What is a Computer Network?
Characteristics of a computer network
Network Cables
Distributors
Routers
Internal Network Cards
External Network Cards
Intranet
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Internetwork
Point-to-Point
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in web servers and connected to local computers through the internet. These websites contain text pages, digital images, audios, videos, etc.
web 2.0
Web 2.0 refers to a perceived second generation of web development and design, that facilitates communication, secure information sharing, interoperability, and collaboration on the World Wide Web.
What is Server? (Web Server vs Application Server)Amit Nirala
What is Server?
Primary functions of Computer Server?
Difference between Web Server And Application Server?
Web Server vs Application Server.
Why Application server is a superior Server?
Functions of Application Server?
Application Server in 3-tier Application Architecture?
Functions of Web Server?
Enterprise applications runs on Application Server or Web Server?
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in web servers and connected to local computers through the internet. These websites contain text pages, digital images, audios, videos, etc.
web 2.0
Web 2.0 refers to a perceived second generation of web development and design, that facilitates communication, secure information sharing, interoperability, and collaboration on the World Wide Web.
What is Server? (Web Server vs Application Server)Amit Nirala
What is Server?
Primary functions of Computer Server?
Difference between Web Server And Application Server?
Web Server vs Application Server.
Why Application server is a superior Server?
Functions of Application Server?
Application Server in 3-tier Application Architecture?
Functions of Web Server?
Enterprise applications runs on Application Server or Web Server?
A computer network is a digital telecommunications network that allows network nodes to share resources. In computer networks, computer devices exchange data with each other using connections (data links) between nodes. These data links are established via network cables such as wire or fiber optics , or wireless media such as Wi-Fi .
Network computing devices that launch, route , and terminate data are called network nodes. [1] Nodes are often identified by network addresses and can include network hosts such as personal computers , phones , and servers , as well as network hardware such as routers and switches. Two such devices can be said to be interconnected when one can exchange information with the other, whether they are directly connected to each other or not. In most cases, application-specific communication protocols are layered (i.e., carry a payload ) over other general communication protocols . This formidable collection of information technology requires skilled network managers to keep all network systems running well.
Week 3 Learning ResourcesThis page contains the Learning Resou.docxcockekeshia
Week 3 Learning Resources
This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources.
Required Resources
Readings
· Haag, S., & Cummings, M. (2013). Management information systems for the information age (9th ed.). New York, NY: McGraw-Hill Irwin.
. Extended Learning Module A, “Computer Hardware and Software” (pp. 322–349)
. Extended Learning Module E, “Network Basics” (pp. 408–433)
· Enter your MyWalden user name: ([email protected]) and password (3#icldyoB1) at the prompt.
· Document:Week 3 Discussion Template (Word document)
Management Information Systems for The Information Age
Haag, S., & Cummings, M. (2013). Management information systems for the iriformation age.
New York: McGraw-Hill.
MANAGEMENT INFORMATION
SYSTEMS FOR THE INFORMATION AGE
> > Ninth Edition
-·
EXTENDED LEARNING MODULE E
NETWORK BASICS
Identify and describe the four basic concepts on which networks are built
and describe what is needed to set up a small peer-to-peer network at home.
Describe the components used to build large business networks and define and
compare local area networks (LANs), wide area networks (WANs),
and metropolitan area networks (MANs).
Compare and contrast the various Internet connection possibilities.
Compare and contrast the types of communications media.
State the four principles of computer security and describe how different net'{Vork
security devices reflect those principles.
<"'
ntroduction
en you're surfing the Web, accessing software on your school's server, sending e-mail,
ecting your roommate use his or her computer to access the files on your computer,
:rr computer is part of a network. A computer network (which we simply refer to as a
~·ork) is two or more computers connected so that they can communicate with each
r and share information, software, peripheral devices, and/ or processing power.
y networks have dozens, hundreds , or even thousands of computers.
SIC PRINCIPLES OF NETWORKS
=;works come in all sizes, from two computers connected to share a printer, to the
--m et, which is the largest network on the planet,joining millions of computers of all
all over the world. In between are business networks, which vary in size from a
zen or fewer computers to many thousands.
- ome basic principles apply to all networks, large or small.
I . Each computer on a network must have a network interface (either as an
expansion card or integrated into the motherboard, or even through software
for a modem) that provides the entrance or doorway in that computer for
information traffic to and from other computers.
2 . A network usually has at least one connecting device (like a hub, switch,
or home/broadband router) that ties the computers on the network together
and acts as a switchboard for passing information.
3 . There must be communications media like cables or radio waves connecting .
Decimal to Other Base System
Other Base System to Decimal System
Other Base System to Non-Decimal System
Shortcut method - Binary to Octal
Shortcut method - Octal to Binary
History and Introduction to Information and Communication TechnologyFaraz Ahmed
Information
Communication
Technology
TECHNOLOGY TIMELINE
EVOLUTION OF COMPUTERS
COMPUTER GENERATIONS
FIRST GENERATION
SECOND GENERATION
Third generation
Fourth Generation
NEW ERA COMPUTER
USAGE OF ICT IN DAILY LIFE
EDUCATION
BANKING
INDUSTRY
E-Commerce
COMPUTERISED AND NON- - COMPUTERISED
SYSTEMS
Computer Networking
What is a Computer Network?
Characteristics of a computer network
Distributors
Router
Network Card
Internal Network Cards
External Network Cards
Universal Serial Bus USB
Professional Practice
Introduction to
– Ethics
– Islamic Ethics
– Professional Ethic
– Computer Ethics
What is Ethics?
Importance of Ethics
Ethics in Islam
What is Professional Ethics
Why professional ethics?
Professional Ethics
Problems with Professional Ethics
Computer Ethics
Aspects of computer ethics
History of Computer Ethics
Categories of Computer Issues
-Privacy
-Property
-Access
-Accuracy
Moral and Ethical Problems
-Hacking, cracking and virus creation
-Software piracy
-Ethical Scenarios
History of computer ethics
What is computer ethics
Computer ethics topics
Computers in the Workplace
Computer Crime
Privacy and Anonymity
Intellectual Property
Professional Responsibility
Globalization
Evolution of computer ethics
Metaethics of computer ethics
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Group Presentation 2 Economics.Ariana Buscigliopptx
Data Communication & Computer Network
1. Computer - Networking
TEACHER:MAHEEN AQEEL
What is a Computer Network?
A computer network is a system in which multiple computers are connected
to each other to share information and resources.
Characteristics of a computer network
Share Resources from one computer to another
Create files and store them in one computer, access those files from the other
computer(s) connected over the network
Connect a printer, scanner, or a fax machine to one computer within the
network and let other computers of the network use the machines available
over network.
Following is the list of hardware's required to setup a computer network.
Network Cables
Distributors
Routers
Internal Network Cards
External Network Cards
2. Computer - Networking
TEACHER:MAHEEN AQEEL
Network Cables
Network cables are used to connect computers. The most commonly used
cable is Category 5 cable RJ-45.
Distributors
A computer can be connected to another one via a serial port but if we need
to connect many computers to produce a network, this serial connection will
not work. The solution is to use a central body to which other computers,
printers, scanners etc. can be connected and then this body will manage or
distribute network traffic.
3. Computer - Networking
TEACHER:MAHEEN AQEEL
Router
A router is a type of device which acts as the central point among
computers and other devices that are part of a network. A router is
equipped with holes called ports and computers and other devices are
connected to a router using network cables. Now-a-days router comes in
wireless modes using which computers can be connected without any
physical cable.
Network Card
Network card is a necessary component of a computer without which a
computer cannot be connected over a network. It is also known as network
adapter or Network Interface Card (NIC). Most branded computers have
network card pre-installed. Network cards are of two types : Internal and
External Network Cards.
4. Computer - Networking
TEACHER:MAHEEN AQEEL
INTERNAL NETWORK CARDS
Motherboard has a slot for internal network card where it is to be inserted.
Internal network cards are of two types in which first type uses Peripheral
Component Interconnect (PCI) connection while the second type uses
Industry Standard Architecture (ISA). Network cables are required to
provide network access.
EXTERNAL NETWORK CARDS
External network cards come in two flavours : Wireless and USB based.
Wireless network card need to be inserted into the motherboard but no
network cable is required to connect to network
5. Computer - Networking
TEACHER:MAHEEN AQEEL
Universal Serial Bus (USB)
USB card are easy to use and connect via USB port. Computers
automatically detect USB card and can install the drivers required to
support the USB network card automatically.
Computer - Internet and Intranet
Internet
It is a worldwide system which has the following characteristics:
Internet is a world-wide / global system of interconnected computer networks.
Internet uses the standard Internet Protocol (TCP/IP)
Every computer in internet is identified by a unique IP address.
IP Address is a unique set of numbers (such as 110.22.33.114) which identifies
a computer’s location.
A special computer DNS (Domain Name Server) is used to give name to the IP
Address so that user can locate a computer by a name.
6. Computer - Networking
TEACHER:MAHEEN AQEEL
For example, a DNS server will resolve a name http://www.google.com to a
particular IP address to uniquely identify the computer on which this website is
hosted.
Internet is accessible to every user all over the world.
Intranet
Intranet is system in which multiple PCs are connected to each other.
PCs in intranet are not available to the world outside the intranet.
Usually each company or organization has their own Intranet network and
members/employees of that company can access the computers in their
intranet.
Each computer in Intranet is also identified by an IP Address which is unique
among the computers in that Intranet.
7. Computer - Networking
TEACHER:MAHEEN AQEEL
Similarities in Internet and Intranet
Intranet uses the internet protocols such as TCP/IP and FTP.
Intranet sites are accessible via web browser in similar way as websites in
internet. But only members of Intranet network can access intranet hosted
sites.
In Intranet, own instant messengers can be used as similar to yahoo
messenger/ gtalk over the internet.
Differences in Internet and Intranet
Internet is general to PCs all over the world whereas Intranet is specific to few
PCs.
Internet has wider access and provides a better access to websites to large
population whereas Intranet is restricted.
Internet is not as safe as Intranet as Intranet can be safely privatized as per the
need.
8. Computer - Networking
TEACHER:MAHEEN AQEEL
Data Communication & Computer Network
Data communications refers to the transmission of this digital data between
two or more computers and a computer network or data network is a
telecommunications network that allows computers to exchange data. The
physical connection between networked computing devices is established
using either cable media or wireless media. The best-known computer
network is the Internet.
DCN - Computer Network Types
Generally, networks are distinguished based on their geographical span. A
network can be as small as distance between your mobile phone and its
Bluetooth headphone and as large as the internet itself, covering the whole
geographical world,
Personal Area Network
A Personal Area Network (PAN) is smallest network which is very personal
to a user. This may include Bluetooth enabled devices or infra-red enabled
devices. PAN has connectivity range up to 10 meters. PAN may include
wireless computer keyboard and mouse, Bluetooth enabled headphones,
wireless printers and TV remotes.
9. Computer - Networking
TEACHER:MAHEEN AQEEL
For example, Piconet is Bluetooth-enabled Personal Area Network which
may contain up to 8 devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single
administrative system is generally termed as Local Area Network (LAN).
Usually,LAN covers an organization’ offices, schools, colleges or universities.
Number of systems connected in LAN may vary from as least as two to as
much as 16 million.
LAN provides a useful way of sharing the resources between end users.The
resources such as printers, file servers, scanners, and internet are easily
sharable among computers.
10. Computer - Networking
TEACHER:MAHEEN AQEEL
LANs are composed of inexpensive networking and routing equipment. It
may contains local servers serving file storage and other locally shared
applications. It mostly operates on private IP addresses and does not
involve heavy routing. LAN works under its own local domain and controlled
centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely
employed LAN technology and uses Star topology, while Token-ring is rarely
seen.
LAN can be wired,wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city
such as cable TV network. It can be in the form of Ethernet,Token-ring,
ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables
its users to expand their Local Area Networks. For example, MAN can help
an organization to connect all of its offices in a city.
11. Computer - Networking
TEACHER:MAHEEN AQEEL
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works
in between Local Area Network and Wide Area Network. MAN provides
uplink for LANs to WANs or internet.
Wide Area Network
As the name suggests,the Wide Area Network (WAN) covers a wide area
which may span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks
provide connectivity to MANs and LANs. Since they are equipped with very
high speed backbone, WANs use very expensive network equipment.
12. Computer - Networking
TEACHER:MAHEEN AQEEL
WAN may use advanced technologies such as Asynchronous Transfer Mode
(ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may
be managed by multiple administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is
the largest network in existence on this planet.The internet hugely connects
all WANs and it can have connection to LANs and Home networks. Internet
uses TCP/IP protocol suite and uses IP as its addressing protocol. Present
day, Internet is widely implemented using IPv4. Because of shortage of
address spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of
information worldwide. It uses WWW, FTP, email services, audio and video
streaming etc. At huge level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect
various continents, fibers are laid under sea known to us as submarine
communication cable.
Internet is widely deployed on World Wide Web services using HTML linked
pages and is accessible by client software known as Web Browsers. When a
user requests a page using some web browser located on some Web Server
13. Computer - Networking
TEACHER:MAHEEN AQEEL
anywhere in the world, the Web Server responds with the proper HTML
page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life.
Some of them are:
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
DCN - Computer Network Toplogies
A Network Topology is the arrangement with which computer systems or
network devices are connected to each other. Topologies may define both
physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer,
switches or routers, servers connected back to back using a single piece of
cable. Often, the receiving end of one host is connected to sending end of
the other and vice-versa.
14. Computer - Networking
TEACHER:MAHEEN AQEEL
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network
and see each other as if they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or
cable.Bus topology may have problem while multiple hosts sending data at
the same time. Therefore, Bus topology either uses CSMA/CD technology or
recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.
15. Computer - Networking
TEACHER:MAHEEN AQEEL
Star Topology
All hosts in Star topology are connected to a central device, known as hub
device, using a point-to-point connection. That is, there exists a point to
point connection between hosts and hub. The hub device can be any of the
following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails,
connectivity of all hosts to all other hosts fails. Every communication
between hosts, takes place through only the hub.Star topology is not
expensive as to connect one more host, only one cable is required and
configuration is simple.
16. Computer - Networking
TEACHER:MAHEEN AQEEL
Ring Topology
In ring topology, each host machine connects to exactly two other
machines, creating a circular network structure. When one host tries to
communicate or send message to a host which is not adjacent to it, the
data travels through all intermediate hosts. To connect one more host in
the existing structure, the administrator may need only one more extra
cable.
Failure of any host results in failure of the whole ring.Thus, every
connection in the ring is a point of failure. There are methods which employ
one more backup ring.
17. Computer - Networking
TEACHER:MAHEEN AQEEL
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This
topology has hosts in point-to-point connection with every other host or
may also have hosts which are in point-to-point connection to few hosts
only.
Hosts in Mesh topology also work as relay for other hosts which do not have
direct point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides
the most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
18. Computer - Networking
TEACHER:MAHEEN AQEEL
Tree Topology
Also known as Hierarchical Topology, this is the most common form of
network topology in use presently.This topology imitates as extended Star
topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network.
Mainly in LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached. The middle
layer is known as distribution layer, which works as mediator between
upper layer and lower layer. The highest layer is known as core layer, and
is central point of the network, i.e. root of the tree from which all nodes
fork.
All neighboring hosts have point-to-point connection between them.Similar
to the Bus topology, if the root goes down, then the entire network suffers
even.though it is not the single point of failure. Every connection serves as
point of failure, failing of which divides the network into unreachable
segment.
19. Computer - Networking
TEACHER:MAHEEN AQEEL
Hybrid Topology
A network structure whose design contains more than one topology is said
to be hybrid topology. Hybrid topology inherits merits and demerits of all
the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining
topologies may contain attributes of Star, Ring, Bus, and Daisy-chain
topologies. Most WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology networks. Internet is
the best example of largest Hybrid topology
20. Computer - Networking
TEACHER:MAHEEN AQEEL
DCN – Overview
A system of interconnected computers and computerized peripherals such
as printers is called computer network. This interconnection among
computers facilitates information sharing among them. Computers may
connect to each other by either wired or wireless media.
Classification of Computer Networks
Computer networks are classified based on various factors.They includes:
Geographical span
Inter-connectivity
Administration
Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
It may be spanned across your table, among Bluetooth enabled devices,.
Ranging not more than few meters.
It may be spanned across a whole building, including intermediate devices to
connect all floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
It may be one network covering whole world.
Inter-Connectivity
Components of a network can be connected to each other differently in
some fashion. By connectedness we mean either logically , physically , or
both ways.
Every single device can be connected to every other device on network, making
the network mesh.
21. Computer - Networking
TEACHER:MAHEEN AQEEL
All devices can be connected to a single medium but geographically
disconnected, created bus like structure.
Each device is connected to its left and right peers only, creating linear structure.
All devices connected together with a single device, creating star like structure.
All devices connected arbitrarily using all previous ways to connect each other,
resulting in a hybrid structure.
Administration
From an administrator’s point of view, a network can be private network
which belongs a single autonomous system and cannot be accessed outside
its physical or logical domain.A network can be public which is accessed by
all.
Network Architecture
Computer networks can be discriminated into various types such as Client-
Server,peer-to-peer or hybrid, depending upon its architecture.
There can be one or more systems acting as Server. Other being Client, requests
the Server to serve requests.Server takes and processes request on behalf of
Clients.
Two systems can be connected Point-to-Point, or in back-to-back fashion. They
both reside at the same level and called peers.
There can be hybrid network which involves network architecture of both the
above types.
Network Applications
Computer systems and peripherals are connected to form a network.They
provide numerou advantages:
Resource sharing such as printers and storage devices
Exchange of information by means of e-Mails and FTP
Information sharing by using Web or Internet
Interaction with other users using dynamic web pages
IP phones