This document provides an introduction to computer networks. It defines key network concepts like local area networks (LANs), wide area networks (WANs), and the different physical network topologies including bus, star, ring, mesh, and hybrid networks. It discusses network performance metrics like throughput and delay. It also covers network criteria such as reliability, security, and standards organizations that help networks communicate. Examples of different network configurations are provided to illustrate LANs, WANs, and the various physical topologies.
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
For beginners in Computer Networking field, know about basics about what is Computer Networks, what are ways through which we can communicate, what is meant by protocols, he famous OSI its layers and TCP/IP and its layers, What makes a Networking Device, basic topologies of Computer Networks, special purpose network devices like Switch, routers, repeter, bridges and hub, and basics of networking methods, basics of ethernet, TCP its characteristics, UDP, TCP vs UDP, One would wonder what happens when information particular to each layer is read by the corresponding protocols at target machine or why is it required?
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
For beginners in Computer Networking field, know about basics about what is Computer Networks, what are ways through which we can communicate, what is meant by protocols, he famous OSI its layers and TCP/IP and its layers, What makes a Networking Device, basic topologies of Computer Networks, special purpose network devices like Switch, routers, repeter, bridges and hub, and basics of networking methods, basics of ethernet, TCP its characteristics, UDP, TCP vs UDP, One would wonder what happens when information particular to each layer is read by the corresponding protocols at target machine or why is it required?
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
8. What is a Computer Network?
• A set of computers which
are connected together.
• This can mean two
computers cabled together
on the same desk, or
thousands of computers
across the world.
• The connections can be
cables or wireless.
9. Advantages of Computer Networks
• Enables users to share hardware like
scanners and printers. This reduces
costs by reducing the number of
hardware items bought.
• Allows users access to data stored on
others' computers. This keeps everyone
up-to-date on the latest data
• Can share access to the Internet.
10. Advantages of Computer Networks
• Can even let users run programs that
are not installed on their own computers
but are installed elsewhere in the
network.
reduces the effort for networks
administrators to keep programs configured
correctly and saves a lot of storage space.
11. Local Area Networks
• A LAN is a Local Area Network.
This would include networks where the
computers are relatively close together.
So LANs would be within the same
office, a single building, or several
buildings close together.
12. Local Area Network Example 1
• Two buildings with 4 departments
connected as a LAN that uses 3
servers.
16. Wide Area Network
• A WAN is a Wide Area Network,
which would be all networks too large
to be LANs.
• A WAN would be most useful for
large companies with offices or
factories in widely separated areas, like
Microsoft, IBM, Ford, AT&T, etc.
21. NET 331: Computer Networks
Fundementals
• Objective: Covering the necessary concepts
in communication networks, topics include:
network architicture, layering concepts,
packet and circuit switching, internetworing,
TCP/IP protocol suite and network
applications.
• Prerequisites: CS302 (Operating Systems)
OR NET321 (Computers Operating
Systems).
22. Course’s TextBook
• Data Communication and
Networking, Behrouz
Forouzan, McGrawHill,
2006.
• Available at the library,
get your copy soon!
23. Chapter 1
Introduction
• Data Communication
• Networks
• Protocols and Standards
• Standard Organizations
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
25. Definitions
• Data: information presented in whatever form
is agreed upon by the parties creating and
using the data.
• Data Communication: exchange of data
between two devices via transmission medium
(wire cable / link).
• Data Communication System: Made up of a
combination of hardware (physical equipment)
and software (programs) to facilitate for
effective communication of data.
26. 5 Components of a Data
Communication System
Figure 1-1
Protocol: is a set of rules that governs data communications.
It represents an agreement between the communicating
devices. Without a protocol two devices may be connected
but not communicating.
27. Characteristics of a Data Communication
System
Delivery : System must deliver data to correct
destination. Data must be received by only
intended device or user.
Accuracy: The system must deliver data
accurately
Timeliness: the system must deliver data in a
timely manner. Data delivered later are useless.
Jitter: Variation in the packet arrival time. It is
the uneven delay in the delivery of audio or
video packets.
28. Data Flow
• Path taken by data within a device, network,
or organization, as it moves from its source
to its destination (a data repository or a data
user).
• Categorized by direction of flow:
Simplex
Half-duplex
Full-duplex
29. Simplex
• Communication is unidirectional, one of
the two devices on a link can transmit; the
other can only receive (one-way street).
• Ex: keyboard (input), monitors (output)
30. Half-duplex
Each station can both transmit and receive ,
but not at the same time. When one device
is sending the other can receive and vice
versa. (one-lane road with two direction).
31. Full-duplex
• Both stations can transmit and receive
simultaneously. (two way street with traffic
flowing in both directions at the same time).
• Ex: telephone network.
Signals going in either direction share the capacity of the link in
two ways:
Either the link must contain two physically separate transmission
paths one for sending and other for receiving.
Capacity of the channel is divided between signals traveling in both
direction
33. Definitions
• A network is a set of devices (often
referred to as nodes) connected by
communication links.
• A node can be a host (such as a computer,
a laptop, a smart phone etc.) or a network
device (such as a switch, a router, etc.).
• A link is a communication pathway that
transfer data from one device to another.
34. Network Criteria
• A network must be able to meet a
certain number of criteria.
Performance
Reliability
Security
36. Performance
• Can be measured in many ways!
– Transmit time: the amount of time
required for a message to travel from one
device to another.
– Response time: the elapsed time between
an inquiry and a response.
• Often evaluated by two networking
metrics: throughput and delay.
37. Throughput
• Throughput is an important network
metric which is also known as bandwidth.
• The bandwidth of a network is given by
the number of bits that can be transmitted
over the network in a certain period of
time.
• Depends on the network technology
(hardware capabilities) and therefore is
constant.
38. Throughput Example
• A network might have a bandwidth of
10 million bits/second (Mbps),
meaning that it is able to deliver 10
million bits every second.
39. Delay
• Also known as latency.
• corresponds to how long it takes a
message to travel from one end of a
network to the other.
• Latency is measured strictly in terms of
time.
• Effected by number of users and hence
may change from time to time.
40. Delay Example
• A transcontinental network might have
a latency of 24 milliseconds (ms); that
is, it takes a message 24 ms to travel
from one end of North America to the
other.
42. Network Criteria
• A network must be able to meet a
certain number of criteria.
Performance
Reliability
Security
43. Reliability
• Accuracy of delivery.
• Measured by:
– Frequency of failures
– Time it takes to recover from a failure
– The network’s robustness in a
catastrophe.
44. Network Criteria
• A network must be able to meet a
certain number of criteria.
Performance
Reliability
Security
45. Security
• Many issues at the different layers!
• Examples:
– Protecting data from unauthorized access.
– Protecting data from damage.
– Implementing policies and procedures for
recovery from breaches and data losses.
46. Network Configuration
• There are a number of ways that
computers can be connected together
to form networks.
• Physical attributes of a network
include:
Type of connection
Physical topology
47. Type of Connection
• For communication to occure, two devices
must be connected in someway to the same
link at the same time.
• Two possible connections:
– Point-to-point
– Multipoint
48. Physical Structures: Type of
connection
1. Point –to-point
Dedicated link between two devices. Most of them uses an
actual length of wire or cable to connect the two ends but
other options ,such as microwave satellite are possible.
49. Physical Structures: Type of
connection
2. Multipoint
Is one in which more than two specific devices share a
single link
50. 1/18/2006 CSCI 363 Computer Networks 50
Links
(a)
(b)
point-to-point
multiple-access
Geographical coverage and scalability are limited.
Each node needs one interface for each link.
52. Physical Topology
• Two or more links for a topology.
– The topology of a network refers to the
geometric representation of the
relationship of all the links and linking
devices (nodes) to one another.
• The term physical topology refers to
the way in which a network is laid out
physically.
53. • The way in which a network is laid out physically.
Physical Topology
54. Mesh Topology
• Every device has a dedicated point-to-
point link with every other device on the
network.
link carries traffic
only between the
two devices.
• How many links do we need in a network
with N nodes?
– Half duplex
- Full duplex
55. Fully connected mesh topology (for five devices)
• Every device has a dedicated point-to-point link to every
other devices
• Fully connected mesh network has n(n-1)/2 physical
connection to link n devices.
• Every device on the network must have n-1 input/output
(I/O) ports
56. Advantages of a Mesh topology
• Privacy or security (every message travels
along a dedicated line, only the intended
recipient sees it. Physical boundaries
prevents other user from gaining access
the message
• eliminating the traffic problems The use
of dedicated links guarantees that each
connection can carry its own data load;
that can occur when links must be shared
by multiple devices.
57. Advantages of a Mesh topology
• A mesh is robust. If one link becomes
unusable, it does not incapacitate the
entire system.
• Fault identification and fault isolation
easy. This enables the network manager
to discover the precise location of fault
and aids in finding its cause and solution.
58. Disadvantages of a Mesh topology
Related to the amount of cabling devices and
the amount of I/O ports required:
– Every device must be connected to every other
device, installation and reconnection are
difficult
– The sheer bulk of the wiring can be greater than
the available space can accommodate.
– The H.W required to connect each link (I/O ports
and cable) expensive.
59. Disadvantages of a Mesh topology
So a mesh topology is usually implemented
in a limited fashion( as a backbone
connecting the main computers of a
hybrid network that can include several
other topology
60. Star topology
Each device has a dedicated point-to-point link only to a
central controller (hub)
Unlike a mesh , a star topology does not allow direct traffic
between devices, if one device want to send data to another ,
it send it to the hub, which send it to other device
61. • The star pattern connects
everything to a host computer,
a network switch, or a
network hub, which handles
the network tasks.
• All communications
between computers
go through the
host/switch/hub.
62. Advantages of a Star topology
1.Easy to install and reconfigure and
less expensive
– each device need only one link and I/O
port to connect it to any other devices.)
2.Robustness:
– if one link fails, only that link affected
and other links remain active.
3.identification and fault isolation
63. Disadvantages of a Star topology
• The dependency of the whole topology
on one single point, the hub. If the hub
goes down, the whole system is dead.
64. Tree topology : Is a variation of star
- Not every device plugs directly into the central
hub. The majority of devices connect to
secondary hub that in turn is connected to the
central hub.
65. Tree topology : Is a variation of star
The advantages and disadvantages of tree
topology are generally the same as those of star .
- The addition of secondary hubs bring more
advantage: allows for more devices to be attached
to a single central hub, therefore increase the
distance a signal can travel between devices.
67. • The bus pattern connects the computer to the
same communications line. Communications
goes both directions along the line. All the
computers can communicate with each other
without having to go through the server.
68. Bus topology
There is a limit on the number of taps a
bus can support and on the distance
between those taps
• As a signal travels along the backbone, it
becomes weaker
69. Advantages of a Bus topology
Ease of instulation, use less cabling than
mesh or star.
-
70. Disadvantages of a Bus topology
1. A fault in bus cable (break) stops all
transmissions even between devices on the
same side of the problem. The damaged area
reflects signals back the direction of origin,
creating noise in both directions
2. Reconnection
It can difficult to add new devices (adding
more require modification or replacement of
the backbone).
71. Ring Topology
• Each device has a dedicated point-to-point
connection only with the two devices on
either side of it
• A signal is passed along the ring in one
direction from device until it reaches its
destination.
72. • The ring pattern
connects the computers
and other devices one
to the other in a circle.
• There is no central host
computer that holds all
the data.
• Communication flows
in one direction around
the ring.
73. Ring Topology
Each device in the ring incorporate as repeater
Repeater :regenerates the signal
it receives a weakened signal, creates a copy,
bit for bit, at the original strength
74. Ring Topology
Advantages:
• Easy to install and reconfigure.
Each device is linked only to its immediate neighbors. To add or
delete a device requires hanging only 2 connections
• Fault isolation is simplified :
A signal is circulating at all times (token) if one device does not
receive a signal within specified period, it can issue an alarm. The
alarm alerts the network operator to the problem and its location
Disadvantages
• Unidirectional traffic.
A break in the ring (such as disabled station) can disable the entire
network. This can be solved by use dual ring
75. Advantages of a Ring Topology
• Easy to install and reconfigure.
Each device is linked only to its immediate
neighbors. To add or delete a device requires
hanging only 2 connections
• Fault isolation is simplified :
A signal is circulating at all times (token) if one
device does not receive a signal within
specified period, it can issue an alarm. The
alarm alerts the network operator to the
problem and its location
76. Disadvantages of a Ring Topology
• Unidirectional traffic.
A break in the ring (such as disabled
station) can disable the entire network.
This can be solved by use dual ring
78. Networks Models
• Computer networks are created by different
entities.
• Standards are needed so that these
heterogeneous networks can communicate.
• The two most know standards:
– OSI model: defines a seven layer network.
– Internet model: defines a five layer network.
79. Network category is determined by its size,
ownership, the distance it cover and its
physical architecture.
Network Categories
82. LAN ( Local Area Network)
• Privately owned and links the devices in a
single office, building or campus
• LANs designed to allow resources to be
shared between PCs or workstations. The
resources may be H.W (e.g. printer) or S.W
(applications program) or data.
• In LANs one of the computers has a large
capacity drive and becomes a server to other
clients.
83. LAN ( Local Area Network)
• S/W stored on server and used as needed by
the whole group.
• LAN size determined by licensing restrictions
(no of users per copy of S/W)
• LAN use only one type of transmission
medium.
• The most common LAN topologies are bus,
ring and star.
84. LAN ( Local Area Network)
• Traditionally LAN have data rates in the 4 to
16 Mbps. Today Speed can reach to 100Mbps
or 1000MBps(1G).
85. MAN (Metropolitan Area Network)
• Owned by private company or it may be a
service provided by public company (
such as local tel.-company)
• Extended over an entire city.
• May be single network such as a cable
television network, or it may be
connected number of LANs into a large
network so that resources may be shared
LAN-TO- LAN.
86. MAN (Metropolitan Area Network)
• Examples:
Company can use MAN to connect
the LANs in all its offices throughout
the city.
A part of the telephone line network
that can provide DSL line to the
customer
88. WAN (Wide Area Network)
• Provides long distance transmission of data, voice , image
and video information over large areas ( country or whole
world)
• In contrast to LAN, WAN may utilize public or private
communication equipments or combination.
90. 1/18/2006 CSCI 363 Computer Networks 90
Internetworking
To interconnect two or more
networks, one needs a gateway or
router.
Host-to-host connectivity is only
possible if there’s a uniform
addressing scheme and a routing
mechanism.
Messages can be sent to a single
destination (unicast), to multiple
destinations (multicast), or to all
possible destinations (broadcast).
93. Internet
• a collaboration of more than 100 of
1000 interconnected network.
• Brief History ( self-reading)
• In mid of 1960:
• The Advanced Research Projects Agency (ARPA)
in the department of defense was interested in
finding a way to connect computers so that the
researchers they funded could share their findings,
to reduce costs and eliminating duplication of effort.
94. Brief History
• 1n1967
– ARPA presented its ideas for ARPANET, small
network of connected computers (mainframe).
• 1n 1969,
– ARPANET was reality. Four nodes at the UNV.
Of California,(at los angles and Santa Barba), univ.
of utah and SRI (Stand ford Research Institute
connected via IMPs computers to form a network.
Software called Network Control Protocol (NCP)
provided communication between the hosts.
95. Brief History
• In 1972,
– Protocol to achieve end -to-end delivery of packets,
Transmission Control Protocol (TCP).
– Authorities made decision to split TCP into two protocols:
– IP: Internetworking protocol to handle datagram routing
and
– TCP: responsible for higher-level-functions such as error
detection, segmentation and reassembly.
• Internet today
– Made up of many wide and local area networks joined by
connecting devices and switching stations. Today most end
users use the services of internet service providers
(ISPs).
96. internet service providers
(ISPs)
• Hierarchical organization of the Internet
includes:
– International Internet Service Providers
– National Internet Service Providers
– Regional Internet Service Providers
– Local Internet Service Providers
100. Protocols
• Set of rules that governs data communications.
• Protocol defines :
– What is communicated?
– How it communicated?
– When it is communicated?
101. What’s a protocol?
human protocols:
• “what’s the time?”
• “I have a question”
• introductions
… specific msgs sent
… specific actions taken
when msgs received, or
other events
network protocols:
• machines rather than
humans
• all communication activity
in Internet governed by
protocols
protocols define format,
order of msgs sent and
received among network
entities, and actions
taken on msg transmission
and/or receipt of a msg.
102. Protocols
• Key elements of a protocol: Syntax,
semantics and timing
• Syntax: Structure or format of the data,
meaning the order in which they are
presented. Example: A simple protocol
might expect the first byte of data to be the
address of the sender, the second byte to be
the address of the receiver and the reset of
the stream to be the message itself.
103. Protocols
• Semantics: Refers to the meaning of each
section of bits.
• Example: does an address identify the route
to be taken or the final destination of the
message.
104. Protocols
• Timing: When data to should be sent?
•How fast they can be sent? Example: If a
sender produces data at 100Mpbs but the
receiver can process data at only 1Mpbs,
transmission will overload the receiver and
data will be largely lost.
105. Standards
• Provide guidelines to manufactures,
vendors, government agencies and
other service provides to ensure the
kind of interconnectivity necessary in
today's marketplace and international
communication.
106. Standards
• Two categories:
1.De fact: Have been adopted as
standers through widespread use.
Established by manufacturers that
define the functionality of a new
product or technology
2.De jure: officially recognized body.
109. Standers Organization
2. International Telecommunication
Union Telecommunication standard
sector ( ITU-T)
– devoted to the research of standards for
telecommunication in general and for phone
and data system in particular
– Data transmission over telephone line
Modems standards :V- series( V32,
V34,V90)
– X-series: data transmission over public
digital network (e- mail)
111. Standers Organization
4. Institute of Electrical and
Electronics Engineers (IEEE)
– International in scoop
– In the fields of electrical engineering,
electronics and all related branches of
engineering
– International standards for computing and
communications LAN (project 802):
IEEE Ethernet 802.3 5. Electronic
Industries Association (EIA)
– Field of Information Technology
(SONET)