SlideShare a Scribd company logo
1 of 34
MTN 2013
Computer Network Technology




    Chapter 2
 Computer Network
Outline
1.    Introduction to Networking
2.    Network Configuration
3.    Network Criteria
4.    Transmission Mode
5.    Network Topology




11/17/2011              MTN 2013   2
1. Introduction to Networking
• What is network?
• A network consists of 2 or more computers
  connected together, and they can
  communicate and share resources (i.e.
  information)




11/17/2011           MTN 2013                 3
Why Networking?
• Sharing information — i.e. data communication
Do you prefer these?




   Or this?




11/17/2011              MTN 2013                  4
Networking
• Sharing hardware or software
     • E.g. print document




 • Centralize administration and support
     • E.g. Internet-based, so everyone can access the same administrative or support
       application from their PCs




11/17/2011                             MTN 2013                                    5
How many kinds of Networks?

• Depending on one’s perspective, we can classify
  networks in different ways

      • Based on transmission media: Wired (UTP, coaxial
        cables, fiber-optic cables) and Wireless
      • Based on network size: LAN and WAN (and MAN)
      • Based on management method: Peer-to-peer and
        Client/Server
      • Based on topology (connectivity): Bus, Star, Ring …
         :
         :
11/17/2011                     MTN 2013                       6
2. Network Configuration
• Form/arrangement/setup of network
  parts/elements.
• Ways that computers can be connected
  together to form networks.




11/17/2011             MTN 2013          7
3. Network Criteria
• To be considered effective and efficient, a network must meet a number
  of criteria. The most important of these are performance, reliability, and
  security.
                 Performance       Reliability      Security


                    Type of
                                   Hardware        Software
                  connection


                    Type of      Frequency of
                                                  Catastrophe
                 transmission       failure


                                  Number of
                                    user
11/17/2011                          MTN 2013                                   8
Performance
• Performance can be measured in many
  ways, including transit time and response time.
• Transit time is the amount of time required for a
  message to travel from one device to another.
• Response time is the elapsed time between an
  enquiry and a response.
• The performance of a network depends on a
  number of factors, including the number of
  users, the type of transmission medium, the
  capabilities of the connected hardware, and the
  efficiency of the software.
11/17/2011             MTN 2013                   9
Number of User
• Having a large number of concurrent users can
  slow response time in a network not designed to
  coordinate heavy traffic loads.
• The design of a given network is based on an
  assessment of the average number of users that
  will be communicating at any one time.
• In peak load periods, however, the actual number
  of users can exceed the average and thereby
  decrease performance.
• How a network responds to loading is measure of
  its performance.

11/17/2011            MTN 2013                   10
Type of Connection
      – Point to Point - single transmitter and
        receiver
      – Multipoint - multiple recipients of single
        transmission




11/17/2011                MTN 2013                   11
Type of Transmission
• Unicast, multicast, broadcast
• Transmission medium
      – The medium defines the speed at which data can
        travel through a connection. Today’s networks are
        moving to faster and faster transmission
        media, such as fiber-optic cabling, a medium that
        can carry data at only 10 megabits per second.
        However, the speed of light imposes an upper
        bound on the data rate.

11/17/2011                  MTN 2013                    12
Hardware
• The types of hardware included in a network
  affect both the speed and capacity of
  transmission. A higher-speed computer with
  greater storage capacity provides better
  performance.




11/17/2011           MTN 2013                   13
Software
• The software used to process data at the
  sender, receiver, and intermediate nodes also affects
  network performance.
• Moving a message from node to node through a
  network requires processing to transform the raw data
  into transmittable signals, to route these signals to the
  proper destination, to ensure error-free delivery, and
  to recast the signals into a form the receiver can use.
• The software that provides these services affects both
  the speed and the reliability of a network link.
• Well-designed software can speed the process and
  make transmission more effective and efficient.

11/17/2011                 MTN 2013                       14
Reliability
• In addition to accuracy of delivery, network
  reliability is measured frequency of failure, the
  time it takes a link to recover from a
  failure, and the network’s robustness in a
  catastrophe.




11/17/2011             MTN 2013                   15
Frequency of Failure
• All networks fail occasionally.
• A network that fails often, however, is of little
  value to a user.
• Recovery time of a network after a failure:

    How long does it take to restore service? A
    network that recovers quickly is more useful
    than one that does not.

11/17/2011              MTN 2013                      16
Catastrophe
• Networks must be protected from
  catastrophic events such as
  fire, earthquake, or theft.
• One protection against unforeseen damage is
  a reliable system to back up network software.




11/17/2011            MTN 2013                 17
Security
• Network security issues include protecting data from unauthorized access
  and viruses.
    Unauthorized access:
    For a network to be useful, sensitive data must be protected from
    unauthorized access. Protection can be accomplished at a number of
    levels. At the lowest level are user identification codes and passwords. At
    a higher level are encryption techniques. In these mechanisms, data are
    systematically altered in such a way that if an unauthorized user intercepts
    them, they will be unintelligible.
    Viruses:
    Because a network is accessible from many points, it can be susceptible to
    computer viruses. A virus is an illicitly introduced code that damages the
    system. A good network is protected from viruses by hardware and
    software designed specifically for that purpose.


11/17/2011                           MTN 2013                                 18
4. Transmission Mode
• Defines the direction of data flow between two
  linked devices.
• The manner or way in which data is transmitted
  from one place to another is called data
  transmission mode.
• There are three ways for transmitting data from
  one location to another. These are:
      – Simplex
      – Half duplex
      – Full duplex

11/17/2011             MTN 2013                     19
Simplex Mode
• The communication can take place in only one direction.
• A terminal can only send data and cannot receive it or it can only
  receive data but cannot send it.
• It means that in this mode communication is uni-directional.
• Today, this mode of data communication is not popular, because
  most of the modem communications require two-way exchange of
  data.
• However, this mode of communication is used in business field at
  certain point-of-sale terminals in which sales data is entered
  without a corresponding reply.
• The other examples of simplex communication modes are radio and
  TV transmissions.
• Computer system, the keyboard, monitor and printer are examples
  of simplex devices.
• The keyboard can only be used to enter data into computer, while
  monitor and printer can only accept (display/print) output.

11/17/2011                     MTN 2013                           20
Half/Semi Duplex Mode
• The communication can take place in both directions,
  but only in one direction at a time.
• In this mode, data is sent and received alternatively. It
  is like a one-lane bridge where two-way traffic must
  give way in order to cross the other.
• In half-duplex mode, at a time only one end transmits
  data while other end receives.
• In addition, it is possible to perform error detection
  and request the sender to re-transmit information.
• The Internet browsing is an example of half duplex.
  When we issue a request to download a web
  document, then that document is downloaded and
  displayed before we issue another request.

11/17/2011                 MTN 2013                           21
Full Duplex Mode
• The communication can take place in both
  directions simultaneously, i.e. at the same time on
  the same channel.
• It is the fastest directional mode of communication.
• Example of this mode is conversation of the persons
  through telephone.
• This type of communication is similar to automobile
  traffic on a two-lane road.
• The telephone communication system is an
  example of full duplex communication mode.

 11/17/2011              MTN 2013                   22
5. Network Topology
• The network topology defines the way in which
  computers, printers, and other devices are connected. A
  network topology describes the layout of the wire and devices
  as well as the paths used by data transmissions.




11/17/2011                  MTN 2013                         23
Bus Topology
     Commonly referred to as a
     linear bus, all the devices
     on a bus topology are
     connected by one single
     cable.




11/17/2011                    MTN 2013   24
Bus Topology
• Advantages                          • Disadvantages
      – It is easy to handle               – The cable length is
        and implement.                       limited. This limits the
                                             number of stations
      – It is best suited for
                                             that can be connected.
        small networks.
                                           – This network topology
                                             can perform well only
                                             for a limited number
                                             of nodes.


11/17/2011                      MTN 2013                            25
Star & Tree Topology
     The star topology is the most
     commonly used architecture in
     Ethernet LANs.
     When installed, the star topology
     resembles spokes in a bicycle wheel.
     Larger networks use the extended
     star topology also called tree
     topology. When used with network
     devices that filter frames or
     packets, like bridges, switches, and
     routers, this topology significantly
     reduces the traffic on the wires by
     sending packets only to the wires of
     the destination host.
11/17/2011                   MTN 2013       26
Star Topology
• Advantages                             • Disadvantages
      – Due to its centralized                – The network operation
        nature, the topology                    depends on the
        offers simplicity of                    functioning of the
        operation.                              central hub.
      – It also achieves an                   – Hence, the failure of the
        isolation of each device                central hub leads to the
        in the network.                         failure of the entire
                                                network.
                  Hub




11/17/2011                         MTN 2013                             27
Tree Topology
• A tree topology is a hierarchical computer
  network that is a combination of star and bus
  topologies.
• Allows for multiple hubs to exist on a network
  which act as roots for terminals connected to
  them.
• This tree like branched structure of networks
  provides high scalability.

11/17/2011            MTN 2013                 28
Tree Topology
•    Advantages                                      •    Disadvantages
       – It is the best topology for a large              - Dependence of the entire network
         computer network for which a star                on one central hub is a point of
         topology or ring topology are unsuitable         vulnerability for this topology. A
         due to the sheer scale of the entire             failure of the central hub or failure of
         network.
                                                          the main data trunk cable, can
       – Tree topology divides the whole                  cripple the whole network.
         network into parts that are more easily
         manageable. Tree topology makes it               - With increase in size beyond a
         possible to have a point to point                point, the management becomes
         network.                                         difficult.
       – All computers have access to their
         immediate neighbors in the network
         and also the central hub. This kind of
         network makes it possible for multiple
         network devices to be connected with
         the central hub.
       – It overcomes the limitation of star
         network topology, which has a
         limitation of hub connection points and
         the broadcast traffic induced limitation
         of a bus network topology. A tree
         network provides enough room for
         future expansion of a network.

    11/17/2011                                 MTN 2013                                         29
Ring Topology
   A     frame    travels    around    the
   ring, stopping at each node. If a node
   wants to transmit data, it adds the
   data as well as the destination address
   to the frame.
   The frame then continues around the
   ring until it finds the destination
   node, which takes the data out of the
   frame.
      Single ring – All the devices on the
      network share a single cable
           Dual ring – The dual ring topology
           allows data to be sent in both
11/17/2011
           directions.          MTN 2013        30
Ring Topology
• Advantages                            • Disadvantages
      – The data being                       – The failure of a single
        transmitted between                    node of the network can
        two nodes passes                       cause the entire network
        through all the                        to fail.
        intermediate nodes.                  – The movement or
      – A central server is not                changes made to
        required for the                       network nodes affects
        management of this                     the performance of the
        topology.                              entire network.


11/17/2011                        MTN 2013                           31
Mesh Topology

      The     mesh     topology
      connects    all   devices
      (nodes) to each other for
      redundancy and fault
      tolerance.
      It is used in WANs to
      interconnect LANs and for
      mission critical networks
      like those used by banks
      and financial institutions.
      Implementing the mesh
      topology is expensive and
      difficult.

11/17/2011                     MTN 2013   32
Mesh Topology
• Advantages                     • Disadvantages
                                      – The arrangement
      – The arrangement of              wherein every network
        the network nodes is            node is connected to
        such that it is                 every other node of
                                        the network, many of
        possible to transmit            the connections serve
        data from one node              no major purpose.
        to many other nodes           – This leads to the
                                        redundancy of many of
        at the same time.               the network
                                        connections.


11/17/2011                 MTN 2013                        33
END
              Q&A
11/17/2011   MTN2013CNT   34

More Related Content

What's hot

Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Networking devices
Networking devicesNetworking devices
Networking devicesTayyab Hussain
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantagessabari Giri
 
Serial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionSerial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionRohanMistry15
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
 
dsl (digital subscriber line)
dsl (digital subscriber line)dsl (digital subscriber line)
dsl (digital subscriber line)waheed iqbal
 
Computer networking
Computer networkingComputer networking
Computer networkingAbdul Rehman
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer networkSaahilIT
 

What's hot (20)

Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Manet
ManetManet
Manet
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Serial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionSerial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmission
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
dsl (digital subscriber line)
dsl (digital subscriber line)dsl (digital subscriber line)
dsl (digital subscriber line)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Network Software
Network SoftwareNetwork Software
Network Software
 
basic networking
basic networkingbasic networking
basic networking
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
 

Viewers also liked

BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
network topology
network topologynetwork topology
network topologyharish pillai
 
introduction to networking
introduction to networkingintroduction to networking
introduction to networkingRobert Almazan
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To NetworkingSteven Cahill
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyAmmar Rahman
 
Network topologies
Network topologiesNetwork topologies
Network topologiesShripal Oswal
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.pptSiddique Ibrahim
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1Zafar Ayub
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingRWHGA
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networkinganishgoel
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
04 introduction to computer networking
04 introduction to computer networking04 introduction to computer networking
04 introduction to computer networkingtjunicornfx
 
Display Network criteria bidding
Display Network criteria biddingDisplay Network criteria bidding
Display Network criteria biddingsupergigas
 

Viewers also liked (20)

BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
network topology
network topologynetwork topology
network topology
 
introduction to networking
introduction to networkingintroduction to networking
introduction to networking
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Networking fundamental
Networking fundamentalNetworking fundamental
Networking fundamental
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networking
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
04 introduction to computer networking
04 introduction to computer networking04 introduction to computer networking
04 introduction to computer networking
 
Display Network criteria bidding
Display Network criteria biddingDisplay Network criteria bidding
Display Network criteria bidding
 

Similar to Computer Network

Computer networks
Computer networksComputer networks
Computer networksKeerty Smile
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networkingprashanna13
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information TechnologySagar Mehta
 
chapter 3.pptx
chapter 3.pptxchapter 3.pptx
chapter 3.pptxAbdalleGeele
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptxAbdalleGeele
 
chapter 2.pptx
chapter 2.pptxchapter 2.pptx
chapter 2.pptxAbdalleGeele
 
Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 
chapter v.pptx
chapter v.pptxchapter v.pptx
chapter v.pptxAbdalleGeele
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxManasaPM3
 
chapter lll.pptx
chapter lll.pptxchapter lll.pptx
chapter lll.pptxAbdalleGeele
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptxssusercd3ff8
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptxMohammedAnas871930
 
Ch 5 computer networks by anam younas
Ch 5 computer networks by anam younasCh 5 computer networks by anam younas
Ch 5 computer networks by anam younasAnamYounas1
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questionsTaleManju
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018Fizaril Amzari Omar
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317Khondoker Sadia
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in BusinessNethan P
 

Similar to Computer Network (20)

Computer networks
Computer networksComputer networks
Computer networks
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
chapter 3.pptx
chapter 3.pptxchapter 3.pptx
chapter 3.pptx
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
chapter 2.pptx
chapter 2.pptxchapter 2.pptx
chapter 2.pptx
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 
chapter v.pptx
chapter v.pptxchapter v.pptx
chapter v.pptx
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx
 
chapter lll.pptx
chapter lll.pptxchapter lll.pptx
chapter lll.pptx
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptx
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Ch 5 computer networks by anam younas
Ch 5 computer networks by anam younasCh 5 computer networks by anam younas
Ch 5 computer networks by anam younas
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questions
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in Business
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 

Computer Network

  • 1. MTN 2013 Computer Network Technology Chapter 2 Computer Network
  • 2. Outline 1. Introduction to Networking 2. Network Configuration 3. Network Criteria 4. Transmission Mode 5. Network Topology 11/17/2011 MTN 2013 2
  • 3. 1. Introduction to Networking • What is network? • A network consists of 2 or more computers connected together, and they can communicate and share resources (i.e. information) 11/17/2011 MTN 2013 3
  • 4. Why Networking? • Sharing information — i.e. data communication Do you prefer these? Or this? 11/17/2011 MTN 2013 4
  • 5. Networking • Sharing hardware or software • E.g. print document • Centralize administration and support • E.g. Internet-based, so everyone can access the same administrative or support application from their PCs 11/17/2011 MTN 2013 5
  • 6. How many kinds of Networks? • Depending on one’s perspective, we can classify networks in different ways • Based on transmission media: Wired (UTP, coaxial cables, fiber-optic cables) and Wireless • Based on network size: LAN and WAN (and MAN) • Based on management method: Peer-to-peer and Client/Server • Based on topology (connectivity): Bus, Star, Ring … : : 11/17/2011 MTN 2013 6
  • 7. 2. Network Configuration • Form/arrangement/setup of network parts/elements. • Ways that computers can be connected together to form networks. 11/17/2011 MTN 2013 7
  • 8. 3. Network Criteria • To be considered effective and efficient, a network must meet a number of criteria. The most important of these are performance, reliability, and security. Performance Reliability Security Type of Hardware Software connection Type of Frequency of Catastrophe transmission failure Number of user 11/17/2011 MTN 2013 8
  • 9. Performance • Performance can be measured in many ways, including transit time and response time. • Transit time is the amount of time required for a message to travel from one device to another. • Response time is the elapsed time between an enquiry and a response. • The performance of a network depends on a number of factors, including the number of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency of the software. 11/17/2011 MTN 2013 9
  • 10. Number of User • Having a large number of concurrent users can slow response time in a network not designed to coordinate heavy traffic loads. • The design of a given network is based on an assessment of the average number of users that will be communicating at any one time. • In peak load periods, however, the actual number of users can exceed the average and thereby decrease performance. • How a network responds to loading is measure of its performance. 11/17/2011 MTN 2013 10
  • 11. Type of Connection – Point to Point - single transmitter and receiver – Multipoint - multiple recipients of single transmission 11/17/2011 MTN 2013 11
  • 12. Type of Transmission • Unicast, multicast, broadcast • Transmission medium – The medium defines the speed at which data can travel through a connection. Today’s networks are moving to faster and faster transmission media, such as fiber-optic cabling, a medium that can carry data at only 10 megabits per second. However, the speed of light imposes an upper bound on the data rate. 11/17/2011 MTN 2013 12
  • 13. Hardware • The types of hardware included in a network affect both the speed and capacity of transmission. A higher-speed computer with greater storage capacity provides better performance. 11/17/2011 MTN 2013 13
  • 14. Software • The software used to process data at the sender, receiver, and intermediate nodes also affects network performance. • Moving a message from node to node through a network requires processing to transform the raw data into transmittable signals, to route these signals to the proper destination, to ensure error-free delivery, and to recast the signals into a form the receiver can use. • The software that provides these services affects both the speed and the reliability of a network link. • Well-designed software can speed the process and make transmission more effective and efficient. 11/17/2011 MTN 2013 14
  • 15. Reliability • In addition to accuracy of delivery, network reliability is measured frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness in a catastrophe. 11/17/2011 MTN 2013 15
  • 16. Frequency of Failure • All networks fail occasionally. • A network that fails often, however, is of little value to a user. • Recovery time of a network after a failure: How long does it take to restore service? A network that recovers quickly is more useful than one that does not. 11/17/2011 MTN 2013 16
  • 17. Catastrophe • Networks must be protected from catastrophic events such as fire, earthquake, or theft. • One protection against unforeseen damage is a reliable system to back up network software. 11/17/2011 MTN 2013 17
  • 18. Security • Network security issues include protecting data from unauthorized access and viruses. Unauthorized access: For a network to be useful, sensitive data must be protected from unauthorized access. Protection can be accomplished at a number of levels. At the lowest level are user identification codes and passwords. At a higher level are encryption techniques. In these mechanisms, data are systematically altered in such a way that if an unauthorized user intercepts them, they will be unintelligible. Viruses: Because a network is accessible from many points, it can be susceptible to computer viruses. A virus is an illicitly introduced code that damages the system. A good network is protected from viruses by hardware and software designed specifically for that purpose. 11/17/2011 MTN 2013 18
  • 19. 4. Transmission Mode • Defines the direction of data flow between two linked devices. • The manner or way in which data is transmitted from one place to another is called data transmission mode. • There are three ways for transmitting data from one location to another. These are: – Simplex – Half duplex – Full duplex 11/17/2011 MTN 2013 19
  • 20. Simplex Mode • The communication can take place in only one direction. • A terminal can only send data and cannot receive it or it can only receive data but cannot send it. • It means that in this mode communication is uni-directional. • Today, this mode of data communication is not popular, because most of the modem communications require two-way exchange of data. • However, this mode of communication is used in business field at certain point-of-sale terminals in which sales data is entered without a corresponding reply. • The other examples of simplex communication modes are radio and TV transmissions. • Computer system, the keyboard, monitor and printer are examples of simplex devices. • The keyboard can only be used to enter data into computer, while monitor and printer can only accept (display/print) output. 11/17/2011 MTN 2013 20
  • 21. Half/Semi Duplex Mode • The communication can take place in both directions, but only in one direction at a time. • In this mode, data is sent and received alternatively. It is like a one-lane bridge where two-way traffic must give way in order to cross the other. • In half-duplex mode, at a time only one end transmits data while other end receives. • In addition, it is possible to perform error detection and request the sender to re-transmit information. • The Internet browsing is an example of half duplex. When we issue a request to download a web document, then that document is downloaded and displayed before we issue another request. 11/17/2011 MTN 2013 21
  • 22. Full Duplex Mode • The communication can take place in both directions simultaneously, i.e. at the same time on the same channel. • It is the fastest directional mode of communication. • Example of this mode is conversation of the persons through telephone. • This type of communication is similar to automobile traffic on a two-lane road. • The telephone communication system is an example of full duplex communication mode. 11/17/2011 MTN 2013 22
  • 23. 5. Network Topology • The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions. 11/17/2011 MTN 2013 23
  • 24. Bus Topology Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable. 11/17/2011 MTN 2013 24
  • 25. Bus Topology • Advantages • Disadvantages – It is easy to handle – The cable length is and implement. limited. This limits the number of stations – It is best suited for that can be connected. small networks. – This network topology can perform well only for a limited number of nodes. 11/17/2011 MTN 2013 25
  • 26. Star & Tree Topology The star topology is the most commonly used architecture in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle wheel. Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host. 11/17/2011 MTN 2013 26
  • 27. Star Topology • Advantages • Disadvantages – Due to its centralized – The network operation nature, the topology depends on the offers simplicity of functioning of the operation. central hub. – It also achieves an – Hence, the failure of the isolation of each device central hub leads to the in the network. failure of the entire network. Hub 11/17/2011 MTN 2013 27
  • 28. Tree Topology • A tree topology is a hierarchical computer network that is a combination of star and bus topologies. • Allows for multiple hubs to exist on a network which act as roots for terminals connected to them. • This tree like branched structure of networks provides high scalability. 11/17/2011 MTN 2013 28
  • 29. Tree Topology • Advantages • Disadvantages – It is the best topology for a large - Dependence of the entire network computer network for which a star on one central hub is a point of topology or ring topology are unsuitable vulnerability for this topology. A due to the sheer scale of the entire failure of the central hub or failure of network. the main data trunk cable, can – Tree topology divides the whole cripple the whole network. network into parts that are more easily manageable. Tree topology makes it - With increase in size beyond a possible to have a point to point point, the management becomes network. difficult. – All computers have access to their immediate neighbors in the network and also the central hub. This kind of network makes it possible for multiple network devices to be connected with the central hub. – It overcomes the limitation of star network topology, which has a limitation of hub connection points and the broadcast traffic induced limitation of a bus network topology. A tree network provides enough room for future expansion of a network. 11/17/2011 MTN 2013 29
  • 30. Ring Topology A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. Single ring – All the devices on the network share a single cable Dual ring – The dual ring topology allows data to be sent in both 11/17/2011 directions. MTN 2013 30
  • 31. Ring Topology • Advantages • Disadvantages – The data being – The failure of a single transmitted between node of the network can two nodes passes cause the entire network through all the to fail. intermediate nodes. – The movement or – A central server is not changes made to required for the network nodes affects management of this the performance of the topology. entire network. 11/17/2011 MTN 2013 31
  • 32. Mesh Topology The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult. 11/17/2011 MTN 2013 32
  • 33. Mesh Topology • Advantages • Disadvantages – The arrangement – The arrangement of wherein every network the network nodes is node is connected to such that it is every other node of the network, many of possible to transmit the connections serve data from one node no major purpose. to many other nodes – This leads to the redundancy of many of at the same time. the network connections. 11/17/2011 MTN 2013 33
  • 34. END Q&A 11/17/2011 MTN2013CNT 34