires
9A-21 Computer Network by Siddique06/28/16
Voice Over IPVoice Over IP
9A-22 Computer Network by Siddique06/28/16
The Uses of a NetworkThe Uses of a Network
ī‚—Easier data backup
â—Ļ Backup copies data to removable media
â—Ļ Server data backed up in one step
9A-23 Computer Network by Siddique06/28/16
The Uses of a NetworkThe Uses of a Network
ī‚—Easier data backup
â—Ļ Backup copies data to removable media
â—Ļ Server data backed up in one step
9A-24 Computer Network by Siddique06/28/16
ChallengesChallenges
1. Security difficulties
2. ComputerViruses and malware
3. Lake of independence
06/28/16 Computer Network by Siddique 25
ī‚— Type of Connection
â—Ļ Point to Point - single transmitter and receiver
â—Ļ Multipoint - multiple recipients of single transmission
ī‚— Physical Topology
â—Ļ Connection of devices
â—Ļ Type of transmission - unicast, mulitcast, broadcast
1.
26
Physical Structures
Computer Network by Siddique06/28/16
1.
27
Figure 1.3 Types of connections: point-to-point and multipoint
Computer Network by Siddique06/28/16
Network CriteriaNetwork Criteria
ī‚—A network must meet a number of
criteria to be considered as effective and
efficient.
ī‚—They are:
ī‚—1. Performance
ī‚—2. Reliability
ī‚—3. Security
28Computer Network by Siddique06/28/16
PerformancePerformance
I.Transit time:
It is the amount of time required for a
message to travel from one device to
another device.
29Computer Network by Siddique06/28/16
II. Response time:II. Response time:
ī‚—It is the elapsed time between an inquiry and
a response.
ī‚—The performance can be measured by
number factors are,
i. Number of user –slow response and heavy
traffic load
ii.Type of transition medium
iii. Hardware
iv. Software
30Computer Network by Siddique06/28/16
ReliabilityReliability
ī‚—The reliability is measured by frequency
to failure, the time it takes a link to
recover from a failure and the network’s
robustness in a catastrophe.
31Computer Network by Siddique06/28/16
i. Frequency of Failure:
ī‚—A network that fails often
ii. Recovery time:
ī‚—How much time it takes to recover
service after a failure has occurred?
iii. Catastrophe:
ī‚—Failures due to such reasons are fire,
earthquake, theftâ€Ļ
32Computer Network by Siddique06/28/16
3. Security:3. Security:
ī‚—It refers to protecting data from unauthorized
access and viruses.
i. Unauthorized Access:
ī‚—Sensitive data must be protected from
unauthorized access. Protection can be done
by user identification and passwords at the
lowest level.At the highest level, encryption
techniques may use.
ī‚—ii.Viruses:
A virus is an illicitly introduced code that
damages the system.
33Computer Network by Siddique06/28/16
Classification of ComputerClassification of Computer
NetworksNetworks
īąComputer networks are classified based
on various factors.They include:
ī‚—Geographical span
ī‚—Inter-connectivity
ī‚—Administration
ī‚—Architecture
34Computer Network by Siddique06/28/16
Geographical SpanGeographical Span
ī‚— Geographically a network can be seen in one of
the following categories:
ī‚— It may be spanned across your table, among Bluetooth
enabled devices, Ranging not more than few meters.
ī‚— It may be spanned across a whole building, including
intermediate devices to connect all floors.
ī‚— It may be spanned across a whole city.
ī‚— It may be spanned across multiple cities or provinces.
ī‚— It may be one network covering whole world.
35Computer Network by Siddique06/28/16
Inter-ConnectivityInter-Connectivity
ī‚—Components of a network can be connected
to each other differently in some fashion. By
connectedness we mean either logically,
physically, or both ways.
ī‚—Every single device can be connected to every other
device on network, making the network mesh.
ī‚—All devices can be connected to a single medium but
geographically disconnected, created bus-like
structure.
ī‚—Each device is connected to its left and right peers
only, creating linear structure.
36Computer Network by Siddique06/28/16
ī‚—All devices connected together with a
single device, creating star-like structure.
ī‚—All devices connected arbitrarily using all
previous ways to connect each other,
resulting in a hybrid structure.
37Computer Network by Siddique06/28/16
AdministrationAdministration
ī‚—From an administrator’s point of view, a
network can be private network which
belongs a single autonomous system and
cannot be accessed outside its physical or
logical domain.A network can be public,
which is accessed by all.
38Computer Network by Siddique06/28/16
Network ArchitectureNetwork Architecture
ī‚— Computer networks can be discriminated into
various types such as Client-Server, peer-to-peer or
hybrid, depending upon its architecture.
ī‚— There can be one or more systems acting as Server. Other
being Client, requests the Server to serve requests. Server
takes and processes request on behalf of Clients.
ī‚— Two systems can be connected Point-to-Point, or in back-to-
back fashion.They both reside at the same level and called
peers.
ī‚— There can be hybrid network which involves network
architecture of both the above types.
39Computer Network by Siddique06/28/16
Network ApplicationsNetwork Applications
ī‚— Resource sharing such as printers and storage devices
ī‚— Exchange of information by means of e-Mails and FTP
ī‚— Information sharing by using Web or Internet
ī‚— Interaction with other users using dynamic web pages
ī‚— IP phones
ī‚— Video conferences
ī‚— Parallel computing
ī‚— Instant messaging
40Computer Network by Siddique06/28/16
How Networks Are StructuredHow Networks Are Structured
ī‚—Client/Server network
â—Ļ Nodes and servers share data roles
â—Ļ Nodes are called clients
â—Ļ Servers are used to control access
â—Ļ Database software
ī‚– Access to data controlled by server
â—Ļ Server is the most important computer
9A-41 Computer Network by Siddique06/28/16
Types of ServerTypes of Server
ī‚—Centralized
ī‚—Decentralized
42Computer Network by Siddique06/28/16
How Networks Are StructuredHow Networks Are Structured
ī‚—Peer to peer networks (P2PN)
â—Ļ All nodes are equal
â—Ļ Nodes access resources on other nodes
â—Ļ Each node controls its own resources
â—Ļ Most modern OS allow P2PN
â—Ļ Distributing computing is a form
â—Ļ Kazaa
9A-43 Computer Network by Siddique06/28/16
P2PN conceptsP2PN concepts
ī‚—All are server
ī‚—Meta data
ī‚—Chunk file
ī‚—Server up and down-Remaining will be
continued
ī‚—Example :torrent and Multiplayer online
games
44Computer Network by Siddique06/28/16
Types of CN:Personal AreaTypes of CN:Personal Area
NetworkNetwork
ī‚— A Personal Area Network (PAN) is smallest network
which is very personal to a user.
ī‚— This may include Bluetooth enabled devices or infra-red
enabled devices.
ī‚— PAN has connectivity range up to 10 meters.
ī‚— PAN may include wireless computer keyboard and
mouse, Bluetooth enabled headphones, wireless
printers, and TV remotes.
45Computer Network by Siddique06/28/16
46Computer Network by Siddique06/28/16
Common NetworkTypesCommon NetworkTypes
ī‚—Local Area Network (LAN)
LAN provides a useful way of sharing the
resources between end users.The
resources such as printers, file servers,
scanners, and internet are easily sharable
among computers.
â—Ļ Contains printers, servers and computers
â—Ļ Systems are close to each other
â—Ļ Contained in one office or building
â—Ļ Organizations often have several LANS
9A-47 Computer Network by Siddique06/28/16
LAN(Contd.,)LAN(Contd.,)
ī‚—Number of systems connected in LAN
may vary from as least as two to as much
as 16 million.
ī‚—LAN uses either Ethernet or Token-ring
technology. Ethernet is most widely
employed LAN technology and uses Star
topology, while Token-ring is rarely seen.
ī‚—LAN can be wired, wireless, or in both
forms at once.
48Computer Network by Siddique06/28/16
49Computer Network by Siddique06/28/16
Common NetworkTypesCommon NetworkTypes
ī‚—Wide Area Networks (WAN)
â—Ļ Two or more LANs connected
â—Ļ Over a large geographic area
â—Ļ Typically use public or leased lines
ī‚– Phone lines
ī‚– Satellite
â—Ļ The Internet is a WAN
9A-50 Computer Network by Siddique06/28/16
WANWAN
ī‚—the Wide Area Network (WAN) covers a
wide area which may span across
provinces and even a whole country.
Generally, telecommunication networks
are Wide Area Network.These networks
provide connectivity to MANs and LANs.
Since they are equipped with very high
speed backbone,WANs use very
expensive network equipment.
51Computer Network by Siddique06/28/16
52Computer Network by Siddique06/28/16
ī‚—It can be in the form of Ethernet,Token-
ring,ATM, or Fiber Distributed Data
Interface (FDDI).
ī‚—Metro Ethernet is a service which is
provided by ISPs.This service enables its
users to expand their Local Area
Networks. For example, MAN can help an
organization to connect all of its offices in
a city.
53Computer Network by Siddique06/28/16
54Computer Network by Siddique06/28/16
Hybrid NetworkTypesHybrid NetworkTypes
ī‚—Campus Area Networks (CAN)
â—Ļ A LAN in one large geographic area
â—Ļ Resources related to the same organization
â—Ļ Each department shares the LAN
9A-55 Computer Network by Siddique06/28/16
Hybrid NetworkTypesHybrid NetworkTypes
ī‚—Metropolitan Area Network (MAN)
â—Ļ Large network that connects different
organizations
â—Ļ Shares regional resources
â—Ļ A network provider sells time
9A-56 Computer Network by Siddique06/28/16
Hybrid NetworkTypesHybrid NetworkTypes
ī‚—Home Area Network (HAN)
â—Ļ Small scale network
â—Ļ Connects computers and entertainment
appliances
â—Ļ Found mainly in the home
9A-57 Computer Network by Siddique06/28/16
Hybrid NetworkTypesHybrid NetworkTypes
ī‚—Personal Area Network (PAN)
â—Ļ Very small scale network
â—Ļ Range is less than 2 meters
â—Ļ Cell phones, PDAs, MP3 players
9A-58 Computer Network by Siddique06/28/16
ī‚— Internetwork
ī‚— A network of networks is called an internetwork, or simply the internet. It
is the largest network in existence on this planet.The internet hugely
connects all WANs and it can have connection to LANs and Home
networks. Internet uses TCP/IP protocol suite and uses IP as its addressing
protocol. Present day, Internet is widely implemented using IPv4. Because
of shortage of address spaces, it is gradually migrating from IPv4 to IPv6.
ī‚— Internet enables its users to share and access enormous amount of
information worldwide. It uses WWW, FTP, email services, audio, and video
streaming etc.At huge level, internet works on Client-Server model.
ī‚— Internet uses very high speed backbone of fiber optics.To inter-connect
various continents, fibers are laid under sea known to us as submarine
communication cable.
ī‚— Internet is widely deployed onWorld Wide Web services using HTML
linked pages and is accessible by client software known as Web Browsers.
When a user requests a page using some web browser located on some
Web Server anywhere in the world, the Web Server responds with the
proper HTML page.The communication delay is very low.
ī‚— Internet is serving many proposes and is involved in many aspects of life.
Some of them are:
59Computer Network by Siddique06/28/16
ī‚—ī‚ˇ Web sites
ī‚—ī‚ˇ E-mail
ī‚—ī‚ˇ Instant Messaging
ī‚—ī‚ˇ Blogging
ī‚—ī‚ˇ Social Media
ī‚—ī‚ˇ Marketing
ī‚—ī‚ˇ Networking
ī‚—ī‚ˇ Resource Sharing
ī‚—ī‚ˇ Audio andVideo Streaming
60Computer Network by Siddique06/28/16
1.
61
1-3 THE INTERNET1-3 THE INTERNET
TheThe InternetInternet has revolutionized many aspects of our dailyhas revolutionized many aspects of our daily
lives. It has affected the way we do business as well as thelives. It has affected the way we do business as well as the
way we spend our leisure time. The Internet is away we spend our leisure time. The Internet is a
communication system that has brought a wealth ofcommunication system that has brought a wealth of
information to our fingertips and organized it for our use.information to our fingertips and organized it for our use.
Organization of the Internet
Internet Service Providers (ISPs)
Topics discussed in this section:Topics discussed in this section:
Computer Network by Siddique06/28/16
1.
62
Figure 1.13 Hierarchical organization of the Internet
Computer Network by Siddique06/28/16
1.
63
1-4 PROTOCOLS1-4 PROTOCOLS
A protocol is synonymous with rule. It consists of a set ofA protocol is synonymous with rule. It consists of a set of
rules that govern data communications. It determines whatrules that govern data communications. It determines what
is communicated, how it is communicated and when it isis communicated, how it is communicated and when it is
communicated. The key elements of a protocol are syntax,communicated. The key elements of a protocol are syntax,
semantics and timingsemantics and timing
ī‚§ Syntax
ī‚§ Semantics
ī‚§ Timing
Topics discussed in this section:Topics discussed in this section:
Computer Network by Siddique06/28/16
ī‚— Syntax
â—Ļ Structure or format of the data
â—Ļ Indicates how to read the bits - field delineation
ī‚— Semantics
â—Ļ Interprets the meaning of the bits
â—Ļ Knows which fields define what action
ī‚— Timing
â—Ļ When data should be sent and what
â—Ļ Speed at which data should be sent or speed at which it is being
received.
1.
64
Elements of a Protocol
Computer Network by Siddique06/28/16

More Related Content

What's hot

Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networksNkosinathi Lungu
 
Networking devices
Networking devicesNetworking devices
Networking devicesfrestoadi
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking conceptsMujeeb Ahmad
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architectureselvakumar_b1985
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Networking devices
Networking devicesNetworking devices
Networking devicesTayyab Hussain
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNayan Dagliya
 
Guided And Unguided Media
Guided And Unguided MediaGuided And Unguided Media
Guided And Unguided MediaRajesh Yadav
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)Vishwajit Nandi
 

What's hot (20)

Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network
NetworkNetwork
Network
 
basic networking
basic networkingbasic networking
basic networking
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Guided And Unguided Media
Guided And Unguided MediaGuided And Unguided Media
Guided And Unguided Media
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Viewers also liked

Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed controlSiddique Ibrahim
 
Getting started into mySQL
Getting started into mySQLGetting started into mySQL
Getting started into mySQLSiddique Ibrahim
 
Datapath Design of Computer Architecture
Datapath Design of Computer ArchitectureDatapath Design of Computer Architecture
Datapath Design of Computer ArchitectureAbu Zaman
 
Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed controlSyed Zaid Irshad
 

Viewers also liked (7)

Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed control
 
Getting started into mySQL
Getting started into mySQLGetting started into mySQL
Getting started into mySQL
 
Datapath Design of Computer Architecture
Datapath Design of Computer ArchitectureDatapath Design of Computer Architecture
Datapath Design of Computer Architecture
 
Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed control
 
Mysql grand
Mysql grandMysql grand
Mysql grand
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Hardwired control
Hardwired controlHardwired control
Hardwired control
 

Similar to Basic networking

PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018Fizaril Amzari Omar
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksamudha arul
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4Vasanti Dutta
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its TypesHamzaHaji8
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Ramadan Babers, PhD
 
Lec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptxLec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptxHasankaWijesinghe1
 
Computer network Introduction
Computer network  IntroductionComputer network  Introduction
Computer network IntroductionJyoti Akhter
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.pptUndeadban2
 
Computer network note
Computer network noteComputer network note
Computer network noteMdAnikKhan
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Khondoker Sadia
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.pptTariq Emad
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networkingprashanna13
 
MSc.ppt
MSc.pptMSc.ppt
MSc.pptsol zem
 

Similar to Basic networking (20)

niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 
Lan networks
Lan networksLan networks
Lan networks
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
INT 1010 06-3.pdf
INT 1010 06-3.pdfINT 1010 06-3.pdf
INT 1010 06-3.pdf
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
Lec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptxLec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptx
 
Computer network Introduction
Computer network  IntroductionComputer network  Introduction
Computer network Introduction
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.ppt
 
Computer network note
Computer network noteComputer network note
Computer network note
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
MSc.ppt
MSc.pptMSc.ppt
MSc.ppt
 

More from Siddique Ibrahim

More from Siddique Ibrahim (20)

List in Python
List in PythonList in Python
List in Python
 
Python Control structures
Python Control structuresPython Control structures
Python Control structures
 
Python programming introduction
Python programming introductionPython programming introduction
Python programming introduction
 
Data mining basic fundamentals
Data mining basic fundamentalsData mining basic fundamentals
Data mining basic fundamentals
 
Virtualization Concepts
Virtualization ConceptsVirtualization Concepts
Virtualization Concepts
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
pipelining
pipeliningpipelining
pipelining
 
interface
interfaceinterface
interface
 
Interrupt
InterruptInterrupt
Interrupt
 
Interrupt
InterruptInterrupt
Interrupt
 
DMA
DMADMA
DMA
 
Io devies
Io deviesIo devies
Io devies
 
Stack & queue
Stack & queueStack & queue
Stack & queue
 
Metadata in data warehouse
Metadata in data warehouseMetadata in data warehouse
Metadata in data warehouse
 
Data extraction, transformation, and loading
Data extraction, transformation, and loadingData extraction, transformation, and loading
Data extraction, transformation, and loading
 
Aggregate fact tables
Aggregate fact tablesAggregate fact tables
Aggregate fact tables
 
PHP variables
PHP  variablesPHP  variables
PHP variables
 
Php hypertext pre-processor
Php   hypertext pre-processorPhp   hypertext pre-processor
Php hypertext pre-processor
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Basic networking

  • 1. Basics of Computer Network S.P. Siddique Ibrahim AP/CSE Kumaraguru College ofTechnology 1Computer Network by Siddique06/28/16
  • 2. Data Communication â€ĸ Communicate-sharing the information(local or Remote) â€ĸ Local-usually occurs face to face â€ĸ Remote-take place over distance. â€ĸ Telecommunication-includes telephone, telegraphy and television means communication at a distance. â€ĸ The data-refers to information presented in whatever form is agreed upon by the parties creating and using the data. 2Computer Network by Siddique06/28/16
  • 3. Data Communication â€ĸ Are exchange of data between two devices via some transmission medium such as a wired cable (or) Wireless. â€ĸ To exchange of digital information from two digital devices is called data communication. 3Computer Network by Siddique06/28/16
  • 4. Character tics â€ĸ Delivery- the system must deliver to correct destination. â€ĸ Accuracy- Data that have been altered in transmission and left uncorrected are unusable. â€ĸ Timeliness(Real time transmission)-Late are useless. â€ĸ Jitter-Uneven receive of packet 4Computer Network by Siddique06/28/16
  • 5. Communication model(Components)or Requirement of Data communication â€ĸ Two devices â€ĸ Message-The message is the information to be communicated. Popular forms text,pic,images,video, audio,number. â€ĸ Protocol(A-Set of rules that govern data communication) â€ĸ Sender and Receiver(computer, workstation,mobile) â€ĸ Transmission medium- physical path by which a message travels from sender to receiver. 5Computer Network by Siddique06/28/16
  • 6. 1.6 Figure 1.1 Components of a data communication system Computer Network by Siddique06/28/16
  • 7. Data RepresentationData Representation ī‚—Information today in different forms like text,number, images, audio and video. ī‚—Text: ī‚—In data communication, text is represented as a bit pattern. ī‚—Unicode-32bits ī‚—ASCII-first 127 characters in Unicode 1.7Computer Network by Siddique06/28/16
  • 8. ī‚—Number: ī‚—Number also represented in bit patterns ī‚—ASCII not used to represent Number. ī‚—Number directly converted into binary to simplify mathematical operations. 1.8Computer Network by Siddique06/28/16
  • 9. ImagesImages ī‚—Also represented in bit pattern. ī‚—Image is composed of matrix of pixels, each pixel is a small dot. ī‚—The size of the images depends on resolution. (can be divided into 1000 or 10000) ī‚—After divide into pixel each will assigned a bit pattern 1.9Computer Network by Siddique06/28/16
  • 10. ī‚—Black and white-1-bit pattern is enough. ī‚—Not black and white-increase the bit pattern like 00-black, 01-gray, 11-white. ī‚—Audio: ī‚—Sound or music-Analog(continuous not discrete) ī‚—Video: ī‚—Movie or broadcasting of a picture. 1. 10Computer Network by Siddique06/28/16
  • 11. 1. 11 Figure 1.2 Data flow plex, and full-duplex) Computer Network by Siddique06/28/16
  • 12. What is Network â€ĸ A network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks and contain subnetworks. â€ĸ Networking is the convenient way of making information accessible to anyone, anytime & anywhere. â€ĸ Set of technologies that connects computers. Allows communication and collaboration between users 12Computer Network by Siddique06/28/16
  • 13. ī‚—A system of interconnected computers and computerized peripherals such as printers is called computer network.This interconnection among computers facilitates information sharing among them. Computers may connect to each other by either wired or wireless media. 13Computer Network by Siddique06/28/16
  • 14. What is Network â€ĸ A network is a group of two or more computer systems linked together. There are many types of computer networks, including the following: â€ĸ local-area networks (LANs): The computers are geographically close together (that is, in the same building).wide-area networks (WANs): The computers are farther apart and are connected by telephone lines or radio waves.campus-area networks (CANs): The computers are within a limited geographic area, such as a campus or military base.metropolitan-area networks MANs): A data network designed for a town or city.home-area networks (HANs): A network contained within a user's home that connects a person's digital devices. 14Computer Network by Siddique06/28/16
  • 15. BenefitsBenefits 1. Allows File Sharing 2. Provides Convenient Resource sharing 3. Flexible to be used 4. Common control 5. Easy communication 6. Internet 7. Promoted gaming 06/28/16 Computer Network by Siddique 15
  • 16. Social Networking â€ĸ the use of dedicated websites and applications to interact with other users, or to find people with similar interests to one's own. â€ĸ A social structure made of nodes that are generally individuals or organizations. A social network represents relationships and flows between people, groups, organizations, animals, computers or other information/knowledge processing entities. 16Computer Network by Siddique06/28/16
  • 17. Use of Network â€ĸ Interact with others to exchange information and develop professional(Linkedin) or social contacts(Facebook). â€ĸ A group or system of interconnected people or things. 17Computer Network by Siddique06/28/16
  • 18. The Uses of a NetworkThe Uses of a Network ī‚—Simultaneous access to data â—Ļ Data files are shared ī‚– Access can be limited â—Ļ Shared files stored on a server â—Ļ Software can be shared ī‚– Site licenses ī‚– Network versions ī‚– Application servers 9A-18 Computer Network by Siddique06/28/16
  • 19. The Uses of a NetworkThe Uses of a Network ī‚—Shared peripheral device â—Ļ Printers and faxes are common shares â—Ļ Reduces the cost per user â—Ļ Devices can be connected to the network â—Ļ Print servers control network printing ī‚– Manage the print queue 9A-19 Computer Network by Siddique06/28/16
  • 20. Sharing DataSharing Data 9A-20 File server contains documentsFile server contains documents used by other computers.used by other computers. Computer Network by Siddique06/28/16
  • 21. The Uses of a NetworkThe Uses of a Network ī‚—Personal communication â—Ļ Email ī‚– Instantaneous communication â—Ļ Conferencing ī‚– Tele conferencing ī‚– Videoconferencing ī‚– Audio-conferencing ī‚– Data-conferencing â—Ļ Voice over IP ī‚– Phone communication over network wires 9A-21 Computer Network by Siddique06/28/16
  • 22. Voice Over IPVoice Over IP 9A-22 Computer Network by Siddique06/28/16
  • 23. The Uses of a NetworkThe Uses of a Network ī‚—Easier data backup â—Ļ Backup copies data to removable media â—Ļ Server data backed up in one step 9A-23 Computer Network by Siddique06/28/16
  • 24. The Uses of a NetworkThe Uses of a Network ī‚—Easier data backup â—Ļ Backup copies data to removable media â—Ļ Server data backed up in one step 9A-24 Computer Network by Siddique06/28/16
  • 25. ChallengesChallenges 1. Security difficulties 2. ComputerViruses and malware 3. Lake of independence 06/28/16 Computer Network by Siddique 25
  • 26. ī‚— Type of Connection â—Ļ Point to Point - single transmitter and receiver â—Ļ Multipoint - multiple recipients of single transmission ī‚— Physical Topology â—Ļ Connection of devices â—Ļ Type of transmission - unicast, mulitcast, broadcast 1. 26 Physical Structures Computer Network by Siddique06/28/16
  • 27. 1. 27 Figure 1.3 Types of connections: point-to-point and multipoint Computer Network by Siddique06/28/16
  • 28. Network CriteriaNetwork Criteria ī‚—A network must meet a number of criteria to be considered as effective and efficient. ī‚—They are: ī‚—1. Performance ī‚—2. Reliability ī‚—3. Security 28Computer Network by Siddique06/28/16
  • 29. PerformancePerformance I.Transit time: It is the amount of time required for a message to travel from one device to another device. 29Computer Network by Siddique06/28/16
  • 30. II. Response time:II. Response time: ī‚—It is the elapsed time between an inquiry and a response. ī‚—The performance can be measured by number factors are, i. Number of user –slow response and heavy traffic load ii.Type of transition medium iii. Hardware iv. Software 30Computer Network by Siddique06/28/16
  • 31. ReliabilityReliability ī‚—The reliability is measured by frequency to failure, the time it takes a link to recover from a failure and the network’s robustness in a catastrophe. 31Computer Network by Siddique06/28/16
  • 32. i. Frequency of Failure: ī‚—A network that fails often ii. Recovery time: ī‚—How much time it takes to recover service after a failure has occurred? iii. Catastrophe: ī‚—Failures due to such reasons are fire, earthquake, theftâ€Ļ 32Computer Network by Siddique06/28/16
  • 33. 3. Security:3. Security: ī‚—It refers to protecting data from unauthorized access and viruses. i. Unauthorized Access: ī‚—Sensitive data must be protected from unauthorized access. Protection can be done by user identification and passwords at the lowest level.At the highest level, encryption techniques may use. ī‚—ii.Viruses: A virus is an illicitly introduced code that damages the system. 33Computer Network by Siddique06/28/16
  • 34. Classification of ComputerClassification of Computer NetworksNetworks īąComputer networks are classified based on various factors.They include: ī‚—Geographical span ī‚—Inter-connectivity ī‚—Administration ī‚—Architecture 34Computer Network by Siddique06/28/16
  • 35. Geographical SpanGeographical Span ī‚— Geographically a network can be seen in one of the following categories: ī‚— It may be spanned across your table, among Bluetooth enabled devices, Ranging not more than few meters. ī‚— It may be spanned across a whole building, including intermediate devices to connect all floors. ī‚— It may be spanned across a whole city. ī‚— It may be spanned across multiple cities or provinces. ī‚— It may be one network covering whole world. 35Computer Network by Siddique06/28/16
  • 36. Inter-ConnectivityInter-Connectivity ī‚—Components of a network can be connected to each other differently in some fashion. By connectedness we mean either logically, physically, or both ways. ī‚—Every single device can be connected to every other device on network, making the network mesh. ī‚—All devices can be connected to a single medium but geographically disconnected, created bus-like structure. ī‚—Each device is connected to its left and right peers only, creating linear structure. 36Computer Network by Siddique06/28/16
  • 37. ī‚—All devices connected together with a single device, creating star-like structure. ī‚—All devices connected arbitrarily using all previous ways to connect each other, resulting in a hybrid structure. 37Computer Network by Siddique06/28/16
  • 38. AdministrationAdministration ī‚—From an administrator’s point of view, a network can be private network which belongs a single autonomous system and cannot be accessed outside its physical or logical domain.A network can be public, which is accessed by all. 38Computer Network by Siddique06/28/16
  • 39. Network ArchitectureNetwork Architecture ī‚— Computer networks can be discriminated into various types such as Client-Server, peer-to-peer or hybrid, depending upon its architecture. ī‚— There can be one or more systems acting as Server. Other being Client, requests the Server to serve requests. Server takes and processes request on behalf of Clients. ī‚— Two systems can be connected Point-to-Point, or in back-to- back fashion.They both reside at the same level and called peers. ī‚— There can be hybrid network which involves network architecture of both the above types. 39Computer Network by Siddique06/28/16
  • 40. Network ApplicationsNetwork Applications ī‚— Resource sharing such as printers and storage devices ī‚— Exchange of information by means of e-Mails and FTP ī‚— Information sharing by using Web or Internet ī‚— Interaction with other users using dynamic web pages ī‚— IP phones ī‚— Video conferences ī‚— Parallel computing ī‚— Instant messaging 40Computer Network by Siddique06/28/16
  • 41. How Networks Are StructuredHow Networks Are Structured ī‚—Client/Server network â—Ļ Nodes and servers share data roles â—Ļ Nodes are called clients â—Ļ Servers are used to control access â—Ļ Database software ī‚– Access to data controlled by server â—Ļ Server is the most important computer 9A-41 Computer Network by Siddique06/28/16
  • 42. Types of ServerTypes of Server ī‚—Centralized ī‚—Decentralized 42Computer Network by Siddique06/28/16
  • 43. How Networks Are StructuredHow Networks Are Structured ī‚—Peer to peer networks (P2PN) â—Ļ All nodes are equal â—Ļ Nodes access resources on other nodes â—Ļ Each node controls its own resources â—Ļ Most modern OS allow P2PN â—Ļ Distributing computing is a form â—Ļ Kazaa 9A-43 Computer Network by Siddique06/28/16
  • 44. P2PN conceptsP2PN concepts ī‚—All are server ī‚—Meta data ī‚—Chunk file ī‚—Server up and down-Remaining will be continued ī‚—Example :torrent and Multiplayer online games 44Computer Network by Siddique06/28/16
  • 45. Types of CN:Personal AreaTypes of CN:Personal Area NetworkNetwork ī‚— A Personal Area Network (PAN) is smallest network which is very personal to a user. ī‚— This may include Bluetooth enabled devices or infra-red enabled devices. ī‚— PAN has connectivity range up to 10 meters. ī‚— PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers, and TV remotes. 45Computer Network by Siddique06/28/16
  • 46. 46Computer Network by Siddique06/28/16
  • 47. Common NetworkTypesCommon NetworkTypes ī‚—Local Area Network (LAN) LAN provides a useful way of sharing the resources between end users.The resources such as printers, file servers, scanners, and internet are easily sharable among computers. â—Ļ Contains printers, servers and computers â—Ļ Systems are close to each other â—Ļ Contained in one office or building â—Ļ Organizations often have several LANS 9A-47 Computer Network by Siddique06/28/16
  • 48. LAN(Contd.,)LAN(Contd.,) ī‚—Number of systems connected in LAN may vary from as least as two to as much as 16 million. ī‚—LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and uses Star topology, while Token-ring is rarely seen. ī‚—LAN can be wired, wireless, or in both forms at once. 48Computer Network by Siddique06/28/16
  • 49. 49Computer Network by Siddique06/28/16
  • 50. Common NetworkTypesCommon NetworkTypes ī‚—Wide Area Networks (WAN) â—Ļ Two or more LANs connected â—Ļ Over a large geographic area â—Ļ Typically use public or leased lines ī‚– Phone lines ī‚– Satellite â—Ļ The Internet is a WAN 9A-50 Computer Network by Siddique06/28/16
  • 51. WANWAN ī‚—the Wide Area Network (WAN) covers a wide area which may span across provinces and even a whole country. Generally, telecommunication networks are Wide Area Network.These networks provide connectivity to MANs and LANs. Since they are equipped with very high speed backbone,WANs use very expensive network equipment. 51Computer Network by Siddique06/28/16
  • 52. 52Computer Network by Siddique06/28/16
  • 53. ī‚—It can be in the form of Ethernet,Token- ring,ATM, or Fiber Distributed Data Interface (FDDI). ī‚—Metro Ethernet is a service which is provided by ISPs.This service enables its users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city. 53Computer Network by Siddique06/28/16
  • 54. 54Computer Network by Siddique06/28/16
  • 55. Hybrid NetworkTypesHybrid NetworkTypes ī‚—Campus Area Networks (CAN) â—Ļ A LAN in one large geographic area â—Ļ Resources related to the same organization â—Ļ Each department shares the LAN 9A-55 Computer Network by Siddique06/28/16
  • 56. Hybrid NetworkTypesHybrid NetworkTypes ī‚—Metropolitan Area Network (MAN) â—Ļ Large network that connects different organizations â—Ļ Shares regional resources â—Ļ A network provider sells time 9A-56 Computer Network by Siddique06/28/16
  • 57. Hybrid NetworkTypesHybrid NetworkTypes ī‚—Home Area Network (HAN) â—Ļ Small scale network â—Ļ Connects computers and entertainment appliances â—Ļ Found mainly in the home 9A-57 Computer Network by Siddique06/28/16
  • 58. Hybrid NetworkTypesHybrid NetworkTypes ī‚—Personal Area Network (PAN) â—Ļ Very small scale network â—Ļ Range is less than 2 meters â—Ļ Cell phones, PDAs, MP3 players 9A-58 Computer Network by Siddique06/28/16
  • 59. ī‚— Internetwork ī‚— A network of networks is called an internetwork, or simply the internet. It is the largest network in existence on this planet.The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6. ī‚— Internet enables its users to share and access enormous amount of information worldwide. It uses WWW, FTP, email services, audio, and video streaming etc.At huge level, internet works on Client-Server model. ī‚— Internet uses very high speed backbone of fiber optics.To inter-connect various continents, fibers are laid under sea known to us as submarine communication cable. ī‚— Internet is widely deployed onWorld Wide Web services using HTML linked pages and is accessible by client software known as Web Browsers. When a user requests a page using some web browser located on some Web Server anywhere in the world, the Web Server responds with the proper HTML page.The communication delay is very low. ī‚— Internet is serving many proposes and is involved in many aspects of life. Some of them are: 59Computer Network by Siddique06/28/16
  • 60. ī‚—ī‚ˇ Web sites ī‚—ī‚ˇ E-mail ī‚—ī‚ˇ Instant Messaging ī‚—ī‚ˇ Blogging ī‚—ī‚ˇ Social Media ī‚—ī‚ˇ Marketing ī‚—ī‚ˇ Networking ī‚—ī‚ˇ Resource Sharing ī‚—ī‚ˇ Audio andVideo Streaming 60Computer Network by Siddique06/28/16
  • 61. 1. 61 1-3 THE INTERNET1-3 THE INTERNET TheThe InternetInternet has revolutionized many aspects of our dailyhas revolutionized many aspects of our daily lives. It has affected the way we do business as well as thelives. It has affected the way we do business as well as the way we spend our leisure time. The Internet is away we spend our leisure time. The Internet is a communication system that has brought a wealth ofcommunication system that has brought a wealth of information to our fingertips and organized it for our use.information to our fingertips and organized it for our use. Organization of the Internet Internet Service Providers (ISPs) Topics discussed in this section:Topics discussed in this section: Computer Network by Siddique06/28/16
  • 62. 1. 62 Figure 1.13 Hierarchical organization of the Internet Computer Network by Siddique06/28/16
  • 63. 1. 63 1-4 PROTOCOLS1-4 PROTOCOLS A protocol is synonymous with rule. It consists of a set ofA protocol is synonymous with rule. It consists of a set of rules that govern data communications. It determines whatrules that govern data communications. It determines what is communicated, how it is communicated and when it isis communicated, how it is communicated and when it is communicated. The key elements of a protocol are syntax,communicated. The key elements of a protocol are syntax, semantics and timingsemantics and timing ī‚§ Syntax ī‚§ Semantics ī‚§ Timing Topics discussed in this section:Topics discussed in this section: Computer Network by Siddique06/28/16
  • 64. ī‚— Syntax â—Ļ Structure or format of the data â—Ļ Indicates how to read the bits - field delineation ī‚— Semantics â—Ļ Interprets the meaning of the bits â—Ļ Knows which fields define what action ī‚— Timing â—Ļ When data should be sent and what â—Ļ Speed at which data should be sent or speed at which it is being received. 1. 64 Elements of a Protocol Computer Network by Siddique06/28/16

Editor's Notes

  1. Teaching Tip Figure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes. Spend time discussing why application servers need to be so powerful.
  2. Teaching tip Figure 9A.4 on page 344 shows a print queue. It can be helpful to demonstrate your classroom queue.
  3. Teaching tip It is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards.
  4. Insider information The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
  5. Insider information The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
  6. Teaching tip Discuss how users managing their own security settings can be bad.
  7. Teaching tip Use a real world example to describe an organization with interconnected LANs.
  8. Teaching tip Blockbuster Video uses a WAN to connect it’s stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed!
  9. Teaching tip An example of a regional resource is a supercomputer. For example, Pittsburgh has the Pittsburgh Super Computing center (www.psc.edu). The various colleges in Pittsburgh connect to the center through a MAN in Pittsburgh.
  10. Insider information PAN is very new. Few devices support PAN. High end cell phones include Bluetooth technology. Once the technology matures, Bluetooth will allow the creation of a PAN.