SlideShare a Scribd company logo
1 of 19
Communication & Networks
Part - 1
MR. RAJASEKAR RAMALINGAM
LECTURER – DEPARTMENT OF INFORMATION TECHNOLOGY,
COLLEGE OF APPLIED SCIENCES – SUR,
SULTANATE OF OMAN.
In this lecture…
 Computers in communications
 Advantages of using networks
 Network scale
 Network architecture
 Network topology
 Ethernet and Bluetooth
2
Computer communications
 Home
 Office
 School
 Café
 Wireless hotspot
 Anywhere!
3
Communicating
 Sender
 Medium
 Wired
 Wireless
 Receiver
 More than talk
 More than text
4
Networks
 "Collection of computers and devices
connected together using communication
devices and transmission media“
 Any device connected to a network (wired or
wireless) is called a node
 The next slide has a diagram from the text
showing advantages of using networks
5
6
Network Scale
 LAN
 Local Area Network
 An office, a floor, a university
 MAN
 Metropolitan Area Network
 City-wide
 Often connects LANS
 London Fire Service
 WAN
 Wide Area Network
 Country, Region, World
7
Network Architecture
Client-Server
 One or more servers
 Controls & coordinates access to network resources
 Hardware, software, data - "The Boss"
 Provides centralised, shared storage
 For software
 For data
 Uses network operating system
 May be specialised e.g. file server, print server
 Clients use network resources
 The worker's PCs
 Each computer is "equal"
 Every computer can share data and/or hardware
 Every computer is both a "server" and a "client"
 About 10 computers is the sensible limit
 Simple, easy, cheap
 Internet P2P
 A file sharing network
 Users connect direct to each other's hard disks and exchange files directly
8
Client-Server
9
In this example the server is also a print server
P2P
10
Network operating system and application software on each
computer
Network topology
 The layout of the network
 Bus network
 Nodes connected to a single central cable (the bus)
 Inexpensive, easy to install
 Easy to connect/disconnect nodes without disruption
 Problems if the bus fails!
11
Ring network
 Cable forms a closed loop
 Data moves in one direction around the loop, from one node to the
next
 If a node fails, nodes after that won't work
12
Star network
 All nodes connected to a central device
 Uses a hub
 Easy to install and maintain
 Easy to connect/disconnect nodes
 If the hub fails…
13
Hub
14
Small (4 ports) to large (24+
port)
Most networks use a mixture of
topologies
15
Topology summary
Advantage Disadvantage
Bus Easy to add/remove nodes
Node failure doesn't disrupt
network
If bus fails, network is disabled
Ring Larger distance than bus
topography
More difficult to install
Node failure disables all subsequent
nodes
Adding/removing a node disrupts
network
Star Easy to install and maintain
Easy to add/remove nodes
If hub fails, network is disabled
16
Communication standards
 Allow different devices to "talk" to each other
 Example - PC, Apple, mobile phone
 Allow different networks to "talk" to each other
 Example - LAN, WAN, wired and wireless
 A standard that outlines how network devices
communicate is called a protocol
 The language that is used to communicate
 Examples include TCP/IP (in OMINT103), Ethernet
and Bluetooth
17
Ethernet
 A networking standard
 Based on bus topology, but also used for star
 Specifies physical configuration
 Cabling, network cards, nodes etc
 Popular - inexpensive, relatively easy to maintain
 Often uses cable as transmission media
18
Bluetooth
 A network protocol
 Defines how Bluetooth devices use short-range radio
devices to transmit data
 Speeds up to 2 Mbps
 Over distances of up to 10m
 Devices require a built-in Bluetooth chip, or a plug-in
Bluetooth adapter
 Examples - wireless mouse, sync PC and mobile
phone, phone and headset.
19

More Related Content

What's hot

What's hot (20)

Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Network
NetworkNetwork
Network
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Computer Networks 2
Computer Networks 2Computer Networks 2
Computer Networks 2
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
networking
networkingnetworking
networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network Resources
Network ResourcesNetwork Resources
Network Resources
 
Computer Networks and Its Types
Computer Networks and Its TypesComputer Networks and Its Types
Computer Networks and Its Types
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
 
Osi model
Osi modelOsi model
Osi model
 
Network topology
Network topologyNetwork topology
Network topology
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Network Topology
Network Topology Network Topology
Network Topology
 
Networking power point
Networking power pointNetworking power point
Networking power point
 
Computer Networks Lec#1
Computer Networks Lec#1Computer Networks Lec#1
Computer Networks Lec#1
 
Uses of computer networks
Uses of computer networksUses of computer networks
Uses of computer networks
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
 
Unit2
Unit2Unit2
Unit2
 

Similar to Communication and networks Part 1

Software Slides
Software SlidesSoftware Slides
Software Slides
iarthur
 
Assignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxAssignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docx
IhtishamAhmad20
 
1_1. CN introduction.ppt
1_1. CN introduction.ppt1_1. CN introduction.ppt
1_1. CN introduction.ppt
ATIFAZEEZ1
 

Similar to Communication and networks Part 1 (20)

Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Software Slides
Software SlidesSoftware Slides
Software Slides
 
Com
ComCom
Com
 
networking
networkingnetworking
networking
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
COMPUTER TAPALOGY
COMPUTER TAPALOGYCOMPUTER TAPALOGY
COMPUTER TAPALOGY
 
Network
NetworkNetwork
Network
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
jaringan.pptx
jaringan.pptxjaringan.pptx
jaringan.pptx
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.ppt
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptx
 
Assignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxAssignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docx
 
1_1. CN introduction.ppt
1_1. CN introduction.ppt1_1. CN introduction.ppt
1_1. CN introduction.ppt
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
Networking
NetworkingNetworking
Networking
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 

More from CAS

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Communication and networks Part 1

  • 1. Communication & Networks Part - 1 MR. RAJASEKAR RAMALINGAM LECTURER – DEPARTMENT OF INFORMATION TECHNOLOGY, COLLEGE OF APPLIED SCIENCES – SUR, SULTANATE OF OMAN.
  • 2. In this lecture…  Computers in communications  Advantages of using networks  Network scale  Network architecture  Network topology  Ethernet and Bluetooth 2
  • 3. Computer communications  Home  Office  School  Café  Wireless hotspot  Anywhere! 3
  • 4. Communicating  Sender  Medium  Wired  Wireless  Receiver  More than talk  More than text 4
  • 5. Networks  "Collection of computers and devices connected together using communication devices and transmission media“  Any device connected to a network (wired or wireless) is called a node  The next slide has a diagram from the text showing advantages of using networks 5
  • 6. 6
  • 7. Network Scale  LAN  Local Area Network  An office, a floor, a university  MAN  Metropolitan Area Network  City-wide  Often connects LANS  London Fire Service  WAN  Wide Area Network  Country, Region, World 7
  • 8. Network Architecture Client-Server  One or more servers  Controls & coordinates access to network resources  Hardware, software, data - "The Boss"  Provides centralised, shared storage  For software  For data  Uses network operating system  May be specialised e.g. file server, print server  Clients use network resources  The worker's PCs  Each computer is "equal"  Every computer can share data and/or hardware  Every computer is both a "server" and a "client"  About 10 computers is the sensible limit  Simple, easy, cheap  Internet P2P  A file sharing network  Users connect direct to each other's hard disks and exchange files directly 8
  • 9. Client-Server 9 In this example the server is also a print server
  • 10. P2P 10 Network operating system and application software on each computer
  • 11. Network topology  The layout of the network  Bus network  Nodes connected to a single central cable (the bus)  Inexpensive, easy to install  Easy to connect/disconnect nodes without disruption  Problems if the bus fails! 11
  • 12. Ring network  Cable forms a closed loop  Data moves in one direction around the loop, from one node to the next  If a node fails, nodes after that won't work 12
  • 13. Star network  All nodes connected to a central device  Uses a hub  Easy to install and maintain  Easy to connect/disconnect nodes  If the hub fails… 13
  • 14. Hub 14 Small (4 ports) to large (24+ port)
  • 15. Most networks use a mixture of topologies 15
  • 16. Topology summary Advantage Disadvantage Bus Easy to add/remove nodes Node failure doesn't disrupt network If bus fails, network is disabled Ring Larger distance than bus topography More difficult to install Node failure disables all subsequent nodes Adding/removing a node disrupts network Star Easy to install and maintain Easy to add/remove nodes If hub fails, network is disabled 16
  • 17. Communication standards  Allow different devices to "talk" to each other  Example - PC, Apple, mobile phone  Allow different networks to "talk" to each other  Example - LAN, WAN, wired and wireless  A standard that outlines how network devices communicate is called a protocol  The language that is used to communicate  Examples include TCP/IP (in OMINT103), Ethernet and Bluetooth 17
  • 18. Ethernet  A networking standard  Based on bus topology, but also used for star  Specifies physical configuration  Cabling, network cards, nodes etc  Popular - inexpensive, relatively easy to maintain  Often uses cable as transmission media 18
  • 19. Bluetooth  A network protocol  Defines how Bluetooth devices use short-range radio devices to transmit data  Speeds up to 2 Mbps  Over distances of up to 10m  Devices require a built-in Bluetooth chip, or a plug-in Bluetooth adapter  Examples - wireless mouse, sync PC and mobile phone, phone and headset. 19

Editor's Notes

  1. Ask students to identify bus, ring and star topologies
  2. Explain meaning of "Mbps"