SlideShare a Scribd company logo
Computer Networks
Networking
Computer network
A collection of computing devices connected in
order to communicate and share resources
Connections between computing devices can be
physical using wires or cables or wireless using radio
waves or infrared signals
Networking…
Node
Any device on a network
Data transfer rate (bandwidth)
The speed with which data is moved from
one place to another on a network
Basic Components
4
Basic Components…
 Terminals: end user work station
 Telecommunications Channels & Media: Media
over which data are transmitted – coaxial cables,
fiber optics etc.
 Computer: carry out their information processing
assignments. Mainframe host computer/server.
5
Basic Components…
 Telecommunication Software: controls the
telecommunication activities
 Telecommunication Processors: to enhance data
communication b/w two points – modems,
message switchers, multiplexers, front end
processors
6
Basic Components…
 Modems: most common type; convert analog signals to
digital and vice versa.
 Message Switchers: device that receives data messages
from terminals, determine their destination and routes
them one by one to the CPU.
 Advantages – reduce long distance transmission costs since only
single line is required
 Multiplexers : collects messages from many senders, puts
them in order & transmits them thru a broadband; allows
simultaneous transmission
7
Basic Components…
 Concentrator : a smart multiplexer, can be programmed,
more processing capability (used for load balancing)
 Controller : link groups (clusters) of terminals to a
communication channel
 Front-end processors: located near the host computer,
relieves the host computer of some of the communications
tasks, so that it can process other applications requests.
8
Communications Media
 Channel:
 means by which data is transmitted b/w
sending and receiving devices.
9
Types of Networks
Local-area network (LAN)
A network that connects a relatively small number of
machines in a relatively close geographical area
Ring topology connects all nodes in a closed loop on
which messages travel in one direction
Star topology centers around one node to which all
others are connected and through which all messages are
sent
Bus topology nodes are connected to a single
communication line that carries messages in both
directions
Types of Networks
Ethernet
The industry standard bus technology for
local-area networks
Types of Networks
Wide-area network (WAN)
A network that connects local-area networks over a
potentially large geographic distance
Metropolitan-area network (MAN)
The communication infrastructures that have been
developed in and around large cities
Gateway
One particular set up to handle all communication
going between that LAN and other networks
Types of Networks
Local-area networks connected across a distance to
create a wide-area network
Types of Networks
Internet
A wide area network that spans the planet
14
Network Protocols
 An agreed-upon format for transmitting
data b/w 2 devices.
 Protocol determines the following
 Type of error checking
 Data compression method
 Message completion indicated by sender
 Message acknowledgement by receiver
 Popular protocols – TCP/IP, HTTP, FTP, SMTP, POP
15
Network Architecture
 Refer to either h/w, s/w or a combination.
 Classification : -
 Peer-to-peer architecture – each workstation
has equivalent capabilities & responsibilities
 Client/Server architecture – each computer is
either a client or a server.
16
Packet Transmission/Switching
Packet
A unit of data sent across a network
Router
A network device that directs a packet between networks
toward its final destination
Packet switching
Messages are divided into fixed-sized, numbered packets;
packets are individually routed to their destination, then
reassembled
Packet Switching
Messages
sent by
packet
switching
Take a message, break it into three packets, and
simulate this process
Hubs
 A hub is the place where data converges
from one or more directions and is
forwarded out in one or more directions.
 Seen in local area networks
Switches
 Allow different nodes of a network to
communicate directly with each other.
 Allow several users to send information over
a network at the same time without slowing
each other down using Media Access
Control address (MAC address)
TCP/IP
Transmission Control Protocol (TCP)
Software that breaks messages into packets, hands
them off to the IP software for delivery, and then
orders and reassembles the packets at their
destination
Internet Protocol (IP)
Software that deals with the routing of packets
through the maze of interconnected networks to
their final destination
21
High-Level Protocols
Other protocols build on TCP/IP protocol suite
Simple Mail Transfer Protocol (SMTP) used to specify
transfer of electronic mail
File Transfer Protocol (FTP) allows a user to transfer
files to and from another computer
Telnet used to log onto one computer from another
Hyper Text Transfer Protocol (http) allows exchange
of Web documents
22
Which of these have you used?
Firewalls- Network Security
Firewall
A gateway machine and its software that protects a
network by filtering the traffic it allows
Access control policy
A set of rules established by an organization that
specify what types of network communication are
permitted and denied
23
Have your messages ever been
returned undelivered, blocked by a firewall?
Firewalls
24
A firewall protecting a LAN

More Related Content

What's hot

Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 
Computer network
Computer networkComputer network
Computer network
Gaurav Rawat
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
R G Mani
 
The OSI model
 The OSI model The OSI model
The OSI model
ShofiqulIslam38
 
Basic Concepts of Computer Networking
 Basic Concepts of Computer Networking Basic Concepts of Computer Networking
Basic Concepts of Computer Networking
ShofiqulIslam38
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
MSA Technosoft
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
MSA Technosoft
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK
Amar Panchal
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
Switching
SwitchingSwitching
Switching
Shankar Gangaju
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
Sweta Kumari Barnwal
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Computer networks-4
Computer networks-4Computer networks-4
Computer networks-4
MSA Technosoft
 
IT Lexicon
IT LexiconIT Lexicon
IT Lexicon
anku2266
 
Switching
SwitchingSwitching
Switching
sheekha_11
 

What's hot (20)

Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Computer network
Computer networkComputer network
Computer network
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Basic Concepts of Computer Networking
 Basic Concepts of Computer Networking Basic Concepts of Computer Networking
Basic Concepts of Computer Networking
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Switching
SwitchingSwitching
Switching
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Computer networks-4
Computer networks-4Computer networks-4
Computer networks-4
 
IT Lexicon
IT LexiconIT Lexicon
IT Lexicon
 
Switching
SwitchingSwitching
Switching
 

Similar to Computer network-types1

Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment help
Jacob William
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
DebaComedyClub
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1arjun0222
 
Class work 1
Class work 1Class work 1
Class work 1
RaziaSultanaHimu
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
AfsanaAkterRubi
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
raptrovic
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
Data communications and computer networks
Data communications and computer networksData communications and computer networks
Data communications and computer networks
obaid-ur-rehman
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
DURYODHAN MAHAPATRA
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
Sithu PM
 
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
NIMISHMUTYAPU
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networksichiswa
 
Computer network
Computer networkComputer network
Computer network
ABHINANDAN Lalit
 
Class 2
Class 2Class 2
Class 2
AsmaulCSE
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
theshivammit13
 

Similar to Computer network-types1 (20)

Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment help
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Lan wan
Lan wanLan wan
Lan wan
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1
 
Class work 1
Class work 1Class work 1
Class work 1
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communications and computer networks
Data communications and computer networksData communications and computer networks
Data communications and computer networks
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Networking fundamentals (1)
Networking fundamentals (1)Networking fundamentals (1)
Networking fundamentals (1)
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
 
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
 
Computer network
Computer networkComputer network
Computer network
 
Class 2
Class 2Class 2
Class 2
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Computer network-types1

  • 2. Networking Computer network A collection of computing devices connected in order to communicate and share resources Connections between computing devices can be physical using wires or cables or wireless using radio waves or infrared signals
  • 3. Networking… Node Any device on a network Data transfer rate (bandwidth) The speed with which data is moved from one place to another on a network
  • 5. Basic Components…  Terminals: end user work station  Telecommunications Channels & Media: Media over which data are transmitted – coaxial cables, fiber optics etc.  Computer: carry out their information processing assignments. Mainframe host computer/server. 5
  • 6. Basic Components…  Telecommunication Software: controls the telecommunication activities  Telecommunication Processors: to enhance data communication b/w two points – modems, message switchers, multiplexers, front end processors 6
  • 7. Basic Components…  Modems: most common type; convert analog signals to digital and vice versa.  Message Switchers: device that receives data messages from terminals, determine their destination and routes them one by one to the CPU.  Advantages – reduce long distance transmission costs since only single line is required  Multiplexers : collects messages from many senders, puts them in order & transmits them thru a broadband; allows simultaneous transmission 7
  • 8. Basic Components…  Concentrator : a smart multiplexer, can be programmed, more processing capability (used for load balancing)  Controller : link groups (clusters) of terminals to a communication channel  Front-end processors: located near the host computer, relieves the host computer of some of the communications tasks, so that it can process other applications requests. 8
  • 9. Communications Media  Channel:  means by which data is transmitted b/w sending and receiving devices. 9
  • 10. Types of Networks Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area Ring topology connects all nodes in a closed loop on which messages travel in one direction Star topology centers around one node to which all others are connected and through which all messages are sent Bus topology nodes are connected to a single communication line that carries messages in both directions
  • 11. Types of Networks Ethernet The industry standard bus technology for local-area networks
  • 12. Types of Networks Wide-area network (WAN) A network that connects local-area networks over a potentially large geographic distance Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities Gateway One particular set up to handle all communication going between that LAN and other networks
  • 13. Types of Networks Local-area networks connected across a distance to create a wide-area network
  • 14. Types of Networks Internet A wide area network that spans the planet 14
  • 15. Network Protocols  An agreed-upon format for transmitting data b/w 2 devices.  Protocol determines the following  Type of error checking  Data compression method  Message completion indicated by sender  Message acknowledgement by receiver  Popular protocols – TCP/IP, HTTP, FTP, SMTP, POP 15
  • 16. Network Architecture  Refer to either h/w, s/w or a combination.  Classification : -  Peer-to-peer architecture – each workstation has equivalent capabilities & responsibilities  Client/Server architecture – each computer is either a client or a server. 16
  • 17. Packet Transmission/Switching Packet A unit of data sent across a network Router A network device that directs a packet between networks toward its final destination Packet switching Messages are divided into fixed-sized, numbered packets; packets are individually routed to their destination, then reassembled
  • 18. Packet Switching Messages sent by packet switching Take a message, break it into three packets, and simulate this process
  • 19. Hubs  A hub is the place where data converges from one or more directions and is forwarded out in one or more directions.  Seen in local area networks
  • 20. Switches  Allow different nodes of a network to communicate directly with each other.  Allow several users to send information over a network at the same time without slowing each other down using Media Access Control address (MAC address)
  • 21. TCP/IP Transmission Control Protocol (TCP) Software that breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination Internet Protocol (IP) Software that deals with the routing of packets through the maze of interconnected networks to their final destination 21
  • 22. High-Level Protocols Other protocols build on TCP/IP protocol suite Simple Mail Transfer Protocol (SMTP) used to specify transfer of electronic mail File Transfer Protocol (FTP) allows a user to transfer files to and from another computer Telnet used to log onto one computer from another Hyper Text Transfer Protocol (http) allows exchange of Web documents 22 Which of these have you used?
  • 23. Firewalls- Network Security Firewall A gateway machine and its software that protects a network by filtering the traffic it allows Access control policy A set of rules established by an organization that specify what types of network communication are permitted and denied 23 Have your messages ever been returned undelivered, blocked by a firewall?